TestMizer Modernization Guide
TestMizer is a files and datasets (vsam) product by NETEC International. Explore technical details, modernization strategies, and migration paths below.
Product Overview
TestMizer was a tool designed to create shadow copies of VSAM files within a z/OS environment.
It was particularly useful for organizations in industries like banking and insurance, where data integrity is paramount. If you are looking for a replacement, consider products like BMC AMI Data Management solutions or CA File Master Plus.
Modernization Strategies
Rehost
- Timeline:
- 6-12 months
Lift-and-shift to cloud infrastructure with minimal code changes. Fast migration with lower risk.
Refactor (Recommended)
- Timeline:
- 18-24 months
Optimize application architecture for cloud while preserving business logic. Best ROI long-term.
Replatform
- Timeline:
- 3-5 years
Complete rewrite to cloud-native architecture with microservices and modern tech stack.
Frequently Asked Questions
General
What did TestMizer do?
TestMizer created shadow copies of VSAM files, enabling testing without impacting production data. It was a tool designed to facilitate safe and isolated testing environments for z/OS systems.
Was TestMizer a system, application, or tool?
TestMizer was a toolset, providing utilities and functions to manage and create VSAM file copies. It was not a complete system or application but rather a collection of tools focused on a specific task.
What types of organizations used TestMizer?
Organizations that relied heavily on VSAM data storage on z/OS and required frequent testing of applications using that data would have found TestMizer useful. These were typically larger enterprises in industries like banking, insurance, and government.
When should a company have considered TestMizer?
Companies should have considered TestMizer when they needed to perform frequent testing against VSAM data but could not risk impacting production systems. This was especially relevant when testing involved data modifications or potentially unstable code.
What were the alternatives to TestMizer?
Alternatives to TestMizer included other VSAM copy utilities, logical replication tools, or manual VSAM copy processes. Products like BMC AMI Data Management solutions, IBM Db2 Cloning Tool, or CA File Master Plus offered similar capabilities.
Technical
What infrastructure was required?
TestMizer required a z/OS environment with VSAM datasets. It likely needed access to specific z/OS subsystems like SMS (Storage Management Subsystem) to manage VSAM datasets effectively. It operated within an LPAR on the mainframe.
What configuration files or interfaces were used?
TestMizer likely used JCL (Job Control Language) for batch processing and ISPF panels for interactive user interfaces. Configuration files probably defined VSAM dataset characteristics and copy parameters.
What were the main system components?
The core components likely included a VSAM copy utility, a dataset management module, and a reporting component. These components communicated through z/OS system services and potentially inter-process communication mechanisms.
What types of APIs did TestMizer expose?
TestMizer likely exposed APIs or callable services for integration with other z/OS applications or automation tools. These APIs might have been accessed through COBOL, Assembler, or other mainframe programming languages.
Business Value
What business problem did TestMizer solve?
TestMizer provided business value by reducing the risk associated with testing changes to applications that used VSAM data. By creating isolated test environments, it prevented accidental corruption of production data and ensured application stability.
What would happen if an organization did not use TestMizer?
Without TestMizer or similar tools, organizations would have faced higher risks of data corruption during testing, potentially leading to application outages or data integrity issues. Testing would have been more complex and time-consuming.
What was the typical licensing model?
The licensing model for TestMizer was likely perpetual, with an initial license fee and ongoing maintenance costs. The total cost of ownership included the license fee, implementation costs, training, and ongoing operational expenses.
Security
How was security handled?
TestMizer likely integrated with z/OS security systems like RACF, ACF2, or Top Secret for authentication and authorization. Access control was probably based on user IDs and dataset permissions defined within these security systems.
What audit/logging capabilities existed?
TestMizer probably used standard z/OS audit and logging facilities to record user activity and system events. These logs could be integrated with SIEM platforms for security monitoring and analysis.
What encryption was used?
TestMizer likely relied on the security features of the underlying z/OS operating system and VSAM dataset security. It may not have implemented its own encryption mechanisms but rather leveraged z/OS encryption capabilities if available.
Operations
How was TestMizer typically deployed?
TestMizer was typically deployed on-premise within a z/OS environment. Implementation required expertise in z/OS, VSAM, and JCL. Common implementation challenges included configuring dataset naming conventions and managing storage space for shadow copies.
What ongoing operational requirements existed?
Ongoing operational requirements included monitoring storage utilization, managing dataset copies, and ensuring the availability of the test environment. This required skilled mainframe systems programmers and storage administrators.
What administrative interfaces were available?
Administrative interfaces likely included ISPF panels and command-line utilities. User management was handled through z/OS security systems like RACF, ACF2, or Top Secret. Configuration parameters were stored in control datasets or parmlibs.
Ready to Start Your Migration?
Download our comprehensive migration guide for TestMizer or calculate your ROI.