Professional Documents
Culture Documents
Corporate Finance Mainframe-4 Document of Understanding v0.3
Corporate Finance Mainframe-4 Document of Understanding v0.3
HBC Confidential
Authors
Name Location Phone Email
Revision History
Date Author Description
HBC Confidential
Contents
1. Application Name......................................................................................................5
2. Purpose of the Application........................................................................................5
B – Technical Overview...................................................................................8
15. Technology Stack.....................................................................................................8
16. License Requirements...........................................................................................10
17. Technology Variances...........................................................................................10
18. System architecture diagram...............................................................................10
19. Database Architecture...........................................................................................10
A) Physical data model and Logical data model............................................................11
B) List the key tables and their mapping to the transactions.......................................11
20. Backup, Recovery and Archival............................................................................11
21. Infrastructure Architecture Diagram for all Environments...............................11
22. Number of Instances.............................................................................................11
23. Performance and Availability...............................................................................12
24. Scheduled Upgrades.............................................................................................12
25. Setup Procedures...................................................................................................12
HBC Confidential
26. Interfaces................................................................................................................12
27. Critical Jobs / Integration needs / Schedules Yet to receive...........................13
28. Technical data sheets............................................................................................13
29. Detail the Do’s and Don’ts and specific test scenarios....................................14
30. Ticketing System....................................................................................................14
Yet to receive......................................................................................................................14
A) Tools................................................................................................................................14
B) Reports............................................................................................................................14
31. Quantitative Assessment of Ticket data.............................................................14
Yet to receive......................................................................................................................14
A) Analyze Application Incident data..............................................................................14
B) Trend Analysis................................................................................................................14
32. Operating Procedures Yet to receive.........................................................15
A) Incident Management (all types) until Ticket closure...............................................15
B) Incident Reporting and Recording Mechanism.........................................................15
C) Planned Activity Resolution Process...........................................................................15
D) Unplanned activity Resolution Process......................................................................15
E) Disaster Recovery process............................................................................................15
F) Change Management Process......................................................................................15
G) Deployment Process.....................................................................................................15
H) Log Locations / Enabling / Debugging Process........................................................15
I) Release management frequency and process............................................................15
J) Installation Process.........................................................................................................15
K) Rollback Management..................................................................................................15
L) Third party Support including Helpdesk.....................................................................15
M) After hours support procedure..................................................................................15
33. Configuration Management. Yet to receive.............................................15
A) Configuration Management Process..........................................................................15
B) Configuration Mgmt (People, Hardware, Software, other assets)..........................15
34. Communication Process. Yet to receive...................................................15
A) Communication within the Team and Client.............................................................15
B) Escalation Process and Touch Points..........................................................................15
HBC Confidential
C) Customer Communication Framework for Jobs, Monitoring..................................15
35. Verification and Validation process. Yet to receive..............................16
A) Application Functionality Verification.........................................................................16
B) Performance Testing.....................................................................................................16
C) System Integration Testing Process............................................................................16
36. Process templates Yet to receive.............................................................16
A – FUNCTIONAL OVERVIEW
1. Application Name
OLSI – Online Sales Inquiry (Saks)
HBC Confidential
T-Log Translation system saves transaction details into DB2 table on Mainframe
from POS system so that users can inquiry on the transaction details through green
screen and look at all the transaction details as to total transaction amount for the
day at store level or department level or store/department level. All store and
department details will be fetched from Company structure on real time basis. OLSI
reads the Mainframe DB2 table to generate output COGNOS reports.
Banner (HB, HO, LT, Saks, Outlets, and CORP): Saks US and Canada, Find@ (POS)
Software Vendor:
Vendor Systematic Software Solutions
Contact name Steve Trischetta
Email stevet@syssoftware.com
Phone 732-297-8989
HBC Confidential
CICS, COBOL, VSAM, DB2
User/Business Group:
User Business Group
Store Management Stores
Kirsten Grimaldi and team BSM
Andrea Robins and team? Customer Relations
HBC Confidential
Context Diagram (Link below):
11. Computations
Yet to receive
12. Dependencies
Yet to receive
B – Technical Overview
15. Technology Stack
[Detail:
- Application type: Mainframe
- Application Stage: Production
o Application is released to Production
- Detail the Hardware ( if required )
o N/A
HBC Confidential
- Detail the Operating system
o z/OS
- Detail the Software / Language
o IBM Mainframe
Cobol & DYL-280
o Unix Server
Unix Shell Script
- Detail the tools and any Integration technologies used
o File-Aid
File manipulation tool
o Panvalet
Member manipulation tool
- Detail all major and minor technologies / frameworks the application is
built with. the latest versions.
- Detail the data store
- Detail the version control tool
- In case of products establish the market name of the product, version &
vendor details.
- Establish if vendor AMC for third party product / support is required ; and
is available or not through Customer’s
- Cover Database, Administration / Security , Front-end GUI , Application
server , Language , API’s , Encryption , Monitoring tools , Development
tools , Reporting tools, Integration tools, Workflow , Rules engine etc ]
HBC Confidential
Security Permissions (List groups): Yet to receive
RACF AD Other
RACF
Security Regulations:
PCI PII Capital One Port
No No No
A. How do you grant access?
RACF
RACF/Mainframe
HBC Confidential
19. Database Architecture
Yet to receive
HBC Confidential
22. Number of Instances
Yet to receive
Instanc Instance type Instance Synchronizatio Accessibilit Remarks /
e ( Eg : Location n with y Centralized /
No Production , [ If Production Details Decentralize
Development hosted Instance , ( URL , IP d
, Testing ) outside State Yes / Address
Custome No etc )
r’s
Network
]
Detail the ALL access URL and links for different components such as
- Local databases
- Version control tools
- Application URL
- Reports etc
HBC Confidential
26. Interfaces
Yet to receive
Critical Job Information – (if application has critical jobs that will be monitored list
details in this table)
Critical Job Server or Site Schedu Scheduled Impacts if not Notifications Needed
le Completion completed on time late
Name (Due out
time))
System Monitoring (List monitoring tool. Ex. TMON for MF/New Relic for Open
Systems):
HBC Confidential
28. Technical data sheets
Yet to receive
29. Detail the Do’s and Don’ts and specific test scenarios
Yet to receive
C – Operational Overview
Yet to receive
A) Tools
B) Reports
Yet to receive
B) Trend Analysis
HBC Confidential
32. Operating Procedures Yet to receive
G) Deployment Process
J) Installation Process.
K) Rollback Management.
HBC Confidential
35. Verification and Validation process. Yet to receive
B) Performance Testing.
Yet to receive
HBC Confidential