DataKinetics z/OS

tableBASE Modernization Guide

Files and Datasets (VSAM)PerformanceDatabases

tableBASE is a files and datasets (vsam) product by DataKinetics. Explore technical details, modernization strategies, and migration paths below.

Product Overview

tableBASE is an in-memory table management system designed to improve the performance of applications using IMS, DB2, and VSAM data on z/OS.

It integrates with existing z/OS security systems like RACF, ACF2, and Top Secret for authentication and access control.

Modernization Strategies

Rehost

Timeline:
6-12 months

Lift-and-shift to cloud infrastructure with minimal code changes. Fast migration with lower risk.

Refactor (Recommended)

Timeline:
18-24 months

Optimize application architecture for cloud while preserving business logic. Best ROI long-term.

Replatform

Timeline:
3-5 years

Complete rewrite to cloud-native architecture with microservices and modern tech stack.

Frequently Asked Questions

General

What does tableBASE do?

tableBASE is an in-memory table management system designed to enhance database performance. It works by storing frequently accessed data in memory, reducing the need for disk I/O and improving response times for applications accessing IMS, DB2, and VSAM data.

Is this a system, application, or tool?

tableBASE is a middleware system that sits between applications and databases. It provides a layer of abstraction and optimization for data access, improving performance without requiring changes to application code.

What types of organizations use this?

Organizations that rely heavily on IMS, DB2, or VSAM data and require faster access times are ideal candidates for tableBASE. This includes enterprises in finance, insurance, and other industries where rapid data retrieval is critical.

When should we consider tableBASE?

A company should consider tableBASE when they experience performance bottlenecks related to database access, particularly with IMS, DB2, or VSAM data. If application response times are slow due to disk I/O, tableBASE can provide a significant improvement.

Technical

For mainframe products: Does this run in an LPAR?

tableBASE operates on z/OS and requires access to the IMS, DB2, or VSAM subsystems that it is intended to accelerate. It typically runs within an LPAR on the mainframe.

What infrastructure is required?

tableBASE requires existing IMS, DB2, or VSAM databases. It enhances the performance of these systems by providing in-memory data access. It does not replace the underlying databases.

What are the alternatives to tableBASE?

Alternatives to tableBASE include other in-memory data management solutions, database caching products, and performance tuning tools specific to IMS, DB2, or VSAM. Some organizations may also consider upgrading their hardware or database systems.

How is tableBASE typically deployed?

tableBASE is deployed on-premise, typically within the same z/OS environment as the databases it supports. It requires configuration to identify the tables and data to be cached in memory.

Business Value

What is the business value of tableBASE?

tableBASE improves application response times by reducing the need for disk I/O. This can lead to increased transaction throughput, reduced CPU utilization, and improved overall system performance. Faster data access can also improve user satisfaction and business agility.

What happens if we do not use tableBASE?

Without tableBASE, organizations may experience slower application response times, increased CPU utilization, and higher operational costs associated with database I/O. This can impact business productivity and competitiveness.

When is tableBASE a good fit?

tableBASE can be a good fit when existing database systems are struggling to meet performance requirements, particularly under high transaction loads. It is also beneficial when application changes are difficult or costly to implement.

Security

How does tableBASE handle security?

tableBASE access control is based on the underlying security mechanisms of IMS, DB2, and VSAM. It leverages existing security definitions to control access to cached data.

What authentication methods are supported?

tableBASE integrates with existing z/OS security systems, such as RACF, ACF2, or Top Secret, to authenticate users and control access to data. It does not introduce its own security mechanisms.

What audit/logging capabilities exist?

tableBASE provides audit logging capabilities to track data access and modifications. These logs can be used to monitor security events and ensure compliance with regulatory requirements.

Operations

What ongoing operational requirements exist?

Ongoing operational requirements for tableBASE include monitoring cache performance, managing cache size, and ensuring data consistency between the cache and the underlying databases. This typically requires skilled mainframe systems programmers.

What administrative interfaces are available?

tableBASE provides administrative interfaces for monitoring cache statistics, configuring cache parameters, and managing user access. These interfaces are typically accessed through a command-line interface (CLI) or a web-based console.

What are common implementation challenges?

Common implementation challenges with tableBASE include properly sizing the cache, configuring data replication, and ensuring compatibility with existing applications and database systems. Thorough testing is essential to avoid data inconsistencies or performance issues.

Ready to Start Your Migration?

Download our comprehensive migration guide for tableBASE or calculate your ROI.

Calculate ROI