ronald nunan incorporating mainframe legacy applications into soa

24

Post on 19-Dec-2015

215 views

Category:

Documents


0 download

TRANSCRIPT

Ronald NunanRonald Nunan

Incorporating mainframe legacy applications into SOAIncorporating mainframe legacy applications into SOA

Agenda

• SOA and market momentum

• Verastream family

• Real world problems and solutions– Verastream Host Integrator– Verastream Transaction Integrator– Verastream Web Integrator– Verastream Bridge Integrator

Can’t sleep? Can’t imagine why…

What is our longterm strategy?

New regulations

Competitive pressures

The CFO wants to review the project ROI this week….

It’s time to test our business contingency

plans again

COBOL programmer retiring - how will we find a

replacement?

Do more with less?That doesn’t even

make sense…

Another merger?!

“Agility” is the Answer

• Businesses must be agile• IT enables business agility • An architectural strategy is key

IT pace is a problem

• IT faces continuous change• IT is more involved with

business units than ever before • Old approaches are too slow

IT AppsIT Apps

Market Observations

• SOA is increasingly the answer for agility• For IT initiatives today, SOA is a best practice

approach

“The number of organizations where SOA is the preferred approach for new projects has grown from 37% in 2005 to 53% in 2006”[IDC survey, June 2006]

SOASOA

The Challenge IT Organizations Face

• Leverage existing application assets– Extend use of applications– Align with technology direction– Tap appropriate skill-sets

• Minimize risk– Enterprise class apps– QoS, Regression,…

• Keep projects moving forward

How do you implement agility?

• The goal is the architecture

• What technology– SOA? EDA? Both?– Middle tier? – ESB? BPM? BI?– Java? .NET? Both?– ITSM? ITIL?

Elements of Agile Architecture

The Reality of Legacy

• Valuable• High business value• Typically mission critical

• Problematic• Not agile by design• Major undertaking to replace

Legacy systems are too important not to participate!

Destination Agility – You choose the route

• The technology is yours alone– SOA is an architecture– The choice is about your

business– Aligning IT implementations

• Legacy can participate– Rewrite or re-host– ‘Wrapper’ approach

• Low risk approach– Evolve applications– Non-invasive legacy inclusion is

possible

Integration Product FamilyNon-invasive screen solution

Transaction and data access solution

Host-based hybrid solution

Case Study – Edfinancial Services

• Problem

– Financial services have evolved to the point where self-service activities with partners and customers is expected.

– Self-service applications are essentially activities that are a subset of existing applications

• Technically– Multiple outside customers need real-time, read-write

access to loan data for queries and updates

Case Study – Edfinancial Services

Goals– Use existing legacy systems and

applications to build self-service applications

– Apply an SOA approach so future needs

can be accommodated

Solution – Non-invasive host interactions using

Verastream Host Integrator– Create services through ‘controlled

navigations’– Used BizTalk to buid customer

facing loan application – Biztalk used Verastream services to

handle host queries and updates

VerastreamHost Integrator

VerastreamHost Integrator

Loan App

Result• Built services through a simple drag-and-drop designer• Simplified the host interactions

– Reduced 6 hosts screens into a Web Service operation

COBOL

COBOL

zSeries Loan App

VerastreamHost Integrator

Terminal access

BizTalk

Verastream ServicesBizTalk App built

From services

Customer facing Loan App w/ embedded

legacy access

Credit Bureau - Experian

• Problem– Too many architectures involved

within the enterprise– Stretched skills beyond comfort – Neutralized economies of scale

• Need– The goal was to rollout a common architectural platform

to be used for backend systems – Approach needed to span application and data access– Existing assets (Legacy) as well as new initiatives

needed a single access architectural approach

Preferred Solution

• Goal– Implement standard SQL style access across systems– Use a non-invasive approach for legacy application– Quick implementation to service a short time-to-market

• Solution used multiple access methods– Verastream Transaction Integrator for CICS DPL access– Screen access through Host Integrator– Data access through Verastream Data Integrator– All access methods combine to build a set of services for

consistent mid-tier use

Result• Services built from specific access methods• Use is generic and not dependent on access type

COBOL

COBOL

zSeries Loan App

VerastreamHost Integrator

VerastreamHost IntegratorVSAM DB2

VerastreamHost Integrator

• Hi Kevin,• Please see my response below:-

• Fidelity National Information Services (FIS) is a provider of financial institution processing. Loan processing happens to be on of the things FIS does very well with their ALSCOM platform. The North Carolina State credit union has over 200 branches. The Credit Union found the need to automate the loan origination processes in order to reduce loan processing lead times. This could increase its market share and make its loan offerings more attractive to their customers. The Credit union stores most of its financial information on Mainframes. The Presentation layer of the CICS application encapsulates logic utilized by the ALSCOM loan processing workflow. Leveraging this was important to FIS and the Credit Union. Attachmate provided the technology to mine Mainframe data and host logic at Presentation layer.

• The Credit Union has improved its consumer lending business immensely. They are extending their loan marketing channels by extending customer/consumer information to Tellers by unlocking a lot of the intelligence that resides on the Mainframe. They are doing this by using tools that access the Presentation layer of their CICS applications. They are doing so with Attachmate's Verastream 3270 Bridge integrator.

• Regards,• Tambu

Verastream -- Developing for Agility

Color PalettePrimary Palette

Secondary Palette

R: 63G: 86B: 121

R: 104G: 134B: 178

R: 228G: 99B: 0

R: 255G: 150B: 71

R: 254G: 190B: 68

R: 255G: 228B: 95

R: 114G: 41B: 70

R: 162G: 58B: 100

R: 122G: 115B: 0

R: 168G: 160B: 0

R: 163G: 163B: 163

R: 194G: 194B: 194

Color Picker Chips

Copy and paste onto working slide for color reference

R: 2G: 132B: 193

R: 160

G: 225

B: 254

R: 123G: 12B: 0

R: 165G: 35B: 38

THREAT DETECTION CHANGE DETECTION SECUIRTY/LOCK KEY NETWORK

DATABASE DATABASE OLAP CALENDAR 3RD PARTY TOOLS VIRTUALIZATION

SWITCH ROUTER SECURITY HUB LOAD BALANCER FIREWALL/GATEWAY

GROUP POLICY RECYCLE/TRASH DESKTOP IP PHONE LAPTOP

PDA/SMART PHONE DESKTOP W/DISPLAY DISPLAY SERVER EMAIL SERVER

PRINTER CD DRIVE HARD DRIVE INTERNET/CLOUD WIRELESS TOWER

USER (HALF) USER GROUP (HALF) USER (FULL) USER GROUP (FULL) HACKER

ACTIVE DIRECTORY CUSTOM APPLICATIONS APP SERVICES EMAIL MONITORING

TREND REPORTING LOG FORENSICS DATA REPORTS STANDARDS TASKS

REPORTS SNAPSHOT CONFIGURATION

FINANCE HEALTHCARE RETAIL PRIVATE PHARMACEUTICAL

MANUFACTURING GOVERNMENT TELECOM