Implementing IBM CICS JSON Web Services for Mobile Applications

Implementing IBM CICS JSON Web Services for Mobile Applications PDF Author: Rufus Credle
Publisher: IBM Redbooks
ISBN: 0738438901
Category : Computers
Languages : en
Pages : 198

Get Book Here

Book Description
This IBM® Redbooks® publication provides information about how you can connect mobile devices to IBM Customer Information Control System (CICS®) Transaction Server (CICS TS), using existing enterprise services already hosted on CICS, or to develop new services supporting new lines of business. This book describes the steps to develop, configure, and deploy a mobile application that connects either directly to CICS TS, or to CICS via IBM Worklight® Server. It also describes the advantages that your organization can realize by using Worklight Server with CICS. In addition, this Redbooks publication provides a broad understanding of the new CICS architecture that enables you to make new and existing mainframe applications available as web services using JavaScript Object Notation (JSON), and provides support for the transformation between JSON and application data. While doing so, we provide information about each resource definition, and its role when CICS handles or makes a request. We also describe how to move your CICS applications, and business, into the mobile space, and how to prepare your CICS environment for the following scenarios: Taking an existing CICS application and exposing it as a JSON web service Creating a new CICS application, based on a JSON schema Using CICS as a JSON client This Redbooks publication provides information about the installation and configuration steps for both Worklight Studio and Worklight Server. Worklight Studio is the Eclipse interface that a developer uses to implement a Worklight native or hybrid mobile application, and can be installed into an Eclipse instance. Worklight Server is where components developed for the server side (written in Worklight Studio), such as adapters and custom server-side authentication logic, run. CICS applications and their associated data constitute some of the most valuable assets owned by an enterprise. Therefore, the protection of these assets is an essential part of any CICS mobile project. This Redbooks publication, after a review of the main mobile security challenges, outlines the options for securing CICS JSON web services, and reviews how products, such as Worklight and IBM DataPower®, can help. It then shows examples of security configurations in CICS and Worklight.

Implementing IBM CICS JSON Web Services for Mobile Applications

Implementing IBM CICS JSON Web Services for Mobile Applications PDF Author: Rufus Credle
Publisher: IBM Redbooks
ISBN: 0738438901
Category : Computers
Languages : en
Pages : 198

Get Book Here

Book Description
This IBM® Redbooks® publication provides information about how you can connect mobile devices to IBM Customer Information Control System (CICS®) Transaction Server (CICS TS), using existing enterprise services already hosted on CICS, or to develop new services supporting new lines of business. This book describes the steps to develop, configure, and deploy a mobile application that connects either directly to CICS TS, or to CICS via IBM Worklight® Server. It also describes the advantages that your organization can realize by using Worklight Server with CICS. In addition, this Redbooks publication provides a broad understanding of the new CICS architecture that enables you to make new and existing mainframe applications available as web services using JavaScript Object Notation (JSON), and provides support for the transformation between JSON and application data. While doing so, we provide information about each resource definition, and its role when CICS handles or makes a request. We also describe how to move your CICS applications, and business, into the mobile space, and how to prepare your CICS environment for the following scenarios: Taking an existing CICS application and exposing it as a JSON web service Creating a new CICS application, based on a JSON schema Using CICS as a JSON client This Redbooks publication provides information about the installation and configuration steps for both Worklight Studio and Worklight Server. Worklight Studio is the Eclipse interface that a developer uses to implement a Worklight native or hybrid mobile application, and can be installed into an Eclipse instance. Worklight Server is where components developed for the server side (written in Worklight Studio), such as adapters and custom server-side authentication logic, run. CICS applications and their associated data constitute some of the most valuable assets owned by an enterprise. Therefore, the protection of these assets is an essential part of any CICS mobile project. This Redbooks publication, after a review of the main mobile security challenges, outlines the options for securing CICS JSON web services, and reviews how products, such as Worklight and IBM DataPower®, can help. It then shows examples of security configurations in CICS and Worklight.

Application Development for IBM CICS Web Services

Application Development for IBM CICS Web Services PDF Author: O'Grady James
Publisher: IBM Redbooks
ISBN: 0738440310
Category : Computers
Languages : en
Pages : 552

Get Book Here

Book Description
This IBM® Redbooks® publication focuses on developing Web service applications in IBM CICS®. It takes the broad view of developing and modernizing CICS applications for XML, Web services, SOAP, and SOA support, and lays out a reference architecture for developing these kinds of applications. We start by discussing Web services in general, then review how CICS implements Web services. We offer an overview of different development approaches: bottom-up, top-down, and meet-in-the-middle. We then look at how you would go about exposing a CICS application as a Web service provider, again looking at the different approaches. The book then steps through the process of creating a CICS Web service requester. We follow this by looking at CICS application aggregation (including 3270 applications) with IBM Rational® Application Developer for IBM System z® and how to implement CICS Web Services using CICS Cloud technology. The first part is concluded with hints and tips to help you when implementing this technology. Part two of this publication provides performance figures for a basic Web service. We investigate some common variables and examine their effects on the performance of CICS as both a requester and provider of Web services.

A Software Architect's Guide to New Java Workloads in IBM CICS Transaction Server

A Software Architect's Guide to New Java Workloads in IBM CICS Transaction Server PDF Author: Rufus Credle
Publisher: IBM Redbooks
ISBN: 0738440256
Category : Computers
Languages : en
Pages : 148

Get Book Here

Book Description
This IBM® Redpaper Redbooks® publication introduces the IBM System z® New Application License Charges (zNALC) pricing structure and provides examples of zNALC workload scenarios. It describes the products that can be run on a zNALC logical partition (LPAR), reasons to consider such an implementation, and covers the following topics: Using the IBM WebSphere Application Server Liberty profile to host applications within an IBM CICS® environment and how it interacts with CICS applications and resources Security technologies available to applications that are hosted within a WebSphere Application Server Liberty profile in CICS How to implement modern presentation in CICS with a CICS Liberty Java virtual machine (JVM) server How to share scenarios to develop Liberty JVM applications to gain benefits from IBM CICS Transaction Server for IBM z/OS® Value Unit Edition Considerations when using mobile devices to interact with CICS applications and explains specific CICS technologies for connecting mobile devices by using the z/OS Value Unit Edition How IBM Operational Decision Manager for z/OS runs in the transaction server to provide decision management services for CICS COBOL and PL/I applications Installing the CICS Transaction Server for z/OS (CICS TS) Feature Pack for Modern Batch to enable the IBM WebSphere® batch environment to schedule and manage batch applications in CICS This book also covers what is commonly referred to as plain old Java objects (POJOs). The Java virtual machine (JVM) server is a full-fledged JVM that includes support for Open Service Gateway initiative (OSGi) bundles. It can be used to host open source Java frameworks and does just about anything you want to do with Java on the mainframe. POJO applications can also qualify for deployment using the Value Unit Edition. Read about how to configure and deploy them in this companion Redbooks publication: IBM CICS and the JVM server: Developing and Deploying Java Applications, SG24-8038 Examples of POJOs are terminal-initiated transactions, CICS web support, web services, requests received via IP CICS sockets, and messages coming in via IBM WebSphere MQ messaging software.

IBM CICS and Liberty: What You Need to Know

IBM CICS and Liberty: What You Need to Know PDF Author: Hernan Cunico
Publisher: IBM Redbooks
ISBN: 0738441368
Category : Computers
Languages : en
Pages : 252

Get Book Here

Book Description
This IBM® Redbooks® publication, intended for architects, application developers, and system programmers, describes how to design and implement Java web-based applications in an IBM CICS® Liberty JVM server. This book is based on IBM CICS Transaction Server V5.3 (CICS TS) using the embedded IBM WebSphere® Application Server Liberty V8.5.5 technology. Liberty is an asset to your organization, whether you intend to extend existing enterprise services hosted in CICS, or develop new web-based applications supporting new lines of business. Fundamentally, Liberty is a composable, dynamic profile of IBM WebSphere Application Server that enables you to provision Java EE technology on a feature-by-feature basis. Liberty can be provisioned with as little as the HTTP transport and a servlet web container, or with the entire Java EE 6 Web Profile feature set depending on your application requirements. This publication includes a Technology Essentials section for architects and application developers to help understand the underlying technology, an Up-and-Running section for system programmers implementing the Liberty JVM server for the first time, and a set of real-life application development scenarios.

The Next Generation of Distributed IBM CICS

The Next Generation of Distributed IBM CICS PDF Author: Raghavendran Srinivasan
Publisher: IBM Redbooks
ISBN: 0738440574
Category : Computers
Languages : en
Pages : 522

Get Book Here

Book Description
This IBM® Redbooks® publication describes IBM TXSeries® for Multiplatforms, which is the premier IBM distributed transaction processing software for business-critical applications. Before describing distributed transaction processing in general, we introduce the most recent version of TXSeries for Multiplatforms. We focus on the following areas: The technical value of TXSeries for Multiplatforms New features in TXSeries for Multiplatforms Core components of TXSeries Common TXSeries deployment scenarios Deployment, development, and administrative choices Technical considerations It also demonstrates enterprise integration with products, such as relational database management system (RDBMS), IBM WebSphere® MQ, and IBM WebSphere Application Server. In addition, it describes system customization, reviewing several features, such as capacity planning, backup and recovery, and high availability (HA). We describe troubleshooting in TXSeries. We also provide details about migration from version to version for TXSeries. A migration checklist is included. We demonstrate a sample application that we created, called BigBlueBank, its installation, and the server-side and client-side programs. Other topics in this book include application development and system administration considerations. This book describes distributed IBM Customer Information Control System (IBM CICS®) solutions, and how best to develop distributed CICS applications.

Reduce Risk and Improve Security on IBM Mainframes: Volume 3 Mainframe Subsystem and Application Security

Reduce Risk and Improve Security on IBM Mainframes: Volume 3 Mainframe Subsystem and Application Security PDF Author: Axel Buecker
Publisher: IBM Redbooks
ISBN: 0738441023
Category : Computers
Languages : en
Pages : 200

Get Book Here

Book Description
This IBM® Redbooks® publication documents the strength and value of the IBM security strategy with IBM zTM Systems hardware and software. In an age of increasing security consciousness and more and more dangerous advanced persistent threats, IBM z SystemsTM provides the capabilities to address the needs of today's business security challenges. This publication explores how z Systems hardware is designed to provide integrity, process isolation, and cryptographic capability to help address security requirements. We highlight the features of IBM z/OS® and other operating systems, which offer a variety of customizable security elements. We discuss z/OS and other operating systems and additional software that use the building blocks of z Systems hardware to provide solutions to business security needs. We also explore the perspective from the view of an enterprise security architect and how a modern mainframe has to fit into an overarching enterprise security architecture. This book is part of a three-volume series that focuses on guiding principles for optimized mainframe security configuration within a holistic enterprise security architecture. The series' intended audience includes enterprise security architects, planners, and managers who are interested in exploring how the security design and features of z Systems, the z/OS operating system, and associated software address current issues such as data encryption, authentication, authorization, network security, auditing, ease of security administration, and monitoring.

IBM System z in a Mobile World: Providing Secure and Timely Mobile Access to the Mainframe

IBM System z in a Mobile World: Providing Secure and Timely Mobile Access to the Mainframe PDF Author: Axel Buecker
Publisher: IBM Redbooks
ISBN: 0738440094
Category : Computers
Languages : en
Pages : 480

Get Book Here

Book Description
Today, organizations engage with customers, business partners, and employees who are increasingly using mobile technology as their primary general-purpose computing platform. These organizations have an opportunity to fully embrace this new mobile technology for many types of transactions, including everything from exchanging information to exchanging goods and services, from employee self-service to customer service. With this mobile engagement, organizations can build new insight into the behavior of their customers so that organizations can better anticipate customer needs and gain a competitive advantage by offering new services. Becoming a mobile enterprise is about re-imagining your business around constantly connected customers and employees. The speed of mobile adoption dictates transformational rather than incremental innovation. This IBM® Redbooks® publication has an end-to-end example of creating a scalable, secure mobile application infrastructure that uses data that is on an IBM mainframe. The book uses an insurance-based application as an example, and shows how the application is built, tested, and deployed into production. This book is for application architects and decision-makers who want to employ mobile technology in concert with their mainframe environment.

Digital Transformation with IBM Application Discovery

Digital Transformation with IBM Application Discovery PDF Author: Suman Gopinath
Publisher: IBM Redbooks
ISBN: 0738456152
Category : Computers
Languages : en
Pages : 30

Get Book Here

Book Description
This IBM® RedpaperTM publication describes how IBM Application Discovery (AD) complements IBM z/OS® Connect Enterprise Edition and IBM Developer for z Systems® in making older mainframe applications available to the digital world. By using a sample scenario, this publication primarily focuses on how the functionality of AD can be used to discover application programming interface (API) candidates and how z/OS Connect can easily create an API out of the mainframe program. It also describes how IBM Developer for z Systems acts as the tool that links the entire transformation.

System z on the Go: Accessing z/OS from Smartphones

System z on the Go: Accessing z/OS from Smartphones PDF Author: Alex Louwe Kooijmans
Publisher: IBM Redbooks
ISBN: 0738434434
Category : Computers
Languages : en
Pages : 230

Get Book Here

Book Description
In this IBM® Redbooks® publication we demonstrate that it is possible to combine the traditional strengths of the mainframe to manage large volumes of data and run business transactions with the Web 2.0 paradigm. We can get simpler interfaces, better integration among different services, lightweight protocols for communication, and much more, together with the availability, security, and reliability of mainframe data. And we will show how mainframe data can be accessed by smartphones such as Android or iPhone. But we can do more to demonstrate how flexible the mainframe platform is. Through the use of pervasive devices it is possible to add new possibilities to mainframe applications, extending System z® capabilities. We can receive notifications in real time, for example, of successful or unsuccessful termination of a TWS job stream, or we can immediately get alerts about abends that occurred in a critical application. This book is another demonstration that the mainframe is alive and kicking and can and should play a key role in modern application architectures.

Using IBM z/OS WLM to Measure Mobile and Other Workloads

Using IBM z/OS WLM to Measure Mobile and Other Workloads PDF Author: IBM Client Center Montpellier
Publisher: IBM Redbooks
ISBN: 0738455504
Category : Computers
Languages : en
Pages : 82

Get Book Here

Book Description
This IBM® RedpaperTM publication discusses the need to monitor and measure different workloads, especially mobile workloads. It introduces the workload classification capabilities of IBM z SystemsTM platforms and helps you to understand how recent enhancements to IBM MVSTM Workload Management (WLM) and other IBM software products can be used to measure the processor cost of mobile workloads. This paper looks at how mobile-initiated and other transactions in IBM CICS®, IMSTM, DB2®, and WebSphere® Application Server can be "tagged and tracked" using WLM. For each of these subsystems, the options for classifying mobile requests and using WLM to measure mobile workloads are reviewed. A scenario is considered in which a bank is witnessing a significant growth in mobile initiated transactions, and wants to monitor and measure the mobile channels more closely. This paper outlines how the bank can use WLM to do this. This publication can help you to configure WLM mobile classification rules. It can also help you to interpret Workload Activity reports from IBM RMFTM Post Processor and to report on the CPU consumption of different workloads, including mobile and public cloud workloads.