View
215
Download
0
Tags:
Embed Size (px)
Citation preview
Ronald NunanRonald Nunan
Incorporating mainframe legacy applications into SOAIncorporating mainframe legacy applications into SOA
Agenda
• SOA and market momentum
• Verastream family
• Real world problems and solutions– Verastream Host Integrator– Verastream Transaction Integrator– Verastream Web Integrator– Verastream Bridge Integrator
Can’t sleep? Can’t imagine why…
What is our longterm strategy?
New regulations
Competitive pressures
The CFO wants to review the project ROI this week….
It’s time to test our business contingency
plans again
COBOL programmer retiring - how will we find a
replacement?
Do more with less?That doesn’t even
make sense…
Another merger?!
“Agility” is the Answer
• Businesses must be agile• IT enables business agility • An architectural strategy is key
IT pace is a problem
• IT faces continuous change• IT is more involved with
business units than ever before • Old approaches are too slow
IT AppsIT Apps
Market Observations
• SOA is increasingly the answer for agility• For IT initiatives today, SOA is a best practice
approach
“The number of organizations where SOA is the preferred approach for new projects has grown from 37% in 2005 to 53% in 2006”[IDC survey, June 2006]
SOASOA
The Challenge IT Organizations Face
• Leverage existing application assets– Extend use of applications– Align with technology direction– Tap appropriate skill-sets
• Minimize risk– Enterprise class apps– QoS, Regression,…
• Keep projects moving forward
How do you implement agility?
• The goal is the architecture
• What technology– SOA? EDA? Both?– Middle tier? – ESB? BPM? BI?– Java? .NET? Both?– ITSM? ITIL?
The Reality of Legacy
• Valuable• High business value• Typically mission critical
• Problematic• Not agile by design• Major undertaking to replace
Legacy systems are too important not to participate!
Destination Agility – You choose the route
• The technology is yours alone– SOA is an architecture– The choice is about your
business– Aligning IT implementations
• Legacy can participate– Rewrite or re-host– ‘Wrapper’ approach
• Low risk approach– Evolve applications– Non-invasive legacy inclusion is
possible
Integration Product FamilyNon-invasive screen solution
Transaction and data access solution
Host-based hybrid solution
Case Study – Edfinancial Services
• Problem
– Financial services have evolved to the point where self-service activities with partners and customers is expected.
– Self-service applications are essentially activities that are a subset of existing applications
• Technically– Multiple outside customers need real-time, read-write
access to loan data for queries and updates
Case Study – Edfinancial Services
Goals– Use existing legacy systems and
applications to build self-service applications
– Apply an SOA approach so future needs
can be accommodated
Solution – Non-invasive host interactions using
Verastream Host Integrator– Create services through ‘controlled
navigations’– Used BizTalk to buid customer
facing loan application – Biztalk used Verastream services to
handle host queries and updates
VerastreamHost Integrator
VerastreamHost Integrator
Loan App
Result• Built services through a simple drag-and-drop designer• Simplified the host interactions
– Reduced 6 hosts screens into a Web Service operation
COBOL
COBOL
zSeries Loan App
VerastreamHost Integrator
Terminal access
BizTalk
Verastream ServicesBizTalk App built
From services
Customer facing Loan App w/ embedded
legacy access
Credit Bureau - Experian
• Problem– Too many architectures involved
within the enterprise– Stretched skills beyond comfort – Neutralized economies of scale
• Need– The goal was to rollout a common architectural platform
to be used for backend systems – Approach needed to span application and data access– Existing assets (Legacy) as well as new initiatives
needed a single access architectural approach
Preferred Solution
• Goal– Implement standard SQL style access across systems– Use a non-invasive approach for legacy application– Quick implementation to service a short time-to-market
• Solution used multiple access methods– Verastream Transaction Integrator for CICS DPL access– Screen access through Host Integrator– Data access through Verastream Data Integrator– All access methods combine to build a set of services for
consistent mid-tier use
Result• Services built from specific access methods• Use is generic and not dependent on access type
COBOL
COBOL
zSeries Loan App
VerastreamHost Integrator
VerastreamHost IntegratorVSAM DB2
VerastreamHost Integrator
• Hi Kevin,• Please see my response below:-
• Fidelity National Information Services (FIS) is a provider of financial institution processing. Loan processing happens to be on of the things FIS does very well with their ALSCOM platform. The North Carolina State credit union has over 200 branches. The Credit Union found the need to automate the loan origination processes in order to reduce loan processing lead times. This could increase its market share and make its loan offerings more attractive to their customers. The Credit union stores most of its financial information on Mainframes. The Presentation layer of the CICS application encapsulates logic utilized by the ALSCOM loan processing workflow. Leveraging this was important to FIS and the Credit Union. Attachmate provided the technology to mine Mainframe data and host logic at Presentation layer.
• The Credit Union has improved its consumer lending business immensely. They are extending their loan marketing channels by extending customer/consumer information to Tellers by unlocking a lot of the intelligence that resides on the Mainframe. They are doing this by using tools that access the Presentation layer of their CICS applications. They are doing so with Attachmate's Verastream 3270 Bridge integrator.
• Regards,• Tambu
Color PalettePrimary Palette
Secondary Palette
R: 63G: 86B: 121
R: 104G: 134B: 178
R: 228G: 99B: 0
R: 255G: 150B: 71
R: 254G: 190B: 68
R: 255G: 228B: 95
R: 114G: 41B: 70
R: 162G: 58B: 100
R: 122G: 115B: 0
R: 168G: 160B: 0
R: 163G: 163B: 163
R: 194G: 194B: 194
Color Picker Chips
Copy and paste onto working slide for color reference
R: 2G: 132B: 193
R: 160
G: 225
B: 254
R: 123G: 12B: 0
R: 165G: 35B: 38
THREAT DETECTION CHANGE DETECTION SECUIRTY/LOCK KEY NETWORK
DATABASE DATABASE OLAP CALENDAR 3RD PARTY TOOLS VIRTUALIZATION
SWITCH ROUTER SECURITY HUB LOAD BALANCER FIREWALL/GATEWAY
GROUP POLICY RECYCLE/TRASH DESKTOP IP PHONE LAPTOP
PDA/SMART PHONE DESKTOP W/DISPLAY DISPLAY SERVER EMAIL SERVER
PRINTER CD DRIVE HARD DRIVE INTERNET/CLOUD WIRELESS TOWER
USER (HALF) USER GROUP (HALF) USER (FULL) USER GROUP (FULL) HACKER
ACTIVE DIRECTORY CUSTOM APPLICATIONS APP SERVICES EMAIL MONITORING