P-Tracker Modernization Guide
P-Tracker is a program and load libraries product by UBS Hainer. Explore technical details, modernization strategies, and migration paths below.
Product Overview
P-Tracker is a tool for monitoring program and load module usage on z/OS systems.
By tracking software product use, P-Tracker enables better resource allocation and helps identify potential security risks.
Modernization Strategies
Rehost
- Timeline:
- 6-12 months
Lift-and-shift to cloud infrastructure with minimal code changes. Fast migration with lower risk.
Refactor (Recommended)
- Timeline:
- 18-24 months
Optimize application architecture for cloud while preserving business logic. Best ROI long-term.
Replatform
- Timeline:
- 3-5 years
Complete rewrite to cloud-native architecture with microservices and modern tech stack.
Frequently Asked Questions
General
What does P-Tracker do?
P-Tracker monitors program and load module usage on z/OS systems. It tracks who accessed which modules, when they were accessed, and the relationships between modules.
Is this a system, application, or tool?
P-Tracker is a software tool designed to provide insights into application and software product usage on mainframe systems.
What types of organizations use this?
Organizations that rely on the z/OS operating system, particularly those in industries like banking, finance, and insurance, find P-Tracker valuable for monitoring software usage and ensuring compliance.
When should we consider P-Tracker?
A company should consider using P-Tracker when it needs to understand how its software assets are being used, identify potential cost savings, or ensure compliance with licensing agreements.
What are the alternatives to P-Tracker?
Alternatives to P-Tracker include IBM Z Software Asset Management. P-Tracker distinguishes itself by focusing on detailed load module usage and inter-module dependencies.
Technical
What infrastructure is required?
P-Tracker runs on the z/OS operating system and requires access to system libraries and load modules. It can monitor applications running in environments like IMS and CICS.
For mainframe products: Does this run in an LPAR?
Yes, P-Tracker runs within an LPAR on a z/OS system. It leverages z/OS system services to gather information about load module usage.
How does P-Tracker discover load modules?
P-Tracker discovers load modules by scanning specified libraries on the z/OS system. It identifies modules and their attributes, such as size, creation date, and associated programs.
How does P-Tracker report on module dependencies?
P-Tracker reports on modules calling other modules by analyzing load module dependencies. It identifies which modules are invoked by other modules, providing a call graph of application components.
Business Value
How does P-Tracker provide business value?
P-Tracker helps organizations optimize software licensing costs by providing detailed usage information. This allows them to identify underutilized software and reallocate licenses as needed.
How does P-Tracker improve application performance?
By monitoring application usage, P-Tracker helps organizations understand how their applications are being used and identify areas for improvement. This can lead to better performance and user satisfaction.
How does P-Tracker help with compliance?
P-Tracker can help organizations ensure compliance with software licensing agreements by providing accurate usage data. This reduces the risk of non-compliance penalties.
Security
How does P-Tracker provide security?
P-Tracker controls access to mainframe datasets by integrating with z/OS security systems such as RACF, ACF2, or Top Secret. It leverages these systems to determine who is authorized to access specific load modules.
What audit logging capabilities exist?
P-Tracker provides audit logging capabilities that track who accessed which load modules and when. This information can be used to investigate security incidents and ensure accountability.
What authentication methods are supported?
P-Tracker supports various authentication methods, including those provided by z/OS security systems like RACF, ACF2, and Top Secret. It integrates with these systems to authenticate users.
Operations
How is P-Tracker typically deployed?
P-Tracker is typically deployed on-premise within the z/OS environment. It requires access to system libraries and load modules to collect usage data.
What level of technical expertise is required to implement it?
Implementing P-Tracker requires a moderate level of technical expertise, particularly in z/OS systems administration and security. Familiarity with RACF, ACF2, or Top Secret is beneficial.
What ongoing operational requirements exist?
Ongoing operational requirements include monitoring P-Tracker's performance, ensuring it has access to the necessary system resources, and reviewing audit logs for security incidents.
What are common implementation challenges?
Common implementation challenges include configuring P-Tracker to access the correct system libraries, integrating it with existing security systems, and ensuring it does not impact system performance.
Ready to Start Your Migration?
Download our comprehensive migration guide for P-Tracker or calculate your ROI.