Broadcom z/OS z/VM

MIM Modernization Guide

Files and DatasetsSharingTape

MIM is a files and datasets product by Broadcom. Explore technical details, modernization strategies, and migration paths below.

Product Overview

MIM (Multi-Image Manager) simplifies tape and dataset sharing across multiple z/OS images.

Configuration involves defining shared resources and communication parameters in configuration files.

Modernization Strategies

Rehost

Timeline:
6-12 months

Lift-and-shift to cloud infrastructure with minimal code changes. Fast migration with lower risk.

Refactor (Recommended)

Timeline:
18-24 months

Optimize application architecture for cloud while preserving business logic. Best ROI long-term.

Replatform

Timeline:
3-5 years

Complete rewrite to cloud-native architecture with microservices and modern tech stack.

Frequently Asked Questions

General

What problem does MIM solve?

MIM facilitates tape and dataset sharing across z/OS images, even in different Parallel Sysplexes. It eliminates the need for manual device varying and hardware RESERVEs, streamlining data access and management.

What are the main components of MIM?

The main components are MIA (Multi-Image Access for tape sharing), MII (Multi-Image Integrity for dataset sharing), and MIC (Multi-Image Communication for cross-system commands).

How does MIM enable tape and dataset sharing?

MIM supports tape sharing across z/OS images without requiring devices to be varied online and offline. Dataset sharing is enabled without hardware RESERVEs, similar to GRS.

How does MIM handle cross-system communication?

MIM allows z/OS images in the same or different Parallel Sysplexes to share resources. The MIC component enables cross-system command and message routing.

Technical

What configuration files are used by MIM?

MIM uses configuration files to define shared resources and communication parameters. The exact format and location of these files are detailed in the product documentation.

What APIs does MIM expose?

MIM does not expose standard APIs like REST or SOAP. Instead, it relies on native z/OS communication mechanisms for cross-system interactions.

How do the MIM components communicate with each other?

The main components communicate using z/OS system services and inter-system communication facilities. The specifics depend on the z/OS environment and configuration.

What authentication methods are supported by MIM?

MIM leverages z/OS security features for authentication and authorization. Specific methods include RACF, ACF2, and Top Secret, depending on the site's security configuration.

Business Value

How does MIM reduce operational overhead?

MIM reduces operational overhead by automating tape and dataset sharing. This eliminates manual intervention and minimizes downtime associated with device allocation and contention.

How does MIM improve hardware utilization and ROI?

By enabling efficient resource sharing, MIM optimizes hardware utilization and reduces the need for redundant infrastructure. This leads to cost savings and improved ROI.

How does MIM enhance disaster recovery capabilities?

MIM simplifies disaster recovery by ensuring that critical data and resources are accessible across multiple z/OS images. This enhances business continuity and resilience.

Security

How does MIM ensure security?

MIM leverages z/OS security features, including RACF, ACF2, and Top Secret, for authentication and authorization. The access control model is based on the z/OS security system in place.

What audit and logging capabilities exist in MIM?

MIM relies on z/OS security auditing and logging capabilities. Security events and access attempts are logged according to the z/OS security configuration.

What encryption is used by MIM?

MIM does not implement its own encryption. It relies on z/OS encryption facilities for data protection, if configured.

Operations

What administrative interfaces are available for MIM?

MIM provides administrative interfaces through z/OS console commands and ISPF panels. These interfaces allow administrators to configure and monitor MIM components.

How is user management handled in MIM?

User management is handled through the z/OS security system (RACF, ACF2, or Top Secret). MIM leverages these systems for user authentication and authorization.

What monitoring and logging capabilities does MIM offer?

MIM provides monitoring and logging capabilities through z/OS system logs and SMF records. These logs can be analyzed to track MIM activity and identify potential issues.

What are the network requirements for MIM?

MIM requires specific ports for inter-system communication. The exact ports depend on the z/OS communication protocols used and must be configured accordingly.

Ready to Start Your Migration?

Download our comprehensive migration guide for MIM or calculate your ROI.

Calculate ROI