Download presentation
Presentation is loading. Please wait.
Published byEvan Hood Modified over 9 years ago
1
Dueling Middleware WAVV 2000, Colorado Springs
2
Middleware Defined LAN DBMS Web Browser Client Workstation Local Area Network Middleware Web Server S/390
3
Significant Investments Hardware Hardware Data Data Applications Applications People People Hardware Hardware Data Data Applications Applications People People
4
Low-tech Middleware 3270 Emulation 3270 Emulation FTP FTP Screen Scrapers Screen Scrapers Sneaker Net Sneaker Net 3270 Emulation 3270 Emulation FTP FTP Screen Scrapers Screen Scrapers Sneaker Net Sneaker Net
5
Viaserv Over The Years Liberating Enterprise Data
6
Solutions Over The Years Client/Server Client/Server Decision Support Decision Support Data Warehousing Data Warehousing Business Intelligence Business Intelligence E-Business E-Business Enterprise Information Portals Enterprise Information Portals Client/Server Client/Server Decision Support Decision Support Data Warehousing Data Warehousing Business Intelligence Business Intelligence E-Business E-Business Enterprise Information Portals Enterprise Information Portals
7
It Still Comes Down To Basics ODBC and JDBC access to S/390 data and applications ODBC and JDBC access to S/390 data and applications
8
A Relational Layer RelationalEngine VSAM IMS D
9
Two Very Different Approaches S/390 RelationalEngine RelationalEngine CICS 1 2 Standalone Engine CICS-Coupled Engine
10
So What’s Important? Full SQL DML support Full SQL DML support CICS control of files CICS control of files Transaction management Transaction management Programmatic access Programmatic access Data movement Data movement Security Security Scalability Scalability Advanced features Advanced features Full SQL DML support Full SQL DML support CICS control of files CICS control of files Transaction management Transaction management Programmatic access Programmatic access Data movement Data movement Security Security Scalability Scalability Advanced features Advanced features
11
Full DML Support SELECT SELECT INSERT INSERT UPDATE UPDATE DELETE DELETE SELECT SELECT INSERT INSERT UPDATE UPDATE DELETE DELETE
12
CICS Control of Files VSAM shareoptions are problematic VSAM shareoptions are problematic Robust transaction management Robust transaction management Standard security features Standard security features Concurrency controls Concurrency controls VSAM shareoptions are problematic VSAM shareoptions are problematic Robust transaction management Robust transaction management Standard security features Standard security features Concurrency controls Concurrency controls
13
Transaction Management Read and write capabilities Read and write capabilities Transaction management Transaction management Long and short transactions Long and short transactions Read and write capabilities Read and write capabilities Transaction management Transaction management Long and short transactions Long and short transactions
14
Programmatic Access LAN clients access CICS resources LAN clients access CICS resources access any S/390 data store utilize existing business logic special processing CICS clients access LAN resources CICS clients access LAN resources mainframe is central SQL access to LAN-based DBMS utilize newly-evolved business logic data distribution LAN clients access CICS resources LAN clients access CICS resources access any S/390 data store utilize existing business logic special processing CICS clients access LAN resources CICS clients access LAN resources mainframe is central SQL access to LAN-based DBMS utilize newly-evolved business logic data distribution
15
Data Movement Move data directly into target DBMS Move data directly into target DBMS Bi-directional Bi-directional Ideally, SQL is used to select the data Ideally, SQL is used to select the data Move data directly into target DBMS Move data directly into target DBMS Bi-directional Bi-directional Ideally, SQL is used to select the data Ideally, SQL is used to select the data VSAM DL/I Other Oracle Other SQL Server
16
Security Workstation-side Workstation-side support for user authentication Server-side Server-side use standard CICS security support SQL GRANT and REVOKE Workstation-side Workstation-side support for user authentication Server-side Server-side use standard CICS security support SQL GRANT and REVOKE
17
Scalability Multi-user, multi-tasking server Multi-user, multi-tasking server Multiple users serviced by one address space or partition Multiple users serviced by one address space or partition Multi-user, multi-tasking server Multi-user, multi-tasking server Multiple users serviced by one address space or partition Multiple users serviced by one address space or partition
18
Advanced Features Client-idle timeout Client-idle timeout Data compression Data compression Cross-datasource joins Cross-datasource joins Cursors and dynamic events Cursors and dynamic events Client-idle timeout Client-idle timeout Data compression Data compression Cross-datasource joins Cross-datasource joins Cursors and dynamic events Cursors and dynamic events
19
So What’s Important? Full SQL DML support Full SQL DML support CICS control of files CICS control of files Transaction management Transaction management Programmatic access Programmatic access Data movement Data movement Security Security Scalability Scalability Advanced features Advanced features Full SQL DML support Full SQL DML support CICS control of files CICS control of files Transaction management Transaction management Programmatic access Programmatic access Data movement Data movement Security Security Scalability Scalability Advanced features Advanced features
20
Liberating Enterprise Data Desktop Access Desktop Access Web Integration Web Integration Data Staging and Movement Data Staging and Movement Multi-tiered Applications Multi-tiered Applications Desktop Access Desktop Access Web Integration Web Integration Data Staging and Movement Data Staging and Movement Multi-tiered Applications Multi-tiered Applications S/390
21
Liberating Enterprise Data Services Professional
22
Liberating Enterprise Data
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.