SlideShare a Scribd company logo
1 of 34
© 2018 IBM Corporation
1
The enterprise differentiator of IBM MQ on z/OS
—
Matt Leming
Architect, MQ on z/OS
© 2018 IBM Corporation
2
Contents
MQ Advanced for VUE
MQ on z/OS: the most
resilient form of MQ
Hardware integration and z14
MQ Advanced for VUE
IBM MQ Advanced for z/OS Value Unit Edition
IBM MQ Advanced
Message Security for z/OS
IBM MQ for z/OS
The richest set of z/OS messaging capabilities in a single, simple to deploy offering
Connector Pack
IBM MQ Managed
File Transfer for z/OS
IBM MQ Advanced for z/OS Value Unit Edition V9.0.3 onwards
Provides end-to-end encryption of message contents to protect
sensitive data from all forms of intrusion, attack or accidental
disclosure, and with no need for application change
Provides reliable, secure and auditable file transfer that reduces the
need for manual processes, and management tools that help
reduce wasted time when dealing with failure analysis
Enables the secure, reliable exchange of business data across
applications, systems and services on-premises, in the Cloud, or
in Hybrid environments
Enables applications and systems to participate in a Blockchain
network via MQ, performing CRUD operations on Hyperledger
Fabric Blockchain running in IBM Cloud or running locally
4
© 2018 IBM Corporation
6
Tight integration with z/OS platform and subsystems
Maximum performance, high availability, connectivity and security
IBM Z, z/OS and the Parallel Sysplex
provide the foundation for IBM MQ on
z/OS
Create high performance
environments able to process millions
of messages every second
Highly available connectivity with
shared storage and automatic
recovery
Tight integration with key subsystems
and consistency with a range of other
platforms
CICS
z/OS
IMS
Batch
Db2
IIB WAS
zCEE
Queue
manager
Channel
initiator
mqweb
MQ
Clients
REST
z/OS
Java
Clients
IBM MQ Advanced Message Security
for z/OS
7
9 Billion
4%
Of the
only
breached since 2013
were encrypted 3
records
$4M
Average cost of a data
breach in 2016 2
Likelihood of an organization
having a data breach in the
next 24 months 1
26%
“It’s no longer
a matter of if,
but when …”
Health
Insurance
Portability and
Accountability
Act (HIPAA)
European Union
General Data
Protection Regulation
(GDPR)
Payment Card Industry Data
Security Standard (PCI-DSS)
1, 2 Source: 2016 Ponemon Cost of Data Breach Study: Global Analysis -- http://www.ibm.com/security/data-breach/
3 Source: Breach Level Index -- http://breachlevelindex.com/
How do you address data protection and compliance?
8
© 2018 IBM Corporation
9
MQ Advanced for z/OS VUE delivers pervasive encryption
Protects data at rest, in-flight and in-memory to guarantee privacy of message contents
Application B
Application A
Channels
IBM MQ system
Queue Manager
Queue Manager
Apply end-to-end encryption to existing
messaging infrastructure easily and with
no application changes
Authenticate and protect messages across
the enterprise making audit simple
Reduce time and skills needed to comply
with aspects of common security
standards
Detect and remove rogue messages
New confidentiality option for encryption
has minimal performance impact
Decrypted at destination
Encrypted at source
IBM MQ Managed File Transfer
for z/OS
10
© 2018 IBM Corporation
12
Move data and files with MQ Advanced for z/OS VUE
Consistent approach to transporting application data and file data as messages
How:
 File-to-file
 File-to-message
 Message-to-file
MFT Agent:
Performs the fundamental file transfer function of sending
and receiving files from the local system
MFT Service:
Installs a file transfer agent on MQ server with additional
capabilities
Benefits:
• Reliability of delivery
• Increased security of system and data
• Integrated management and recovery
Channels
MQ Advanced QMs
Logging
component
MFT Agent
Application BApplication A
MFT Agent
Unlimited deployments
of MQ MFT Agents when
connecting them to MQ
Advanced Queue
Managers
© 2018 IBM Corporation
13
MQ Adv VUE
MFT
Agent
MFT
Agent
MFT
Agent
LPAR 1 LPAR 2
File Hub
(LPAR 3)
Create a “File Hub” using simplified MFT Agent connectivity
MFT agents deployed wherever files are to
be sourced or delivered
No requirement for a local z/OS queue
manager - choose where to handle file
workload
Files transferred across the MQ network
between local and remote agents
Reduce the number of queue managers
required - simplified topology for easier
administration
Connector Pack
14
Blockchain: holds details of
all vehicles for country
Manufacturer
adds vehicles
Recycle/Scrap
removes vehicles
Dealer: Registers
vehicle, updates
ownership
Importer: adds
vehicles
Tax
Records
Tax Due
process
Send
Reminder
process
Reminder
Excise Authority`
Query current
Owner
Modified Hybrid Business Process
MQ
Blockchain requires connectivity for data sharing
Parties in the business network need to exchange data often held in Systems of Record
Enable a range of different
applications and systems to
send updates to a Blockchain
network
Ensure data integrity following
changes to shared assets
Transport critical business data
securely and reliably
…sound familiar?
Requirements…
16
IBM MQ
Bridge for
Blockchain
IBM MQ
Connect to Blockchain with MQ Advanced for z/OS VUE
Deploy IBM MQ Bridge for Blockchain to enable applications and systems to participate
Bridge allows an MQ application to connect to Hyperledger Fabric
Blockchain running in IBM Cloud or running locally
Utilise request-reply MQ messages to query information from
Blockchain (e.g. what is the value of the balance on this account)
Use MQ to drive Create, Read, Update and Delete operations on
Blockchain-managed assets
No need to understand the ledger-specific APIs, configuration or
controls
Connection to Queue Manager
---------------------------
Queue Manager : [MQ21]
Bridge Input Queue : [SYSTEM.BLOCKCHAIN.INPUT.QUEUE]
Bridge User Identity Queue : [SYSTEM.BLOCKCHAIN.IDENTITY.QUEUE]
MQ Channel : [SYSTEM.DEF.SVRCONN]
MQ Conname : [host1.example.com(3714)]
Blockchain - User Identification
--------------------------------
Blockchain Userid : [WebAppAdmin]
Enrollment Secret : []******
Blockchain - Organisation Identification
----------------------------------------
Organisation Name : [PeerOrg1]
Certificate Authority servers : [ldn1-zbc5a.2.secure.blockchain.ibm.com:14511] 17
© 2018 IBM Corporation
18
Connector Pack also contains
9.0.3:
Support for client connections from MFT agents
to MQ Advanced for z/OS VUE queue managers
running on other LPARs
9.0.4:
Support for client connections from Java applications
to MQ Advanced for z/OS VUE queue managers
running on other LPARs
Client mode support for MFT logger in file mode
9.0.5
AMS support for Java applications using client
connections
MQ Adv VUE
JMS
Client
Java
Client
LPAR 1 LPAR 2
LPAR 3
MQ on z/OS: the most
resilient form of MQ
© 2018 IBM Corporation
20
IBM Z is most reliable and resilient
hardware platform
Less than one minute unplanned
downtime per server per year
99.999% or greater reliability
Baked in from CPU, memory, IO
subsystems, cooling, chassis, OS,
coupling facility, all the way up to
the middleware
INCLUDING MQ!
http://itic-corp.com/blog/2018/01/ibm-lenovo-top-latest-itic-global-server-hardware-reliability-poll/
IBM MQ – resiliency capabilities
21
A layered set of capabilities to build robust and highly available connectivity
LOGGING ARCHIVING CLUSTERING
DATA
SHARING
SHARED
QUEUES
DATA RECOVERY
SERVICE
HIGH AVAILABILITY
SERVICE & DATA
HIGH AVAILABILITY
IBM MQ records all significant
changes to persistent data in a
recovery log
Enables data recovery after a
hardware or software failure
MQ for z/OS: Dual logging offers
further protection against data
loss
MQ for z/OS: Logs automatically
archived to secondary storage
(tape or DASD)
Clusters of queue
managers provide WLM
and high availability of
messaging resources
resilient to individual
server failures
Gold standard for resilience on MQ for z/OS: Queue
Sharing Groups
Queue managers can be members of a queue sharing
group with resources held in coupling facilities. Pull
workload balancing and automatic peer recovery
through shared data access
High availability of individual distributed platform
queue managers provided by:
• Multi-instance queue managers using shared
file system
• Data replication using appliance HA or RDQM
• HA clusters managed using hardware
DATA
REPLICATION
© 2018 IBM Corporation
22
Service high availability:
MQ clusters
Multiple instances of a named queue can be deployed
into a cluster
Cluster workload management routine
distributes messages between the instances
Benefits:
Service remains available even if a queue
manager fails
Workload balancing between instances
Most customers operating critical services
at scale make use of MQ clustering
Up to 1000s of cluster members
Available on all supported MQ platforms
NB: Failure of a queue manager in
the cluster results in its messages
being unavailable
Client
Service
Cluster
WLM
QMGR
CLUSQ
QMGR
CLUSQ
QMGR
Service
© 2018 IBM Corporation
23
Data high availability:
shared queues
Queue sharing group: set of queue
managers with shared object definitions
Shared queue: queue where messages
are stored in coupling facility structure
Messages accessible
from any member of
queue sharing group
Pull based WLM: applications can
consume messages at their own speed
The most resilient MQ topology
Client
Queue sharing group
QMGR
QMGR
QMGR
Shared queue
held in coupling
facility structure
Service
Service
Service
© 2018 IBM Corporation
24
Resiliency characteristics of
shared queues
Messages remain available if individual queue
managers or LPARs fail
Peer recovery for inflight work
Applications and queue managers can continue
to connect into queue sharing group if individual
queue managers or LPARs fail (shared
channels)
Resilient to structure failure
Resilient to coupling facility connectivity failure
Resilient to application failure
Client Service
QUEUE FULL
Hardware integration and z14
Pervasive encryption with IBM z Systems
Enabled through full-stack platform integration
1 Statement of Direction* in the z/OS Announcement Letter (10/4/2016) - http://ibm.co/2ldwKoC
2 IBM z/OS Version 2 Release 3 Preview Announcement Letter (2/21/2017) -
http://ibm.co/2l43ctN
Broadly protect Linux® file systems and z/OS data sets1 using policy
controlled encryption that is transparent to applications and databasesData at Rest
Integrated Crypto
Hardware
Hardware accelerated encryption on every core – CPACF performance improvements of up to 7x
Next Gen Crypto Express6S – up to 2x faster than prior generation
Protect z/OS Coupling Facility2 data end-to-end, using
encryption that’s transparent to applications
Clustering
Protect network traffic using standards based encryption from end to end, including encryption
readiness technology2 to ensure that z/OS systems meet approved encryption criteria
Network
Secure deployment of software appliances including tamper protection during installation and
runtime, restricted administrator access, and encryption of data and code in-flight and at-rest
Secure Service
Container
The IBM Enterprise Key Management Foundation (EKMF) provides real-time, centralized secure
management of keys and certificates with a variety of cryptographic devices and key stores.
Key
Management
****Data in Use Protect MQ data while it is in memory within z/OS, while it is at rest, while it is inflight using MQ
Advanced for z/OS VUE based end-to-end encryption that’s transparent to applications
1
0
1
26
z14 Integrated Cryptographic Hardware
CP Assist for Cryptographic Functions
(CPACF)
Hardware accelerated encryption on every
microprocessor core
Performance improvements of up to 7x for
selective encryption modes
Crypto Express6S
Next generation PCIe Hardware Security
Module (HSM)
Performance improvements up to 2x
Industry leading FIPS 140-2 Level 4
Certification Design
Why is it valuable:
More performance = lower latency + less CPU
overhead for encryption operations
Highest level of protection available for encryption
keys
Industry exclusive “protected key” encryption
27
© 2018 IBM Corporation
28
We have been trying out MQ on z14!
The news is good…
Better scalability
Crypto improvements
Dataset encryption
Storage class memory
I/O performance gains
Improvements in compression via
zEDC
Generally in line with LSPR, but
sometimes much better
© 2018 IBM Corporation
30
Better scalability
Z14 brings:
Faster processors, and more of them
MQ benefits:
Improved scalability – up 11% to 641K
transactions per second
Almost 1.3 million messages per second
Rate doesn’t tail off with increased CPUs
Chart shows non-persistent out of synchpoint
messaging. Buffer pools and pagesets tuned
to minimize contention
When sending messages in synchpoint, z14
continues to scale up to 32 CPUs 30
© 2018 IBM Corporation
31
Crypto improvements: TLS
channels
Z14 brings:
New Crypto Express 6S (CEX6S)
Improved CPACF
TLS channels benefit:
20% cheaper on average over z13
With CEX5S 17-22% faster over z13
With CEX6S there is a further 5-14%
speed gain
Secret key negotiated for every 1MB of
data sent, shows benefits of CPACF and
CEX6S (charts on left)
Secret key negotiated at start up shows
benefits of CPACF only: 28% cheaper, 35%
faster (see performance report)
31
© 2018 IBM Corporation
32
Crypto improvements: AMS
Integrity signs messages (CEX6S)
Privacy signs and encrypts (CEX6S+CPACF)
Confidentiality encrypts + key reuse (CPACF)
Size of message has an effect on numbers
but gains were made across the board
For medium messages:
% change in Integrity Privacy Confide-
ntiality
Transaction
cost
-10 -12 -30
Cost of
protection
-10 -12.25 -40
Throughput +21.3 +18.5 +31.3
32
© 2018 IBM Corporation
34
Storage class memory
Z14 brings: virtual flash memory,
replacing Flash Express cards on
EC12 and later
MQ benefits:
Improved pre-fetch performance
Faster IO access
Two use cases for MQ:
Emergency storage
Tolerate very long getting application
outage
SMDS + message offloading + SCM
Improved performance
Allow long getting application outage
with minimal performance impact
SCM only
34
SCM assumes messages are got in priority
order
VFM performance gains most apparent when not
getting in priority order, e.g. by correlation id
z13 z14 Change
Transaction rate 483 804 +66%
Average read service
time
1285 323 -75%
Average write service
time
414 231 -44%
SCM read per minute 39,000 77,000 +41
SCM delayed 25% 26%
© 2018 IBM Corporation
35
Summary
MQ Advanced for VUE
MQ on z/OS: the most
resilient form of MQ
Hardware integration and z14
Notices and disclaimers
© 2018 International Business Machines Corporation. No part of this
document may be reproduced or transmitted in any form without
written permission from IBM.
U.S. Government Users Restricted Rights — use, duplication or
disclosure restricted by GSA ADP Schedule Contract with IBM.
Information in these presentations (including information relating to
products that have not yet been announced by IBM) has been reviewed
for accuracy as of the date of initial publication and could include
unintentional technical or typographical errors. IBM shall have no
responsibility to update this information. This document is distributed
“as is” without any warranty, either express or implied. In no event,
shall IBM be liable for any damage arising from the use of this
information, including but not limited to, loss of data, business
interruption, loss of profit or loss of opportunity. IBM products and
services are warranted per the terms and conditions of the agreements
under which they are provided.
IBM products are manufactured from new parts or new and used parts.
In some cases, a product may not be new and may have been previously
installed. Regardless, our warranty terms apply.”
Any statements regarding IBM's future direction, intent or product
plans are subject to change or withdrawal without notice.
Performance data contained herein was generally obtained in a
controlled, isolated environments. Customer examples are presented as
illustrations of how those
customers have used IBM products and the results they may have
achieved. Actual performance, cost, savings or other results in other
operating environments may vary.
References in this document to IBM products, programs, or services
does not imply that IBM intends to make such products, programs or
services available in all countries in which IBM operates or does
business.
Workshops, sessions and associated materials may have been prepared
by independent session speakers, and do not necessarily reflect the
views of IBM. All materials and discussions are provided for informational
purposes only, and are neither intended to, nor shall constitute legal or
other guidance or advice to any individual participant or their specific
situation.
It is the customer’s responsibility to insure its own compliance with legal
requirements and to obtain advice of competent legal counsel as to
the identification and interpretation of any relevant laws and regulatory
requirements that may affect the customer’s business and any actions
the customer may need to take to comply with such laws. IBM does not
provide legal advice or represent or warrant that its services or products
will ensure that the customer follows any law.
36
Notices and disclaimers
continued
Information concerning non-IBM products was obtained from the
suppliers of those products, their published announcements or other
publicly available sources. IBM has not tested those products about this
publication and cannot confirm the accuracy of performance,
compatibility or any other claims related to non-IBM products. Questions
on the capabilities of non-IBM products should be addressed to the
suppliers of those products. IBM does not warrant the quality of any
third-party products, or the ability of any such third-party products to
interoperate with IBM’s products. IBM expressly disclaims all
warranties, expressed or implied, including but not limited to, the
implied warranties of merchantability and fitness for a purpose.
The provision of the information contained herein is not intended to, and
does not, grant any right or license under any IBM patents, copyrights,
trademarks or other intellectual property right.
IBM, the IBM logo, ibm.com and [names of other referenced IBM
products and services used in the presentation] are trademarks of
International Business Machines Corporation, registered in many
jurisdictions worldwide. Other product and service names might
be trademarks of IBM or other companies. A current list of IBM
trademarks is available on the Web at "Copyright and trademark
information" at: www.ibm.com/legal/copytrade.shtml.
.
37
Thank you
Matt Leming
Architect, MQ on z/OS
—
lemingma@uk.ibm.com
Helpshape
thefutureof
MQ… ibm.biz/MQ-Customer-Survey
The enterprise differentiator of mq on zos

More Related Content

What's hot

Whats new in MQ V9.1
Whats new in MQ V9.1Whats new in MQ V9.1
Whats new in MQ V9.1David Ware
 
Clusters (Distributed computing)
Clusters (Distributed computing)Clusters (Distributed computing)
Clusters (Distributed computing)Sri Prasanna
 
IBM MQ High Availability 2019
IBM MQ High Availability 2019IBM MQ High Availability 2019
IBM MQ High Availability 2019David Ware
 
MQ Support for z/OS Connect
MQ Support for z/OS ConnectMQ Support for z/OS Connect
MQ Support for z/OS ConnectMatt Leming
 
HHM-3481: IBM MQ for z/OS: Enhancing Application and Messaging Connectivity ...
 HHM-3481: IBM MQ for z/OS: Enhancing Application and Messaging Connectivity ... HHM-3481: IBM MQ for z/OS: Enhancing Application and Messaging Connectivity ...
HHM-3481: IBM MQ for z/OS: Enhancing Application and Messaging Connectivity ...Matt Leming
 
IBM MQ - What's new in 9.2
IBM MQ - What's new in 9.2IBM MQ - What's new in 9.2
IBM MQ - What's new in 9.2David Ware
 
Designing IBM MQ deployments for the cloud generation
Designing IBM MQ deployments for the cloud generationDesigning IBM MQ deployments for the cloud generation
Designing IBM MQ deployments for the cloud generationDavid Ware
 
Interconnect 2017: 6893 Keep out the bad guys by securing your MQ messaging e...
Interconnect 2017: 6893 Keep out the bad guys by securing your MQ messaging e...Interconnect 2017: 6893 Keep out the bad guys by securing your MQ messaging e...
Interconnect 2017: 6893 Keep out the bad guys by securing your MQ messaging e...Robert Parker
 
IBM WebSphere MQ: Using Publish/Subscribe in an MQ Network
IBM WebSphere MQ: Using Publish/Subscribe in an MQ NetworkIBM WebSphere MQ: Using Publish/Subscribe in an MQ Network
IBM WebSphere MQ: Using Publish/Subscribe in an MQ NetworkDavid Ware
 
Interconnect 2017: 6885 Deploying IBM MQ in the cloud
Interconnect 2017: 6885 Deploying IBM MQ in the cloudInterconnect 2017: 6885 Deploying IBM MQ in the cloud
Interconnect 2017: 6885 Deploying IBM MQ in the cloudRobert Parker
 
IBM MQ: Managing Workloads, Scaling and Availability with MQ Clusters
IBM MQ: Managing Workloads, Scaling and Availability with MQ ClustersIBM MQ: Managing Workloads, Scaling and Availability with MQ Clusters
IBM MQ: Managing Workloads, Scaling and Availability with MQ ClustersDavid Ware
 
MQ Infrastructure of Today and Tomorrow
MQ Infrastructure of Today and TomorrowMQ Infrastructure of Today and Tomorrow
MQ Infrastructure of Today and TomorrowProlifics
 
InterConnect 2016: IBM MQ self-service and as-a-service
InterConnect 2016: IBM MQ self-service and as-a-serviceInterConnect 2016: IBM MQ self-service and as-a-service
InterConnect 2016: IBM MQ self-service and as-a-serviceDavid Ware
 
IBM MQ for z/OS The Latest and Greatest Enhancements
IBM MQ for z/OS The Latest and Greatest EnhancementsIBM MQ for z/OS The Latest and Greatest Enhancements
IBM MQ for z/OS The Latest and Greatest EnhancementsPete Siddall
 
CTU 2017 - I168 IBM MQ in the cloud
CTU 2017 - I168 IBM MQ in the cloudCTU 2017 - I168 IBM MQ in the cloud
CTU 2017 - I168 IBM MQ in the cloudRobert Parker
 
Secure Your Messages with IBM MQ Advanced Message Security
Secure Your Messages with IBM MQ Advanced Message SecuritySecure Your Messages with IBM MQ Advanced Message Security
Secure Your Messages with IBM MQ Advanced Message SecurityMorag Hughson
 
New Tools and Interfaces for Managing IBM MQ
New Tools and Interfaces for Managing IBM MQNew Tools and Interfaces for Managing IBM MQ
New Tools and Interfaces for Managing IBM MQMatt Leming
 
IBM MQ CONNAUTH/CHLAUTH Doesn't Work Like You Think it Does (and if you aren'...
IBM MQ CONNAUTH/CHLAUTH Doesn't Work Like You Think it Does (and if you aren'...IBM MQ CONNAUTH/CHLAUTH Doesn't Work Like You Think it Does (and if you aren'...
IBM MQ CONNAUTH/CHLAUTH Doesn't Work Like You Think it Does (and if you aren'...T.Rob Wyatt
 
IBM MQ: Using Publish/Subscribe in an MQ Network
IBM MQ: Using Publish/Subscribe in an MQ NetworkIBM MQ: Using Publish/Subscribe in an MQ Network
IBM MQ: Using Publish/Subscribe in an MQ NetworkDavid Ware
 

What's hot (20)

IBM MQ V9 Overview
IBM MQ V9 OverviewIBM MQ V9 Overview
IBM MQ V9 Overview
 
Whats new in MQ V9.1
Whats new in MQ V9.1Whats new in MQ V9.1
Whats new in MQ V9.1
 
Clusters (Distributed computing)
Clusters (Distributed computing)Clusters (Distributed computing)
Clusters (Distributed computing)
 
IBM MQ High Availability 2019
IBM MQ High Availability 2019IBM MQ High Availability 2019
IBM MQ High Availability 2019
 
MQ Support for z/OS Connect
MQ Support for z/OS ConnectMQ Support for z/OS Connect
MQ Support for z/OS Connect
 
HHM-3481: IBM MQ for z/OS: Enhancing Application and Messaging Connectivity ...
 HHM-3481: IBM MQ for z/OS: Enhancing Application and Messaging Connectivity ... HHM-3481: IBM MQ for z/OS: Enhancing Application and Messaging Connectivity ...
HHM-3481: IBM MQ for z/OS: Enhancing Application and Messaging Connectivity ...
 
IBM MQ - What's new in 9.2
IBM MQ - What's new in 9.2IBM MQ - What's new in 9.2
IBM MQ - What's new in 9.2
 
Designing IBM MQ deployments for the cloud generation
Designing IBM MQ deployments for the cloud generationDesigning IBM MQ deployments for the cloud generation
Designing IBM MQ deployments for the cloud generation
 
Interconnect 2017: 6893 Keep out the bad guys by securing your MQ messaging e...
Interconnect 2017: 6893 Keep out the bad guys by securing your MQ messaging e...Interconnect 2017: 6893 Keep out the bad guys by securing your MQ messaging e...
Interconnect 2017: 6893 Keep out the bad guys by securing your MQ messaging e...
 
IBM WebSphere MQ: Using Publish/Subscribe in an MQ Network
IBM WebSphere MQ: Using Publish/Subscribe in an MQ NetworkIBM WebSphere MQ: Using Publish/Subscribe in an MQ Network
IBM WebSphere MQ: Using Publish/Subscribe in an MQ Network
 
Interconnect 2017: 6885 Deploying IBM MQ in the cloud
Interconnect 2017: 6885 Deploying IBM MQ in the cloudInterconnect 2017: 6885 Deploying IBM MQ in the cloud
Interconnect 2017: 6885 Deploying IBM MQ in the cloud
 
IBM MQ: Managing Workloads, Scaling and Availability with MQ Clusters
IBM MQ: Managing Workloads, Scaling and Availability with MQ ClustersIBM MQ: Managing Workloads, Scaling and Availability with MQ Clusters
IBM MQ: Managing Workloads, Scaling and Availability with MQ Clusters
 
MQ Infrastructure of Today and Tomorrow
MQ Infrastructure of Today and TomorrowMQ Infrastructure of Today and Tomorrow
MQ Infrastructure of Today and Tomorrow
 
InterConnect 2016: IBM MQ self-service and as-a-service
InterConnect 2016: IBM MQ self-service and as-a-serviceInterConnect 2016: IBM MQ self-service and as-a-service
InterConnect 2016: IBM MQ self-service and as-a-service
 
IBM MQ for z/OS The Latest and Greatest Enhancements
IBM MQ for z/OS The Latest and Greatest EnhancementsIBM MQ for z/OS The Latest and Greatest Enhancements
IBM MQ for z/OS The Latest and Greatest Enhancements
 
CTU 2017 - I168 IBM MQ in the cloud
CTU 2017 - I168 IBM MQ in the cloudCTU 2017 - I168 IBM MQ in the cloud
CTU 2017 - I168 IBM MQ in the cloud
 
Secure Your Messages with IBM MQ Advanced Message Security
Secure Your Messages with IBM MQ Advanced Message SecuritySecure Your Messages with IBM MQ Advanced Message Security
Secure Your Messages with IBM MQ Advanced Message Security
 
New Tools and Interfaces for Managing IBM MQ
New Tools and Interfaces for Managing IBM MQNew Tools and Interfaces for Managing IBM MQ
New Tools and Interfaces for Managing IBM MQ
 
IBM MQ CONNAUTH/CHLAUTH Doesn't Work Like You Think it Does (and if you aren'...
IBM MQ CONNAUTH/CHLAUTH Doesn't Work Like You Think it Does (and if you aren'...IBM MQ CONNAUTH/CHLAUTH Doesn't Work Like You Think it Does (and if you aren'...
IBM MQ CONNAUTH/CHLAUTH Doesn't Work Like You Think it Does (and if you aren'...
 
IBM MQ: Using Publish/Subscribe in an MQ Network
IBM MQ: Using Publish/Subscribe in an MQ NetworkIBM MQ: Using Publish/Subscribe in an MQ Network
IBM MQ: Using Publish/Subscribe in an MQ Network
 

Similar to The enterprise differentiator of mq on zos

Running IBM MQ in the Cloud
Running IBM MQ in the CloudRunning IBM MQ in the Cloud
Running IBM MQ in the CloudRobert Parker
 
IBM MQ Advanced - IBM InterConnect 2016
IBM MQ Advanced - IBM InterConnect 2016IBM MQ Advanced - IBM InterConnect 2016
IBM MQ Advanced - IBM InterConnect 2016Leif Davidsen
 
OPC UA Connectivity with InduSoft and the OPC Foundation
OPC UA Connectivity with InduSoft and the OPC FoundationOPC UA Connectivity with InduSoft and the OPC Foundation
OPC UA Connectivity with InduSoft and the OPC FoundationAVEVA
 
Realtime mobile&iot solutions using mqtt and message sight
Realtime mobile&iot solutions using mqtt and message sightRealtime mobile&iot solutions using mqtt and message sight
Realtime mobile&iot solutions using mqtt and message sightfloridawusergroup
 
Cloud models and platforms
Cloud models and platformsCloud models and platforms
Cloud models and platformsPrabhat gangwar
 
IRJET- Single to Multi Cloud Data Security in Cloud Computing
IRJET-  	  Single to Multi Cloud Data Security in Cloud ComputingIRJET-  	  Single to Multi Cloud Data Security in Cloud Computing
IRJET- Single to Multi Cloud Data Security in Cloud ComputingIRJET Journal
 
Cloud Security Best Practices - Part 2
Cloud Security Best Practices - Part 2Cloud Security Best Practices - Part 2
Cloud Security Best Practices - Part 2Cohesive Networks
 
Hybrid messaging webcast: Using the best of both worlds to drive your busines...
Hybrid messaging webcast: Using the best of both worlds to drive your busines...Hybrid messaging webcast: Using the best of both worlds to drive your busines...
Hybrid messaging webcast: Using the best of both worlds to drive your busines...sconaomi
 
Connecting IBM MessageSight to the Enterprise
Connecting IBM MessageSight to the EnterpriseConnecting IBM MessageSight to the Enterprise
Connecting IBM MessageSight to the EnterpriseAndrew Schofield
 
Enhancing Data Security in Cloud Computation Using Addition-Composition Fully...
Enhancing Data Security in Cloud Computation Using Addition-Composition Fully...Enhancing Data Security in Cloud Computation Using Addition-Composition Fully...
Enhancing Data Security in Cloud Computation Using Addition-Composition Fully...Dr. Richard Otieno
 
Cloud Computing Networks
Cloud Computing NetworksCloud Computing Networks
Cloud Computing Networksjayapal385
 
Friendly Technologies- Cloud-Based TR-069 Device Management Suite
Friendly Technologies- Cloud-Based TR-069 Device Management SuiteFriendly Technologies- Cloud-Based TR-069 Device Management Suite
Friendly Technologies- Cloud-Based TR-069 Device Management SuiteFriendly Technologies
 
Module1 Mobile Computing Architecture
Module1 Mobile Computing ArchitectureModule1 Mobile Computing Architecture
Module1 Mobile Computing Architectureraksharao
 
MQ Guide France - What's new in ibm mq 9.1.4
MQ Guide France - What's new in ibm mq 9.1.4MQ Guide France - What's new in ibm mq 9.1.4
MQ Guide France - What's new in ibm mq 9.1.4Robert Parker
 
BYOIDaaS - Automating IAM Infrastructure & Operations
BYOIDaaS - Automating IAM Infrastructure & OperationsBYOIDaaS - Automating IAM Infrastructure & Operations
BYOIDaaS - Automating IAM Infrastructure & OperationsJon Lehtinen
 
cloudintro-lec01.ppt
cloudintro-lec01.pptcloudintro-lec01.ppt
cloudintro-lec01.pptMunmunSaha7
 

Similar to The enterprise differentiator of mq on zos (20)

Running IBM MQ in the Cloud
Running IBM MQ in the CloudRunning IBM MQ in the Cloud
Running IBM MQ in the Cloud
 
IBM MQ Advanced - IBM InterConnect 2016
IBM MQ Advanced - IBM InterConnect 2016IBM MQ Advanced - IBM InterConnect 2016
IBM MQ Advanced - IBM InterConnect 2016
 
OPC UA Connectivity with InduSoft and the OPC Foundation
OPC UA Connectivity with InduSoft and the OPC FoundationOPC UA Connectivity with InduSoft and the OPC Foundation
OPC UA Connectivity with InduSoft and the OPC Foundation
 
Realtime mobile&iot solutions using mqtt and message sight
Realtime mobile&iot solutions using mqtt and message sightRealtime mobile&iot solutions using mqtt and message sight
Realtime mobile&iot solutions using mqtt and message sight
 
Yongsan presentation 2
Yongsan presentation 2Yongsan presentation 2
Yongsan presentation 2
 
Cloud models and platforms
Cloud models and platformsCloud models and platforms
Cloud models and platforms
 
IRJET- Single to Multi Cloud Data Security in Cloud Computing
IRJET-  	  Single to Multi Cloud Data Security in Cloud ComputingIRJET-  	  Single to Multi Cloud Data Security in Cloud Computing
IRJET- Single to Multi Cloud Data Security in Cloud Computing
 
Cloud Security Best Practices - Part 2
Cloud Security Best Practices - Part 2Cloud Security Best Practices - Part 2
Cloud Security Best Practices - Part 2
 
Hybrid messaging webcast: Using the best of both worlds to drive your busines...
Hybrid messaging webcast: Using the best of both worlds to drive your busines...Hybrid messaging webcast: Using the best of both worlds to drive your busines...
Hybrid messaging webcast: Using the best of both worlds to drive your busines...
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Connecting IBM MessageSight to the Enterprise
Connecting IBM MessageSight to the EnterpriseConnecting IBM MessageSight to the Enterprise
Connecting IBM MessageSight to the Enterprise
 
Enhancing Data Security in Cloud Computation Using Addition-Composition Fully...
Enhancing Data Security in Cloud Computation Using Addition-Composition Fully...Enhancing Data Security in Cloud Computation Using Addition-Composition Fully...
Enhancing Data Security in Cloud Computation Using Addition-Composition Fully...
 
Cloud Computing Networks
Cloud Computing NetworksCloud Computing Networks
Cloud Computing Networks
 
Friendly Technologies- Cloud-Based TR-069 Device Management Suite
Friendly Technologies- Cloud-Based TR-069 Device Management SuiteFriendly Technologies- Cloud-Based TR-069 Device Management Suite
Friendly Technologies- Cloud-Based TR-069 Device Management Suite
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Module1 Mobile Computing Architecture
Module1 Mobile Computing ArchitectureModule1 Mobile Computing Architecture
Module1 Mobile Computing Architecture
 
MQ Guide France - What's new in ibm mq 9.1.4
MQ Guide France - What's new in ibm mq 9.1.4MQ Guide France - What's new in ibm mq 9.1.4
MQ Guide France - What's new in ibm mq 9.1.4
 
BYOIDaaS - Automating IAM Infrastructure & Operations
BYOIDaaS - Automating IAM Infrastructure & OperationsBYOIDaaS - Automating IAM Infrastructure & Operations
BYOIDaaS - Automating IAM Infrastructure & Operations
 
cloudintro-lec01.ppt
cloudintro-lec01.pptcloudintro-lec01.ppt
cloudintro-lec01.ppt
 
cloudintro-lec01.ppt
cloudintro-lec01.pptcloudintro-lec01.ppt
cloudintro-lec01.ppt
 

More from Matt Leming

533-MigratingYourMQIApplicationsToJMS.pdf
533-MigratingYourMQIApplicationsToJMS.pdf533-MigratingYourMQIApplicationsToJMS.pdf
533-MigratingYourMQIApplicationsToJMS.pdfMatt Leming
 
IBM MQ Whats new - up to 9.3.4.pptx
IBM MQ Whats new - up to 9.3.4.pptxIBM MQ Whats new - up to 9.3.4.pptx
IBM MQ Whats new - up to 9.3.4.pptxMatt Leming
 
Going Deep with MQ
Going Deep with MQGoing Deep with MQ
Going Deep with MQMatt Leming
 
What's new with MQ on z/OS 9.3 and 9.3.1
What's new with MQ on z/OS 9.3 and 9.3.1What's new with MQ on z/OS 9.3 and 9.3.1
What's new with MQ on z/OS 9.3 and 9.3.1Matt Leming
 
HHM-2833: Where is My Message?: Using IBM MQ Tools to Work Out What Applicati...
HHM-2833: Where is My Message?: Using IBM MQ Tools to Work Out What Applicati...HHM-2833: Where is My Message?: Using IBM MQ Tools to Work Out What Applicati...
HHM-2833: Where is My Message?: Using IBM MQ Tools to Work Out What Applicati...Matt Leming
 
HHM-3540: The IBM MQ Light API: From Developer Laptop to Enterprise Data Cen...
 HHM-3540: The IBM MQ Light API: From Developer Laptop to Enterprise Data Cen... HHM-3540: The IBM MQ Light API: From Developer Laptop to Enterprise Data Cen...
HHM-3540: The IBM MQ Light API: From Developer Laptop to Enterprise Data Cen...Matt Leming
 

More from Matt Leming (6)

533-MigratingYourMQIApplicationsToJMS.pdf
533-MigratingYourMQIApplicationsToJMS.pdf533-MigratingYourMQIApplicationsToJMS.pdf
533-MigratingYourMQIApplicationsToJMS.pdf
 
IBM MQ Whats new - up to 9.3.4.pptx
IBM MQ Whats new - up to 9.3.4.pptxIBM MQ Whats new - up to 9.3.4.pptx
IBM MQ Whats new - up to 9.3.4.pptx
 
Going Deep with MQ
Going Deep with MQGoing Deep with MQ
Going Deep with MQ
 
What's new with MQ on z/OS 9.3 and 9.3.1
What's new with MQ on z/OS 9.3 and 9.3.1What's new with MQ on z/OS 9.3 and 9.3.1
What's new with MQ on z/OS 9.3 and 9.3.1
 
HHM-2833: Where is My Message?: Using IBM MQ Tools to Work Out What Applicati...
HHM-2833: Where is My Message?: Using IBM MQ Tools to Work Out What Applicati...HHM-2833: Where is My Message?: Using IBM MQ Tools to Work Out What Applicati...
HHM-2833: Where is My Message?: Using IBM MQ Tools to Work Out What Applicati...
 
HHM-3540: The IBM MQ Light API: From Developer Laptop to Enterprise Data Cen...
 HHM-3540: The IBM MQ Light API: From Developer Laptop to Enterprise Data Cen... HHM-3540: The IBM MQ Light API: From Developer Laptop to Enterprise Data Cen...
HHM-3540: The IBM MQ Light API: From Developer Laptop to Enterprise Data Cen...
 

Recently uploaded

Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...aditisharan08
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...Christina Lin
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about usDynamic Netsoft
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number SystemsJheuzeDellosa
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfkalichargn70th171
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfjoe51371421
 

Recently uploaded (20)

Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...
 
Exploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the ProcessExploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the Process
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about us
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number Systems
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdf
 

The enterprise differentiator of mq on zos

  • 1. © 2018 IBM Corporation 1 The enterprise differentiator of IBM MQ on z/OS — Matt Leming Architect, MQ on z/OS
  • 2. © 2018 IBM Corporation 2 Contents MQ Advanced for VUE MQ on z/OS: the most resilient form of MQ Hardware integration and z14
  • 4. IBM MQ Advanced for z/OS Value Unit Edition IBM MQ Advanced Message Security for z/OS IBM MQ for z/OS The richest set of z/OS messaging capabilities in a single, simple to deploy offering Connector Pack IBM MQ Managed File Transfer for z/OS IBM MQ Advanced for z/OS Value Unit Edition V9.0.3 onwards Provides end-to-end encryption of message contents to protect sensitive data from all forms of intrusion, attack or accidental disclosure, and with no need for application change Provides reliable, secure and auditable file transfer that reduces the need for manual processes, and management tools that help reduce wasted time when dealing with failure analysis Enables the secure, reliable exchange of business data across applications, systems and services on-premises, in the Cloud, or in Hybrid environments Enables applications and systems to participate in a Blockchain network via MQ, performing CRUD operations on Hyperledger Fabric Blockchain running in IBM Cloud or running locally 4
  • 5. © 2018 IBM Corporation 6 Tight integration with z/OS platform and subsystems Maximum performance, high availability, connectivity and security IBM Z, z/OS and the Parallel Sysplex provide the foundation for IBM MQ on z/OS Create high performance environments able to process millions of messages every second Highly available connectivity with shared storage and automatic recovery Tight integration with key subsystems and consistency with a range of other platforms CICS z/OS IMS Batch Db2 IIB WAS zCEE Queue manager Channel initiator mqweb MQ Clients REST z/OS Java Clients
  • 6. IBM MQ Advanced Message Security for z/OS 7
  • 7. 9 Billion 4% Of the only breached since 2013 were encrypted 3 records $4M Average cost of a data breach in 2016 2 Likelihood of an organization having a data breach in the next 24 months 1 26% “It’s no longer a matter of if, but when …” Health Insurance Portability and Accountability Act (HIPAA) European Union General Data Protection Regulation (GDPR) Payment Card Industry Data Security Standard (PCI-DSS) 1, 2 Source: 2016 Ponemon Cost of Data Breach Study: Global Analysis -- http://www.ibm.com/security/data-breach/ 3 Source: Breach Level Index -- http://breachlevelindex.com/ How do you address data protection and compliance? 8
  • 8. © 2018 IBM Corporation 9 MQ Advanced for z/OS VUE delivers pervasive encryption Protects data at rest, in-flight and in-memory to guarantee privacy of message contents Application B Application A Channels IBM MQ system Queue Manager Queue Manager Apply end-to-end encryption to existing messaging infrastructure easily and with no application changes Authenticate and protect messages across the enterprise making audit simple Reduce time and skills needed to comply with aspects of common security standards Detect and remove rogue messages New confidentiality option for encryption has minimal performance impact Decrypted at destination Encrypted at source
  • 9. IBM MQ Managed File Transfer for z/OS 10
  • 10. © 2018 IBM Corporation 12 Move data and files with MQ Advanced for z/OS VUE Consistent approach to transporting application data and file data as messages How:  File-to-file  File-to-message  Message-to-file MFT Agent: Performs the fundamental file transfer function of sending and receiving files from the local system MFT Service: Installs a file transfer agent on MQ server with additional capabilities Benefits: • Reliability of delivery • Increased security of system and data • Integrated management and recovery Channels MQ Advanced QMs Logging component MFT Agent Application BApplication A MFT Agent Unlimited deployments of MQ MFT Agents when connecting them to MQ Advanced Queue Managers
  • 11. © 2018 IBM Corporation 13 MQ Adv VUE MFT Agent MFT Agent MFT Agent LPAR 1 LPAR 2 File Hub (LPAR 3) Create a “File Hub” using simplified MFT Agent connectivity MFT agents deployed wherever files are to be sourced or delivered No requirement for a local z/OS queue manager - choose where to handle file workload Files transferred across the MQ network between local and remote agents Reduce the number of queue managers required - simplified topology for easier administration
  • 13. Blockchain: holds details of all vehicles for country Manufacturer adds vehicles Recycle/Scrap removes vehicles Dealer: Registers vehicle, updates ownership Importer: adds vehicles Tax Records Tax Due process Send Reminder process Reminder Excise Authority` Query current Owner Modified Hybrid Business Process MQ Blockchain requires connectivity for data sharing Parties in the business network need to exchange data often held in Systems of Record Enable a range of different applications and systems to send updates to a Blockchain network Ensure data integrity following changes to shared assets Transport critical business data securely and reliably …sound familiar? Requirements… 16
  • 14. IBM MQ Bridge for Blockchain IBM MQ Connect to Blockchain with MQ Advanced for z/OS VUE Deploy IBM MQ Bridge for Blockchain to enable applications and systems to participate Bridge allows an MQ application to connect to Hyperledger Fabric Blockchain running in IBM Cloud or running locally Utilise request-reply MQ messages to query information from Blockchain (e.g. what is the value of the balance on this account) Use MQ to drive Create, Read, Update and Delete operations on Blockchain-managed assets No need to understand the ledger-specific APIs, configuration or controls Connection to Queue Manager --------------------------- Queue Manager : [MQ21] Bridge Input Queue : [SYSTEM.BLOCKCHAIN.INPUT.QUEUE] Bridge User Identity Queue : [SYSTEM.BLOCKCHAIN.IDENTITY.QUEUE] MQ Channel : [SYSTEM.DEF.SVRCONN] MQ Conname : [host1.example.com(3714)] Blockchain - User Identification -------------------------------- Blockchain Userid : [WebAppAdmin] Enrollment Secret : []****** Blockchain - Organisation Identification ---------------------------------------- Organisation Name : [PeerOrg1] Certificate Authority servers : [ldn1-zbc5a.2.secure.blockchain.ibm.com:14511] 17
  • 15. © 2018 IBM Corporation 18 Connector Pack also contains 9.0.3: Support for client connections from MFT agents to MQ Advanced for z/OS VUE queue managers running on other LPARs 9.0.4: Support for client connections from Java applications to MQ Advanced for z/OS VUE queue managers running on other LPARs Client mode support for MFT logger in file mode 9.0.5 AMS support for Java applications using client connections MQ Adv VUE JMS Client Java Client LPAR 1 LPAR 2 LPAR 3
  • 16. MQ on z/OS: the most resilient form of MQ
  • 17. © 2018 IBM Corporation 20 IBM Z is most reliable and resilient hardware platform Less than one minute unplanned downtime per server per year 99.999% or greater reliability Baked in from CPU, memory, IO subsystems, cooling, chassis, OS, coupling facility, all the way up to the middleware INCLUDING MQ! http://itic-corp.com/blog/2018/01/ibm-lenovo-top-latest-itic-global-server-hardware-reliability-poll/
  • 18. IBM MQ – resiliency capabilities 21 A layered set of capabilities to build robust and highly available connectivity LOGGING ARCHIVING CLUSTERING DATA SHARING SHARED QUEUES DATA RECOVERY SERVICE HIGH AVAILABILITY SERVICE & DATA HIGH AVAILABILITY IBM MQ records all significant changes to persistent data in a recovery log Enables data recovery after a hardware or software failure MQ for z/OS: Dual logging offers further protection against data loss MQ for z/OS: Logs automatically archived to secondary storage (tape or DASD) Clusters of queue managers provide WLM and high availability of messaging resources resilient to individual server failures Gold standard for resilience on MQ for z/OS: Queue Sharing Groups Queue managers can be members of a queue sharing group with resources held in coupling facilities. Pull workload balancing and automatic peer recovery through shared data access High availability of individual distributed platform queue managers provided by: • Multi-instance queue managers using shared file system • Data replication using appliance HA or RDQM • HA clusters managed using hardware DATA REPLICATION
  • 19. © 2018 IBM Corporation 22 Service high availability: MQ clusters Multiple instances of a named queue can be deployed into a cluster Cluster workload management routine distributes messages between the instances Benefits: Service remains available even if a queue manager fails Workload balancing between instances Most customers operating critical services at scale make use of MQ clustering Up to 1000s of cluster members Available on all supported MQ platforms NB: Failure of a queue manager in the cluster results in its messages being unavailable Client Service Cluster WLM QMGR CLUSQ QMGR CLUSQ QMGR Service
  • 20. © 2018 IBM Corporation 23 Data high availability: shared queues Queue sharing group: set of queue managers with shared object definitions Shared queue: queue where messages are stored in coupling facility structure Messages accessible from any member of queue sharing group Pull based WLM: applications can consume messages at their own speed The most resilient MQ topology Client Queue sharing group QMGR QMGR QMGR Shared queue held in coupling facility structure Service Service Service
  • 21. © 2018 IBM Corporation 24 Resiliency characteristics of shared queues Messages remain available if individual queue managers or LPARs fail Peer recovery for inflight work Applications and queue managers can continue to connect into queue sharing group if individual queue managers or LPARs fail (shared channels) Resilient to structure failure Resilient to coupling facility connectivity failure Resilient to application failure Client Service QUEUE FULL
  • 23. Pervasive encryption with IBM z Systems Enabled through full-stack platform integration 1 Statement of Direction* in the z/OS Announcement Letter (10/4/2016) - http://ibm.co/2ldwKoC 2 IBM z/OS Version 2 Release 3 Preview Announcement Letter (2/21/2017) - http://ibm.co/2l43ctN Broadly protect Linux® file systems and z/OS data sets1 using policy controlled encryption that is transparent to applications and databasesData at Rest Integrated Crypto Hardware Hardware accelerated encryption on every core – CPACF performance improvements of up to 7x Next Gen Crypto Express6S – up to 2x faster than prior generation Protect z/OS Coupling Facility2 data end-to-end, using encryption that’s transparent to applications Clustering Protect network traffic using standards based encryption from end to end, including encryption readiness technology2 to ensure that z/OS systems meet approved encryption criteria Network Secure deployment of software appliances including tamper protection during installation and runtime, restricted administrator access, and encryption of data and code in-flight and at-rest Secure Service Container The IBM Enterprise Key Management Foundation (EKMF) provides real-time, centralized secure management of keys and certificates with a variety of cryptographic devices and key stores. Key Management ****Data in Use Protect MQ data while it is in memory within z/OS, while it is at rest, while it is inflight using MQ Advanced for z/OS VUE based end-to-end encryption that’s transparent to applications 1 0 1 26
  • 24. z14 Integrated Cryptographic Hardware CP Assist for Cryptographic Functions (CPACF) Hardware accelerated encryption on every microprocessor core Performance improvements of up to 7x for selective encryption modes Crypto Express6S Next generation PCIe Hardware Security Module (HSM) Performance improvements up to 2x Industry leading FIPS 140-2 Level 4 Certification Design Why is it valuable: More performance = lower latency + less CPU overhead for encryption operations Highest level of protection available for encryption keys Industry exclusive “protected key” encryption 27
  • 25. © 2018 IBM Corporation 28 We have been trying out MQ on z14! The news is good… Better scalability Crypto improvements Dataset encryption Storage class memory I/O performance gains Improvements in compression via zEDC Generally in line with LSPR, but sometimes much better
  • 26. © 2018 IBM Corporation 30 Better scalability Z14 brings: Faster processors, and more of them MQ benefits: Improved scalability – up 11% to 641K transactions per second Almost 1.3 million messages per second Rate doesn’t tail off with increased CPUs Chart shows non-persistent out of synchpoint messaging. Buffer pools and pagesets tuned to minimize contention When sending messages in synchpoint, z14 continues to scale up to 32 CPUs 30
  • 27. © 2018 IBM Corporation 31 Crypto improvements: TLS channels Z14 brings: New Crypto Express 6S (CEX6S) Improved CPACF TLS channels benefit: 20% cheaper on average over z13 With CEX5S 17-22% faster over z13 With CEX6S there is a further 5-14% speed gain Secret key negotiated for every 1MB of data sent, shows benefits of CPACF and CEX6S (charts on left) Secret key negotiated at start up shows benefits of CPACF only: 28% cheaper, 35% faster (see performance report) 31
  • 28. © 2018 IBM Corporation 32 Crypto improvements: AMS Integrity signs messages (CEX6S) Privacy signs and encrypts (CEX6S+CPACF) Confidentiality encrypts + key reuse (CPACF) Size of message has an effect on numbers but gains were made across the board For medium messages: % change in Integrity Privacy Confide- ntiality Transaction cost -10 -12 -30 Cost of protection -10 -12.25 -40 Throughput +21.3 +18.5 +31.3 32
  • 29. © 2018 IBM Corporation 34 Storage class memory Z14 brings: virtual flash memory, replacing Flash Express cards on EC12 and later MQ benefits: Improved pre-fetch performance Faster IO access Two use cases for MQ: Emergency storage Tolerate very long getting application outage SMDS + message offloading + SCM Improved performance Allow long getting application outage with minimal performance impact SCM only 34 SCM assumes messages are got in priority order VFM performance gains most apparent when not getting in priority order, e.g. by correlation id z13 z14 Change Transaction rate 483 804 +66% Average read service time 1285 323 -75% Average write service time 414 231 -44% SCM read per minute 39,000 77,000 +41 SCM delayed 25% 26%
  • 30. © 2018 IBM Corporation 35 Summary MQ Advanced for VUE MQ on z/OS: the most resilient form of MQ Hardware integration and z14
  • 31. Notices and disclaimers © 2018 International Business Machines Corporation. No part of this document may be reproduced or transmitted in any form without written permission from IBM. U.S. Government Users Restricted Rights — use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM. Information in these presentations (including information relating to products that have not yet been announced by IBM) has been reviewed for accuracy as of the date of initial publication and could include unintentional technical or typographical errors. IBM shall have no responsibility to update this information. This document is distributed “as is” without any warranty, either express or implied. In no event, shall IBM be liable for any damage arising from the use of this information, including but not limited to, loss of data, business interruption, loss of profit or loss of opportunity. IBM products and services are warranted per the terms and conditions of the agreements under which they are provided. IBM products are manufactured from new parts or new and used parts. In some cases, a product may not be new and may have been previously installed. Regardless, our warranty terms apply.” Any statements regarding IBM's future direction, intent or product plans are subject to change or withdrawal without notice. Performance data contained herein was generally obtained in a controlled, isolated environments. Customer examples are presented as illustrations of how those customers have used IBM products and the results they may have achieved. Actual performance, cost, savings or other results in other operating environments may vary. References in this document to IBM products, programs, or services does not imply that IBM intends to make such products, programs or services available in all countries in which IBM operates or does business. Workshops, sessions and associated materials may have been prepared by independent session speakers, and do not necessarily reflect the views of IBM. All materials and discussions are provided for informational purposes only, and are neither intended to, nor shall constitute legal or other guidance or advice to any individual participant or their specific situation. It is the customer’s responsibility to insure its own compliance with legal requirements and to obtain advice of competent legal counsel as to the identification and interpretation of any relevant laws and regulatory requirements that may affect the customer’s business and any actions the customer may need to take to comply with such laws. IBM does not provide legal advice or represent or warrant that its services or products will ensure that the customer follows any law. 36
  • 32. Notices and disclaimers continued Information concerning non-IBM products was obtained from the suppliers of those products, their published announcements or other publicly available sources. IBM has not tested those products about this publication and cannot confirm the accuracy of performance, compatibility or any other claims related to non-IBM products. Questions on the capabilities of non-IBM products should be addressed to the suppliers of those products. IBM does not warrant the quality of any third-party products, or the ability of any such third-party products to interoperate with IBM’s products. IBM expressly disclaims all warranties, expressed or implied, including but not limited to, the implied warranties of merchantability and fitness for a purpose. The provision of the information contained herein is not intended to, and does not, grant any right or license under any IBM patents, copyrights, trademarks or other intellectual property right. IBM, the IBM logo, ibm.com and [names of other referenced IBM products and services used in the presentation] are trademarks of International Business Machines Corporation, registered in many jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the Web at "Copyright and trademark information" at: www.ibm.com/legal/copytrade.shtml. . 37
  • 33. Thank you Matt Leming Architect, MQ on z/OS — lemingma@uk.ibm.com Helpshape thefutureof MQ… ibm.biz/MQ-Customer-Survey

Editor's Notes

  1. Brief details of what makes up MQ Advanced for z/OS VUE and then look at some details of the components – why people should be interested in Adv VUE   IBM MQ for z/OS VUE connects virtually everything, from a simple pair of applications to providing connectivity for the most complex business environments. A single part at a single price for the richest set of z/OS messaging server capabilities   I am going to start at the bottom and work way up MQ VUE – the rock solid message offering that has been the transport foundation for many of the worlds biggest companies for 20+ years. The underlying base messaging offering be it the MQ MLC offering or the MQ VUE has certain characteristics and capabilities that it brings to customers. Firstly – it will allow virtually any type of application to connect together. Separation of the messaging or connection logic from the real application logic allows customers to respond to changes quickly and join together disparate applications more efficiently. Security – Base MQ has a range of security options for making sure the right users are allowed to do the right set operations to our messaging resources as well as encryption while passing data over QM channels. MQ’s security can be further enhanced by adding Advanced Message Security on top of the base MQ offering – but we will discuss that in some more detail later   Reliable – MQ is in use by many of the biggest institutions in the world. It is proven in terms of its reliability and ability to keep customer message data safe with various recovery features to allow a customer peace of mind.   Flexibility – The separation of Messaging logic from business logic means that existing MQ configurations can be updated and re-deployed without having to change code in existing and working MQ applications.   Scalable – MQ has numerous capabilities to allow the MQ infrastructure to change in order to deal with end of day, end of month or seasonal peaks   And finally it is Robust – It is a product that has lived on the front line for running all sorts of business critical applications, many many billions of messages with financial and other high value data passing through MQ infrastructure everyday with little or no unplanned system downtime. MQ AMS on z/OS – provides end 2 end encryption to defend a customer from inadvertent or malicious hacking and exposure of data. It provides the ability to protect your sensitive data with no need for application change.   MQ MFT on z/OS – provides rock solid file transfer on top of your MQ infrastructure. MFT reduces the need for manual processes and provides management tools that help to save time in day to day operations as well in failure scenarios Connector Pack – A new component initially focused on connectivity into Blockchain. CRUD operations performed on IBM Blockchain service running in Bluemix or Hyperledger Fabric running locally
  2. Asynchronous messaging with assured once and once only delivery, best in class for performance and reliability. Natural fit for z/OS platform due to tight integration with key subsystems, transactionality to maintain data integrity and end-to-end security trusted to look after the data as it transitions between producer and consumer. Connectivity – it will allow virtually any type of application to connect together. Separation of the messaging or connection logic from the real application logic allows customers to respond to changes quickly and join together disparate applications more efficiently. Security – Base MQ has a range of security options for making sure the right users are allowed to do the right set operations to our messaging resources as well as encryption while passing data over QM channels. MQ’s security can be further enhanced by adding Advanced Message Security on top of the base MQ offering   Reliable – MQ is in use by many of the biggest institutions in the world. It is proven in terms of its reliability and ability to keep customer message data safe with various recovery features to allow a customer peace of mind.   Flexibility – The separation of Messaging logic from business logic means that existing MQ configurations can be updated and re-deployed without having to change code in existing and working MQ applications.   Scalable – MQ has numerous capabilities to allow the MQ infrastructure to change in order to deal with end of day, end of month or seasonal peaks   Robust – It is a product that has lived on the front line for running all sorts of business critical applications, many many billions of messages with financial and other high value data passing through MQ infrastructure everyday with little or no unplanned system downtime.
  3. The more enterprise becomes hyper-connected, the more potential points of vulnerability exist. Different types of threat exist: ‘Mass-market’ attempts; Targeted attempts Disaffected employees; Errors or poor processes Regulatory compliance – industry specific like PCI-DSS and HIPAA, or more general personal data regulations like GDPR; Internal business directives and audits Significant cost associated with data breaches, not limited to direct costs of lost business/fines, but also reputational and brand damage
  4. MQ provides authentication and authorization services (exploiting LDAP or RACF) to ensure applications and users have appropriate levels of access to data. You can also utilize event messages to identify and address unexpected activity. Data is encrypted over the network using the latest TLS cipherspecs and PKI. Data is encrypted at rest – MQ exploits z/OS System SSL which makes use of CPACF and CryptoExpress cards. MQ Advanced extends this support by encrypting message data itself, this is controlled by policy without any involvement or change in the producing application. The data is never encrypted until it reaches the consuming application with the appropriate private key – in-flight, at rest and in memory across the entire MQ network. Performance overhead is a trade-off for greater security. The new confidentiality policy permits a configurable amount of symmetric key reuse during hops across the MQ network when sending to the same destination – it’s possible to achieve near performance parity with use of TLS alone.
  5. Businesses and their applications use files across their infrastructure to store valuable data Where the data is created is not always where it needs to be consumed Files and file contents need to be moved to deliver value FTP is “free” and ubiquitous, but does have it’s drawbacks: Lack of file checkpoint restart logic may mean you have to start transfers from the beginning if they fail Transfers can terminate without notification or any record of what has happened Corrupt or partial files can be accidentally used by downstream applications Lack of Character Set conversion can be an issue when moving data through disparate platforms Changes to file transfers often require updates to many ftp scripts that are typically scattered across machines and require platform-specific skills to alter It is easy to make errors and introduce inconsistency as well as being time consuming Tracking file transfers from the start of journey to final destination is a difficult proposition
  6. If you’ve already invested in robust, reliable messaging infrastructure, why not use it for file transfers as well. Files can be converted into messages and sent over the MQ network. Capability for applications to consume data in file or message format Benefits from the reliability, security, management and recovery capabilities built into MQ Agents transport files between the local system and MQ, these can be deployed wherever they are needed Combining MFT with AMS results in end-to-end encryption whilst transporting file data
  7. A common topology is to create a “file hub” MFT agents pull files from various APARs and send to a MQ Advanced VUE which handles the file processing workload On z/OS - text files, data sets and GDGs (generation data groups - catalog successive updates or generations of related data) are supported
  8. From it’s roots in cryptocurrency, Blockchain technology is being explored as a means of managing and disseminating information about shared assets between multiple interested parties in a business network. Attractive because it provides provenance and immutability of changes in those assets, and enables parties to be notified and respond to change events. For this Healthcare example, network participants are patients, hospitals, insurers, banks, regulators - all involved in the process of supporting patient health and treatment programs. Different participants are notified when.. A treatment plan is elected, a patient is treated or an outcome is recorded Insurance is required, verified or absent Patient’s credit status is checked or changes Regulatory checks and balances are applied There are many potential uses in various supply chains, provenance of assets (“farm to fork”) and so on.
  9. The Blockchain is only as useful as the data that can be supplied and retrieved. Parties contribute their data from their own systems of record. Following updates made by others in the Blockchain, these may need reflecting in their own systems also. This is a connectivity problem. MQ is perfectly placed to act as the transport for system of record data for all the reasons previously covered – connecting a wide range of applications and systems, providing secure and reliable delivery In this example, existing systems are handling vehicle tax processing, identifying when renewals are required and sending reminders. Other Blockchain participants can help in the process of identifying and contacting the current owner, and can be notified should the tax remain unpaid, triggering downstream processes.
  10. MQ Advanced for z/OS VUE provides a Blockchain connector, specifically designed to make it easy for systems of record to interact with Blockchain via MQ Supports connectivity to Hyperledger Fabric service on IBM Cloud, or instances deployed on-premises Request-response messages can query and retrieve information from Blockchain Applications and systems can drive CRUD operations on shared assets by sending messages to specific queues – ledger specific interfaces are handled by the connector