Dueling Middleware WAVV 2000, Colorado Springs. Middleware Defined LAN DBMS Web Browser Client...

Post on 18-Jan-2018

223 views 0 download

description

Significant Investments Hardware Hardware Data Data Applications Applications People People Hardware Hardware Data Data Applications Applications People People

Transcript of Dueling Middleware WAVV 2000, Colorado Springs. Middleware Defined LAN DBMS Web Browser Client...

Dueling Middleware

WAVV 2000, Colorado SpringsWAVV 2000, Colorado Springs

Middleware Defined

LAN DBMSLAN DBMS

Web BrowserWeb Browser

Client WorkstationClient Workstation

Local Area Network

MiddlewareMiddleware

Web ServerWeb Server

S/390

Significant Investments

HardwareHardware DataData ApplicationsApplications PeoplePeople

Low-tech Middleware

3270 Emulation3270 Emulation FTP FTP Screen ScrapersScreen Scrapers Sneaker NetSneaker Net

Viaserv Over The Years

Liberating Enterprise Data

Solutions Over The Years

Client/ServerClient/Server Decision SupportDecision Support Data WarehousingData Warehousing Business IntelligenceBusiness Intelligence E-BusinessE-Business Enterprise Information PortalsEnterprise Information Portals

It Still Comes Down To Basics

ODBC and JDBC access toODBC and JDBC access toS/390 data and applicationsS/390 data and applications

A Relational Layer

RelationalRelationalEngineEngine

VSAMVSAMIMSIMSDD

Two Very Different Approaches

S/390

RelationalRelationalEngineEngine

S/390RelationalRelational

EngineEngine

CICS

11 22Standalone Engine CICS-Coupled Engine

So What’s Important?

Full SQL DML supportFull SQL DML support CICS control of filesCICS control of files Transaction management Transaction management Programmatic accessProgrammatic access Data movementData movement SecuritySecurity ScalabilityScalability Advanced featuresAdvanced features

Full DML Support

SELECTSELECT INSERTINSERT UPDATEUPDATE DELETEDELETE

CICS Control of Files

VSAM shareoptions are problematicVSAM shareoptions are problematic Robust transaction managementRobust transaction management Standard security featuresStandard security features Concurrency controlsConcurrency controls

Transaction Management

Read and write capabilitiesRead and write capabilities Transaction managementTransaction management Long and short transactionsLong and short transactions

Programmatic Access

LAN clients access CICS resourcesLAN clients access CICS resources access any S/390 data store utilize existing business logic special processing

CICS clients access LAN resourcesCICS clients access LAN resources mainframe is central SQL access to LAN-based DBMS utilize newly-evolved business logic data distribution

Data Movement Move data directly into target DBMSMove data directly into target DBMS Bi-directionalBi-directional Ideally, SQL is used to select the dataIdeally, SQL is used to select the data

VSAM

DL/IOther

Oracle

OtherSQLServer

Security

Workstation-sideWorkstation-side support for user authentication

Server-sideServer-side use standard CICS security support SQL GRANT and REVOKE

Scalability

Multi-user, multi-tasking serverMulti-user, multi-tasking server Multiple users serviced by one Multiple users serviced by one

address space or partitionaddress space or partition

Advanced Features

Client-idle timeoutClient-idle timeout Data compressionData compression Cross-datasource joinsCross-datasource joins Cursors and dynamic eventsCursors and dynamic events

So What’s Important?

Full SQL DML supportFull SQL DML support CICS control of filesCICS control of files Transaction management Transaction management Programmatic accessProgrammatic access Data movementData movement SecuritySecurity ScalabilityScalability Advanced featuresAdvanced features

Liberating Enterprise Data

Desktop Access Desktop Access Web IntegrationWeb Integration Data Staging and MovementData Staging and Movement Multi-tiered ApplicationsMulti-tiered Applications

S/390

Liberating Enterprise Data

ServicesProfessional

Liberating Enterprise DataLiberating Enterprise Data