Enterprise Performance Strategies z/OS

Pivotor Modernization Guide

Report Generation and ManagementUNIX and WindowsUsage Accounting/SMF

Pivotor is a report generation and management product by Enterprise Performance Strategies. Explore technical details, modernization strategies, and migration paths below.

Product Overview

Pivotor is a Java-based tool designed for generating customizable z/OS performance reports and charts from SMF records.

It supports authentication methods like LDAP and integrates with z/OS security systems like RACF.

Modernization Strategies

Rehost

Timeline:
6-12 months

Lift-and-shift to cloud infrastructure with minimal code changes. Fast migration with lower risk.

Refactor (Recommended)

Timeline:
18-24 months

Optimize application architecture for cloud while preserving business logic. Best ROI long-term.

Replatform

Timeline:
3-5 years

Complete rewrite to cloud-native architecture with microservices and modern tech stack.

Frequently Asked Questions

General

What is Pivotor and what does it do?

Pivotor is a Java-based tool designed to generate customizable performance reports and charts from z/OS SMF records. It leverages Java, Apache Tomcat, and a JDBC-compliant database to provide flexible reporting capabilities.

What databases are supported by Pivotor?

Pivotor supports several database systems through JDBC, including DB2, Oracle, and MySQL. This allows users to store and retrieve performance data efficiently.

On what platforms can Pivotor be deployed?

Pivotor can be deployed on any platform supporting Java, Apache Tomcat, and a JDBC-compliant database. This includes z/OS and Linux.

How is Pivotor configured?

Pivotor uses configuration files, typically XML or properties files, to define report layouts, data sources, and other operational parameters. These files are read during startup and report generation.

Technical

What are the main components of Pivotor's architecture?

Pivotor's architecture includes components such as the Report Engine, Data Access Layer, and Presentation Layer. The Report Engine processes SMF records, the Data Access Layer interacts with the database, and the Presentation Layer generates reports and charts.

How do the components of Pivotor communicate with each other?

Pivotor communicates between components using standard Java APIs and JDBC for database interactions. The Presentation Layer may use HTTP/HTTPS for web-based access.

How does Pivotor retrieve data from SMF records?

Pivotor supports standard SQL queries for data retrieval. Users can customize these queries to extract specific performance metrics from SMF records.

What ports are required for Pivotor to communicate with the database?

Pivotor uses JDBC to connect to databases. The specific port depends on the database configuration (e.g., 1521 for Oracle, 3306 for MySQL).

Business Value

What business value does Pivotor provide?

Pivotor provides insights into z/OS performance, enabling informed decisions about resource allocation and system optimization. This leads to improved efficiency and cost savings.

How does Pivotor help in identifying performance issues?

By analyzing SMF data, Pivotor helps identify performance bottlenecks and inefficiencies, allowing administrators to take corrective actions and improve system throughput.

How does Pivotor support capacity planning and resource management?

Pivotor's customizable reports allow stakeholders to track key performance indicators (KPIs) and monitor system health over time. This supports better capacity planning and resource management.

Security

What authentication methods are supported by Pivotor?

Pivotor supports authentication methods such as LDAP and integration with z/OS security systems like RACF. This ensures that only authorized users can access performance data.

What access control model does Pivotor use?

Pivotor uses an access control model based on roles, where users are assigned roles with specific permissions. This allows for granular control over access to reports and data.

How does Pivotor ensure data security?

Pivotor encrypts sensitive data both in transit and at rest using industry-standard encryption algorithms. This protects data from unauthorized access.

What audit and logging capabilities exist in Pivotor?

Pivotor provides audit logging capabilities, recording user access, report generation, and configuration changes. This helps in tracking security-related events and ensuring compliance.

Operations

What administrative interfaces are available for Pivotor?

Pivotor provides a web-based administrative interface for managing users, configuring data sources, and scheduling report generation. This simplifies administrative tasks.

How is user management handled in Pivotor?

User management in Pivotor is handled through the administrative interface, where administrators can create, modify, and delete user accounts and assign roles.

What are the main configuration parameters for Pivotor?

Pivotor's main configuration parameters include database connection settings, report templates, and scheduling options. These parameters are typically stored in configuration files.

What monitoring and logging capabilities exist in Pivotor?

Pivotor includes monitoring and logging capabilities, providing insights into system performance, error conditions, and resource utilization. Logs can be accessed through the administrative interface or directly from the file system.

Ready to Start Your Migration?

Download our comprehensive migration guide for Pivotor or calculate your ROI.

Calculate ROI