Librarian Modernization Guide
Librarian is a source code product by Broadcom. Explore technical details, modernization strategies, and migration paths below.
Product Overview
Librarian is a source code management system used on z/OS, z/VM, and z/VSE platforms.
To get started, you will typically use ISPF panels or batch JCL to interact with Librarian.
Modernization Strategies
Rehost
- Timeline:
- 6-12 months
Lift-and-shift to cloud infrastructure with minimal code changes. Fast migration with lower risk.
Refactor (Recommended)
- Timeline:
- 18-24 months
Optimize application architecture for cloud while preserving business logic. Best ROI long-term.
Replatform
- Timeline:
- 3-5 years
Complete rewrite to cloud-native architecture with microservices and modern tech stack.
Frequently Asked Questions
General
What is Librarian and what does it do?
Librarian is a source code management system primarily used on z/OS, z/VM, and z/VSE platforms. It manages source code, JCL, documentation, and other related resources, providing version control and security features.
What are the key features of Librarian?
Librarian provides version control, allowing users to track changes to source code and other resources over time. It also offers security features to control access to these resources and audit facilities to track changes and access.
How does Librarian compare to other source code management systems?
Librarian is similar to other source code management systems like CA-Panvalet and IBM SCLM. These systems provide similar functionality for managing source code and related resources on mainframe platforms.
Technical
What are some common operations performed with Librarian?
Common operations include adding members to the library, retrieving members, updating members, and deleting members. The specific syntax depends on the interface used (e.g., batch JCL, ISPF panels).
Does Librarian have an API for integration with other systems?
While specific API details are not widely published, Librarian likely exposes interfaces for programmatic access to its functions. These interfaces may include callable subroutines or other mechanisms for integration with other applications.
How does Librarian store source code and other resources?
Librarian uses a repository to store source code and related resources. The specific storage mechanism is not publicly documented but likely involves VSAM datasets or similar mainframe storage technologies.
Business Value
What is the business value of using Librarian?
Librarian helps organizations maintain control over their source code and other critical resources. This control reduces the risk of errors, improves code quality, and facilitates compliance with regulatory requirements.
How does Librarian help with traceability and auditing?
By providing version control and audit capabilities, Librarian helps organizations track changes to their source code and identify potential issues. This traceability is essential for debugging, problem resolution, and compliance audits.
Security
What authentication methods are supported by Librarian?
Librarian supports various authentication methods, including RACF, ACF2, and Top Secret, depending on the security environment in place. These methods control access to Librarian resources.
How does Librarian control access to resources?
Librarian uses an access control model based on security profiles and permissions. These profiles define which users or groups have access to specific resources and what actions they are allowed to perform.
What audit and logging capabilities does Librarian provide?
Librarian provides audit logging capabilities to track access to resources and changes made to them. These logs can be used to monitor activity, identify potential security breaches, and comply with audit requirements.
Operations
How is Librarian administered?
Librarian is typically administered through ISPF panels or batch JCL. These interfaces allow administrators to manage users, define security profiles, and configure other system parameters.
How is user management handled in Librarian?
User management is handled through the security system in place (e.g., RACF, ACF2, Top Secret). Librarian integrates with these systems to authenticate users and control their access to resources.
What monitoring and logging capabilities does Librarian offer?
Librarian provides monitoring and logging capabilities to track system activity and identify potential issues. These logs can be used to monitor performance, troubleshoot problems, and ensure system stability.
Ready to Start Your Migration?
Download our comprehensive migration guide for Librarian or calculate your ROI.