BMC z/OS

Problem Program Evaluator Modernization Guide

PerformanceApplication DevelopmentMonitor

Problem Program Evaluator is a performance product by BMC. Explore technical details, modernization strategies, and migration paths below.

Product Overview

Problem Program Evaluator (PPE) was a tool used on z/OS systems to analyze the performance of individual programs.

These tools provide real-time monitoring, automated analysis, and integration with other development and operations tools.

Modernization Strategies

Rehost

Timeline:
6-12 months

Lift-and-shift to cloud infrastructure with minimal code changes. Fast migration with lower risk.

Refactor (Recommended)

Timeline:
18-24 months

Optimize application architecture for cloud while preserving business logic. Best ROI long-term.

Replatform

Timeline:
3-5 years

Complete rewrite to cloud-native architecture with microservices and modern tech stack.

Frequently Asked Questions

General

What was the primary purpose of Problem Program Evaluator?

Problem Program Evaluator (PPE) was designed to identify performance bottlenecks within individual programs running on z/OS. It pinpointed areas of high CPU consumption and excessive wait times by analyzing program execution at a granular level.

What kind of information did PPE provide to developers?

PPE provided detailed reports that highlighted the specific addresses within a program where the most CPU time was being spent or where the program was experiencing significant wait times. This allowed developers to focus their optimization efforts on the most problematic areas.

In what scenarios was PPE commonly used?

PPE was often used to optimize batch processing jobs, online transaction processing (OLTP) applications, and other critical workloads running on z/OS. By identifying and resolving performance bottlenecks, PPE helped to improve overall system throughput and reduce response times.

What were the key benefits of using PPE?

PPE's analysis capabilities helped reduce the consumption of system resources, such as CPU and memory, leading to lower operating costs. Improved application performance also translated into better user experience and increased business productivity.

Technical

How did Problem Program Evaluator technically work?

PPE operated by sampling the program's execution and collecting data on CPU usage and wait times at different memory addresses. This data was then aggregated and presented in reports that highlighted the areas of highest activity.

What were the common commands and configuration options in PPE?

While specific commands are not available due to the product's age and lack of support, typical operations would have involved specifying the program to be analyzed, setting sampling intervals, and generating reports. Configuration likely involved setting parameters for data collection and report formatting.

What kind of APIs did PPE expose for integration?

Given its age, PPE likely did not expose modern APIs like REST or SOAP. Integration would have been achieved through custom programming, potentially using system calls or other low-level interfaces specific to the z/OS environment.

What was the architecture of Problem Program Evaluator?

The architecture likely consisted of a data collection component running on z/OS, a data storage mechanism (possibly VSAM or sequential files), and a reporting component. Communication between components would have been through z/OS system services.

Business Value

How did PPE provide business value?

By identifying and resolving performance bottlenecks, PPE helped to improve application response times and reduce CPU consumption. This translated into cost savings through more efficient use of computing resources.

What were the key business benefits of using PPE?

PPE enabled organizations to optimize their critical applications, leading to improved service levels and increased user satisfaction. Faster processing times also allowed businesses to handle larger volumes of transactions.

How did PPE help IT departments make better decisions?

The insights provided by PPE allowed IT departments to make informed decisions about application tuning and resource allocation, leading to better overall system performance and stability.

Security

How was security handled in PPE?

Given its age, PPE likely relied on basic z/OS security mechanisms. Authentication would have been handled through RACF or similar security systems. Access control would have been based on user IDs and group memberships.

Did PPE use encryption?

Encryption was likely not a standard feature in PPE. Data security would have relied on the underlying z/OS security infrastructure and physical security measures.

What kind of audit logging capabilities did PPE have?

PPE likely provided basic audit logging capabilities, recording user access and report generation activities. These logs could be used to track usage and identify potential security breaches.

Operations

How was PPE administered?

Administration of PPE likely involved using z/OS system commands and configuration files. User management would have been handled through RACF or similar security systems.

How was PPE monitored?

Monitoring PPE's performance would have involved tracking CPU usage, memory consumption, and disk I/O activity. Logging capabilities would have provided insights into program execution and potential errors.

What kind of configuration parameters were available in PPE?

Configuration parameters would have included settings for data collection intervals, report formatting options, and security settings. These parameters would have been stored in configuration files or system datasets.

Ready to Start Your Migration?

Download our comprehensive migration guide for Problem Program Evaluator or calculate your ROI.

Calculate ROI