Möt dagens utmaningar genom en robust integrationsplatform.
Läs mer om integration på länkarna: Informationsintegrering (http://www-03.ibm.com/software/products/sv/category/SWP00) respektive konnektivitet & integration (http://www-03.ibm.com/software/products/sv/category/SW666)
Presentation from IBM InterConnect 2015:
Mobile devices are increasingly ubiquitous and are the preferred, or in some cases the only, way we wish to interact as a consumer or employee. We now live in a world where we are often connected to the Internet in an "always-on" culture where receiving information or events is both valuable and acceptable. IBM MessageSight helps connect mobile platforms and devices to existing systems of record to enhance the way we involve our customers for improved experience and hence better outcomes. In this session, we explore how to use MessageSight to integrate with systems of record exposed using both IBM Integration Bus and WebSphere Application Server to allow bi-directional, event-driven communication to the mobile application.
The Power of Two: Using IBM Standards Processing Engine for EDI Commerce or H...Brian Wilson
This is a presentation covering IBM's newest platform to handle standards processing, with current support for EDI X12 and EDIFACT, as well as HIPAA, within the IBM Integration Bus enterprise service bus offering.
Presentation from IBM InterConnect 2015:
Mobile devices are increasingly ubiquitous and are the preferred, or in some cases the only, way we wish to interact as a consumer or employee. We now live in a world where we are often connected to the Internet in an "always-on" culture where receiving information or events is both valuable and acceptable. IBM MessageSight helps connect mobile platforms and devices to existing systems of record to enhance the way we involve our customers for improved experience and hence better outcomes. In this session, we explore how to use MessageSight to integrate with systems of record exposed using both IBM Integration Bus and WebSphere Application Server to allow bi-directional, event-driven communication to the mobile application.
The Power of Two: Using IBM Standards Processing Engine for EDI Commerce or H...Brian Wilson
This is a presentation covering IBM's newest platform to handle standards processing, with current support for EDI X12 and EDIFACT, as well as HIPAA, within the IBM Integration Bus enterprise service bus offering.
Come and learn how to easily connect IBM MessageSight to your enterprise systems to get the full benefits from the Internet of Things and Mobile. We'll cover connecting to IBM Integration Bus (IIB), MQ, Application Servers, and analytics with InfoSphere Streams.
IBM DataPower Gateway appliances are used in a variety of user scenarios to enable security, control, integration and optimized access for a range of workloads including Mobile, Web, API, B2B, Web Services and SOA. This presentation from the IBM DataPower team provides an in-depth look at each use case.
IBM WebSphere DataPower B2B Appliance XB62 -
Increase the speed and reliability by centralizing and consolidating business- to-business (B2B) trading-partner connectivity with a purpose-built, DMZ-ready B2B Gateway. http://ibm.co/HV0tNx
This Document contains the Case Study of SURE! Unified Communications. SURE! is a Magnaquest product. SURE! is an end-to-end Subscription Lifecycle Management Platform from Magnaquest. SURE! supports different domains like Cloud (IaaS, SaaS, Unified Communication) Broadband (FTTX, WiMAX, Wi-Fi, Cable, ADSL) , Dual Play, Triple Play Telecom, MVNO & M2M, Pay TV (Cable, DTH, DTT, Broadcaster, IPTV, OTT) and Home Utilities. SURE! has been redefining and catalyzing ROI of our clients, spread globally, in verticals like Media & Entertainment, Broadband and Cloud businesses, with a product suite spanning Billing and Revenue Management, CRM, Session Control, OSS and Campaign management.
Datasheet: WebSphere DataPower Service Gateway XG45Sarah Duffy
WebSphere DataPower Service Gateway XG45 is built for web services deployments, governance, light integrations and hardened security. http://ibm.co/HIHOAs
Thinking about SDN and whether it is the right approach for your organization?Cisco Canada
Thinking about SDN and whether it is the right approach for your organization? Have you heard about Cisco’s Application Centric Infrastructure and F5 Synthesis yet? The path to radically simplify and accelerate application deployment and datacenter agility can be a phased approach that leverages your existing investment. Rapid delivery of applications to anyone, anywhere, at any time is complex—and many businesses struggle with it.
Understanding the cloud computing stackSatish Chavan
Understanding the cloud computing stack
Introduction
Key characteristics
At Glance
Standardization, Migration &Adaptation
Service models
Deployment models
Network as a Service
Software as a Service (SaaS).
Platform as a Service (PaaS).
Infrastructure as a Service (IaaS).
Communications as a Service (CaaS)
Data as a Service - DaaS
Benefits & Challenges
Security Risks & Challenges
Cloud Vendors
Introduction to Microsoft Integration TechnologiesBizTalk360
This presentation is from the TechMeet360 event held on August 6, 2016 at BizTalk360 office premises in Coimbatore. In this slide, BizTalk360's Technical Lead Arunkumar Kumaresan gives Introduction to Microsoft Integration Technologies which is especially helpful for budding technologists who would like to make their career with Integration platform. This presentation covers basic introduction to Enterprise Application Integration (EAI), Service Bus, Logic Apps, Cloud Integration, Azure loT Event Hub, Microsoft Integration Scenarios, Biztalk Services and Jet Architecture (Event Driven / Microservices)
(ENT307) AWS Direct Connect Solutions and Network Automation | AWS re:Invent ...Amazon Web Services
As an AWS Direct Connect partner, Level 3 Communications delivers the ability to establish rapid, flexible and private connectivity from your on-premises environment to AWS for increased control and performance. This session covers enterprise use cases related to disaster recovery and migration from on-premises environments to the cloud. The session also addresses best practices and considerations for designing your architecture to include multiple virtual private clouds and global deployments with AWS Direct Connect. Sponsored by Level 3 Communications.
Come and learn how to easily connect IBM MessageSight to your enterprise systems to get the full benefits from the Internet of Things and Mobile. We'll cover connecting to IBM Integration Bus (IIB), MQ, Application Servers, and analytics with InfoSphere Streams.
IBM DataPower Gateway appliances are used in a variety of user scenarios to enable security, control, integration and optimized access for a range of workloads including Mobile, Web, API, B2B, Web Services and SOA. This presentation from the IBM DataPower team provides an in-depth look at each use case.
IBM WebSphere DataPower B2B Appliance XB62 -
Increase the speed and reliability by centralizing and consolidating business- to-business (B2B) trading-partner connectivity with a purpose-built, DMZ-ready B2B Gateway. http://ibm.co/HV0tNx
This Document contains the Case Study of SURE! Unified Communications. SURE! is a Magnaquest product. SURE! is an end-to-end Subscription Lifecycle Management Platform from Magnaquest. SURE! supports different domains like Cloud (IaaS, SaaS, Unified Communication) Broadband (FTTX, WiMAX, Wi-Fi, Cable, ADSL) , Dual Play, Triple Play Telecom, MVNO & M2M, Pay TV (Cable, DTH, DTT, Broadcaster, IPTV, OTT) and Home Utilities. SURE! has been redefining and catalyzing ROI of our clients, spread globally, in verticals like Media & Entertainment, Broadband and Cloud businesses, with a product suite spanning Billing and Revenue Management, CRM, Session Control, OSS and Campaign management.
Datasheet: WebSphere DataPower Service Gateway XG45Sarah Duffy
WebSphere DataPower Service Gateway XG45 is built for web services deployments, governance, light integrations and hardened security. http://ibm.co/HIHOAs
Thinking about SDN and whether it is the right approach for your organization?Cisco Canada
Thinking about SDN and whether it is the right approach for your organization? Have you heard about Cisco’s Application Centric Infrastructure and F5 Synthesis yet? The path to radically simplify and accelerate application deployment and datacenter agility can be a phased approach that leverages your existing investment. Rapid delivery of applications to anyone, anywhere, at any time is complex—and many businesses struggle with it.
Understanding the cloud computing stackSatish Chavan
Understanding the cloud computing stack
Introduction
Key characteristics
At Glance
Standardization, Migration &Adaptation
Service models
Deployment models
Network as a Service
Software as a Service (SaaS).
Platform as a Service (PaaS).
Infrastructure as a Service (IaaS).
Communications as a Service (CaaS)
Data as a Service - DaaS
Benefits & Challenges
Security Risks & Challenges
Cloud Vendors
Introduction to Microsoft Integration TechnologiesBizTalk360
This presentation is from the TechMeet360 event held on August 6, 2016 at BizTalk360 office premises in Coimbatore. In this slide, BizTalk360's Technical Lead Arunkumar Kumaresan gives Introduction to Microsoft Integration Technologies which is especially helpful for budding technologists who would like to make their career with Integration platform. This presentation covers basic introduction to Enterprise Application Integration (EAI), Service Bus, Logic Apps, Cloud Integration, Azure loT Event Hub, Microsoft Integration Scenarios, Biztalk Services and Jet Architecture (Event Driven / Microservices)
(ENT307) AWS Direct Connect Solutions and Network Automation | AWS re:Invent ...Amazon Web Services
As an AWS Direct Connect partner, Level 3 Communications delivers the ability to establish rapid, flexible and private connectivity from your on-premises environment to AWS for increased control and performance. This session covers enterprise use cases related to disaster recovery and migration from on-premises environments to the cloud. The session also addresses best practices and considerations for designing your architecture to include multiple virtual private clouds and global deployments with AWS Direct Connect. Sponsored by Level 3 Communications.
Introduction
Cloud computing is the delivery of computing services—servers, storage, databases, networking, software, analytics and more—over the Internet (“the cloud”).
It is a paradigm that allows on-demand network access to shared computing resources. A model for managing, storing and processing data online via the internet.
An educational overview of the Cloud Computing Ecosystem or Framework. This presentation is geared toward those who are just beginning to understand Cloud Computing.
DEVNET-1132 Create B2B Exchanges with Cisco Connected ProcessesCisco DevNet
The opportunity cost of business disruptions in the hyper-connected world can be very high. To ensure business continuity and optimization, organizations are automating many critical workflows and infrastructure operations throughout their enterprise and extended ecosystems. Cisco Connected Processes software enable architects, application developers and integration professionals to deliver business processes and automation as a service, while managing workflows and data more efficiently and effectively. Join this session to learn how scalable operational efficiencies can save you time and money while simplifying collaboration between all the members of your technical community.
Explore the symbiotic alliance of AI and Cloud Computing, delivering unparalleled computational power, cost-efficiency, and transformative applications. Unleash innovation, scalability, and efficiency with this dynamic technological fusion.
An Agile Ambulance Service Provider Upgrades its Online Network with Smart VP...TataTeleBusinessServ1
To manage its medical transportation services from any location, the company had subscribed to Genesys and AWS Cloud platforms. However, it was only using public internet services provided by different telecom vendors to connect to these Cloud platforms. The employees did not have privatised access to the Cloud, and the usage of applications was vulnerable to weaknesses in the core data connection.
It was essential to get over such vagaries by upgrading to a private MPLS-based network. They also wanted the private network to have certain features:
• It had to be telco-agnostic and provide secure connectivity without having a complex infrastructure or design
• In a multi-application environment where the employees were using applications with high bandwidth consumption in routine workflows, it was necessary to prioritise mission-critical traffic
• The IT team needed access to a portal to view network performance statistics and ensure that latency and jitter were under control
As the data connectivity services were provided by different vendors, the company wanted the MPLS solution with an end-to-end service level agreement (SLA) – this was necessary to ensure high availability and get timely technical assistance whenever required.
Grow smarter project kista watson summit 2018_tommy auoja-1IBM Sverige
Avicii på Tele2 arena, Drake på Globen och AIK - Luleå på Hovet bäddar för en trång lördagseftermiddag i Globenområdet... (SVT Nyheter, 1 mars 2014) ...och problemen kvarstår än idag
Talare: Tommy Auoja, Kundansvarig för Offentlig Sektor, Kontaktperson i EU projektet GrowSmarter, IBM
Presentation från Watson Kista Summit 2018
Bemanningsplanering axfood och houston finalIBM Sverige
Automatiserad budgetering – låt matematiken göra grovgörat för att säkerställa en optimerad bemanning
Talare: Niklas Westerholm, Axfood & Robert Moberg, Chief Analyst, Houston Analytics
Presentation från Watson Kista Summit 2018
File share and sync (bara) är så 2017!
Att dela filer bekvämt och säkert var bara början. Box har gått vidare till att integrera delade filer i applikationer och processflöden, och revolutionera både internt och externt arbete. Hur kan det revolutionera för dig?
Talare: Jan Hygstedt, Director Nordic, Box
Presentation från Watson Kista Summit 2018
Watson kista summit 2018 en bättre arbetsdag för de många människornaIBM Sverige
Först tvingades vi anpassa oss efter datorerna. Sedan använde vi dem för att samarbeta med varandra. Nu är det dags för datorerna att förstå oss. Vad innebär det för vår arbetsvardag?
Talare och moderator: Peter Bjellerup, Executive Consultant - Social Business, Collaboration & Knowledge Sharing, IBM
Presentation från Watson Kista Summit 2018
Iwcs and cisco watson kista summit 2018 v2IBM Sverige
Samarbeta både över tid och i realtid
Cisco Spark och IBM Connections – tillsammans! Kombinera ledaren för konversationer i realtid – text, video, individuellt och i team med branschledaren sedan sju år för internt samarbete, transparens och nätverk.
Talare: Bo Holtemann, Solution Specialist, IBM Collaboration Solutions
Presentation från Watson Kista Summit 2018
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
9. Great…but what about SOA?
A Service
Service Orientation
A repeatable
business task –
e.g., check customer
credit; open new
account
A way of thinking about
your business through
linked services and the
outcomes that they
bring
Service Oriented
Architecture (SOA)
An business-centric architectural
approach based on service
oriented principles
9
10. SOA mediates between consumers and providers (ESB pattern)
APIs
Cloud
Services
Partners
Suppliers
Apps
Patterns
2005: Connecting and mediating in an IT
transactional context
2010: Connecting and mediating e2e processes
10
Customers
2015: Connecting and mediating people,
devices, Cloud, ….
Developers
11. The World As We Knew It
WAS, CICS, IMS
Application platforms
provide containers for
application and
buisness logics
Messaging backbone in
the data center
MQ
12. Why is Messaging Important?
Synchronous
Asynchronous
Improvements in network reliability haven’t eliminated failures
Failure handling still more effective and simpler to implement by separating it out from
business and application logic
–
Connectivity interruptions handled seamlessly without needing expert application integration skills
Consistent interfaces, no matter the system, or the application programming language
– Removes complexity from application, reducing time and cost for development and
maintenance
Moves any type of data and any type of system, device or environment
Can provide variety of qualities of service
–
–
12
Persistence, non-persistence
Point-to-point, publish/subscribe, multicast
–
Move from batch and offline processing, to real-time event driven architectures
13. Build a universal messaging backbone
Managed File Transfers
Improve reliability and security
leveraging the internal
messaging backbone
Enhanced end-to-end
security
Securing your business data
and helping meet industry
regulations
Application Connectivity
Moving data between applications,
systems and services using MQI, JMS,
REST, HTTP, Web Services, etc.
Connect remote devices,
mobile enterprise and
sensors
Harness the power of data
outside your internal
network
Ultra low latency messaging
Highest message throughput and
lowest message latency over any
transport
Use WebSphere MQ to flexibly integrate the pieces of your business
13
14. 1
4
IBM WebSphere MQ 7.5 highlights
– Enhanced utilization of messaging through
use of Managed File Transfer solutions
over the messaging backbone
WMQ
V7.5
WMQ
Telemetry
– Access to end-to-end message encryption
capability with a single install
WMQ AMS
– Increased entitlement to integrated
Telemetry capabilities reducing TCO of
Mobile applications and smarter planet
technology
WMQ MFT
Agent + Service
– Client applications gain access to
transactional integrity and updates across
all environments
WebSphere MQ becomes a single offering with a
single install on distributed platforms, with the existing
WMQ FTE and WMQ AMS code integrated as a part of
the WMQ Server
14 14
A fully integrated messaging
solution with secure, reliable and
scalable data movement for today’s
development needs
15. Message Level Security
“Valuable” messages
– In flight on the network
– At rest, on disk
– Monitoring and control messages
Large networks, difficult to prove security of messages
– Injection
– Modification
– Unauthorized viewing
Data subject to standards compliance (PCI, HIPAA, etc)
– Credit card data protected by PCI
– Confidential & personal data (government / healthcare etc)
– Data at rest, administrative privileges, etc
16. Message Level Security - Requirements
Assurance that messages have not been altered in transit
– When issuing payment information messages, ensure the payment amount does not change before
reaching the receiver
Assurance that messages originated from the expected source
– When processing control messages, validate the sender
Assurance that messages can only be viewed by intended recipient(s)
– When sending confidential information
17. WebSphere MQ AMS – Signed Message Format (Integrity
Policy)
Original MQ Message
AMS Signed Message
Message Properties
Message Properties
PDMQ Header
PKCS #7 Envelope
Message Data
Message Data
Signature
18. WebSphere MQ AMS – Encrypted Message Format (Privacy
Policy)
Original MQ Message
Message Properties
AMS Encrypted Message
Message Properties
PDMQ Header
PKCS #7 Envelope
Message Data
Key encrypted with certificate
Data encrypted with key
Message Data
Signature
19. How to secure an existing MQ application – No protection
Alice
Sending
App
ORDERS
STOCK
Bob
Receiving
App
20. How to secure an existing MQ application SPLCAP(ENABLED)
Alice
Sending
App
ORDERS
STOCK
1.Install WebSphere MQ 7.5 AMS Component on server
Bob
Receiving
App
21. How to secure an existing MQ application – Assign Certificates
Alice
Sending
App
ORDERS
STOCK
Bob
Receiving
App
Keystore
Keystore
Alice Private
Alice Public
Bob Private
Bob Public
1.Install WebSphere MQ 7.5 AMS Component on server
2.Create certificates (public / private key pairs)
22. How to secure an existing MQ application – Exchange Public
Key
Alice
Sending
App
ORDERS
STOCK
Bob
Receiving
App
Keystore
Keystore
Alice Private
Alice Public
Bob Private
Bob Public
Bob Public
Alice Public
1.Install WebSphere MQ 7.5 AMS Component on server
2.Create certificates (public / private key pairs)
3.Exchange public keys
23. How to secure an existing MQ application – Set security policy
Policy
ORDERS
Privacy
Recipient : Bob
Signer : Alice
Alice
Sending
App
ORDERS
STOCK
Bob
Receiving
App
Keystore
Keystore
Alice Private
Alice Public
Bob Private
Bob Public
Bob Public
Alice Public
1.Install WebSphere MQ 7.5 AMS Component on server
2.Create certificates (public / private key pairs)
3.Exchange public keys
4.Define security policy for the queue
24. How to secure an existing MQ application – Privacy & Integrity
Policy
ORDERS
Privacy
Recipient : Bob
Signer : Alice
Alice
Sending
App
Keystore
Alice Private
Alice Public
Bob Public
ORDERS
STOCK
Bob
Receiving
App
Charlie
Keystore
Send/Rcv
App
Bob Private
Bob Public
Alice Public
1.Install WebSphere MQ 7.5 AMS Component on server
2.Create certificates (public / private key pairs)
3.Exchange public keys
4.Define security policy for the queue
5.Messages can only be viewed by Bob, Bob will only accept messages from Alice
25. WebSphere MQ Advanced Message Security
Provides additional security to that provided by base MQ
Non-invasive
– No code changes or re-linking of applications
End-to-end security, message level protection
– A security policy defines what protection should be applied to messages
Asymmetric cryptography used to protect each message
– Integrity Policies prove message origin, content not changed
– Privacy policies as per integrity plus each message encrypted with unique key
AMS Policies
–Integrity (End-to-end digital signing of messages)
–Privacy (End-to-end message content encryption)
26. How do most organizations move files today?
Most organizations rely on a mix of home-grown code,
several legacy products and different technologies …
and even people!
FTP
– Typically File Transfer Protocol (FTP) is combined with writing and maintaining homegrown
code to address its limitations
Why is FTP use so widespread?
– FTP is widely available – Lowest common denominator
– Promises a quick fix – repent at leisure
– Simple concepts – low technical skills needed to get started
– FTP products seem “free”, simple, intuitive and ubiquitous
Legacy File Transfer products
– A combination of products often used to provide silo solutions
– Often based on proprietary versions of FTP protocol
– Can’t transport other forms of data besides files
– Usually well integrated with B2B but rarely able to work with the rest of the IT infrastructure –
especially with SOA
People
– From IT Staff to Business staff and even Security Personnel
– Using a combination of email, fax, phone, mail, memory keys…
27. Shortcomings of Basic FTP
Limited
Reliability
Unreliable delivery – Lacking
checkpoint restart – Files can
be lost
Transfers can terminate
without notification or any
record – corrupt or partial
files can be accidentally used
File data can be unusable
after transfer – lack of
Character Set conversion
Limited
Flexibility
Changes to file transfers often require updates to many
ftp scripts that are typically scattered across machines
and require platform-specific skills to alter
All resources usually have to be available concurrently
Often only one ftp transfer can run at a time
Typically transfers cannot be prioritized
Limited
Security
Often usernames and
passwords are sent with file –
as plain text!
Privacy, authentication and
encryption often not be
available
Non-repudiation often lacking
Limited visibility
and traceability
Transfers cannot be monitored and managed
centrally or remotely
Logging capabilities may be limited and may only
record transfers between directly connected systems
Cannot track the entire journey of files – not just from
one machine to the next but from the start of its
journey to its final destination
36. The Changing World: Towards SOA
WAS, CICS, IMS
Integration Bus
Application platforms
provide containers for
application and
buisness logics
Enterprise Service Bus integrates
apps/data/services and partners,
appliance provides integration
gateway to heritage services
Messaging backbone in
the data center
MQ
58. Accelerating Integration with Built-in Patterns
Best practice, reusable solutions to common integration problems
• Can be quickly configured and deployed, and extended to create new patterns
• Patterns for SAP, mobile, BPM, Message-based integration and more!
Service
Enablement
Service
Virtualization
Application
Integration
Encapsulating functionality and
presenting it through a serviceoriented interface
Loose coupling and mediation
between services
Enabling rapid integration of
applications across the enterprise
e.g. SAP
Message-based
Integration
File
Processing
Custom
Patterns
Providing routing, transformation
and logging services for
messages
Managed runtime environment for
processing files such as shredding
into individual transaction records
Create your own patterns to reuse across your organization
60. The Changing World: And Then There Was Mobile
Enterprises looking to
achieve “more with less”
by better managing IT
resources as collectives
IWD,
PureApp
Cast Iron, DP XH40
Connectivity to
applications in the
public cloud enables
Enterprises to leverage
a new cloud economy
Public
Cloud
WAS, CICS, IMS
Integration Bus
Application platforms
provide containers for
application and
buisness logics
Enterprise Service Bus integrates
apps/data/services and partners,
appliance provides integration
gateway to heritage services
WXS, DataPower XC10
Cache grids improve
scale and performance
of applications and
services
Private
Cloud
Internet
Mobile
Sensors
Scale and ubiquity of
mobile and sensor-rich
environments has
changed requirements of
the enterprise
IBM Mobile Foundation
(Worklight)
Secure
appliances
enable
controlled
access to
Enterprise
resources
DataPower XG45
Messaging backbone in
the data center has
extended to external
clients connected via
the Internet
Internet
MQ, MessageSight
61. Mobile … a new frontier in business growth
Mobile B2C
• Increase customer
satisfaction by enabling
banking, insurance, and
trading anywhere,
anytime
• Reach customers in new
ways through mobile
applications, SMS, email
Mobile B2E & B2B
• Enable field employees for
increased productivity
• Greater efficiency and
accuracy in supply chain
operations
• Exchange business
information with partners
securely
(Mobile) M2M
• Enable the exchange of
data and events between
businesses and machines
• Internet of Things - sensor
events feeding information
and driving a smarter
planet
62. Why messaging for mobile and machine-to-machine?
HTTP revolutionized how we consume data
– Simple request/response model
– Available on any tablet, laptop, phone, PC
– Not designed for wireless
– Slow and unreliable on mobile networks
Mobile and M2M applications have additional challenges
– Requires a real-time, event-driven model
– Publishing information one-to-many
– Listening for events as they happen
– Sending small packets of data in huge volumes
– Reliably pushing data over unreliable networks
75. The Basics of a web API
What is a Web API?
A web API is a public persona for an enterprise; exposing defined assets,
data or services for public consumption
A web API is simple for app developers to use, access and understand
A web API can be easily invoked via a browser, mobile device, etc.
What Value Does a Web API Provide?
Extends an enterprise and opens new markets by allowing external app
developers to easily leverage, publicize and/or aggregate a company’s
assets for broad-based consumption
What “assets, data or services”
are exposed via an Web API?:
Product catalogs
Phone listings
Insurance cases
Order status
Bank loan rates
External
App Developer
76. Apps, APIs and API Mgmt…
Benefits
New business opportunities
• New markets
• Increase customers
• Enhance branding
• Competitive advantage
Consumers
Challenges
Extend development team
•Increase innovation
•Increase scale
Developer
Business strategy
Infrastructure
• Security
• Creation
• Scalability
Partner/supplier
alignment
Business
Owner
IT
Operational control
• Publish
• Analyze
• Monitor
77. Easily Define APIs
• Define the API you wish to expose
• Then configure the API by proxying
an existing REST API or assemble
a new API
• Provide examples of the request
and response messages, headers
and parameters
78. Assemble New APIs Through Configuration
• Connect to one or more
datasource
‒
‒
‒
‒
‒
‒
‒
DB2
MySQL
SQL Server
Oracle
Salesforce.com
SOAP to REST
HTTP
• Drag and connect linking
the request and response
messages
• Transform the message
elements with a click
79. The Changing World: Emergence of Appliances
WAS, CICS, IMS
Integration Bus
Application platforms
provide containers for
application and
buisness logics
Enterprise Service Bus integrates
apps/data/services and partners,
appliance provides integration
gateway to heritage services
WXS, DataPower XC10
Cache grids improve
scale and performance
of applications and
services
Secure
appliances
enable
controlled
access to
Enterprise
resources
DataPower XG45
Messaging backbone in
the data center
MQ
80. DataPower 6.0
Secure. Integrate. Optimize.
Secure integration
Pattern-based configuration
Securely integrate API, Web & Mobile
workloads, in addition to SOA & B2B
Create & deploy common configuration
patterns for reduced time to value,
improved productivity & quality
Mobile-ready security gateway
System z integration
Secure & optimize delivery of Mobile
applications & integrate with
IBM Worklight
Easily consume external web services
from IMS & expose IMS data as a
service
Faster consistent response time
Deployment flexibility
Reduce load on back-end systems and
optimize delivery through local & external
caching and intelligent load distribution
Use physical or virtual appliance with
seamless configuration migration
81. DataPower in a Nutshell
Enable additional use-cases with a single, policy-driven converged gateway
Focus so far
Web Service
Gateway
•
•
•
•
DMZ-ready
Security
gateway (AAA,
XML threat)
Service level
management
and monitoring
Intelligent load
distribution &
dynamic routing
Expanded focus
Integration
Gateway
•
•
•
“Any-to-Any”
conversion at
wire-speed
Bridges multiple
transport
protocols
Mainframe
integration &
enablement
B2B Gateway
•
•
•
•
DMZ-ready
B2B Messaging
(AS1/AS2/AS3/
ebMS)
Trading Partner
Profile
Management
B2B
Transaction
Viewer
Web
Application
Gateway
•
•
•
•
•
DMZ-ready
First-class
integration with
WAS
Cache response
content
Web application
security
Traffic mgmt
On-premise
API
Management
•
•
•
•
DMZ-ready
Web API
security
Monitor API use
Enforce API
consumption
policies
Form factors
Physical Appliance for hardware performance & security
Virtual Appliance for deployment flexibility
Mobile
Application
Gateway
•
•
•
•
DMZ ready
Mobile
application
security
Support
Worklight
mobile platform
Monitor and
control mobile
app access
82. DataPower Classic Use Cases
• Monitoring and control
– Example: centralized ingress management for all Web Services using ITCAM SOA
• Deep-content routing and data aggregation
– Example: XPath (content) routing on Web Service parameters
• Functional acceleration
– Example: XSLT, WS Security
• Application-layer security and threat protection
– Example: XML Denial-of-Service protection, WS Security, AAA
In-the-clear
SOAP/HTTP
• Protocol and message bridging
– Example: Convert to WS to legacy Cobol/MQ
SOAP
In-the-clear
SOAP/HTTP
Encrypted and
Signed SOAP/HTTP
SOAP
SOAP
Clients
Cobol/
MQ
Appl
Malicious
SOAP/HTTP
Cobol/MQ
Service
Providers
83. Use Case: Security Gateway (Consumer or Employee)
AAA authenticates
user and ensures
they are authorized
to the resource
beings accessed
SLM shapes and
throttles traffic based
on seggregated
consumer types
DMZ
Trusted
Zone
Internet
XG45
Usually (REST)
JSON or XML over
HTTP from web or
mobile application
XML and JSON wellformedness, schema
valication and DoS
protection
Request are
transformed to
internal schema and
routed appropriately
Responses are cached
to improve response
time
84. Use Case: Security Gateway (B2B)
AAA authenticates
user and ensures
they are authorized
to the resource
beings accessed
SLM shapes and
throttles traffic based
on seggregated
consumer types
DMZ
Trusted
Zone
Internet
XG45
Usually Web Service
(SOAP) or AS*
(XB62) protocol
XML wellformedness, schema
valication and DoS
protection
Request are
transformed to
internal schema and
routed appropriately
Responses are cached
to improve response
time
85. Use Case: Security Gateway (Inter-LoB)
AAA authenticates
user and ensures
they are authorized
to the resource
beings accessed
SLM shapes and
throttles traffic based
on seggregated
consumer types
Security
Zone
Boundary
Trusted
Zone B
Trusted
Zone A
XG45
Usually Web Service
(SOAP) or AS*
(XB62) protocol
XML wellformedness, schema
valication and DoS
protection
Request are
transformed to
internal schema and
routed appropriately
Responses are cached
to improve response
time
86. Use Case: Integration Gateway (Edge of Service)
Trusted Zone
AAA authenticates
user and ensures
they are authorized
to the resource
beings accessed
SLM throttles all
inbound traffic to
perform overload
protection of backend
resource
XI52
Usually Web Service
(SOAP) or REST
Requests are
transfomed to local
format (eg. Cobol)
Request are
transmitted over local
transport and
intelligently
distributed (e.g. MQ)
Responses are cached
to improve response
time
87. IBM Messaging Focus Areas
Deliver Messaging Backbone for Enterprise
Focus on traditional MQ values, rock-solid enterprise-class
service, ease-of-operation, breadth of platform coverage,
availability, z/OS exploitation
Capture Big Data from Mobile and Internet of Things
Focus on Internet-scale events, m2m device enablement,
zero-admin, security and privacy, feed into real-time
analytics, location-based notifications
Enable Developers to build more scalable, responsive
applications
Focus on new app dev use cases, breadth of languages, ease-ofdeployment, lightweight services, integration with developer
frameworks