Implementing and Testing SOA on IBM System Z

Implementing and Testing SOA on IBM System Z PDF Author: IBM Redbooks
Publisher: IBM.Com/Redbooks
ISBN: 9780738488752
Category : Computers
Languages : en
Pages : 156

Get Book Here

Book Description

Implementing and Testing SOA on IBM System Z

Implementing and Testing SOA on IBM System Z PDF Author: IBM Redbooks
Publisher: IBM.Com/Redbooks
ISBN: 9780738488752
Category : Computers
Languages : en
Pages : 156

Get Book Here

Book Description


Implementing and Testing SOA on IBM System Z

Implementing and Testing SOA on IBM System Z PDF Author: Christian Matthys
Publisher:
ISBN:
Category :
Languages : en
Pages : 166

Get Book Here

Book Description
Service-oriented architecture (SOA) is one of the most important topics on the agenda of any IT person. SOA involves a new vision of how to design, develop, and manage applications. It also has new requirements when building an architecture for the underlying infrastructure. This IBM Redbooks publication is the result of a project managed in the IBM European Design Center, based in Montpellier, France. The scope of the project involved helping a major worldwide customer in the automotive industry to validate and justify an SOA implementation. In particular, the customer wanted to add new business values to work with its partners, by adding new data models. It also wanted to modernize an infrastructure, by adding new Internet interfaces. The customer faced the need to eradicate an obsolete programming language. Furthermore, it wanted to build a smooth migration path, with as few risks and costs as possible. The thought, planning, and architecture of the new system, which included integration of the SOA concepts, was built by the customer with the participation of Atos Origin, a leading international IT services provider. The existing customer IT infrastructure was already built around UNIX systems, IBM System z, non-IBM clusters, SAP solutions, 3270 screens, IMS-DL/I databases, and specific code. SOA was the right solution to connect this existing environment to new components using Java, Web services, and DB2 in particular. This book explores the business needs and the architectural choices that were faced by the customer. It describes the mock-ups and prototypes, provides performance numbers that were used to validate the decisions, and explains how they were implemented. It also suggests a generic and riskless solution to eradicate the obsolete programming language.

Set Up Linux on IBM System Z for Production

Set Up Linux on IBM System Z for Production PDF Author: Lydia Parziale
Publisher:
ISBN:
Category : Client/server computing
Languages : en
Pages : 0

Get Book Here

Book Description


IBM z/OS V2R1 Communications Server TCP/IP Implementation Volume 4: Security and Policy-Based Networking

IBM z/OS V2R1 Communications Server TCP/IP Implementation Volume 4: Security and Policy-Based Networking PDF Author: Rufus P. Credle Jr.
Publisher: IBM Redbooks
ISBN: 0738438804
Category : Computers
Languages : en
Pages : 958

Get Book Here

Book Description
For more than 40 years, IBM® mainframes have supported an extraordinary portion of the world's computing work, providing centralized corporate databases and mission-critical enterprise-wide applications. IBM System z®, the latest generation of the IBM distinguished family of mainframe systems, has come a long way from its IBM System/360 heritage. Likewise, its IBM z/OS® operating system is far superior to its predecessors in providing, among many other capabilities, world-class and state-of-the-art support for the TCP/IP Internet protocol suite. TCP/IP is a large and evolving collection of communication protocols managed by the Internet Engineering Task Force (IETF), an open, volunteer organization. Because of its openness, the TCP/IP protocol suite has become the foundation for the set of technologies that form the basis of the Internet. The convergence of IBM mainframe capabilities with Internet technology, connectivity, and standards (particularly TCP/IP) is dramatically changing the face of information technology and driving requirements for ever more secure, scalable, and highly available mainframe TCP/IP implementations. The IBM z/OS Communications Server TCP/IP Implementation series provides understandable, step-by-step guidance about how to enable the most commonly used and important functions of z/OS Communications Server TCP/IP. This IBM Redbooks® publication is for people who install and support z/OS Communications Server. It explains how to set up security for your z/OS networking environment. Network security requirements have become more stringent and complex. Because many transactions are from unknown users and untrusted networks, careful attention must be given to host and user authentication, data privacy, data origin authentication, and data integrity. Also, because security technologies are complex and can be confusing, we include helpful tutorial information in the appendixes of this book.

IBM z/OS V2R2 Communications Server TCP/IP Implementation: Volume 4 Security and Policy-Based Networking

IBM z/OS V2R2 Communications Server TCP/IP Implementation: Volume 4 Security and Policy-Based Networking PDF Author: Bill White
Publisher: IBM Redbooks
ISBN: 0738442240
Category : Computers
Languages : en
Pages : 958

Get Book Here

Book Description
For more than 50 years, IBM® mainframes have supported an extraordinary portion of the world's computing work, providing centralized corporate databases, and mission-critical enterprise-wide applications. IBM z® Systems, the latest generation of the IBM distinguished family of mainframe systems, has come a long way from its IBM System/360 heritage. Likewise, its IBM z/OS® operating system is far superior to its predecessors in providing, among many other capabilities, world-class and state-of-the-art support for the TCP/IP Internet protocol suite. TCP/IP is a large and evolving collection of communication protocols managed by the Internet Engineering Task Force (IETF), an open, volunteer organization. Because of its openness, the TCP/IP protocol suite has become the foundation for the set of technologies that form the basis of the Internet. The convergence of IBM mainframe capabilities with Internet technology, connectivity, and standards (particularly TCP/IP) is dramatically changing the face of information technology and driving requirements for ever more secure, scalable, and highly available mainframe TCP/IP implementations. The IBM z/OS Communications Server TCP/IP Implementation series provides understandable, step-by-step guidance about how to enable the most commonly used and important functions of z/OS Communications Server TCP/IP. This IBM Redbooks® publication is for people who install and support z/OS Communications Server. It explains how to set up security for your z/OS networking environment. With the advent of TCP/IP and the Internet, network security requirements have become more stringent and complex. Because many transactions are from unknown users and untrusted networks such as the Internet, careful attention must be given to host and user authentication, data privacy, data origin authentication, and data integrity. Also, because security technologies are complex and can be confusing, we include helpful tutorial information in the appendixes of this book. For more information about z/OS Communications Server base functions, standard applications, and high availability, see the other following volumes in the series: IBM z/OS V2R2 Communications Server TCP/IP Implementation Volume 1: Base Functions, Connectivity, and Routing, SG24-8360 IBM z/OS V2R2 Communications Server TCP/IP Implementation Volume 2: Standard Applications, SG24-8361 IBM z/OS V2R2 Communications Server TCP/IP Implementation Volume 3: High Availability, Scalability, and Performance, SG24-8362 This book does not duplicate the information in these publications. Instead, it complements those publications with practical implementation scenarios that might be useful in your environment. For more information about at what level a specific function was introduced, see z/OS Communications Server: New Function Summary, GC31-8771.

System z Parallel Sysplex Best Practices

System z Parallel Sysplex Best Practices PDF Author: Frank Kyne
Publisher: IBM Redbooks
ISBN: 0738434671
Category : Computers
Languages : en
Pages : 202

Get Book Here

Book Description
This IBM® Redbooks® publication pulls together diverse information regarding the best way to design, implement, and manage a Parallel Sysplex® to deliver the levels of performance and availability required by your organization. This book should be of interest to system programmers, availability managers, and database administrators who are interested in verifying that your systems conform to IBM best practices for a Parallel Sysplex environment. In addition to z/OS® and the sysplex hardware configuration, this book also covers the major IBM subsystems: CICS® DB2® IMSTM MQ WebSphere® Application Server To get the best value from this book, readers should have hands-on experience with Parallel Sysplex and have working knowledge of how your systems are set up and why they were set up in that manner.

Creating IBM z/OS Cloud Services

Creating IBM z/OS Cloud Services PDF Author: Jeffrey Bisti
Publisher: IBM Redbooks
ISBN: 0738441538
Category : Computers
Languages : en
Pages : 86

Get Book Here

Book Description
This IBM® Redbooks® publication discusses the real world experience of an enterprise that developed and implemented IBM z/OS® cloud services. This book shares the experience of a team at Walmart Technology, Walmart Stores, Inc.® and some of the decisions they made to create business critical cloud services. These experiences and approaches relate to the z/OS platform, and might not apply to other hybrid cloud approaches. This book highlights the strengths and characteristics of z/OS that led the Walmart infrastructure and software engineers to use this platform as they transitioned from a traditional IT deployment to a cloud model. Embarking on a cloud strategy can be overwhelming. No shortage of approaches to cloud computing exists. This book focuses on a pragmatic approach for enterprises that are struggling to take advantage of their business assets in the cloud. This book introduces the basic cloud concepts as defined by the National Institute of Standards and Technology (NIST). Each chapter explains the importance of a particular NIST characteristic, the z/OS role in accomplishing the characteristic, and how it was implemented by the Walmart Technology team. This book is intended for IT professionals who are considering extending their IBM z SystemsTM environment to a hybrid cloud by unleashing the power of cloud services on z/OS. For information about creating cloud services that are hosted in IBM CICS®, see How Walmart Became a Cloud Services Provider with IBM CICS, SG24-8347.

IBM z/OS Mainframe Security and Audit Management Using the IBM Security zSecure Suite

IBM z/OS Mainframe Security and Audit Management Using the IBM Security zSecure Suite PDF Author: Axel Buecker
Publisher: IBM Redbooks
ISBN: 0738435880
Category : Computers
Languages : en
Pages : 494

Get Book Here

Book Description
Every organization has a core set of mission-critical data that must be protected. Security lapses and failures are not simply disruptions—they can be catastrophic events, and the consequences can be felt across the entire organization. As a result, security administrators face serious challenges in protecting the company's sensitive data. IT staff are challenged to provide detailed audit and controls documentation at a time when they are already facing increasing demands on their time, due to events such as mergers, reorganizations, and other changes. Many organizations do not have enough experienced mainframe security administrators to meet these objectives, and expanding employee skillsets with low-level mainframe security technologies can be time-consuming. The IBM® Security zSecure suite consists of multiple components designed to help you administer your mainframe security server, monitor for threats, audit usage and configurations, and enforce policy compliance. Administration, provisioning, and management components can significantly reduce administration, contributing to improved productivity, faster response time, and reduced training time needed for new administrators. This IBM Redbooks® publication is a valuable resource for security officers, administrators, and architects who wish to better understand their mainframe security solutions.

DataPower SOA Appliance Administration, Deployment, and Best Practices

DataPower SOA Appliance Administration, Deployment, and Best Practices PDF Author: Gerry Kaplan
Publisher: IBM Redbooks
ISBN: 0738435708
Category : Computers
Languages : en
Pages : 300

Get Book Here

Book Description
This IBM® Redbooks® publication focuses on operational and managerial aspects for DataPower® appliance deployments. DataPower appliances provide functionality that crosses both functional and organizational boundaries, which introduces unique management and operational challenges. For example, a DataPower appliance can provide network functionality, such as load balancing, and at the same time, provide enterprise service bus (ESB) capabilities, such as transformation and intelligent content-based routing. This IBM Redbooks publication provides guidance at both a general and technical level for individuals who are responsible for planning, installation, development, and deployment. It is not intended to be a "how-to" guide, but rather to help educate you about the various options and methodologies that apply to DataPower appliances. In addition, many chapters provide a list of suggestions.

z/TPF Application Modernization using Standard and Open Middleware

z/TPF Application Modernization using Standard and Open Middleware PDF Author: Lisa Dianne Banks
Publisher: IBM Redbooks
ISBN: 0738438200
Category : Computers
Languages : en
Pages : 486

Get Book Here

Book Description
In a world where product lifespans are often measured in months, the IBM® Transaction Processing Facility has remained relevant for more than four decades by continuing to process high volumes of transactions quickly and reliably. As the title of this book suggests, the z/TPF system uses open, standard interfaces to create services. Integration of new applications with existing z/TPF functions is a key factor in extending application capabilities. The ability for service data objects (SDO) to access the z/TPF Database Facility (z/TPFDF) provides a framework for data application program development that includes an architecture and application programming interfaces (APIs). SDO access to z/TPFDF provides remote client applications with access to z/TPF traditional data. In the simplest terms, service-oriented architecture (SOA) is a means by which like, or unlike, systems can communicate with one another despite differences between each system's heritage. SOA can neutralize the differences between systems so that they understand one another. SOA support for z/TPF is a means by which z/TPF can interact with other systems that also support SOA. This book discusses various aspects of SOA in the z/TPF system, including explanations and examples to help z/TPF users implement SOA. IBM WebSphere® Application Server was chosen as the partner system as a means of demonstrating how a world class transaction server and a world class application server can work together. This book shows you how you can exploit z/TPF as a transaction server, participating in a SOA structure alongside WebSphere Application Server. This IBM Redbooks® publication provides an introduction to z/TPF and the technologies critical to SOA. z/TPF is positioned as a provider or consumer in an SOA by supporting SOAP processing, communication bindings, and Extensible Markup Language (XML). An example is used to show how z/TPF can be used both as a Web service provider and as a consumer. A second example shows how to use WebSphere Operational Decision Management to apply business rules. A third example shows how business event processing can be incorporated in z/TPF applications. An example is also used to discuss security aspects, including z/TPF XML encryption and the z/TPF WS-Security wrapper. The main part of the book concludes with a discussion of z/TPF in an open systems environment, including examples of lightweight implementations to fit z/TPF, such as the HTTP server for the z/TPF system. The appendixes include information and examples using TPF Toolkit, sample code, and workarounds (with yes, more examples).