IBM E-Business: Technology, Solution, and Design Overview 6.3 Gather Requirements

Total Page:16

File Type:pdf, Size:1020Kb

IBM E-Business: Technology, Solution, and Design Overview 6.3 Gather Requirements Front cover IBM e-business Technology, Solution, and Design Overview Learn the IBM way of building e-business applications Discover the array of IBM products and solutions for e-business Prepare yourself for IBM certification exams Brian R. Smith Charles Ackeifi Thomas G. Bradford Prabhakar Gopalan Jennifer Maynard Abdulamir Mryhij ibm.com/redbooks International Technical Support Organization IBM e-business Technology, Solution, and Design Overview August 2003 SG24-6248-01 Note: Before using this information and the product it supports, read the information in “Notices” on page vii. Second Edition (August 2003) © Copyright International Business Machines Corporation 2001, 2003. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Notices . vii Trademarks . viii Preface . ix The team that wrote this redbook. ix Become a published author . xi Comments welcome. xi Chapter 1. What e-business is . 1 1.1 This publication as a guide to your understanding . 3 1.1.1 We guide. 3 1.1.2 We reference . 3 1.1.3 We elaborate. 8 1.2 IBM Certified for e-business . 9 1.2.1 IBM Certified for e-business - Solution designer. 10 Chapter 2. e-business concepts and technologies . 19 2.1 Patterns for e-business . 20 2.1.1 The Patterns for e-business layered asset model. 20 2.1.2 How to use the Patterns for e-business . 21 2.1.3 Summary. 29 2.2 Technology options . 29 2.2.1 Java technology . 30 2.2.2 XML. 31 2.2.3 Java 2 Platform, Enterprise Edition. 36 2.2.4 Presentation layer technologies . 39 2.2.5 Web application server . 47 2.2.6 Integration server . 55 2.2.7 Protocols . 57 2.2.8 Objects . 67 2.2.9 Struts. 67 2.2.10 Eclipse . 68 2.2.11 MVC patterns . 68 2.2.12 Common Object Request Broker Architecture (CORBA) . 73 2.2.13 Transactions . 73 Chapter 3. e-business infrastructure management . 83 3.1 Common Information Model (CIM) . 84 3.2 Infrastructure management . 84 3.3 Performance and availability management . 85 3.4 Performance management . 85 3.4.1 Bottlenecks . 86 3.4.2 Technologies. 87 3.5 Availability management . 96 3.6 IBM Tivoli performance and availability solutions . 97 3.7 Configuration and operations management . 97 3.7.1 Configuration and operations management overview. 97 3.7.2 IBM Tivoli Configuration and Operations Management solutions . 98 3.8 Storage Management . 98 © Copyright IBM Corp. 2003. All rights reserved. iii 3.8.1 Importance of Storage Management . 98 3.8.2 Storage Management technologies . 99 3.8.3 Decision hints and tips in choosing a Storage Management solution. 101 3.8.4 IBM Tivoli Storage Management solutions . 102 3.8.5 IBM's top ten data protection recommendations. 103 3.9 Suggested further reading/references. 104 Chapter 4. Security . 105 4.1 Security for e-business . 106 4.2 Cryptography principles . 107 4.2.1 Symmetric (secret) key cryptography . 108 4.2.2 Asymmetric (public) key cryptography . 109 4.2.3 Digital signature algorithm (DSA) . 110 4.2.4 Digital certificates . 112 4.3 Secure Sockets Layer (SSL) protocol . 114 4.3.1 Record layer protocol . 115 4.3.2 Communication protocols . 115 4.4 Secure Electronic Transaction (SET) protocol . 116 4.5 Techniques for securing the end-to-end model. 120 4.5.1 Firewalls . 120 4.5.2 Directory services . 124 4.5.3 Security architecture . 126 4.6 WebSphere Application Server security model. 127 4.7 Approaches for securing e-business solutions . 135 4.7.1 Securing e-business using packet filtering and application firewalls. 135 4.7.2 Securing e-business using circuit-level gateways. 136 4.7.3 Securing e-business using SET . 137 4.7.4 Securing e-business using VPN . 137 Chapter 5. Design criteria and considerations for e-business solutions . 139 5.1 Understand current business policy . 140 5.2 Validate skills needed . 140.
Recommended publications
  • Introduction to Tivoli Enterprise Data Warehouse
    Front cover Introduction to Tivoli Enterprise Data Warehouse Insider’s guide to Tivoli Enterpise Data Warehouse Best practices for creating data marts Integration with all major OLAP tools Vasfi Gucer William Crane Chris Molloy Sven Schubert Roger Walker ibm.com/redbooks International Technical Support Organization Introduction to Tivoli Enterprise Data Warehouse May 2002 SG24-6607-00 Take Note! Before using this information and the product it supports, be sure to read the general information in “Notices” on page xvii. First Edition (May 2002) This edition applies to Tivoli Enterprise Data Warehouse Version 1.1. Comments may be addressed to: IBM Corporation, International Technical Support Organization Dept. JN9B Building 003 Internal Zip 2834 11400 Burnet Road Austin, Texas 78758-3493 When you send information to IBM, you grant IBM a non-exclusive right to use or distribute the information in any way it believes appropriate without incurring any obligation to you. © Copyright International Business Machines Corporation 2002. All rights reserved. Note to U.S Government Users – Documentation related to restricted rights – Use, duplication or disclosure is subject to restrictions set forth in GSA ADP Schedule Contract with IBM Corp. Contents Figures . .ix Tables . xv Notices . xvii Trademarks . xviii Preface . xix The team that wrote this redbook. xx Notice . xxi Comments welcome. xxii Chapter 1. Introducing building blocks. 1 1.1 Business Intelligence. 2 1.2 Business driving forces . 2 1.3 Main Business Intelligence terms . 3 1.3.1 Operational databases . 4 1.3.2 Online transaction processing (OLTP) . 4 1.3.3 Data warehouse . 5 1.3.4 Data mart .
    [Show full text]
  • IBM Tivoli Endpoint Manager for Patch Management Continuous Patch Compliance Visibility and Enforcement
    IBM Software Data Sheet Tivoli IBM Tivoli Endpoint Manager for Patch Management Continuous patch compliance visibility and enforcement With software and the threats against that software constantly evolving, Highlights organizations need an effective way to assess, deploy and manage a con- stant flow of patches for the myriad operating systems and applications in ● Automatically manage patches for multi- their heterogeneous environments. For system administrators responsible ple operating systems and applications across hundreds of thousands of end- for potentially tens or hundreds of thousands of endpoints running vari- points regardless of location, connection ous operating systems and software applications, patch management type or status can easily overwhelm already strained budgets and staff. IBM Tivoli® ● Reduce security and compliance risk by Endpoint Manager for Patch Management balances the need for fast slashing remediation cycles from weeks deployment and high availability with an automated, simplified patching to days or hours process that is administered from a single console. ● Gain greater visibility into patch compli- ance with flexible, real-time monitoring Tivoli Endpoint Manager for Patch Management, built on BigFix® and reporting technology, gives organizations access to comprehensive capabilities ● Provide up-to-date visibility and control for delivering patches for Microsoft® Windows®, UNIX®, Linux® and from a single management console Mac operating systems, third-party applications from vendors including Adobe®, Mozilla, Apple and Java™, and customer-supplied patches to endpoints—regardless of their location, connection type or status. Endpoints can include servers, laptops, desktops, and specialized equip- ment such as point-of-sale (POS) devices, ATMs, and self-service kiosks. Apply only the correct patches to the correct endpoint One approach to patch management is to create large patch files with a large update “payload” and distribute them to all of the endpoints, regardless of whether they already have all of the patches or not.
    [Show full text]
  • SOA Education Day for CMU Students and Faculty
    IBM SOA Roadshow SOA Education Day For CMU Students and Faculty Frank Stein Program Director IBM Federal SOA Institute © 2007 IBM Corporation IBM SOA Architect Summit Agenda 9:00 – 9:15am Welcome – Dr. Randy Bryant, Dean, SCS 9:15 – 9:45am Introduction to SOA – Frank Stein 9:45 – 10:15am Leveraging Information in SOA – Mark Sherman 10:15 – 10:45am SOA Governance and SOA Lifecycle – Naveen Sachdeva 10:45 – 11:15am Reuse, Community, Ecosystems & Catalogs – Jay Palat 11:15 – 12:00pm IBM’s SOA Experience, Trends, Outlook – Sanjay Bose 12:00 – 1:15pm Lunch Break & Faculty Reception 1:15 – 2:00pm Business Process Modeling Overview – Tom McManus & Emilio Zegarra 2:00 – 3:15pm Innov8 3D BPM “Serious Game” – Dave Daniel 2 SOA Education Day at CMU IBM SOA Roadshow Overview Presentation: SOA: A Foundation for Improved Agility and Economic Value Frank Stein Program Director IBM Federal SOA Institute © 2007 IBM Corporation IBM SOA Architect Summit Cloud Computing Announcement – Oct 10, 2007 • IBM and Google will provide hw, sw, and services to assist the academic community to explore Internet-scale computing. •CMU, MIT, Stanford, U of Washington, UC-Berkeley, U of MD 4 SOA Education Day at CMU IBM SOA Architect Summit Agenda Why SOA SOA Technical Concepts What’s Next for SOA Summary 5 SOA Education Day at CMU IBM SOA Architect Summit Businesses are Placing a Premium on Innovation THINK THINK 6 SOA Education Day at CMU IBM SOA Architect Summit Innovation Impacts Business Models Is Your Architecture Ready? “ On a flat earth, the most important
    [Show full text]
  • Carlos Guardia Rivas Ibm Spain
    CARLOS GUARDIA RIVAS IBM SPAIN EXECUTIVE IT SPECIALIST - IBM SOFTWARE GROUP WHAT IS THE ROLE OF DATA WITHIN YOUR ACTIVITY AT IBM? IBM is closely related to data and is a big data producer. For example, a few years ago IBM bought The Weather Company. This company generates climate data, compiles it and sells it to, especially, insurance companies and also to other private companies that make use of this kind of data. Even if IBM uses external data repositories, it is mainly a data producer. As for the tools, at IBM we have a very complete portfolio of analytics tools, ranging from importing data from diverse sources, data integration in diverse formats, data cleaning, replication to other systems if needed… Our most famous analytics tool is Watson, which is basically a set of tools that allows you to do any kind of projection on the data: from visualization to prediction. In conclusion, we are a company that offers solutions in the main data-related areas. This is the field in which IBM is heavily investing. DOES IBM USE OPEN DATA FROM PUBLIC SOURCES? We mainly use our own IBM-produced data and tools. We have a big variety of databases: structured, non-structured, analysis-oriented… CONSIDERING THAT MOST OF THE DATA IS GENERATED BY IBM, WHAT KIND OF STANDARDS DO YOU APPLY? Our own customers demand us to adjust to specific standards when they use our tools. Therefore, we comply with all the typical standards in data management. If we didn’t do so, we wouldn’t sell anything! We are always keeping an eye on the market’s demand for specific standards.
    [Show full text]
  • Tivoli Monitoring for Microsoft Applications V6.1.1
    IBM United States Announcement 208-122, dated May 20, 2008 Tivoli Monitoring for Microsoft Applications V6.1.1 Ordering information ..................................7 Overview Terms and conditions ................................ 9 IBM Electronic Services ...........................10 The IBM Tivoli® Monitoring for Microsoft® Applications Entry V6.1.1 Prices .......................................................10 offering provides a limited use entitlement for the Windows® operating system agent in IBM Tivoli Monitoring for Microsoft Applications. IBM Tivoli Monitoring for Microsoft Applications Advanced V6.1.1 is a Microsoft system and application monitoring tool that provides the capabilities to comprehensively monitor, alert, and report on the availability of Microsoft applications and the environment they run on. For additional information, refer to Software Announcement 208-065, dated March 25, 2008. Planned availability date • May 23, 2008: Electronic software delivery • May 23, 2008: Media and documentation IBM United States Announcement 208-122 IBM is a registered trademark of International Business Machines Corporation 1 IBM Tivoli Enhanced Value-Based Pricing terminology IBM Tivoli® Enhanced Value-Based Pricing: IBM Tivoli software products are priced using IBM Tivoli's Enhanced Value-Based Pricing. The Enhanced Value-Based Pricing system is based upon the IBM Tivoli Environment-Managed Licensing Model, which uses a managed-environment approach — whereby price is determined by what is managed rather than the number and type
    [Show full text]
  • XLUPC: Developing an Optimizing Compiler UPC Programming Language
    IBM Software Group | Rational ® XLUPC: Developing an optimizing compiler UPC Programming Language Ettore Tiotto IBM Toronto Laboratory [email protected] ScicomP 2012 IBM Disclaimer © Copyright IBM Corporation 2012. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and/or capabilities referenced in these materials may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. IBM, the IBM logo, Rational, the Rational logo, Telelogic, the Telelogic logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others. Please Note: IBM’s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM’s sole discretion.
    [Show full text]
  • Monitoring: Become More Proactive Through Effective Historical Analysis
    1 IBM Software Group | Tivoli Software Monitoring: Become More Proactive Through Effective Historical Analysis Ed Woods Session 9633 Consulting IT Specialist Tuesday, August 9 th IBM Corporation 1:30-2:30 PM © 2011 IBM Corporation IBM Software Group | Tivoli Software Agenda How can you use history to improve your real-time monitoring strategy? Are you getting the most from your investment in monitoring and management solutions? How can you leverage history to improve your overall performance and availability? What are the most effective ways to use history to solve common problems? What are the optimal ways to collect historical information? How can you use history to become more proactive with real-time monitoring and management? Become More Proactive Through Effective Historical Analysis © 2011 IBM Corporation 2 IBM Software Group | Tivoli Software The Importance Of History Data Why History Can Be Essential To Your Overall Strategy Not all problems or events can be seen and analyzed in real time – Inevitably some analysis will need to be done after the fact using such functions as Near Term History, snapshot history, or report analysis History provides an understanding of what happened in the past – History of application performance and response time – CICS/IMS response time, DB2 thread activity, z/OS batch activity – History of resource utilization and resource issues – DASD, memory/paging, CPU, pools – History of alerts and issues – What alerts fired and how often History can be used to help visualize what may happen in the
    [Show full text]
  • A Brief Guide to Using This Text
    A BRIEF GUIDE TO USING THIS TEXT The sixth edition of Marketing Research offers several features that will help you throughout this course. FEATURE BENEFIT/DESCRIPTION PAGE REFERENCE SPSS and SAS computerized This edition offers the most extensive help available anywhere for learning e.g., 419, 439 demonstration movies, screen these programs. (1) From the Web site for this book you can download captures, step-by-step instruc- computerized demonstration movies illustrating step-by-step instructions for tion, and technology manual every data analysis technique covered in the chapters. (2) You can also download screen captures with notes illustrating these step-by-step instruc- tions. (3) You can study detailed step-by-step instructions in the chapters. (4) You can refer to the Study Guide and Technology Manual, a supplement that accompanies this book. We provide the most extensive help available anywhere for learning SPSS and SAS. You can learn these software tools on your own. Stimulating critical-thinking Socratic questioning, critical reading and writing, and higher-order thinking 780-787 practice and assessment are built into three comprehensive critical-thinking cases (2.1 American Idol, 2.2 Baskin-Robbins, and 2.3 Akron Children's Hospital), end-of-chapter review questions, applied problems, and group discussions. These materials have been designed along guidelines from the Foundation for Critical Thinking. Develop critical-thinking skills while you learn marketing research. Concept maps These maps will help you visualize interrelationships among concepts. These e.g., 28 are one or more concept maps per chapter based on the findings of the Institute for Human and Machine Cognition.
    [Show full text]
  • IBM Software-Defined Storage Guide
    Front cover IBM Software-Defined Storage Guide Larry Coyne Joe Dain Eric Forestier Patrizia Guaitani Robert Haas Christopher D. Maestas Antoine Maille Tony Pearson Brian Sherman Christopher Vollmar Redpaper International Technical Support Organization IBM Software-Defined Storage Guide July 2018 REDP-5121-02 Note: Before using this information and the product it supports, read the information in “Notices” on page vii. Third Edition (July 2018) © Copyright International Business Machines Corporation 2016, 2018. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Notices . vii Trademarks . viii Preface . ix Authors. ix Now you can become a published author, too . xi Comments welcome. xii Stay connected to IBM Redbooks . xii Chapter 1. Why software-defined storage . 1 1.1 Introduction to software-defined architecture . 2 1.2 Introduction to software-defined storage. 3 1.3 Introduction to Cognitive Storage Management . 7 Chapter 2. Software-defined storage. 9 2.1 Introduction to SDS . 10 2.2 SDS overview . 11 2.2.1 SDS supports emerging as well as traditional IT consumption models . 12 2.2.2 Required SDS capabilities . 14 2.2.3 SDS Functions . 15 2.3 SDS Data-access protocols . 16 2.3.1 Block I/O . 16 2.3.2 File I/O . 17 2.3.3 Object Storage . 17 2.4 SDS reference architecture. 17 2.5 Ransomware Considerations . 18 Chapter 3. IBM SDS product offerings . 19 3.1 SDS architecture . 20 3.1.1 SDS control plane . 23 3.1.2 SDS data plane.
    [Show full text]
  • IBM Tivoli Monitoring: Implementation and Performance Optimization for Large Scale Environments
    Front cover IBM Tivoli Monitoring: Implementation and Performance Optimization for Large Scale Environments Best practices - large scale deployment of IBM Tivoli Monitoring V6.1 and V6.2 Performance, scalability and high availability considerations Includes CCMDB integration Vasfi Gucer Naeem Altaf Erik D Anderson Dirk-Gary Boldt Murtuza Choilawala Isabel Escobar Scott A Godfrey Mauricio Morilha Sokal Christopher Walker ibm.com/redbooks International Technical Support Organization IBM Tivoli Monitoring: Implementation and Performance Optimization for Large Scale Environments February 2008 SG24-7443-00 Note: Before using this information and the product it supports, read the information in “Notices” on page xi. First Edition (February 2008) This edition applies to IBM Tivoli Monitoring Version 6.1.0 and Version 6.2.0, IBM Tivoli OMEGAMON XE Version 4.1.0. © Copyright International Business Machines Corporation 2008. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Notices . xi Trademarks . xii Preface . xv The team that wrote this book . xv Become a published author . xviii Comments welcome. xviii Chapter 1. Introduction to IBM Tivoli Monitoring V6.1. 1 1.1 IBM Tivoli at a glance . 2 1.2 IBM Service Management . 2 1.2.1 IBM Process Management products . 4 1.2.2 IBM Operational Management products . 4 1.2.3 IBM Service Management platform. 5 1.3 Enterprise management challenges . 5 1.3.1 Business driving forces . 6 1.4 IBM Tivoli Monitoring solutions . 7 1.5 IBM Tivoli Monitoring V6.1 components . 9 1.5.1 Tivoli Enterprise Monitoring Server (monitoring server) .
    [Show full text]
  • IBM Tivoli Configuration Manager for Automated Teller Machines: Release Notes Preface
    IBM Tivoli Configuration Manager for Automated Teller Machines Release Notes Ve r s i o n 2 .1 SC32-1254-00 IBM Tivoli Configuration Manager for Automated Teller Machines Release Notes Ve r s i o n 2 .1 SC32-1254-00 Note Before using this information and the product it supports, read the information in “Notices” on page 9. First Edition (June 2003) This edition applies to Version 2, release 1, modification level 0 of IBM Tivoli Configuration Manager for Automated Teller Machines (program number 5724-E50) and to all subsequent releases and modifications until otherwise indicated in new editions. © Copyright International Business Machines Corporation 2000, 2003. All rights reserved. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Preface ...............v Compatibility ..............1 Publications ..............v IBM Tivoli Configuration Manager for Automated Chapter 2. Installation and upgrade Teller Machines ............v notes ................3 Prerequisite publications .........v Supported operating systems .........3 Related publications ..........vi Supported databases............4 Accessing publications online .......vii Component installation requirements ......4 Ordering publications ..........vii Hardware Requirements .........4 Contacting software support ........vii Software Requirements ..........5 Conventions used in this guide .......viii Installing and upgrading to IBM Tivoli Configuration Typeface conventions ..........viii Manager for
    [Show full text]
  • Understanding the Interaction of Z/OS Workload Manager and DB2
    ® IBM Software Group Understanding The Interaction Of z/OS Workload Manager And DB2 Ed Woods / IBM Corporation © 2010 IBM Corporation IBM Software Group | Tivoli software Agenda Workload Manager Overview Important WLM Concepts And Terminology How DB2 Exploits Workload Manager Understanding WLM and how it impacts DB2 WLM/DB2 Usage Recommendations Summary Understanding The Interaction Of z/OS Workload Manager And DB2 © 2011 IBM Corporation 2 IBM Software Group | Tivoli software Why Workload Manager (WLM)? DDF Goal Prioritization CICS JES What does z/OS need to accomplish objectives? DB2 IMS TSO How important is the workload to the business? Complexity of systems has increased dramatically In the past priority managed by PARMLIB options Too much work to ‘micro-manage’ each z/OS system Multiple LPARs, Data sharing, large sophisticated workloads Workload Manager improves the performance management process Prioritize workload based upon goals and business objectives Let the system optimize and prioritize resource management Make sure that the most important workload gets the appropriate resource Understanding The Interaction Of z/OS Workload Manager And DB2 © 2011 IBM Corporation 3 IBM Software Group | Tivoli software DB2 And Workload Manager Workload Manager (WLM) is the priority and resource manager for z/OS and implicitly for DB2 as well Workload Manager manages CPU, I/O, and memory resources as needed by the workload WLM manages critical DB2 address spaces DB2 subsystem address spaces DB2 Stored Procedure address spaces These
    [Show full text]