Download presentation
Presentation is loading. Please wait.
2
Ronald Nunan Incorporating mainframe legacy applications into SOA
3
Agenda SOA and market momentum Verastream family Real world problems and solutions –Verastream Host Integrator –Verastream Transaction Integrator –Verastream Web Integrator –Verastream Bridge Integrator
4
Can’t sleep? Can’t imagine why… What is our long term strategy? New regulations Competitive pressures The CFO wants to review the project ROI this week…. It’s time to test our business contingency plans again COBOL programmer retiring - how will we find a replacement? Do more with less? That doesn’t even make sense… Another merger?!
5
“Agility” is the Answer Businesses must be agile IT enables business agility An architectural strategy is key IT pace is a problem IT faces continuous change IT is more involved with business units than ever before Old approaches are too slow
6
Market Observations SOA is increasingly the answer for agility For IT initiatives today, SOA is a best practice approach “The number of organizations where SOA is the preferred approach for new projects has grown from 37% in 2005 to 53% in 2006” [IDC survey, June 2006]
7
The Challenge IT Organizations Face Leverage existing application assets –Extend use of applications –Align with technology direction –Tap appropriate skill-sets Minimize risk –Enterprise class apps –QoS, Regression,… Keep projects moving forward
8
How do you implement agility? The goal is the architecture What technology –SOA? EDA? Both? –Middle tier? –ESB? BPM? BI? –Java?.NET? Both? –ITSM? ITIL?
9
Elements of Agile Architecture
10
The Reality of Legacy Valuable High business value Typically mission critical Problematic Not agile by design Major undertaking to replace Legacy systems are too important not to participate!
11
Destination Agility – You choose the route The technology is yours alone –SOA is an architecture –The choice is about your business –Aligning IT implementations Legacy can participate –Rewrite or re-host –‘Wrapper’ approach Low risk approach –Evolve applications –Non-invasive legacy inclusion is possible
12
Integration Product Family Non-invasive screen solution Transaction and data access solution Host-based hybrid solution
13
Case Study – Edfinancial Services Problem –Financial services have evolved to the point where self-service activities with partners and customers is expected. –Self-service applications are essentially activities that are a subset of existing applications Technically –Multiple outside customers need real-time, read-write access to loan data for queries and updates
14
Case Study – Edfinancial Services Goals –Use existing legacy systems and applications to build self- service applications –Apply an SOA approach so future needs can be accommodated Solution –Non-invasive host interactions using Verastream Host Integrator –Create services through ‘controlled navigations’ –Used BizTalk to buid customer facing loan application –Biztalk used Verastream services to handle host queries and updates Verastream Host Integrator Verastream Host Integrator Loan App
15
Result Built services through a simple drag-and-drop designer Simplified the host interactions –Reduced 6 hosts screens into a Web Service operation COBOL zSeries Loan App Verastream Host Integrator Terminal access BizTalk Verastream Services BizTalk App built From services Customer facing Loan App w/ embedded legacy access
16
Credit Bureau - Experian Problem –Too many architectures involved within the enterprise –Stretched skills beyond comfort –Neutralized economies of scale Need –The goal was to rollout a common architectural platform to be used for backend systems –Approach needed to span application and data access –Existing assets (Legacy) as well as new initiatives needed a single access architectural approach
17
Preferred Solution Goal –Implement standard SQL style access across systems –Use a non-invasive approach for legacy application –Quick implementation to service a short time-to-market Solution used multiple access methods –Verastream Transaction Integrator for CICS DPL access –Screen access through Host Integrator –Data access through Verastream Data Integrator –All access methods combine to build a set of services for consistent mid-tier use
18
Result Services built from specific access methods Use is generic and not dependent on access type COBOL zSeries Loan App Verastream Host Integrator Verastream Host Integrator VSAMDB2 Verastream Host Integrator
19
Hi Kevin, Please see my response below:- Fidelity National Information Services (FIS) is a provider of financial institution processing. Loan processing happens to be on of the things FIS does very well with their ALSCOM platform. The North Carolina State credit union has over 200 branches. The Credit Union found the need to automate the loan origination processes in order to reduce loan processing lead times. This could increase its market share and make its loan offerings more attractive to their customers. The Credit union stores most of its financial information on Mainframes. The Presentation layer of the CICS application encapsulates logic utilized by the ALSCOM loan processing workflow. Leveraging this was important to FIS and the Credit Union. Attachmate provided the technology to mine Mainframe data and host logic at Presentation layer. The Credit Union has improved its consumer lending business immensely. They are extending their loan marketing channels by extending customer/consumer information to Tellers by unlocking a lot of the intelligence that resides on the Mainframe. They are doing this by using tools that access the Presentation layer of their CICS applications. They are doing so with Attachmate's Verastream 3270 Bridge integrator. Regards, Tambu
20
Verastream -- Developing for Agility
21
Color Palette Primary Palette Secondary Palette R: 63 G: 86 B: 121 R: 104 G: 134 B: 178 R: 228 G: 99 B: 0 R: 255 G: 150 B: 71 R: 254 G: 190 B: 68 R: 255 G: 228 B: 95 R: 114 G: 41 B: 70 R: 162 G: 58 B: 100 R: 122 G: 115 B: 0 R: 168 G: 160 B: 0 R: 163 G: 163 B: 163 R: 194 G: 194 B: 194 Color Picker Chips Copy and paste onto working slide for color reference R: 2 G: 132 B: 193 R: 160 G: 225 B: 254 R: 123 G: 12 B: 0 R: 165 G: 35 B: 38
22
THREAT DETECTIONCHANGE DETECTIONSECUIRTY/LOCKKEYNETWORKDATABASEDATABASE OLAPCALENDAR3 RD PARTY TOOLSVIRTUALIZATIONSWITCHROUTERSECURITY HUBLOAD BALANCERFIREWALL/GATEWAYGROUP POLICYRECYCLE/TRASHDESKTOPIP PHONELAPTOP
23
PDA/SMART PHONEDESKTOP W/DISPLAYDISPLAYSERVEREMAIL SERVERPRINTERCD DRIVEHARD DRIVEINTERNET/CLOUDWIRELESS TOWERUSER (HALF)USER GROUP (HALF)USER (FULL)USER GROUP (FULL)HACKERACTIVE DIRECTORYCUSTOM APPLICATIONSAPP SERVICESEMAILMONITORING
24
TREND REPORTINGLOG FORENSICSDATA REPORTSSTANDARDSTASKSREPORTSSNAPSHOTCONFIGURATIONFINANCEHEALTHCARERETAILPRIVATEPHARMACEUTICALMANUFACTURINGGOVERNMENTTELECOM
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.