Can Do Systems z/OS

TICTOC Modernization Guide

Tools and UtilitiesTesting

TICTOC is a tools and utilities product by Can Do Systems. Explore technical details, modernization strategies, and migration paths below.

Product Overview

TICTOC is a z/OS tool that simulates different system dates and times for application testing.

The primary command to start TICTOC is the TICTOC EXEC.

Modernization Strategies

Rehost

Timeline:
6-12 months

Lift-and-shift to cloud infrastructure with minimal code changes. Fast migration with lower risk.

Refactor (Recommended)

Timeline:
18-24 months

Optimize application architecture for cloud while preserving business logic. Best ROI long-term.

Replatform

Timeline:
3-5 years

Complete rewrite to cloud-native architecture with microservices and modern tech stack.

Frequently Asked Questions

General

How does TICTOC simulate different dates and times?

TICTOC intercepts system calls related to date and time. It then returns the date and time specified by the user, instead of the actual system date and time. This allows applications to run as if it were a different date without impacting the actual system.

What are the common use cases for TICTOC?

TICTOC is primarily used for testing date-sensitive application logic. This includes year-end processing, month-end processing, leap year calculations, and other time-based events. It is also used for simulating future dates for application demonstrations or training.

What configuration files are used by TICTOC?

TICTOC supports a configuration file, typically named TICTOC.CNTL, which defines the date and time to be simulated. This file is read when TICTOC is initialized. The file contains parameters such as the simulated date, time, and the applications to be affected.

How does TICTOC intercept system calls?

TICTOC intercepts system calls related to date and time. This interception is achieved through modifications to the system's dispatching routines. The specific method involves altering the CVT (Communication Vector Table) to redirect date and time requests to TICTOC routines.

Technical

What are the main commands for using TICTOC?

The primary command is the TICTOC EXEC, which initiates the TICTOC environment. Parameters are passed through the TICTOC.CNTL file. There are no interactive commands once TICTOC is active; the simulated date and time are controlled by the configuration file.

Does TICTOC expose any APIs?

TICTOC does not expose APIs in the traditional sense. It operates by intercepting system calls. Therefore, there are no REST or SOAP endpoints. Integration is achieved by configuring TICTOC to affect specific applications.

What is the architecture of TICTOC?

TICTOC's architecture involves a main module that intercepts date and time requests. It uses the TICTOC.CNTL configuration file for settings. There is no database involved; the simulated date and time are stored in memory.

How is TICTOC administered?

TICTOC does not have a dedicated administrative interface. Configuration is managed through the TICTOC.CNTL file. Monitoring is typically done through system logs or application-specific logs to verify the simulated date and time are being used.

Business Value

What is the business value of using TICTOC?

TICTOC allows testing of date-sensitive logic without impacting production systems. This reduces the risk of errors related to date calculations. It also accelerates testing cycles by allowing testers to simulate future dates and times.

How does TICTOC help with regulatory compliance?

By simulating different dates and times, TICTOC enables organizations to validate compliance with regulatory requirements related to data retention, reporting, and other time-sensitive processes.

How does TICTOC contribute to cost savings?

TICTOC reduces the need for complex and time-consuming manual testing of date-sensitive logic. This leads to cost savings in terms of reduced testing effort and faster time to market for new applications or updates.

Security

What authentication methods are supported by TICTOC?

TICTOC relies on the security mechanisms of the underlying z/OS system. It does not implement its own authentication methods. Access to the TICTOC EXEC and the TICTOC.CNTL file should be controlled through z/OS security features.

What access control model is used by TICTOC?

TICTOC leverages the access control mechanisms provided by z/OS. Access to the TICTOC EXEC and the TICTOC.CNTL file can be controlled using standard z/OS security features, such as RACF.

What encryption is used by TICTOC?

TICTOC does not encrypt data. The simulated date and time are stored in memory. The TICTOC.CNTL file may contain sensitive information, so access to this file should be restricted.

What audit/logging capabilities exist in TICTOC?

TICTOC does not have built-in audit logging capabilities. However, system logs and application-specific logs can be used to monitor the use of TICTOC and verify the simulated date and time.

Operations

How is TICTOC configured for operation?

TICTOC is configured through the TICTOC.CNTL file. This file specifies the simulated date and time, as well as the applications to be affected. The file must be accessible to the TICTOC EXEC.

How is user management handled in TICTOC?

TICTOC does not have specific user management features. Access to TICTOC is controlled through z/OS security mechanisms. User access to the TICTOC EXEC and the TICTOC.CNTL file should be managed using RACF or similar tools.

What monitoring capabilities does TICTOC provide?

TICTOC's primary monitoring capability involves checking system logs and application-specific logs to verify that the simulated date and time are being used correctly. There are no built-in monitoring tools within TICTOC itself.

How can I troubleshoot issues with TICTOC?

To troubleshoot TICTOC, verify the contents of the TICTOC.CNTL file, check system logs for error messages, and ensure that the applications being tested are correctly configured to use the simulated date and time.

Ready to Start Your Migration?

Download our comprehensive migration guide for TICTOC or calculate your ROI.

Calculate ROI