IBM System I Tools Innovation Program: Resource Guide for Modernization and Integration Tools for System I Applications

Total Page:16

File Type:pdf, Size:1020Kb

IBM System I Tools Innovation Program: Resource Guide for Modernization and Integration Tools for System I Applications Front cover IBM System i Tools Innovation Program: Resource Guide for Modernization and Integration Tools for System i Applications ISV tools for modernization and integration (including with .NET) IBM tools for modernization and integration IBM System i Developer Roadmap Linda Cole LindaMay Patterson John Quarantello ibm.com/redbooks Redpaper International Technical Support Organization IBM System i Tools Innovation Program: Resource Guide for Modernization and Integration Tools for System i Applications April 2006 Note: Before using this information and the product it supports, read the information in “Notices” on page vii. First Edition (April 2006) This edition applies i5/OS Version 5, Release 4 (product number 5722-SS1). © Copyright International Business Machines Corporation 2006. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Notices . vii Trademarks . viii Legal Disclaimer. viii Preface . xi The team that wrote this Redpaper . xii Become a published author . xiii Comments welcome. xiii Chapter 1. Introducing the IBM System i and i5/OS V5R4. 1 1.1 Introducing System i . 2 1.2 System i value proposition . 2 1.3 System i5 models . 4 1.4 i5/OS V5R4 value proposition . 6 1.4.1 Promoting solutions innovation . 6 1.4.2 Integrating with other systems and operating environments. 8 1.4.3 Promoting business resilience and compliance . 8 1.4.4 Enabling ISVs . 9 Chapter 2. Introducing IBM System i Initiative for Innovation . 11 2.1 Introducing the System i Initiative for Innovation. 12 2.2 System i Initiative for Innovation program . 13 2.2.1 Application Innovation program . 14 2.2.2 Tools Innovation program . 15 2.2.3 System i Initiative for Innovation program. 15 2.3 Introducing the System i Developer Roadmap . 16 2.3.1 System i Developer Roadmap with subcategories . 18 Chapter 3. IBM ServerProven tools for application modernization and integration. 19 3.1 IBM ServerProven ISV tools . 20 3.2 System i Tools Innovation program. 20 3.3 Tools to improve your productivity . 21 3.3.1 Code analysis, documentation, and tracking tools . 22 3.3.2 Integrated development environments . 24 3.4 Tools to enhance the end-user experience. 32 3.4.1 Application refacing. 32 3.4.2 Portal and personalization . 36 3.5 Tools to create a modular architecture . 37 3.5.1 Business rule logic extraction for SOA . 38 3.5.2 Client integration . 38 3.5.3 .NET integration . 42 3.5.4 Regenerate RPG into J2EE . 42 3.5.5 RPG to Java conversion . 43 3.5.6 SOA framework tools . 44 3.6 Tools to integrate applications . 44 3.6.1 Connectivity . 45 3.6.2 Data movement and migration . 48 3.6.3 EAI/Application integration . 49 3.7 Tools to integrate business processes . 52 © Copyright IBM Corp. 2006. All rights reserved. iii 3.7.1 Business integration . 52 Chapter 4. IBM tools for application modernization and integration . 55 4.1 IBM tools in the System i Tools Innovation Program . 56 4.2 Tools to improve your productivity . 56 4.2.1 Integrated development environments . 57 4.3 Tools to enhance the end-user experience. 59 4.3.1 Application refacing. 59 4.3.2 Application servers . 62 4.3.3 Portal and personalization . 63 4.4 Tools to create a modular architecture . 65 4.4.1 Client integration . 66 4.4.2 .NET integration . 67 4.4.3 SOA framework tools . 67 4.5 Tools to integrate applications . 67 4.5.1 Connectivity . 68 4.5.2 Data movement and migration . 68 4.5.3 EAI/Application integration . 70 4.6 Tools to integrate business processes . 71 4.6.1 Business integration . 72 Chapter 5. Integrating System i with Microsoft .NET. 75 5.1 System i and .NET integration . 76 5.2 High level overview of .NET . 76 5.2.1 Architecture. 76 5.3 .NET integration . 77 5.3.1 IBM ServerProven ISV tools for integration . 77 5.3.2 IBM tools for integration . 80 5.3.3 Applications using ADO.NET . 82 Chapter 6. Leveraging System i and xSeries integration to deploy Windows 2003 applications. 83 6.1 System i5 integrated xSeries solutions . ..
Recommended publications
  • Key Features in Windows Server 2008 R2 and Windows Server
    With Windows Server® 2008 R2 Remote Desktop Services (RDS), Microsoft is progressing in its vision to provide the best virtualization platform for accelerating and extending desktop and application deployments from the data center to any device. In addition to the traditional session virtualization scenario (formerly known as “Terminal Services”), Remote Desktop Services is expanding its role to provide an extensible platform for a Virtual Desktop Infrastructure (VDI). RDS is a cost-effective infrastructure platform for any type of organization, particularly those with a roaming workforce, structured task workers or knowledge workers with a need for flexible desktop or application access, including contractors, offshore workers and office workers that require a free seating environment or have a need to work from home. SOLUTION BENEFITS ACCELERATE DESKTOP & APPLICATION HELP SECURE DATA AND INCREASE REMOTE WORKER DEPLOYMENT APPLICATIONS EFFICIENCY Remote Desktop Services accelerates and Remote Desktop Services helps Remote Desktop Services helps extends the deployment of desktops and organizations keep critical simplify remote connectivity, applications to a wide array of client devices, intellectual property highly secure enabling rich applications to be helping make your organization more agile and helps radically simplify accessed from a web page and and responsive. RDS also enables flexible regulatory compliance by removing seamlessly integrated with a local work scenarios such as hot-desking and work applications and data from the desktop, improving remote worker from home. desktop. efficiency. Key Features in Windows Server 2008 R2 and Windows Server 2008 R2 Service Pack 1: • Microsoft RemoteFX introduces a new set of end user experience capabilities, enabling local-like access to media-rich applications for virtual and session-based desktops; it can be deployed to a range of thick and thin client access devices.
    [Show full text]
  • Defending Against Data Breach - Developing the Right Encryption Strategy
    Defending Against Data Breach - Developing the Right Encryption Strategy 1 A White Paper by Linoma Software EXECUTIVE SUMMARY No matter how secure your information systems appear This white paper has several objectives. and no matter how confident your IT staff may be, the • Examine the problems that create a higher risk for risks of your company experiencing a data breach are data breach. real, and they continue to grow daily. • Explore the regulatory landscape. • Describe the technical hurdles facing both Information security breaches cost companies mil- management and IT. lions of dollars each year, and incidents continue to • Demonstrate how the right data encryption technol- rise. While government and industry regulations have ogies can reduce the exposure of data theft without been implemented that penalize the company if their hampering efficient workflow. sensitive data is compromised, protecting against the threat of data breach is difficult. Take, for example, the Most importantly, this paper offers recommendations multiple ways unauthorized access can occur: theft of for how IT management can deploy strong security portable devices, lost paper files and external storage technologies to encrypt, monitor, and audit the access devices, improper access by employees, network infil- and use of sensitive information within an organiza- tration from outside entities, and more. tion’s system. Data breach incidents are not a temporary statistical aberration, but instead represent a growing epidemic. Given the cost to both companies and their customers, it’s critical that IT teams develop a solid strategy that utilizes the most effective tools. 2 Defending Against Data Breach - Developing the Right Encryption Strategy Data Breaches Wreak Havoc According to estimates published by the Ponemon inal activities.
    [Show full text]
  • Rich Client Architecture
    Base One International Corp. www.boic.com Base One's Rich Client Architecture Base One provides a unique approach How Rich Client works for developing Internet-enabled applications, combining both efficiency and ease of programming through its "Rich Client" architecture. With this architecture, it is possible to build graphically intensive programs that look and perform like sophisticated client/server Windows applications, but where data is actually stored and retrieved across the Internet. At the same time, Base One makes it easy to develop such applications on a laptop or desktop and deploy them over the Internet without any changes. In Base One's model, each Rich Client looks like In contrast to thin client models, a rich a normal database application - because a Base client application shifts the burden away One Internet Server (BIS) acts as a transparent from shared network resources and proxy for a database across the Internet. server machines onto client computers, for better overall performance and application flexibility. While many applications are adequately handled by thin client architectures, some applications are much better suited to Base One's Rich Client model. (See table below for the types of applications that benefit the most.) A Service Oriented Architecture Like systems based on Web Services, Base One's Rich Client model is also a type of Service Oriented Architecture (SOA). It comprises independent, co- operating components (services) that can be distributed within or outside of an A Rich Client consists of a custom application organization's physical boundaries and written in Visual C++, C#, VB or VB.NET, using security domains, using varying platforms Base One's class libraries (BFC), and running on and programming languages.
    [Show full text]
  • Goanywhere MFT Upgrade Guide Version 5.5.2 Copyright Terms and Conditions
    GoAnywhere MFT Upgrade Guide Version 5.5.2 Copyright Terms and Conditions The content in this document is protected by the Copyright Laws of the United States of America and other countries worldwide. The unauthorized use and/or duplication of this material without express and written permission from HelpSystems is strictly prohibited. Excerpts and links may be used, provided that full and clear credit is given to HelpSystems with appropriate and specific direction to the original content. HelpSystems and its trademarks are properties of the HelpSystems group of companies. All other marks are property of their respective owners. 201705160331 Table of Contents Before You Begin 4 5.3.0 Requires Java 7 Minimum 4 Browser Compatibility 4 Upgrade Process 4 Post Upgrade Notes 5 Starting GoAnywhere MFT in Clustered Environments 5 Enable Schedules, Monitors, and Triggers 5 Changes to Resource Passwords 5 System Requirements 6 Windows Requirements 6 Linux/Unix Requirements 6 IBM i (iSeries) Requirements 6 Download the Upgrade File 8 Upgrading the Java Virtual Machine (JRE) 9 Upgrading the External JRE 9 Upgrading the Embedded JRE (Windows) 10 Upgrading the Embedded JRE (Linux) 11 IBMi Java Upgrade Requirements 12 Windows Upgrade Instructions 14 Linux/UNIX Upgrade Instructions 16 IBM i Upgrade Instructions 17 Upgrading a Cluster Environment 19 Downgrading GoAnywhere MFT 20 Restoring the GA MFT Libraries on IBM i 21 About Linoma Software 23 Contacting Linoma Software 23 GoAnywhere MFT User Guide www.goanywhere.com page: 3 Before You Begin This guide outlines the steps required for upgrading GoAnywhere MFT to the latest version. n Check if there are any updates available for GoAnywhere MFT by logging in to its browser interface as a user with the Product Administrator role.
    [Show full text]
  • Better Together: Rich Client Pcs and Cloud Computing
    IT@Intel Brief Better Together: Rich Client Intel Information Technology Computer Manufacturing PCs and Cloud Computing Cloud Computing Cloud computing poses new questions about the optimal March 2009 Profile: Rich Clients and enterprise client computing strategy. With more and more Cloud Computing services delivered from the cloud, which combination of • Users can access both cloud and client platforms and service delivery models best meets conventional computing services the needs of users and IT organizations? The Intel IT environment contains a mixture of • All service delivery models supported conventional and cloud computing services, delivered primarily to rich client PCs. We have found that whether services are kept in-house or outsourced to the cloud, the ability to perform local computing on the client offers the best user experience and the flexibility to run different types of applications. Only rich clients support the full range of service delivery methods, as shown in Figure 1. In addition, rich clients deliver full mobile computing capabilities for our users, including the ability to work offline. Rich clients remain an important part of our IT strategy as we work toward our future direction of migrating services to the cloud, supporting a wider range of client platforms, and enabling client virtualization. External Cloud Internal Cloud Software as a Service (SaaS) Applications Remote Access • Staffing • Other SaaS Applications and Portal Services • Messaging and Collaboration • Productivity Applications • Benefits • Hosted
    [Show full text]
  • IBM Workplace Dashboard Framework V2.6 and Workplace Dashboards
    Software Announcement March 28, 2006 IBM Workplace Dashboard Framework V2.6 and Workplace dashboards Overview Application integration extensions leverage the portal framework to At a glance Workplace Dashboard Framework deliver a common infrastructure that delivers reusable service-oriented supports the real-time integration of Workplace Dashboard Framework components, robust administration multiple, disparate data sources. As and Workplace dashboard tools, and dashboard-specific a result, dashboards built with products: Workplace Dashboard Framework features that help speed the creation • of standards-based, active help users to monitor and interact Deliver a service-oriented dashboards. This offering, which with the operational data and framework and prepackaged augments the capabilities of IBM processes from all the applications solutions to help companies to WebSphere Portlet Factory, can that are running the business. rapidly deploy portal-based help dramatically reduce the dashboards that provide development costs and speed the The portal infrastructure supports role-based, composite views of time-to-value for a company′s real-time collaboration. As such, their overall business activity dashboard initiatives. Workplace dashboards let decision • makers take immediate action via Display highly customized and dynamic operational Dashboards built with Workplace integrated collaboration features, information, giving decision Dashboard Framework provide a including instant messaging, e-mail, makers the real-time visibility level of adaptability
    [Show full text]
  • Global Supplier Info Pack
    Global Supplier Info Pack FEDE Integration List of Fact sheets available List of Fact sheets available .............................................................................................. 2 First Steps: ....................................................................................................................... 4 What is FEDE [Ford Engineering Design Environment]? ..................................................... 4 GSI Overview .................................................................................................................... 4 Global Supplier Implementation (GSI) ....................................................................................... 4 FEDE process flow chart .................................................................................................... 6 FEDE Website Access ...................................................................................................... 10 Methods Pages Access .................................................................................................... 10 1. Supplier Company Access ................................................................................................... 11 2. Supplier Access Gatekeeper (SAG): ...................................................................................... 11 3. Supplier User Access: .......................................................................................................... 11 Direct Connection options - functionality comparison.....................................................
    [Show full text]
  • Managed File Transfer Solution
    1234 Select and Implement a Managed File Transfer Solution Secure file transfers today and avoid worrying about tomorrow. Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice. Info-Tech’s products and services combine actionable insight and relevant advice with ready-to-use tools and templates that cover the full spectrum of IT concerns. © 1997-2015 Info-Tech Research Group Inc. Info-Tech Research Group 1 Our understanding of the problem This Research Is Designed For: This Research Will Help You: The Enterprise Architect of a small to large Choose the right managed file transfer organization, looking to enhance their solution, while taking into consideration your business integration and file sharing organizational use cases and requirements. capabilities. Avoid the common challenges made when An organization that is looking for a managed implementing a managed file transfer solution. file transfer solution that will meet its specific needs and requirements. Outcomes of this Research: Help sell your organization on the benefits of a managed file transfer solution and gain the buy-in necessary to move forward with your specific selection. Create a project charter that will help define the project goals and objectives, as well as the key stakeholders and the project team. Select the right tool that meets your specific needs and requirements. Create an implementation plan that will circumvent challenges and enable a successful managed file transfer implementation. Info-Tech Research Group 2 Executive summary Situation Info-Tech Insight • Every business, regardless of industry, is required to exchange information • FTP is no longer seen as a viable with internal and external partners.
    [Show full text]
  • System I, Windows, Linux, Unix
    GoAnywhere™ is a centralized solution which automates data retrieval, translation, encryption, compression and distribution from one easy-to-use interface. System i, Windows, Linux, Unix Quick Facts Automated Data Movement for the Enterprise Open Architecture GoAnywhere easily streamlines and secures the exchange of data with your customers, · Installs to System i, Windows, trading partners and servers. It allows your organization to consolidate all of its data Linux and UNIX transmission and processing needs under one solution with a single point of control and Dashboard Navigation administration. With GoAnywhere, customers are saving significant time and money by · Provides an intuitive browser- eliminating the custom programming and manual steps traditionally required. based user interface Automated FTP · Simplifies FTP transfers Open PGP, SFTP, FTPS and HTTPS · Encrypts transmissions for protecting sensitive data Comprehensive Connectivity · Connects to virtually any server Data Replication · Replicates data between database servers (DB2, SQL Server, Oracle, MySQL, etc.) Automated E-mail · Sends and retrieves files via email Centralized Control · Allows monitoring activity through the browser Logging · Provides detailed logging reports Visit www.GoAnywhereToday.com for more information or to download a trial. (800) 949.4696 Introduction Client Testimonials GoAnywhere will automate and secure data movement for the enterprise. With GoAnywhere’s intuitive user interface and templates, your data movement “GoAnywhere makes it easy to processes can be easily defined and executed by authorized personnel and extract data from any Database. applications. GoAnywhere integrates the extraction, encryption and GoAnywhere adopts industry-accepted standards for exchanging, formatting, distribution of information simply.” encrypting and compressing data, which simplifies integration with your trading – Jaime Penagos, Green Light Technology partners.
    [Show full text]
  • Implementing Powerpc Linux on System I Platform
    Front cover Implementing POWER Linux on IBM System i Platform Planning and configuring Linux servers on IBM System i platform Linux distribution on IBM System i Platform installation guide Tips to run Linux servers on IBM System i platform Yessong Johng Erwin Earley Rico Franke Vlatko Kosturjak ibm.com/redbooks International Technical Support Organization Implementing POWER Linux on IBM System i Platform February 2007 SG24-6388-01 Note: Before using this information and the product it supports, read the information in “Notices” on page vii. Second Edition (February 2007) This edition applies to i5/OS V5R4, SLES10 and RHEL4. © Copyright International Business Machines Corporation 2005, 2007. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Notices . vii Trademarks . viii Preface . ix The team that wrote this redbook. ix Become a published author . xi Comments welcome. xi Chapter 1. Introduction to Linux on System i platform . 1 1.1 Concepts and terminology . 2 1.1.1 System i platform . 2 1.1.2 Hardware management console . 4 1.1.3 Virtual Partition Manager (VPM) . 10 1.2 Brief introduction to Linux and Linux on System i platform . 12 1.2.1 Linux on System i platform . 12 1.3 Differences between existing Power5-based System i and previous System i models 13 1.3.1 Linux enhancements on Power5 / Power5+ . 14 1.4 Where to go for more information . 15 Chapter 2. Configuration planning . 17 2.1 Concepts and terminology . 18 2.1.1 Processor concepts .
    [Show full text]
  • IBM Websphere Portal for Multiplatforms V5.1 Handbook
    Front cover IBM WebSpherehere Portal for Multiplatformsplatforms V5.11 Handbook New features and enhancements WebSphere Portal V5.1 implementation demonstrated on multiple platforms Clustering and migration demonstrations included Rufus Credle Faheem Atlaf James Barnes Javier Galvez Sunil Hiranniah Prinz Huang Fernanda Silveira ibm.com/redbooks International Technical Support Organization IBM WebSphere Portal for Multiplatforms V5.1 Handbook April 2005 SG24-6689-00 Note: Before using this information and the product it supports, read the information in “Notices” on page ix. First Edition (April 2005) This edition applies to IBM WebSphere Portal for Multiplatforms Version 5.1. © Copyright International Business Machines Corporation 2005. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Notices . ix Trademarks . x Preface . xi The team that wrote this Redbook . .xi Become a published author . xiv Comments welcome. xiv Chapter 1. WebSphere Portal V5.1: New features and enhancements. 1 1.1 Introduction . 2 1.2 Installation and configuration enhancements . 2 1.3 Virtual portals . 4 1.4 Business process integration . 6 1.5 Search enhancements . 8 1.6 WebSphere Portal Document Manager . 13 1.7 Security enhancements. 16 1.8 Administration, operations, and deployment enhancements. 18 1.9 Personalization . 20 1.10 Web Content Management . 21 1.11 Programming model enhancements . 22 1.12 Summary . 24 Chapter 2. WebSphere Portal V5.1 planning and requirements . 25 2.1 Hardware requirements. 26 2.2 Software requirements . 26 Chapter 3. WebSphere Portal: Microsoft Windows Server 2003 install . 29 3.1 Using install logs .
    [Show full text]
  • IBM Systems - Iseries
    IBM Systems - iSeries Connecting to iSeries iSeries Access for Web Version 5 Release 4 IBM Systems - iSeries Connecting to iSeries iSeries Access for Web Version 5 Release 4 Note Before using this information and the product it supports, read the information in “Notices,” on page 155. Third Edition (February 2006) This edition applies to version 5, release 4, modification 0 of IBM eServer iSeries Access for Web (5722–XH2) and to all subsequent releases and modifications until otherwise indicated in new editions. This version does not run on all reduced instruction set computer (RISC) models nor does it run on CISC models. © Copyright International Business Machines Corporation 2004, 2006. All rights reserved. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents iSeries Access for Web . .1 | Configuring the Apache Software What’s new for V5R4 . .1 | Foundation (ASF) Tomcat Web serving Printable PDF . .4 | environment . .66 License information for iSeries Access for Web . .4 Examples for configuring an existing Web Planning for iSeries Access for Web . .5 application server environment . .70 || iSeries Access for Web offerings . .5 | Configuring WebSphere Application Server || Web application . .6 | V6.1 for i5/OS . .70 || Portal application . .6 | Configuring WebSphere Application Server Security considerations . .7 | Network Deployment V6.1 for i5/OS . .72 Single sign-on considerations . .9 | Configuring WebSphere Application Server Configuring Enterprise Identity Mapping 11 | - Express V6.1 for i5/OS . .74 || Checklist: Planning, installing, and configuring 13 | Configuring WebSphere Application Server Prerequisites for installing iSeries Access for Web 14 | V6.0 for OS/400 .
    [Show full text]