Systems, devices, and methods for mainframe data management

ABSTRACT

Utility programs run on multiple mainframes to periodically monitor a list of started tasks that have been defined in metadata files as running on each mainframe. Some of the utility programs is largely driven by metadata, and filters programmed to manage an output stream for each started task, as the output stream is generated, while remaining agnostic as to an origin of the output stream. When problems are detected in the output stream, users are notified via alerts, along with a suggestion of what to do. This batch dashboard application can be used by anyone with mainframe started tasks that need to be monitored. Once alerted to a problem, the users can logon to the online dashboard for that same list of started tasks and take actions to research and fix the problems.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. patent application Ser. No.15/823,293, filed on Nov. 27, 2017, which claims a benefit of priorityto U.S. Provisional Patent Application Ser. No. 62/427,085, filed onNov. 28, 2016, all of which are herein incorporated by reference intheir entirety.

TECHNICAL FIELD

Generally, this disclosure relates to mainframes. More particularly,this disclosure relates to advanced management of applications onmainframe systems.

BACKGROUND

A mainframe can host a software application programmed to manage anoutput stream, as the output stream is generated, while remainingagnostic as to an origin of the output stream. Resultantly, the softwareapplication can be programmed to automate report data capture,archiving, retrieval, or destruction, based on the output stream and aset of rules for each type of output stream.

When the software application is an Enterprise Output System (EOS)software application, as provided by RSD America Inc.®, then thissoftware application is implemented as a series of continuously runningprograms (started tasks) which need to be monitored, and are complicatedto administer due to presence of many environments within the EOS, amultitude of different configuration settings within each environment,synchronization of configuration settings across environments, securitysettings for thousands of users, and handling of many datainputs/outputs. Therefore, various misconfigurations/errors may arise.Likewise, such complexity is difficult to administer, which leads togreater resource use, greater expense, and a higher error rate forconfiguration changes made. Similarly, such complexity entails that anadministrator of the EOS application be experienced/proficient, which isnot always possible.

Examples of technical problems resulting from manually administering theEOS are numerous. Some of such examples include failed ingest jobscaused when a user requests a modification to an EOS form index, whichoccurs while a job, written in Job Control Language (JCL), is ingestinga multi-part report into the EOS. As such, the ingestion will failbecause the form index is being modified in the EOS. Further, some ofsuch examples include lack of monitoring of the many started taskswithin the EOS because manually doing so is time consuming andcomplicated since few resources are dedicated and skilled enough to dosuch monitoring on a regular basis. Therefore, various undesired eventsor delays can occur in the EOS without notice, which may be expensive torepair at that time. Moreover, some of such examples include the EOSmaking use of a large number of model JCLs that are executed on aregular basis. When massive or voluminous changes need to be made tothese model JCL's, and these changes are manually made, then there is alikelihood that a particular component of the EOS application may faildue to a mistake within these model JCL's. Additionally, some of suchexamples occur when a new report is manually defined to an EOS formindex file, and then the changes have to also be replicated to similartest environments. Human errors from performing this repetitious work,such as digit transposition or setting misconfiguration result infailures to successfully ingest instances of these new reports in thoseenvironments. Also, some of such examples occur when some activities aredone in administration of EOS metadata using tools supplied by the EOSand various details in various activity logs are not sufficient. Thisinsufficiency complicates remedial research for various administrativeactions that caused a user problem. Furthermore, some of such examplesoccur because the EOS is complex and can be used in various technicalenvironments. As such, the administrator can build subject matterexpertise and efficient workflow over a long time period. In addition,some of such examples result from the EOS running 24/7 and theadministrator or an expert in the EOS may not be available when needed,and various users must suffer from a lack of use of the EOS until theadministrator or the expert can be located to fix. Accordingly, there isa desire for a computing technology to address at least one of suchtechnical challenges.

SUMMARY

This disclosure at least partially addresses at least one of the abovechallenges. However, this disclosure can prove useful to other technicalareas. Therefore, at least some claims should not be construed asnecessarily limited to addressing any of the above challenges.

In one embodiment, a method comprises: loading, by a processor, autility program onto an operating system of a mainframe, wherein theoperating system hosts an application that includes a plurality ofrunning jobs, wherein the utility program includes a set ofconfiguration metadata for the application; configuring, by theprocessor, the utility program such that the utility program isconfigured to receive a user input from a workstation that is incommunication with the mainframe and the utility program is configuredto interface with the application based on the set of configurationmetadata responsive to the user input, wherein the mainframe is incommunication with the workstation; creating, by the processor, a jobvia the utility program interfacing with the application based on theset of configuration metadata responsive to the user input; submitting,by the processor, the job to the application via the utility programinterfacing with the application based on the set of configurationmetadata responsive to the user input; querying, by the processor, thejob at the application before completion for an error via the utilityprogram based on the set of configuration metadata; triggering, by theprocessor, an alert based on the set of configuration metadata via theutility program responsive to the error; and outputting, by theprocessor, the alert to the workstation in communication with theutility program.

In one embodiment, a system comprises: a mainframe containing aprocessor that hosts an operating system, wherein the operating systemhosts an application that includes a plurality of running jobs, whereinthe mainframe is configured to: load, by the processor, a utilityprogram onto the operating system, wherein the utility program includesa set of configuration metadata for the application; configure, by theprocessor, the utility program such that the utility program isconfigured to receive a user input from a workstation that is incommunication with the mainframe and the utility program is configuredto interface with the application based on the set of configurationmetadata responsive to the user input, wherein the mainframe is incommunication with the workstation; create, by the processor, a job viathe utility program interfacing with the application based on the set ofconfiguration metadata responsive to the user input; submit, by theprocessor, the job to the application via the utility programinterfacing with the application based on the set of configurationmetadata responsive to the user input; query, by the processor, the jobat the application before completion for an error via the utilityprogram based on the set of configuration metadata; trigger, by theprocessor, an alert based on the set of configuration metadata via theutility program responsive to the error; and output, by the processor,the alert to the workstation in communication with the utility program.

Additional features and advantages of various embodiments are set forthin a detailed description which follows. Various objectives and otheradvantages of this disclosure are realized and attained by variousstructures particularly pointed out in various exemplary embodiments inthe detailed description and claims hereof as well as in a set ofappended drawings. Note that the detailed description is exemplary andexplanatory and is intended to provide further explanation of thisdisclosure as claimed.

BRIEF DESCRIPTION OF DRAWINGS

The accompanying drawings constitute a part of this specification andillustrate an embodiment of the present disclosure and together with thespecification, explain the present disclosure.

FIG. 1 shows a schematic diagram of an embodiment of a mainframeaccording to this disclosure.

FIG. 2a-2c shows a schematic diagram of an embodiment of a utilityaccording to this disclosure.

FIGS. 3a and 3b show a set of screenshots of a front end of a securitymaintenance tool of a utility according to this disclosure.

FIGS. 4a-4e show a set of screenshots for a form group maintenancefunctionality of a security maintenance tool according to thisdisclosure.

FIGS. 5a-5c show a set of screenshots of a form group assignmentfunctionality of a security maintenance tool according to thisdisclosure.

FIG. 6 shows a screenshot of a front end of an applicationadministration tool of a utility according to this disclosure.

FIG. 7 shows a screenshot of an online dashboard monitoring toolselected for option 1 according to this disclosure.

FIGS. 8a-8i show screenshots of multiple maintenance tools selected foroption 2 according to this disclosure.

FIGS. 9a-9c shows a set of screenshots of maintenance tool to definecomponents to EOS, selected for option 3 according to this disclosure.

FIG. 10a-10r shows screenshots of multiple maintenance tools selectedfor option 4 according to this disclosure.

FIGS. 11a-11f shows screenshots of multiple tools selected for option 5according to this disclosure.

DETAILED DESCRIPTION

Generally, this disclosure discloses a logic, such as a utility, thatinterfaces with a plurality of groups of users and an application, suchas an EOS application. The logic is logically hosted between the groupsof users and the application. The logic enables the groups of users toinput what should be done. Then, the logic generates and submitson-demand jobs that execute a set of tasks that can be performed viabatch. Before a job is done, the job goes through a set of edits withinthe logic, which reduces errors and increases availability. The logicfurther allows co-generation, where a user can define a job change,create a prototype based on the job change, and then have that prototypereplicated so that the prototype minimizes an amount of manual codingthat takes place and instead having the logic modify or generate thosecomponents. Therefore, this technology enables utility programs to runon multiple mainframes to periodically monitor a list of started tasksthat have been defined in metadata files as running on each mainframe.Some of the utility programs can be largely driven by metadata, andinclude filters programmed to manage an output stream for each startedtask, as the output stream is generated, while remaining agnostic as toan origin of the output stream. When problems are detected in the outputstream, users can notified via alerts, along with a suggestion of whatto do. This batch dashboard application can be used by anyone withmainframe started tasks that need to be monitored. Once alerted to aproblem, the users can logon to the online dashboard for that same listof started tasks and take actions to research and fix the problems.

FIG. 1 shows a schematic diagram of an embodiment of a mainframeaccording to this disclosure. A topology 100 depicts a network 102, aworkstation 104, a mainframe 106, and a server 108. Each component ofthe topology 100 can be implemented in a logic, whether hardware-basedor software-based. For example, when the logic is hardware-based, thensuch logic can comprise circuitry, such as processors, memory, inputdevices, output devices, or other hardware, that is configured, such asvia programming or design, to implement a functionality of a respectivecomponent. Likewise, when the logic is software-based, then such logiccan comprise one or more instructions, such as assembly code, machinecode, object code, source code, or any other type of instructions, whichwhen executed, such as via running or compilation, implement afunctionality of a respective component.

The network 102 is communicably interposed between the workstation 104,the mainframe 106, and a file share 114 on the server 108. For example,the network 102 can include a local area network (LAN). The network 102can be established via a telecommunication circuit. The network 102 canemploy circuit switching or packet switching methods. The network 102can employ network protocols including Transmission Control Protocol(TCP)/Internet Protocol (IP), which can be used to deliver transport andaddressing functions. However, other communication protocols can beused, whether additionally or alternatively, in whole or in part, suchas File Transfer Protocol (FTP), Network Data Mover (NDM), Ethernet,Internet Message Access Protocol (IMAP) Internet Control MessageProtocol (ICMP), Hypertext Transfer Protocol (HTTP), or others. Thenetwork 102 can comprise circuit switched telephone lines, radio wavetransmission, or optic fiber. In some embodiments, the workstation 104and the mainframe 106 communicably interface with each other thru thenetwork 102. In other embodiments, the mainframe 106 sends files to theserver 108 to reside as the report files 114, via the network 102.

The workstation 104 is programmed to run an application and an operatingsystem (OS), such as Windows, Linux, Android, MacOS, and/or others,where the application runs on the operating system. For example, theapplication can comprise a command prompt console, a browser, aproductivity application, such as a word processor or a spreadsheet, amobile app, or others. The application is programmed to display agraphical user interface (GUI), as disclosed herein. The GUI isprogrammed to display an output and receive an input. The workstation104 is programmed to communicate with the mainframe 106 through thenetwork 102, such as via a console emulator program, whether native tothe OS or included in the application.

The mainframe 106 contains a processor 107 and a memory. Via theprocessor 107 and the memory, the mainframe 106 hosts, in parallel or indistribution an operating system 108, an application 110 (which includesa set of continuously running started tasks which continuously add datato started task logs 115), a utility 112, a JCL created and run by theutility 113, a set of application control files 116 used by theapplication, and a set of report files 114 managed by the application110. The operating system 108 can include at least one of z/OS®, z/VM®,Linux®, z/VSE™, Linux for System z®, and z/TPF, or others. Theapplication 110 can include a software application programmed to managean output stream. For example, the software application can include anEOS software application, as provided by RSD America Inc. In the case ofEOS, the output streams are report files 114. As the report files 114are generated, the application 110 uses an origin of the report files114 to determine which application environment it is to be stored in.The application 110 can be programmed to automate reportingest/archiving/retrieval/destruction based on the output stream and aset of rule inputs. The application 110 accepts output streamscontaining reports, then files them based on information contained abouteach type of report in the application control files 116. The reportfiles 114 are archived based on instructions in the application controlfiles 116, and access to the user community to these report files 114 isbased on security instructions in the application control files 116.

FIGS. 2a-2c show schematic diagrams of an embodiment of a utilityaccording to this disclosure. In particular, a diagram 200, as shown inFIGS. 2a-2c , depicts that the utility 112 comprises or is incommunication with an online dashboard component 202, a batch dashboardcomponent 204, a synchronize new report component 206 for adding newreports, a report transmit component 208, a mass report extractorcomponent 210, a component conversion component 212, a report migratorcomponent 214, a copy archive master index (AMI) archive component 217,an extract form index (FINDX), a report index (RINDX), or AMI infocomponent 218, a display pack info component 220, a form groupmaintenance component 222, a form group assignment component 224, a massuser delete component 226, and a job re-submitter component 228, any ofwhich can be or include at least one of a module, a function, an object,a library, a program, an add-on, a script, or any other software. Theutility component 112 controls the online dashboard component 202, thebatch dashboard component 204, the synchronize new report component 206for adding new reports, the report transmit component 208, the massreport extractor component 210, the component conversion component 212,the report migrator component 214, the copy AMI archive component 217,the extract FINDX, RINDX, or AMI info component 218, the display packinfo component 220, the form group maintenance component 222, the formgroup assignment component 224, the mass user delete component 226, andthe job re-submitter component 228 in order to perform any functionalitydisclosed herein. FIG. 2c shows a schematic diagram of additionalcomponents that the utility 112 can include or be in communication with.These additional components include a restrict actions for formscomponent 230, a business date of reports (B-Date) parsing info forforms component 232, a generate JCL to fix FINDX component 234, and amigration utility quality monitor 236.

The utility 112 simplifies monitoring and management of the application110 product by an administrator, such as allowing complicated processesto be done faster, more accurate, and cheaper, while bringing down alearning curve. The utility 112 code analysis/generation/conversioncapabilities allow many model JCL jobs to be programmatically createdand maintained, thus increasing reliability of the application 110 and amovement of reports and report data. Note that a job includes a unit ofwork or unit of execution that performs a work. The job can include acomponent (as a unit of work), where the component can include a task ora step (if sequential, as in a job stream). As a unit of execution, thejob can be concretely identified with a single process, which may inturn have sub-processes which perform one or more tasks or steps thatinclude the work of the job. The job can be started interactively, suchas from a command line, or scheduled for non-interactive execution by ajob scheduler, and then controlled via automatic or manual job control.The job that has a finite input can complete, successfully orunsuccessfully, or fail to complete and eventually be terminated. Also,automated processes that define recurring NDM sessions, or new form IDs,allow more complicated interrelated processes to be developed than wouldbe possible if defined manually. Due to the complicated interrelatedprocesses that are possible, users of the application 110 derive moreuse from the application 110.

The utility 112 can operate in a production, quality control, or a testenvironment. The utility 112 interfaces with the application 110. Theutility 112 is programmed to contain multiple layers of securityensuring that only authorized user can use the utility 112, such as viauser credentials. The utility 112 includes a set of metadata about aconfiguration of the application 110. Use of this configuration metadataby the utility 112 makes it possible for users with less skill andexperience to administer the application 110. The utility 112 isprogrammed to integrate with a Control-M command or a Control-O command,which may allow for a submission of a JCL job. The utility 112 isprogrammed to enable an addition of one or more new productivity apps tothe utility 112 via modifying a file entry. The utility 112 isprogrammed to guide the user through a set of complicated actions,editing a user's responses, to avoid or minimize the impact of humanerror on the application 110. The utility 112 is programmed to enableand simplify automatic modification or recreation of a component whenthere is a change that may affect many programs or JCL jobs, which mayavoid or minimize a manual component modification. The utility 112 isprogrammed to enable a flexible migration function, which allows a lowskilled or an unskilled user to manage a complicated migration of filesfrom one location or application 110 to another location or application110.

The utility 112 may improve productivity of an administrator of theapplication 110, may allow for a synchronization of meta data changesacross various sessions and environments of the application 110 in atest environment, quality control, or a production environment, mayallow for more efficient use of the application 110, may allow a complexchange to a program within the application 110, a model JCL component,or an application component, such as FINDX and RINDX, to beprogrammatically performed, may lower a cost of migrating a report,which would be a barrier to a migration without the utility 112, mayprovide a higher availability of the application 110 to a set of usersbecause of minimization or avoidance of defects.

The utility 112 is programmed such that most changes thereto can be donewithout changing a code of the utility 112. The utility 112 behavesdifferently depending on where the utility 112 is launched, since theutility 112 is driven by metadata. The utility 112 includes multiple logfiles, depending on action being performed. These logs are viewable fromalmost all apps in the utility 112 (this is useful information whenresearching what has been done thru the utility 112). One of the logfiles in the utility 112 includes a jobs log file viewable from mostapps that can submit jobs. This jobs log file has a history of all JCLjobs spawned by the utility 112, and submitted thru Control-O. Datagenerated by some or most apps may be retained for 1-3 days, althoughmore or less is possible, during which time a user can correct a set ofdata and rerun a set of jobs, if there is a need. In case of a JCL jobfailure, the jobs log file can be read by the job re-submitter 228, andmade available for being rerun. Each app of the utility 112 determinesits own level of security, such as 1 thru 4, and prohibits a userwithout an appropriate clearance or credentials from using the utility112. The utility 112 may use a compiled restructured extended executor(REXX) programs for added security (avoidance of tampering with code).

The utility 112 includes several options. Option 1 allows a view or ananalysis of a status of each task that runs on that Parallel Sysplex,such as a cluster of IBM® mainframes acting together as a single systemimage with z/OS. From this option, a user can start or stop tasks. Auser can also view or analyze a job log for each task. This is theOnline Dashboard 202. A variation of the programming for the onlinedashboard 202 is run in batch mode every 2 or 3 hours to assess andreport on the health of each started task in the Sysplex. This is thebatch dashboard 204. Option 2 directs a user to applications which run(and rerun) an interactive JCL job or jobs in order to complete a set ofwork specified by a user. An application can be added or removed fromthis option without any programming (just metadata entries). Option 3directs a user to an application which generates and defines newcomponents to EOS in order to complete a set of work specified by auser, such as via the report transmit component 208. The user can alsointerface with a business date of reports (B-Date) table component 232,such as to update a B-Date table, to tell an EOS user how to parsereports to change an ingest date, or others. An application can be addedor removed from this option without any programming (just metadataentries). Option 4 directs a user to an application which runs,validates, converts, or mass generates a component. Sometimes, acommonly used app may be a JCL Validator, which corrects an existing JCLjob based on where a user intends to run the JCL job. Use of the JCLValidator avoids the incidents of failed jobs in a test, qualitycontrol, or production environments. The user can also be directed to anapplication to generate a JCL job to fix a problem in a report index,such as via the component 234. An application can be added or removedfrom this option without any programming (just meta data entries). Also,Option 4 enables a user to attach a conversion program that a userwishes to write, so long as the conversion program follows a designconstraint, which would feed the conversion program with one componentmember at a time for conversion. This provides the conversion programwith a services that allows a user to concentrate only on converting onecomponent at a time and frees the conversion program from having to dofile manipulation, member list selection, user entry editing, and linesplitting.

The online dashboard component 202 is programmed to monitor a taskstarted on the application 110 and analyze a logs of the task. Tasks canbe started and stopped, with all actions being included in the log. Userconfirmation is requested and logged before any potentially harmfulaction is performed. Edits occur to prevent multiple concurrent usersfrom unknowingly undoing the work of each other.

The batch dashboard component 204 is programmed to monitor all tasksstarted on the application 110 and send a message, such as email overthe network 102, to the terminal 104, which may be operated by a subjectmatter expert when a problem is detected.

The synchronize new reports 206 component is programmed to run only inthe Production environment when new form identifiers (formIDs) have beenrequested. This utility will add the formIDs across all environments(production, test, and quality assurance) of EOS, making sure that everyaspect of the formIDs creation process is in sync. The synchronize newreports 206 may also replicate formIDs into multiple shadow feed formsin the test environment, to allow for testing in multiple CustomerInformation Control System (CICS) regions at the same time.

The report transmit 208 component is programmed to generate a model JCLto extract and send, such as via an FTP or NDM session, a report (suchas an EOS report). The utility then causes the EOS FINDX to be updatedfor that EOS report's formID, to create a triggering process that makesuse of the model JCL just created.

The mass report extractor 210 is programmed to extract a set of reportsfor a time period into a set of files, or a single file at thespecification of the user. This utility makes it easy to efficientlyextract of large numbers of reports for users that wish to analyze thedata. Extraction using this utility improves productivity because itmakes use of EOS RINDX to anticipate the size of output file needed.Tracking of extracts is also facilitated by a better audit trail.

The Component Conversion 212 component is programmed to facilitategeneration, validation, or conversion of a JCL, program, or script. Thiscomponent minimizes the introduction of user errors in mass componentchanges.

The report migrator 214 component is programmed to manage and execute amigration of a reports to or from one place or application 110 toanother. For example, the report migrator 214 can be programmed to sizea migration effort, determine the number of concurrent processes to beexecuted; builds all data sets necessary for concurrent processing;builds all JCL jobs, and track the progress of all JCL jobs as theyconvert and ingest items to the target system. Inputs from users wouldbe the definition of a migration plan, where from and where to, and howmuch time is available to complete the migration; the utility 112 thenexpects an extract file or generates an extract file; the utility 112recommends a sizing of an effort, and then a user approves/modifies therecommendation; then this extract file is used to generate the JCL jobsthat will execute the migration. The sizing of the effort determines howmany concurrent threads will be used. Each thread is called a set andfor every two sets a copy is built from various indexes, to avoidcontention of the JCL jobs as they run.

The copy AMI archives 217 component is programmed to copy archive filesfrom 1 AMI to another. This is necessary when you want to split 2 EOSenvironments.

The extract FINDX, RINDX, or AMI 218 component is programmed to allow anadministrator to select records from any FINDX, RINDX, or AMI to asequential dataset. This is useful for analysis of the contents of anyof these control files, troubleshooting problems, or getting input toother components of this utility. The output can be placed in a numberof formats for ease of use.

The display pack info 220 component is programmed to allow anadministrator to identify a pack that has enough free space for anintended purpose, then to reserve space on that pack so no otheradministrator tries to reuse the same space. Once the space is reservedby an administrator, it will be displayed to other administrators forthe remainder of the day as unavailable space. The user of thiscomponent can filter the display based on the number of cylinders thatare required for the new dataset.

The form group maintenance 222 component is programmed to allow userswith the correct authorization for an EOS Session and Environment toadd, update, and delete form groups. Form Groups in EOS limit thereports that can be seen by users, beyond what the user group allows auser to see. All changes to form groups are added to a log that cannotbe subsequently changed by the users. The purpose of this application isto allow users to change form groups, without allowing them to changeother security settings in the EOS Profile.

The form group assignment 224 component is programmed to allow userswith the correct authorization for an EOS Session and Environment toadd, change, or delete the form group that other users in that EOSSession and Environment are assigned to. Form groups assigned to a userlimit the forms that can be seen beyond what a user group limits themto. If a form group for a user is deleted, it expands the user's accessto reports, if a form group is added, it could limit the group ofreports that a user can see. The purpose of this application is to allowusers to change form groups, without allowing them to change othersecurity settings in the EOS Profile.

The mass user delete 226 component is programmed to allow administratorsto remove all access for a list of users to EOS for a Session andEnvironment. All deletes are logged for audit purposes. Each year theadministrators of each EOS Session and Environment will review thosewith access to their system. At that time, large numbers of users'access may be identified to be removed. This component allows that to bedone in an efficient and secure manner.

The job re-submitter 228 component is programmed to allow administratorsto resubmit any job submitted thru this utility within the past 3calendar days. Jobs submitted in the other components of the utilityperiodically fail for one reason or another. Sometimes failure is causedby contention with other jobs, sometimes it is caused by an error. Afterthe error is corrected, or the probability of contention has passed, thejob re-submitter will restart the selected job and add that action tothe log. This component allows a user to fix problems without having toreenter a request from scratch.

FIGS. 3a and 3b show a set of screenshots of a security maintenance toolof a utility according to this disclosure. This utility is controlled bya Resource Access Control Facility (RACF) secured metadata. The securitymaintenance tool allows a subset of authorized users of the application110 to navigate to apps which would allow them to maintain various partsof the EOS Profile. FIG. 3a shows an entry point to the securitymaintenance tool. FIG. 3b shows the apps available to modify the formgroups. The three apps shown (FG, FR, and UF) display because of entriesin the metadata for the tool. The apps can be removed or added simply byadding, updating, or deleting lines in the meta data which this securitymaintenance tool reads.

FIGS. 4a-4e show a set of screenshots for a Form Group maintenancefunctionality of a security maintenance tool according to thisdisclosure. The form group maintenance tool 222 allows a set of users ofthe application 110 to maintain form groups within the profile of theapplication 110. This allows the set of users to update a portion of aprofile of the application 110 information, without an exposure to mostfeatures of a set of profile administration screens provided by theapplication 110. Additionally, an app included in this utility mayinsulate the profile from a user error by providing an extensive edit ofuser entered data. This functionality protects a user authorized for afirst environment of the application 110 from maintaining a form groupin a second environment of the application 110. Also, this functionalityenables a user to be authorized to use a certain app, including to aspecific environment of the application 110. This functionality alsoenables a user to view a list of all current users of a form group. Thisfunctionality also enables a query of a list of current users for aparticular user. This functionality also enables an addition or deletionof a form group, as well as addition and deletion of a form ID that areall executed as a series of on-demand jobs that are submitted thru aControl-O command. This functionality also enables a feature where ifmultiple jobs are submitted, then the multiple jobs are chained togethervia a REQUIRE card to run serially, where necessary. This functionalityalso enables a recordation of all activities in a log (see FIG. 4e ),where each entry of the log is more detailed than a log entry keptwithin the application 110. Therefore, these detailed log entries canlater be analyzed to help determine a cause of future access issues, ifany. This functionality also enables a feature where a form ID entry ora form group is not be deleted without an explicit confirmation of auser.

FIG. 5a shows a screenshot of a form group assignment functionality of asecurity maintenance tool according to this disclosure. Thisfunctionality enables an authorized user to add, change, or delete aform group for any user. This functionality also enables use of a formindex or a profile list file that are periodically refreshed, such asevery 12 hours, every 2 weeks, or others. This functionality alsoenables a display of a set of user info that can be sorted by anynumbered column, or a combination of columns, where a column value canbe filtered. This functionality also enables an original display of auser assignment that is re-displayable after sorting or filtering. Thisfunctionality also enables a use of an F-command to position to aparticular user in a list. This functionality also enables a user changeto be arranged into a series of ad-hoc jobs submitted thru a Control-Ocommand. A purpose of the above mentioned features is to allowauthorized users to enter directives to the EOS Security or improvetheir productivity and effectiveness when assigning form groups tousers. All actions that cause changes to the formID or profile of theapplication 110 are put in a detailed log for later tracking andanalysis if problems occur.

FIGS. 5b-5c shows screenshots of excluded actions for formIDfunctionality of a security maintenance tool according to thisdisclosure. This functionality enables an authorized user to add ordelete an excluded action such as PRINT, EXPORT, or VIEW for any formIDfor all users. This functionality also enables a use of a form indexlist file that are periodically refreshed, such as every 12 hours, every2 weeks, or others. This functionality also enables a display of formIDthat can be sorted by any numbered column, or a combination of columns,where a column value can be filtered. This functionality also enables anoriginal display of a formID its restricted function that isre-displayable after sorting or filtering. This functionality alsoenables a use of an F-command to position to a particular formid in alist. A purpose of the above mentioned features is to allow authorizedusers to enter directives to the EOS Security or improve theirproductivity and effectiveness when excluding actions for formids. Allactions that cause changes to the formID are put in a detailed log forlater tracking and analysis if problems occur.

FIG. 6 shows a screenshot of an application maintenance tool of autility according to this disclosure. This tool is used on a productionsystem and a test system in order to improve productivity of anapplication support administrator. In this tool, all performed actionsare logged and usage is controlled by a security program runningtherein. This utility is controlled by a Resource Access ControlFacility (RACF) secured metadata.

FIG. 7 shows a screenshot of a maintenance tool selected for option 1according to this disclosure. This screenshot has various features whichenables various functions including (1) an online dashboard and batchdashboard use same programming, (2) all application started tasks andtheir current statuses are evaluated (both), (3) a current log of eachactive started task can be displayed to user (online dashboard only),(4) a current log of each active started task is analyzed for problems(both), (5) if problems are identified, then a specified user, such asan administrator, is notified via email (batch dashboard only), (6)active tasks can be stopped (online dashboard only), and (7) an inactivetask can be started (online dashboard only).

FIGS. 8a-8i show screenshots of multiple maintenance tools selected foroption 2 according to this disclosure. These include the mass reportextractor component 210, synchronize new report component 206, reporttransmit component 208, Extract FINDX, RINDX, or AMI info component 218,and job re-submitter component 228, as shown in FIG. 2c . In FIG. 8a ,this screenshot has various features which enables various functionsincluding (1) apps (primary commands—Prim Cmds) can be added, removed,or disabled without programming, (2) different apps available on testversions or production versions of the utility 112 without programming,(3) multiple activity logs can be viewed, and (4) apps executed inoption 2 cause a submission of an ad-hoc job(s) thru a Control-Ocommand, under a group ID, such as in production only.

FIG. 8b shows a screenshot of a tool used to extract a large number ofreports in a session and environment into one or to many files. The useof this tool will (1) reduce the time needed to create one or manyextract files in response to periodic requests, (2) reduce the skillneeded to create extract files, (3) counts the number of lines in totalto be extracted for each file (for proper allocation), and (4) regulatewhat can be done in a single session. The creation of all extract filesis logged in detail for future reference.

FIGS. 8c and 8d show screenshots of a tool to define new formIDs to theapplication 110. Various features which enables various functionsinclude (1) simplifies a process of adding a formID to the application110 (can be done by support personnel), (2) formIDs are added to aproduction environment(s) and a test environment in a single action, (3)formIDs can be added to multiple feed forms, applying same splitcriteria in production and test environments, (4) tight editing of userentered data to reduce risk of errors, and (5) generates a model JCLcomponent in production and test environments for execution when reportis ingested using these new formIDs.

FIGS. 8e and 8f show screenshots of a tool to execute an immediatetransfer of a report already ingested in the application 110 to specificlocations. This has various features which enables various functionsincluding (1) an execution when a user is notified that a scheduled FTPtransfer or NDM have failed, and (2) multiple reports for this date/timerange can be extracted and sent to a share(s) resource.

FIGS. 8g and 8h show screenshots of a tool to extract records from anAMI, FINDX, or RINDX. Depending on the type of file to extract recordsfor, the screens will have different fields that need to be entered bythe user. Extracted records from AMIs, FINDXs, and RINDXs are requiredby many utility 112 apps, which this app supports. Various features ofthis tool enables various functions including (1) simplification ofproducing a list, using various options, (2) estimates a size of a listbased on a set of selection criteria, and allocates an output fileaccordingly, and (3) different selection criteria fields availabledepending on a type of list to produce.

FIG. 8I shows a screenshot of a tool that allows resubmission of any jobthat has been executed from the utility 112 in the past 3 days. Thistool provides the following benefits: (1) is useful when jobs havefailed because of bad data entry or job to job timing issues, (2)resubmitted jobs are properly logged.

FIGS. 9a-9c shows a set of screenshots of maintenance tool to definecomponents to EOS, selected for option 3 according to this disclosure.FIG. 9a shows a screenshot of a menu after selection of option 3, whereapplications are available from this menu to make changes to EOS systemfiles. FIGS. 9b-9c show a set of screenshots of multiple maintenancetools selected for option 3, where the maintenance tools includes areport transmit tool (208) and a tool to define a process to transfercopies of reports as they are ingested, and a tool for business dateparsing information for forms (232).

In particular, FIG. 9a shows a screenshot of a maintenance tool selectedfor option 3 according to this disclosure. This screenshot depicts auser interface that is presented using the same programming as thatwhich presents the user interfaces of FIGS. 3b, 8a, 9a, 10a, and 11a ,but adjusted for content of FIG. 9a . This tool has features whichenable various functions including (1) the contents of these screens aredetermined by metadata entries for each option selected in the screensdepicted in FIGS. 3a , and 6, (2) the apps presented with each option asPrim Cmds can be added, removed, or disabled without programming, (3)different apps can be available on a test and production versions of theutility 112 without programming, and (4) multiple activity logs can beviewed.

FIG. 9b shows a screenshot of a maintenance tool to define a recurringFTP or NDM of newly ingested reports. This has various features whichenables various functions including (1) automation of the creation ofmodel JCL components that will be used to perform the FTP or NDM when anew report is ingested. (2) FTP or NDM processes can be added in onestep for multiple formIDs, (3) various options can be selected thatdirect how the FTP or NDM will be performed, and how large the reportsnormally are.

FIG. 10a-10r shows screenshots of multiple maintenance tools selectedfor option 4 according to this disclosure. FIG. 10a shows a screenshotof a menu after a user has selected option 4, where various applicationsare available from this menu are used to validate, convert, or generatecomponents. FIGS. 10b-10r show various screenshots of multiplemaintenance tools selected for option 4. These include the componentconversion component (212), the B-Date table validation, componentvalidation, and Display Pack Info component (220), generate a JCL job tofix a form index problem component 234, as shown in FIG. 2 c.

Apps executed in this option are used to generate, modify, validate andcorrect source code (also used to display system info, and identifyinconsistencies in components). FIG. 10a shows a screenshot of a userinterface that is presented using the same programming as that whichpresents the interfaces of FIGS. 3b, 8a, 9a, 10a, and 11a , but adjustedfor content of the apps. This tool has features which enable variousfunctions including (1) the contents of these screens are determined bymetadata entries for each option selected in the screens depicted inFIGS. 3a , and 6, (2) the apps presented with each option as Prim Cmdscan be added, removed, or disabled without programming, (3) differentapps can be available on a test and production versions of the utility112 without programming, and (4) multiple activity logs can be viewed.

FIG. 10b shows a screenshot of a maintenance tool that allows anadministrator to validate JCL that is intended to run against an EOSsession and environment, and identify recommended changes (if any). Thistool has various features which enables various functions including (1)edits a JCL job to make sure that correct Datasets are used for anindicated environment, (2) a user specifies a type of component, and adataset that a JCL job is in, (3) a user can see what changes have beenrecommended, and edit a JCL component to make corrections.

FIG. 10c shows a screenshot of a tool that identifies forms who requireentries in the BDATE table. The BDATE table defines to EOS application110 reports that are parsed for business dates in the contents of eachreport as it is ingested to determine the date that the report is storedfor. This screenshot has various features which enables variousfunctions including (1) produce a report of form IDs to investigate forpossible addition to the BDATE table. Note that BDATE is a user exitproduced by RSD to parse all reports at ingest time for their processingdates. The processing dates found thru parsing are then used as thereports' ingest dates. The parsing data for all reports is contained ona flat file called the BDate Table.

FIGS. 10d-10f show screenshots of a set of tools designed to generate orconvert one or more software components. This has various features thatenable various functions, including (1) a framework for converting anytype of component (a JCL job, a data file, a program source code, apanel etc.) and (2) a user identifies a type of conversion desired, andan input where a component exists. In FIG. 10d , is a screenshot of thefirst screen where the user identifies the conversion type and datasetwhere the input members are to be selected from. This tool (as embodiedin FIGS. 10d-10f ) has various features which enables various functionsincluding (1) all selected components are fed (one at a time) to aconversion program for a desired code modifications to be made, andplaced in an output, (2) all converted lines are passed thru rulesspecific to a component type to ensure that a line length, andcontinuation rules are adhered to, and (3) a new conversion program canbe plugged into a utility simply by a meta data change. FIG. 10e , thisscreenshot allows for the selection of the type of conversion that isdesired. New conversion programs can be plugged into a utility simply bya meta data change. In FIG. 10f , this screenshot has various featureswhich enables various functions including (1) display of the results ofthe conversion, (2) a summary of the conversion is written to a log filefor later reference.

FIG. 10g shows a screenshot of a tool to allow selection of which diskpack a file should be allocated on. This tool has various features whichenables various functions including (1) certain virtual storage accessmethod (VSAM) datasets reside on non-managed packs that are assigned tothe application 110 (this app displays the application 110 assigned diskpacks, listing available space on each), (2) a display can be limited tomirrored or non-mirrored packs, (3) if a user enters a cylinderrequirement for an entered dataset, only those packs of a type desiredwith at least that amount of contiguous space are displayed, (4)multiple packs can be reserved for a dataset, and (5) once packs havebeen selected, that space is earmarked for that particular dataset untilan end of a day to prevent others from also claiming the space.

FIGS. 11a-11f shows screenshots of multiple tools selected for option 5according to this disclosure. In particular, FIG. 11a shows a screenshotof a maintenance tool selected for option 5 according to thisdisclosure. Apps executed in this option are used to assist in theplanning and execution of efforts to migrate reports or other componentsfrom one application to another. This screenshot depicts a userinterface that is presented using the same programming as that whichpresents FIGS. 3B, 8A, 9A, 10A, and 11A, but adjusted for FIG. 11a .This tool has features which enable various functions including (1) thecontents of these screens are determined by metadata entries for eachoption selected in the screens depicted in FIGS. 3A, and 6, (2) The appspresented with each option as Prim Cmds can be added, removed, ordisabled without programming, (3) different apps can be available on atest and production versions of the utility 112 without programming, and(4) multiple activity logs can be viewed, (5) apps executed in thisoption are used to plan and build out infrastructure for large migrationefforts of reports and data from one place to another.

FIG. 11b shows a screenshot of a maintenance tool to plan a migrationeffort. This tool has various features which enables various functionsincluding (1) allows a user to define an effort that will migrate datafrom one location to another, (2) an identification of criteria limitingwhat will be migrating in this effort, and (3) an effort can be scaledto allow more or less system resources for the effort to ensure theeffort is completed in time. The tool submits jobs automatically toextract various system files from the application 110, that it thenreads to determine the size of the migration effort (the number ofreports or components to migrate). It is possible to migrate fromapplications other than EOS, in which case a user would have to supplysimilar extracts of the information to be migrated to the tool(manually), making sure it is in the expected format. Once the toolknows the number of reports or components to migrate, it calculatesestimates of the length of time to perform the migration. It comparesthis estimate against the time goal provided by the user, and estimatesthe number of concurrent mainframe initiators that should be used. Inthe tool these are known as ‘Sets’. Once the user determines the numberof sets, this determination is used by the other migration tools toexecute the migration process.

FIG. 11e shows a screenshot of a maintenance tool that is programmed tobuild all the datasets needed for the number of sets desired by the userfor this migration effort. This tool has various features which enablesvarious functions including (1) an ability to define and build many orall datasets and components that are required for a migration effort,(2) when building system components specific to a ‘set’, this interfaceallows a user to assign direct access storage device (DASD) pack toallocate thereto, and (3) extensive logging of actions performed, andjobs submitted to build an environment. (4) display at the bottomincludes a log of all activities taken for this migration effort.

FIG. 11d shows a screenshot of a maintenance tool that is programmed tobuild all JCL for each report or component that needs to be migrated.This has various features which enables various functions including (1)reports progress of a migration effort to date, by set, (2) allows auser to activate or inactivate available sets, to change processingthroughput, (3) generate a set of jobs, such as 2,500, per set at asitting, for migrating components, and (4) estimates a time remaining ina migration effort.

FIGS. 11e-11f show screenshots for the migration utility quality monitorcomponent 236, as shown in FIG. 2c , that enables to display migrationresults and regenerate problematic JCL jobs. These are the reportmigrator component 214, as shown in FIG. 2a . The monitor component 236is programmed to monitor and correct problems with a migration effort.This tool has various features which enable various functions including(1) viewing counts of the number of completed, failed, and lost jobsthat have been run for each set in the current migration, (2) thecapability to regenerate lost JCL jobs (3) the capability to generatelists of all successful or failed jobs in the migration, and (4) thecapability to view various logs to investigate the cause of any jobfailures. Resultantly, this tool enables a user at any point of timeduring operation to know, such as via querying and receiving, how manyjobs there were, how many have run, how many remain to be run, how manyhave failed, how many have succeeded and failed. For those jobs thatfailed, the tool is enabled to either edit and fix those jobs orresubmit those jobs just as they were (allows to do large amounts ofwork in a short amount of time and give users assurance that right workwas actually done to restore these reports to provide more systematiccontrol over quality versus manual).

As explained above, in some embodiments, a group of data governanceusers are able to have a security exit to limit a function that thoseusers of EOS could do and then those users can control that securityexit through various data entries in files. This security exit can beperformed via allowing those users to control those files, withoutknowing that those users were actually controlling those files, whilealso keeping track of all the changes done by those users via a log ofwho changed, what, and when, which would not be able to be performed ifthose users were just directly manipulating those files. As such, theutility 112 allows those users to access a particular file that containsdata, which informs the EOS of what functions to restrict for theirparticular subset of EOS. Subsequently, those users are able to controlwhich functions those users want restricted via that particular file.Likewise, the utility logs, which log various user actions, includingchanges to files, enable the users to avoid particular knowledge aboutwhich format and code to use. Since the users are not subject to inputof data in a wrong column or table, the utility 112 acts as an interfacebetween the users and that particular file in order to avoid error andto keep a log of what was done, with the log operating as a controlmechanism for access and a research tool when the users are figuring outwhy doesn't someone have access to export a particular report (the userscan read the log to see whether a change was made for that particularreport rather than just looking at a file that EOS makes a user enter).

Furthermore, in some embodiments, the EOS can have another user exit viaa B-Date. For example, a user can submit a report today and that reportcontains only data for yesterday, so the report date is yesterday butthe user is submitting the report today. EOS by itself would record thatwith a report date of today, but the B-date allows a user to defineparticular reports and then, where the date occurs on each page, thereport can be parsed and EOS can fail. This can be acceptable based onthe data the user received in this report rather than the report beingtoday, the user would record the report as being a report fromyesterday. This functionality is controlled by a file in EOS. FIG. 232depicts an application within the utility 112 that enables an easyinterface for updating the B-Date file. This application allows the userto make or change B-Date entries for any report. All changes made to theB-Date file by the application are logged for later research.

Various embodiments of the present disclosure may be implemented in adata processing system suitable for storing and/or executing programcode that includes at least one processor, including a multicoreprocessor, coupled directly or indirectly to memory elements through asystem bus. The memory elements include, for instance, local memoryemployed during actual execution of the program code, bulk storage, andcache memory which provide temporary storage of at least some programcode in order to reduce the number of times code must be retrieved frombulk storage during execution.

Input/Output or I/O devices (including, but not limited to, keyboards,displays, pointing devices, DASD, tape, CDs, DVDs, thumb drives andother memory media, etc.) can be coupled to the system either directlyor through intervening I/O controllers. Network adapters may also becoupled to the system to enable the data processing system to becomecoupled to other data processing systems or remote printers or storagedevices through intervening private or public networks. Modems, cablemodems, and Ethernet cards are just a few of the available types ofnetwork adapters.

The present disclosure may be embodied in a system, a method, and/or acomputer program product. The computer program product may include acomputer readable storage medium (or media) having computer readableprogram instructions thereon for causing a processor to carry outaspects of the present disclosure. The computer readable storage mediumcan be a tangible device that can retain and store instructions for useby an instruction execution device. The computer readable storage mediummay be, for example, but is not limited to, an electronic storagedevice, a magnetic storage device, an optical storage device, anelectromagnetic storage device, a semiconductor storage device, or anysuitable combination of the foregoing. A non-exhaustive list of morespecific examples of the computer readable storage medium includes thefollowing: a portable computer diskette, a hard disk, a random accessmemory (RAM), a read-only memory (ROM), an erasable programmableread-only memory (EPROM or Flash memory), a static random access memory(SRAM), a portable compact disc read-only memory (CD-ROM), a digitalversatile disk (DVD), a memory stick, a floppy disk, a mechanicallyencoded device such as punch-cards or raised structures in a groovehaving instructions recorded thereon, and any suitable combination ofthe foregoing.

Computer readable program instructions described herein can bedownloaded to respective computing/processing devices from a computerreadable storage medium or to an external computer or external storagedevice via a network, for example, the Internet, a local area network, awide area network and/or a wireless network. The network may comprisecopper transmission cables, optical transmission fibers, wirelesstransmission, routers, firewalls, switches, gateway computers and/oredge servers. A network adapter card or network interface in eachcomputing/processing device receives computer readable programinstructions from the network and forwards the computer readable programinstructions for storage in a computer readable storage medium withinthe respective computing/processing device.

Computer readable program instructions for carrying out operations ofthe present disclosure may be assembler instructions,instruction-set-architecture (ISA) instructions, machine instructions,machine dependent instructions, microcode, firmware instructions,state-setting data, or either source code or object code written in anycombination of one or more programming languages, including an objectoriented programming language such as Smalltalk, C++ or the like, andconventional procedural programming languages, such as the “C”programming language, “R” programming language or similar programminglanguages. A code segment or machine-executable instructions mayrepresent a procedure, a function, a subprogram, a program, a routine, asubroutine, a module, a software package, a class, or any combination ofinstructions, data structures, or program statements. A code segment maybe coupled to another code segment or a hardware circuit by passingand/or receiving information, data, arguments, parameters, or memorycontents. Information, arguments, parameters, data, etc. may be passed,forwarded, or transmitted via any suitable means including memorysharing, message passing, token passing, network transmission, amongothers. The computer readable program instructions may execute entirelyon the user's computer, partly on the user's computer, as a stand-alonesoftware package, partly on the user's computer and partly on a remotecomputer or entirely on the remote computer or server. In the latterscenario, the remote computer may be connected to the user's computerthrough any type of network, including a LAN or a wide area network(WAN), or the connection may be made to an external computer (forexample, through the Internet using an Internet Service Provider). Insome embodiments, electronic circuitry including, for example,programmable logic circuitry, field-programmable gate arrays (FPGA), orprogrammable logic arrays (PLA) may execute the computer readableprogram instructions by utilizing state information of the computerreadable program instructions to personalize the electronic circuitry,in order to perform aspects of the present disclosure.

Aspects of the present disclosure are described herein with reference toflowchart illustrations and/or block diagrams of methods, apparatus(systems), and computer program products according to embodiments of thedisclosure. It will be understood that each block of the flowchartillustrations and/or block diagrams, and combinations of blocks in theflowchart illustrations and/or block diagrams, can be implemented bycomputer readable program instructions. The various illustrative logicalblocks, modules, circuits, and algorithm steps described in connectionwith the embodiments disclosed herein may be implemented as electronichardware, computer software, or combinations of both. To clearlyillustrate this interchangeability of hardware and software, variousillustrative components, blocks, modules, circuits, and steps have beendescribed above generally in terms of their functionality. Whether suchfunctionality is implemented as hardware or software depends upon theparticular application and design constraints imposed on the overallsystem. Skilled artisans may implement the described functionality invarying ways for each particular application, but such implementationdecisions should not be interpreted as causing a departure from thescope of the present disclosure.

The flowchart and block diagrams in the Figures illustrate thearchitecture, functionality, and operation of possible implementationsof systems, methods, and computer program products according to variousembodiments of the present disclosure. In this regard, each block in theflowchart or block diagrams may represent a module, segment, or portionof instructions, which comprises one or more executable instructions forimplementing the specified logical function(s). In some alternativeimplementations, the functions noted in the block may occur out of theorder noted in the figures. For example, two blocks shown in successionmay, in fact, be executed substantially concurrently, or the blocks maysometimes be executed in the reverse order, depending upon thefunctionality involved. It will also be noted that each block of theblock diagrams and/or flowchart illustration, and combinations of blocksin the block diagrams and/or flowchart illustration, can be implementedby special purpose hardware-based systems that perform the specifiedfunctions or acts or carry out combinations of special purpose hardwareand computer instructions.

Words such as “then,” “next,” etc. are not intended to limit the orderof the steps; these words are simply used to guide the reader throughthe description of the methods. Although process flow diagrams maydescribe the operations as a sequential process, many of the operationscan be performed in parallel or concurrently. In addition, the order ofthe operations may be re-arranged. A process may correspond to a method,a function, a procedure, a subroutine, a subprogram, etc. When a processcorresponds to a function, its termination may correspond to a return ofthe function to the calling function or the main function.

Although preferred embodiments have been depicted and described indetail herein, it will be apparent to those skilled in the relevant artthat various modifications, additions, substitutions and the like can bemade without departing from the spirit of the disclosure, and these are,therefore, considered to be within the scope of the disclosure, asdefined in the following claims.

Features or functionality described with respect to certain exampleembodiments may be combined and sub-combined in and/or with variousother example embodiments. Also, different aspects and/or elements ofexample embodiments, as disclosed herein, may be combined andsub-combined in a similar manner as well. Further, some exampleembodiments, whether individually and/or collectively, may be componentsof a larger system, wherein other procedures may take precedence overand/or otherwise modify their application. Additionally, a number ofsteps may be required before, after, and/or concurrently with exampleembodiments, as disclosed herein. Note that any and/or all methodsand/or processes, at least as disclosed herein, can be at leastpartially performed via at least one entity or actor in any manner.

The terminology used herein can imply direct or indirect, full orpartial, temporary or permanent, action or inaction. For example, whenan element is referred to as being “on,” “connected” or “coupled” toanother element, then the element can be directly on, connected orcoupled to the other element and/or intervening elements can be present,including indirect and/or direct variants. In contrast, when an elementis referred to as being “directly connected” or “directly coupled” toanother element, there are no intervening elements present.

Although the terms first, second, etc. can be used herein to describevarious elements, components, regions, layers and/or sections, theseelements, components, regions, layers and/or sections should notnecessarily be limited by such terms. These terms are used todistinguish one element, component, region, layer or section fromanother element, component, region, layer or section. Thus, a firstelement, component, region, layer, or section discussed below could betermed a second element, component, region, layer, or section withoutdeparting from the teachings of the present disclosure.

Furthermore, relative terms such as “below,” “lower,” “above,” and“upper” can be used herein to describe one element's relationship toanother element as illustrated in the accompanying drawings. Suchrelative terms are intended to encompass different orientations ofillustrated technologies in addition to the orientation depicted in theaccompanying drawings. For example, if a device in the accompanyingdrawings were turned over, then the elements described as being on the“lower” side of other elements would then be oriented on “upper” sidesof the other elements. Similarly, if the device in one of the figureswere turned over, elements described as “below” or “beneath” otherelements would then be oriented “above” the other elements. Therefore,the example terms “below” and “lower” can encompass both an orientationof above and below.

The terminology used herein is for describing particular exampleembodiments and is not intended to be necessarily limiting of thepresent disclosure. As used herein, the singular forms “a,” “an” and“the” are intended to include the plural forms as well, unless thecontext clearly indicates otherwise. The terms “comprises,” “includes”and/or “comprising,” “including” when used in this specification,specify the presence of stated features, integers, steps, operations,elements, and/or components, but do not preclude the presence and/oraddition of one or more other features, integers, steps, operations,elements, components, and/or groups thereof.

As used herein, the term “or” is intended to mean an inclusive “or”rather than an exclusive “or.” That is, unless specified otherwise, orclear from context, “X employs A or B” is intended to mean any of thenatural inclusive permutations. That is, if X employs A; X employs B; orX employs both A and B, then “X employs A or B” is satisfied under anyof the foregoing instances.

Unless otherwise defined, all terms (including technical and scientificterms) used herein have the same meaning as commonly understood by oneof ordinary skill in the art to which this disclosure belongs. Theterms, such as those defined in commonly used dictionaries, should beinterpreted as having a meaning that is consistent with their meaning inthe context of the relevant art and should not be interpreted in anidealized and/or overly formal sense unless expressly so defined herein.

As used herein, the term “about” and/or “substantially” refers to a+/−10% variation from the nominal value/term. Such variation is alwaysincluded in any given.

If any disclosures are incorporated herein by reference and suchdisclosures conflict in part and/or in whole with the presentdisclosure, then to the extent of conflict, and/or broader disclosure,and/or broader definition of terms, the present disclosure controls. Ifsuch disclosures conflict in part and/or in whole with one another, thento the extent of conflict, the later-dated disclosure controls.

What is claimed is:
 1. A method comprising: accessing, by a processor, autility program on an operating system of a mainframe, wherein theoperating system hosts an application that includes a plurality ofrunning jobs, wherein the utility program includes a set ofconfiguration metadata for the application; configuring, by theprocessor, the utility program such that the utility program isconfigured to receive a user input from a workstation that is incommunication with the mainframe and the utility program is configuredto interface with the application based on the set of configurationmetadata responsive to the user input; creating, by the processor, a jobvia the utility program interfacing with the application based on theset of configuration metadata responsive to the user input; submitting,by the processor, the job to the application via the utility programinterfacing with the application based on the set of configurationmetadata responsive to the user input; querying, by the processor, thejob at the application before completion for a status via the utilityprogram based on the set of configuration metadata; and sending, by theprocessor, a request about at least one of the application or theoperating system to an output device based on the set of configurationmetadata via the utility program responsive to the status.
 2. The methodof claim 1, wherein the status includes an error, wherein the requestincludes: triggering, by the processor, an alert based on the set ofconfiguration metadata via the utility program responsive to the error;and outputting, by the processor, the alert to the workstation incommunication with the utility program.
 3. The method of claim 2,further comprising: generating, via the processor, a suggestion via theutility program based on the set of configuration metadata responsive tothe error; and presenting, via the processor, the suggestion to theworkstation via the utility program based on the set of configurationmetadata.
 4. The method of claim 3, wherein the alert and the suggestionare concurrently presented to the workstation via the utility programbased on the set of configuration metadata.
 5. The method of claim 1,wherein the utility is programmed for calling a plurality of logicalunits to perform a plurality of functions with respect to theapplication, wherein the functions are distinct from each other, whereinat least one of the functions performs the creating, the submitting, thechecking, and the outputting.
 6. The method of claim 1, wherein theutility program is programmed for a user access control via a pluralityof user logins that have different access privileges from each other. 7.The method of claim 1, wherein the utility program is programmed toenable an addition of an app via modifying an entry of a file storingthe set of configuration metadata.
 8. The method of claim 7, wherein theapp is programmed to read a log included in the utility program.
 9. Themethod of claim 7, wherein the utility program determines its own levelof security and prohibits a user without an appropriate credential fromusing the utility program.
 10. The method of claim 1, wherein theutility program includes an app that performs the submitting.
 11. Anon-transitive storage device storing a plurality of instructions thatare executable by a processor to enable the processor to: access autility program on an operating system of a mainframe, wherein theoperating system hosts an application that includes a plurality ofrunning jobs, wherein the utility program includes a set ofconfiguration metadata for the application; configure the utilityprogram such that the utility program is configured to receive a userinput from a workstation that is in communication with the mainframe andthe utility program is configured to interface with the applicationbased on the set of configuration metadata responsive to the user input;create a job via the utility program interfacing with the applicationbased on the set of configuration metadata responsive to the user input;submit the job to the application via the utility program interfacingwith the application based on the set of configuration metadataresponsive to the user input; query the job at the application beforecompletion for a status via the utility program based on the set ofconfiguration metadata; and send a request about at least one of theapplication or the operating system to an output device based on the setof configuration metadata via the utility program responsive to thestatus.
 12. The non-transitive storage device of claim 11, wherein thestatus includes an error, wherein the request enables the processor to:trigger an alert based on the set of configuration metadata via theutility program responsive to the error; and output the alert to theworkstation in communication with the utility program, wherein theaction includes.
 13. The non-transitive storage device of claim 12,wherein the processor is enabled to: generate a suggestion via theutility program based on the set of configuration metadata responsive tothe error; and present the suggestion to the workstation via the utilityprogram based on the set of configuration metadata.
 14. Thenon-transitive storage device of claim 13, wherein the alert and thesuggestion are concurrently presented to the workstation via the utilityprogram based on the set of configuration metadata.
 15. Thenon-transitive storage device of claim 11, wherein the utility isprogrammed for calling a plurality of logical units to perform aplurality of functions with respect to the application, wherein thefunctions are distinct from each other, wherein at least one of thefunctions performs the creating, the submitting, the checking, and theoutputting.
 16. The non-transitive storage device of claim 11, whereinthe utility program is programmed for a user access control via aplurality of user logins that have different access privileges from eachother.
 17. The non-transitive storage device of claim 11, wherein theutility program is programmed to enable an addition of an app viamodifying an entry of a file storing the set of configuration metadata.18. The non-transitive storage device of claim 17, wherein the app isprogrammed to read a log included in the utility program.
 19. Thenon-transitive storage device of claim 17, wherein the utility programdetermines its own level of security and prohibits a user without anappropriate credential from using the utility program.
 20. Thenon-transitive storage device of claim 11, wherein the utility programincludes an app that performs the submitting.