InterConnect 2015 Session 4156 Twist and Cloud - How customers make CICS dance. Putting CICS into the cloud, is someone actually doing this? Since 2012 CICS TS Version 5 has been introducing and continuously enhancing its capabilities to support a Platform As A Service approach. Join speakers from CICS Technical Sales to hear about their experiences and how their customers gained value from cloud capabilities in CICS.
GSE Nordic 2015 Twist and cloud – How customers make CICS dance. Putting CICS into the cloud, is someone actually doing this? Since 2012 CICS TS Version 5 has been introducing and continuously enhancing its capabilities to support a Platform As A Service approach. Join speakers from CICS Technical Sales to hear about their experiences and how their customers gained value from cloud capabilities in CICS.
Cloud Foundry and OpenStack – Marriage Made in Heaven !Animesh Singh
Cloud Foundry Summit 2014 Presentation: Bring the world's best IaaS to the world's best PaaS, In this talk IBM and Rackspace are going to share their experiences of running Cloud Foundry on OpenStack. The talk will focus on how CloudFoundry and OpenStack complement each other, how they technically integrate using Cloud provider interface (CPI), how could we automate OpenStack setup for Cloud Foundry deployments, and what are some of the best practices for configuring a scalable environment.
GSE Nordic 2015 Twist and cloud – How customers make CICS dance. Putting CICS into the cloud, is someone actually doing this? Since 2012 CICS TS Version 5 has been introducing and continuously enhancing its capabilities to support a Platform As A Service approach. Join speakers from CICS Technical Sales to hear about their experiences and how their customers gained value from cloud capabilities in CICS.
Cloud Foundry and OpenStack – Marriage Made in Heaven !Animesh Singh
Cloud Foundry Summit 2014 Presentation: Bring the world's best IaaS to the world's best PaaS, In this talk IBM and Rackspace are going to share their experiences of running Cloud Foundry on OpenStack. The talk will focus on how CloudFoundry and OpenStack complement each other, how they technically integrate using Cloud provider interface (CPI), how could we automate OpenStack setup for Cloud Foundry deployments, and what are some of the best practices for configuring a scalable environment.
A Bluemix offering built on open-source Docker technology.
Containers technology originated over 20 years ago with web-hosting vendors seeking to optimize the density of websites residing on each server in a datacenter. IBM, Sun, Google made key contributions to those early iterations. More recently, by isolating an application and its dependencies inside a container, Rocket and Cloud Foundry have evolved standards for working with containers within cloud infrastructure. And Dockerhas eliminated the issues that previously resulted in a containerized application working in one environment but not another.
In the context the IBM partnership with Docker, this document provides an overview of IBM Containers as an enterprise-ready solution for using Docker containers.
PureApplication form factors. PureApplication Systems, PureApplication Software, PureApplication on Softlayer, PureApplication on Azure. BlueMix compared with PureApplication.
How Cloud services can help scale your business with speed. The presentation was part of IBM Cloud Innovation Forum India and was presented by Sanjay Siboo Country Manager, IBM GTS Cloud Services India/South Asia
Slides der Präsentation von Gaby Grau, Citrix, am Citrix Day 2014 von Digicomp.
Einfache, schlüsselfertige Cloud-Orchestrierung. CloudPlatform ist die einzige Cloud-Orchestrierungs-Plattform, mit der Sie schnell und einfach eine zukunftsfähige Cloud einrichten können. Die sofort einsatzbereite Lösung basiert auf einer offenen, flexiblen Architektur, die die gesamte Anwendungsauslastung problemlos bewältigt. Diese Lösung können Sie zudem komplett On-Premise in Ihrem Unternehmen einsetzen. Erfahren Sie auch, wie sich die neuste XenDesktop/XenApp-Version einfach in die Cloud-Orchestrierung einbinden lässt.
A Bluemix offering built on open-source Docker technology.
Containers technology originated over 20 years ago with web-hosting vendors seeking to optimize the density of websites residing on each server in a datacenter. IBM, Sun, Google made key contributions to those early iterations. More recently, by isolating an application and its dependencies inside a container, Rocket and Cloud Foundry have evolved standards for working with containers within cloud infrastructure. And Dockerhas eliminated the issues that previously resulted in a containerized application working in one environment but not another.
In the context the IBM partnership with Docker, this document provides an overview of IBM Containers as an enterprise-ready solution for using Docker containers.
PureApplication form factors. PureApplication Systems, PureApplication Software, PureApplication on Softlayer, PureApplication on Azure. BlueMix compared with PureApplication.
How Cloud services can help scale your business with speed. The presentation was part of IBM Cloud Innovation Forum India and was presented by Sanjay Siboo Country Manager, IBM GTS Cloud Services India/South Asia
Slides der Präsentation von Gaby Grau, Citrix, am Citrix Day 2014 von Digicomp.
Einfache, schlüsselfertige Cloud-Orchestrierung. CloudPlatform ist die einzige Cloud-Orchestrierungs-Plattform, mit der Sie schnell und einfach eine zukunftsfähige Cloud einrichten können. Die sofort einsatzbereite Lösung basiert auf einer offenen, flexiblen Architektur, die die gesamte Anwendungsauslastung problemlos bewältigt. Diese Lösung können Sie zudem komplett On-Premise in Ihrem Unternehmen einsetzen. Erfahren Sie auch, wie sich die neuste XenDesktop/XenApp-Version einfach in die Cloud-Orchestrierung einbinden lässt.
S107 5 compelling reasons for using cics in the cloudnick_garrod
GSE Nordic 2015 5 Compelling reasons for using CICS in the cloud. So what does creating a CICS ‘Cloud’ really mean? And what exactly are these new CICS Cloud capabilities? How do these new Applications and Platforms artifacts relate to existing CICS technologies such as programs, transactions and regions? Where do these new Policies fit in? And most importantly, why would you do any of this? What value can you expect to derive from creating a CICS Cloud architecture? If you have ever asked yourself any of those questions, this session will give you five compelling answers. If you ever wondered what the CICS Cloud means in the real world, this session if for you.
GSE Nordic 2015 CICS Java – Beauty and the Beast After giving sessions about Java in the past few years that tell system programmers they should do Java on IBM z Systems and that Java is just like every other language, this session tries to explain why Java is a bit different in operating and handling. We will compare COBOL/PLI/Assembler with Java and provide insight into how the Java technology works on z Systems. Come along if you want to find out the answers to questions such as: Why can't you phase in a Java program? What does the JIT compiler do and how does it work? What is the development process of Java applications? How do I debugging and logging in Java applications?
نقشی که امروزه محققان بازار ایفا میکنند بیش از هر زمان دیگری مهم و حیاتی است. شرکتها باید نیازها و خواستههای مشتریان خود را بشناسند و انجام این کار مستلزم این است که از صنعت تحقیقات بازار کمک بگیرند. محققان بازار نیز برای موفقیت میبایست به طور پیوسته دانش و مهارتهای خود را توسعه داده و به روز کنند. ۷ توصیه و عادتی که در این اسلاید به آنها اشاره خواهد شد، میتواند به محققان بازار در مسیر موفقیت یاری برسانند.
GSE Nordic 2015 Conferece - CICS Opening. CICS TS V5.1 became available at the end of 2012, followed by CICS TS V5.2 in mid 2014. So what does that mean for you? Perhaps you can reduce operational complexity by hosting modern application interface logic inside the Liberty profile server within CICS? Perhaps you can use the new CICS Cloud capabilities to improve application reliability and accelerate deployments? Maybe you can improve your integration with Mobile devices? Or better control your costs though policies and consolidation? Nick and Ian open the CICS track to help you find out how CICS is reinventing mainframe application serving one again. Discover which sessions you should attend to get the most value from your attendance.
4236 What Skills Issue? From the perspective of a Generation z CICS customernick_garrod
InterConnect 2015 session 4236 What Skills Issue? From the perspective of a Generation z CICS customer. There are two types of CICS shops - those who know how to build and nurture new CICS skills for the long term, and those who know how to raise purchase orders for expensive short-term contractors. This session is a view of the former, given from the perspective of a ‘Generation z’ CICS System Programmer working for one of the largest banks in the US. Come to this session to learn the best practices of how to attract, hire, train and retain the best young talent in the business. And as an added bonus you will also learn how the IBM CICS development organization does the same. Expensive short-term contractors need not attend.
InterConnect 2015 Session 3983 CICS Java Real Life Projects. This session will introduce some Projects IBM did with Customers in the last years. These Patterns are generalized and show how other customers can take advantage of the functionality provided by CICS.
This talk, a case study in application deployment models, was given at IBM InterConnect 2017 in Las Vegas, NV on March 21, 2017 by Lin Sun & Phil Estes of IBM Cloud.
In this talk, Lin & Phil provided a background of IBM Bluemix compute offerings across Cloud Foundry, Containers + Kubernetes, and FaaS/serverless via OpenWhisk and then used a demo application to describe the tradeoffs between using the various deployment models and technology. The application is open source and available at https://github.com/estesp/flightassist
How do you deliver your applications to the cloud?Michael Elder
Cloud, Docker, Bluemix, and DevOps. You feel the pressure of a hyper-competitive marketplace, and you want to win. Your goal is to deliver apps to that make your users happy and excited about your brand and products, but how do you do that? In this talk, we'll provide a technical briefing for how you can use a DevOps-enabled toolchain to deliver your apps with speed and reliability to the cloud platform of your choice. We'll review how UrbanCode Deploy can deliver your applications to OpenStack, IBM SoftLayer, Amazon, and VMWare with a consistent and portable Infrastructure-as-a-Service approach; or how you can use Containers and Cloud Foundry for app tiers that change potentially many times a day. Come take a look and ask your questions, and hopefully come away with a game plan to improve your delivery process today.
Cloud computing comes into focus only when you think about what IT always needs: a way to increase capacity or add capabilities on the fly without investing in new infrastructure, training new personnel, or licensing new software. Cloud computing encompasses any subscription-based or pay-per-use service that, in real time over the Internet, extends IT's existing capabilities.
A lecture to the students of the University College Cork 3rd year Undergraduate Computer Science class, CS3311 Middleware module, on the IBM Cloud. The presentation provides a technical overview of the different technologies that can be used to deploy applications on the IBM Cloud (formerly known as IBM Bluemix) - Cloud Foundry applications and services, Docker containers, and Kubernetes clusters.
IBM Hybrid Cloud Integration UCC Talk, 21st November 2018Michael O'Sullivan
A lecture to the students of the University College Cork 3rd year Undergraduate Computer Science class, CS3311 (Middleware) module, and MSc Computer Science class, CS6312 (Mobile Devices and Systems) on IBM Hybrid Cloud. The presentation provides a brief overview of the different technologies that can be used to deploy applications on the IBM Cloud (formerly known as IBM Bluemix) - Cloud Foundry applications and services, Docker containers, and Kubernetes clusters. Following, the presentation focuses in on the Hybrid Cloud model, looking at Hybrid Cloud architectures, integration between on-prem, private, and public cloud services, API Economy, and finally, IBM API Connect as one IBM Hybrid Cloud Solution.
Acknowledgements to my team lead Sanjay Nayak for assisting in preparing some of the content used in this presentation that we have built and delivered together over the last few years, and Christopher Phillips for inspiration on topics to discuss.
This presentation is about -
Based on as a service model,
• SAAS (Software as a service),
• PAAS (Platform as a service),
• IAAS (Infrastructure as a service,
Based on deployment or access model,
• Public Cloud,
• Private Cloud,
• Hybrid Cloud,
For more details you can visit -
http://vibranttechnologies.co.in/salesforce-classes-in-mumbai.html
“My systems work perfectly—it’s the applications that are the problem!” If you have ever said (or thought) that, then this session is for you. Outages do not have to be "an application issue" anymore. In CICS TS 5, new policy-based capabilities allow you to set thresholds on the resources that your applications are allowed to consume. Rogue applications can be detected through various task threshold policies, such as excessive file or database access, repetitive program links, or abnormal storage requests. Once detected, you have the ability to notify, to react, or to ABEND. There’s a new sheriff in town, and it’s you. Come to this session to learn how to exercise your new power wisely.
GSE Nordic 2015 CICS Connectivity in DevOps The business driver behind adopting a DevOps approach to developing software, is the need to deliver applications to the market faster, with lower costs and higher quality. With CICS Transaction Server providing the core services on which many of these applications rely, the importance of being able to connect to CICS and reuse these core services continues to increase. When CICS introduced native Web services about a decade ago, SOA became a reality for CICS customers. Today, many customers are doing tens of millions of SOAP based CICS Web services per day. Some are doing much more. But SOAP based CICS Web services are only a part of the CICS connectivity story. Support for the REST architectural style in CICS is an increasingly popular alternative to SOAP. And JSON is a popular alternative to XML for many application use cases. In this session, we will explore the different CICS connectivity options, suggest use-cases in which they can be of most value, and most importantly, learn which is the right tool for the job.
GSE Nordic 2015 Liberty, Egality, Fraternity “Liberté, Égalité, Fraternité” (Liberty, Equality, Fraternity), is the slogan of France, coined around the time of the French Revolution. It also seems a pretty appropriate slogan for the mini revolution that is happening right now with CICS and WebSphere. The Liberty profile is a highly composable and dynamic application server runtime environment that is shipped as a part of both WebSphere and CICS. This session will introduce Liberty in CICS, compare the capability with WebSphere (note the ‘equality’ word) and discuss how these new Liberty applications can interact with and support the established fraternity of existing CICS applications that run your core business.
S108 - 1 Billion Smartphones a year and counting – How is your CICS connected?nick_garrod
GSE Nordic 2015 1 Billion Smartphones a year and counting – How is your CICS connected? According to IDC, in 2013 “the worldwide smartphone market reached yet another milestone, having shipped one billion units in a single year for the first time”. This was an increase of almost 40% over 2012. If much of your business runs on CICS, you have probably already exposed at least some your CICS applications to the mobile world. But are you exposing these services in the optimal way for your company? Come to this session to discover what the supported options are for mobile exploitation in CICS Transaction Server, CICS Transaction Gateway and z/OS Connect. This session will compare and contrast the options available, so you can understand what is right for you. It will also discuss how you can use IBM MobileFirst with CICS TS to optimize your mobile deployments. Make sure your phone is on silent – you won’t want to be disturbed in this session.
S106 using ibm urban code deploy to deliver your apps to cicsnick_garrod
GSE Nordic 2015 Using IBM UrbanCode Deploy to deliver your apps to CICS. Deploying applications to CICS can be tricky, and you may be struggling to figure out how to handle the many new zFS artifacts such as cloud, bundles, Java, and web services. This could even be slowing down the adoption of new technologies that could deliver the solutions your business needs. This session will introduce IBM UrbanCode Deploy as a tool to automate many types of application deployments through your environments. It can provide rapid feedback and continuous delivery in agile development while providing the audit trails, versioning and approvals needed in production. See the new z/OS and CICS TS plug-ins for UrbanCode Deploy in action to deploy COBOL, web services, and Java applications to CICS in a single action.
GSE Nordic 2015 CICS Performance and Consolidation The CICS TS V5 releases introduce a number of runtime enhancements to reduce CPU usage, improve response times, reduce resource usage, while providing additional insight into transaction performance. Come along to this session as we explore some of the newer performance benefits found in CICS TS and how savings can translate to your environment. We will also look at a lab benchmark that consolidated CICS regions, maintaining throughput, saving significant MIPS, and reducing the management overhead.
GSE Nordic 2015 CICS Cloud and DevOps agility2 Creating a CICS cloud can provide a step change in agility. Add DevOps to the equation and it’s more like a quantum leap. Imagine if the latest CICS DevOps technology could fully automate the reliable and repeatable deployment of CICS applications through the entire lifecycle. Imagine a fully automated build environment for any style of CICS application. With common scripting languages and tools to create a continuous deployment model. Or imagine using a tool like IBM UrbanCode Deploy to provision any type of CICS application, in coordination with other application and database components in a single action. Better still, don’t try and imagine it. Attend this session and see it for yourself.
S102 cics the future is closer abridgednick_garrod
GSE Nordic 2015 - Future of CICS is closer than you think. There is a lot going on behind that mysterious curtain. Recently, the CICS development organization has adopted a new practice called ‘IBM Design Thinking’, which will forever change the way CICS products are developed. The core principle of this approach is to make sure we get as much feedback as possible on our future ideas. This is a quite unique opportunity to participate in a discussion regarding the future of IBM CICS technology. We will be sharing our views. And we will be hoping for lots for interactive feedback. Please don’t be shy!
“Liberté, Égalité, Fraternité” (Liberty, Equality, Fraternity), is the slogan of France, coined around the time of the French Revolution. It also seems a pretty appropriate slogan for the mini revolution that is happening right now with CICS and WebSphere. The Liberty profile is a highly composable and dynamic application server runtime environment that is shipped as a part of both WebSphere and CICS. This session will introduce Liberty in CICS, compare the capability with WebSphere (note the ‘equality’ word) and discuss how these new Liberty applications can interact with and support the established fraternity of existing CICS applications that run your core business.
When CICS Transaction Server introduced native Web services about a decade ago, SOA became a reality for CICS customers. Today, many customers are doing tens of millions of SOAP based CICS Web services per day. Some are doing much more. But SOAP based CICS Web services are only a part of the SOA story. Support for the REST architectural style in CICS is an increasingly popular alternative to SOAP. And JSON is a popular alternative to XML for many application use cases. Additionally, there have been a great many enhancements to both these SOA styles in recent years. Come to this session to get up to speed on the evolution of these technologies. And most importantly, learn which is the right tool for the job.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
2. Agenda
• What is a cloud?
• How CICS does cloud
• How 3 customers really want to use this
2
3. What does Cloud mean
• No cloud in hell…
Comic Source: Webpal.net
4. What is Cloud Computing?
NIST Definition :
• Cloud computing is a model for enabling ubiquitous, convenient, on-demand network
access to
• a shared pool of configurable computing resources (e.g., networks, servers, storage,
applications, and services)
- that can be rapidly provisioned and released
- with minimal management effort or service provider interaction
• composed of 5 essential characteristics, 3 service models, 4 deployment models.
Pool resources and virtualize them
Standardize Services so they can run there
>> Service provided on-demand via Automation,
>> on increasing Demand assign additional resources from the pool (elastic Scaling)
= Cost
++ FlexibilityVIRTUALIZATION STANDARDIZATION AUTOMATION
5. Rapid elasticity
Broad network access
Resource pooling
Measured service
On-demand self-service
5 Characteristics
Private cloud
Public cloud
Hybrid cloud
Community cloud
4 Deployment Models
http://csrc.nist.gov/publications/nistpubs/80
0-145/SP800-145.pdf
Cloud - Deployment, Service, Characteristics
Software as a Service
(SaaS)
Platform as a Service
(PaaS)
Infrastructure as a Service
(IaaS)
3 Service Models
8. Tag, Track &
Time to pay
only for what
you used
TT
Tub (Pool) of resources
TT Workload-dependent,
elastic scalingWW
Interfaces over
the InternetII
Self-Sevice
On DemandSS
9. Mass production vs. high customization
• Fixed images with Compute, storage, database
services …
• “mass” production – one/ few images fit all
• Reusable patterns
• Extremely customizable >> value proposition
• no Blueprints delivered – customer must create own
master image
• Break down image to middleware (CICS, SAP, IMS TM,
WebSphere, …)
Amazon, Linux, … z/OS
Source: www.youtube.com/watch?v=jOhbTAU4OPI#!
10. Glenn Anderson: With z/OS, we need to think
about cloud just a bit differently…..
• Today in cloud environments on distributed servers, or even with Linux
on System z, installations would provision a virtual machine with an
instance of an operating system to run a single workload. To deploy
another workload would mean another virtual machine with another
instance of the operating system.
• However, in the context of z/OS, this methodology goes against
everything we have come to know and expect about z/OS.
On z/OS, you have the ability to
- run multiple disparate workloads
- with different service levels
- for those hosted workloads
- with isolation or multi-tenancy.
• Hence the approach for cloud on z/OS is not focusing on the provisioning
of operating system instances, but rather the ability to provision multiple
workloads in a single z/OS instance.
11.
12. Stage 1: Create a platform
Simple layer of abstraction to decouple
applications from the underlying complexities of a
CICS topology
Consists of Region Types
- logical grouping collecting CICS regions with
common characteristics
- enables them to be managed as a unit in a
platform
- Created: define a region type & set up new
CICS region definitions
- Adopted: adopt existing CICS system group
(CSYSGRP) as region type with its existing
CICS regions
Terminal Owning
Region (TOR)
Production Payroll
14. Stage 2: Create an application and application entry points
package CICS application in
Application bundle
Deploy > manage > monitor
as single entity across
multiple regions in platform
Application entry points
–identify resources as access
points to Application
–control users' access to different
Application versions
Bind application to platform
for additional characteristics
15. Stage 3: Add resources for the application
Transfer responsibility for creating,
installing, managing resources
Don't modify resources individually
(use CICS Bundle/Application
operations)
Application architects: carefully
consider which resources to tie to
CICS Bundle lifecycle
Specify resource separately and
declare as import (dependency) if
resource
–cannot be defined in a CICS bundle
–has different lifecycle
–should not be private (only LIB &
PROGRAM)
17. Bundle your resources > get Application Context
Create a CICS Bundle
to keep your resources
together
Consider as a vehicle to get
them into (and out of) CICS A CICS Application can
contain several CICS
Bundles
19. About Entry Points
PROGRAM that tasks call to access
application
–Program not required in this bundle
URIMAP* resources providing URIs for
requesters to access application
–Unique name (still) required
–Must be contained in same bundle
–Access for Liberty, HTTP, MQ
Application context data if entry point passed
Operation =
FrontDoor
22. Where else can Bundles be deployed
Bundle in
Application Bundle in
Binding
Bundle in
Platform
23. Transaction * Program *File ** Library *
OSGi Bundle JVM Server ** Pipeline **TCP/IP Service **
URI map *
Web service **
Event (Application or System)
Atom feed
XML-based service
Channel-based service
* CICS 5.1 | ** CICS 5.2
CICS Bundle Resources
25. German Insurance
• Hurray, we can finally bundle together Java OSGi Bundles and
their corresponding Program Definitions! Because for the rest
we use autoinstall…
25
Program *
OSGi Bundle
URI map *
JVM Server **
TCP/IP Service **
26. New packaging options
+ Library
+ Program
+ URI map
+ Transaction
+ File
+ OSGi Bundle
+ Program
+ URI map
+ JVM Server
+ TCP/IP Service
Within Bundle
Within
Binding
Classic
CEDA
Within
Platform
27. Web Services Lifecycle
Define both inbound and outbound web
services
Import WSBind file
Import WSDL file
Generate URIMAP resource
All configuration managed within the
CICS bundle lifecycle
Resources can be life-cycled with
Application, Binding or Platform as
appropriate
German Building Association:
Great, we don’t use the PIPELINE
SCAN mechanism to generate the
URIMAP anyway, now we can
bundle resources
German Building Association:
Great, we don’t use the PIPELINE
SCAN mechanism to generate the
URIMAP anyway, now we can
bundle resources
28. Stage 4: Add a policy
XML definition
Rules to describe controls or
actions
For one or more application tasks
Threshold conditions to manage
behaviour of user tasks
e.g. define a threshold for the
amount of storage allocated by a
user task, and make CICS issue
a message if the threshold is
exceeded
29. So far:
Combination of IBM, ISV
and self-written tools
Without application hard to
tell what individual
resources do
Trans exceeding
Threshold
Control application
behaviour
Avoid runaway &
loosing money
Policies to control
31. Stage 5: Remove the application from the platform
Complete lifecycle by removing application from platform
>> unavailable, disable, discard
Removal of individual versions possible
33. Multi-versioning Update
Application A 1.0.0
PROGRAM P
PROGRAM S
PROGRAM E1
Platform M
Region R
EXEC CICS LINK PROGRAM(E1)
single version
application: private
resources declared as
application entry points
become public
resources when
application entry point is
made available.
34. Version 1.0.1 INSTALL & ENABLE
Platform M
Application A 1.0.1
PROGRAM P’
PROGRAM E1
Region R
PROGRAM S
Application A 1.0.0
PROGRAM P
PROGRAM E1
EXEC CICS LINK PROGRAM(E1)
35. Version 1.0.1 AVAILABLE
Platform M
Application A 1.0.0
PROGRAM P
Application A 1.0.1
PROGRAM P’
PROGRAM E1
PROGRAM E1
Region R
PROGRAM S
EXEC CICS LINK PROGRAM(E1)
multi-version
application: entry point
of highest version
application public,
others private
36. Version 1.0.1 UNAVAILABLE
Platform M
Application A 1.0.1
PROGRAM P’
PROGRAM E1
Region R
PROGRAM S
Application A 1.0.0
PROGRAM P
PROGRAM E1
EXEC CICS LINK PROGRAM(E1)
UNAVAILABLE
37. Application
• Generated from xCobol
• Current versioning in
generated file names
• No entity, only few can
tell from entry module
what’s behind
• Wholistic approach
• 3 major releases/
year
• 6-8 weeks testing
block before release
for everyone
• Include Bundle
generation in that process
• Have application as entity
and bundles as
encapsulated modules
• Individually upgrade and
test bundles – also in
parallel to old version
• Allows continuous,
parallel testing for
dedicated users
38. Developer chooses
Platform M
Application A 1.1.1
PROGRAM P
Application A 1.1.2
PROGRAM P’
PROGRAM E1 PROGRAM E1
Region R
PROGRAM R
EXEC CICS INVOKE APPLICATION(A) OPERATION(op1)
MAJORVERSION(1) MINORVERSION(1) EXACTMATCH
Application A 1.2.1
PROGRAM P’’
PROGRAM E1
op1 op1
op1
Will pick highest bug fix automatically, so 1.1.1 hidden
EXACTMATCH: exactly 1.1
MINIMUM: at least 1.1
39. Platform
• Developer platform on RD&T for Compile
• Test on RD&T or Host – have complete image that can be
restored or reset to old version for regression test
• Not possible on mainframe, no self service …
• Also test against different patch levels
• Production: multi-versioning enables testing there as well for
dedicated users, 1-click rollback essential
• Services
• TQF (Technical cross section functions) with date inquiry,
RACF interface, data access & locking etc.
• Web Service architecture
39
41. CICS Development Scenario
Mainframe System
Services
REST
Interface
Web
UI
• Goals
easily create new JVM servers for Developers
Developers should get an Environment on
which they can work independent
No need to know the mainframe parts
• Rest Interface, for other systems to access functionality
Automatic creation of platforms and JVM servers for new users
Possibility for a continuous integration server to deal with deploys and
compiles
• Web UI
Easy way for non mainframe developers to get a new JVM server on the fly
Admin in the development department (not System programmer) can manage
all developer-specific use cases on the mainframe
42. Technical Overview
CICS Liberty
PL/1
REST Services
Web UI
RDZ
Test Deployment,
Test PL/1 Compile
CI Server
Deployment, Staging
Job submit
Mainframe System
Services
Admin
Deployment Overview,
Server Overview, …
Developer
Sandbox management
My Servers, My
Applications
44. • Multi platforms – 1 region
• Incremental implementation of requirements
• Was always dependent on a completed release to start
working, even though new requirements kept coming in – had
to wait and was always the „Fool of the Nation“
• Decouple development and specify explicit dependencies
• Old versions can still run in parallel
• „You can use something without the fear that something else
does not work any more. And if somebody is faster, he/she
does not have to wait for the rest any more.“
• „We need this system really really urgent.“
44
47. Server consolidation
Platform M
Application A
PROGRAM HELLO
Application B
PROGRAM HELLO PROGRAM HELLO
PROGRAM E PROGRAM F PROGRAM G
Region R
resource name does not
have to be unique any more
> private search path
HOMELIB
SYSA.SOME.LOAD
OTHERLIB
SYSA.OTHER.LOAD
DFHRPL
48. 1. Non-unique program names
2. Individual load libs instead of
just one common in RPL
3. Cleanup everything by
discarding the bundle
4. Let students deploy as
application in one go (little
checkmark)
1. Non-unique program names
2. Individual load libs instead of
just one common in RPL
3. Cleanup everything by
discarding the bundle
4. Let students deploy as
application in one go (little
checkmark)
50. Thank You
Your Feedback is
Important!
Access the InterConnect 2015
Conference CONNECT Attendee
Portal to complete your session
surveys from your smartphone,
laptop or conference kiosk.
Editor's Notes
NIST: Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. This cloud model is composed of five essential characteristics, three service models, and four deployment models.
IaaS: Server, Storage, Datenbank
PaaS: deploy Applications, Applikationsentwicklung und Testing / kurzfristigen Bereitstellung von Hardware inkl. deren Konfiguration mit den benötigten Images (Betriebssystem, Application Server, Datenbank)
SaaS: ERP, CRM, SCM, Communication&Collaboration
V4
Event Processing
Atom
Java/OSGi
V5.1
LIBRARY
POLICY
PROGRAM
TRANSACTION
URIMAP
V5.2
TCPIPSERVICE
JVMSERVER (including Liberty)
FILE (recoverable & unrecoverable)
WEBSERVICE, PIPELINE