Dueling Middleware WAVV 2000, Colorado Springs
Middleware Defined LAN DBMS Web Browser Client Workstation Local Area Network Middleware Web Server S/390
Significant Investments Hardware Hardware Data Data Applications Applications People People Hardware Hardware Data Data Applications Applications People People
Low-tech Middleware 3270 Emulation 3270 Emulation FTP FTP Screen Scrapers Screen Scrapers Sneaker Net Sneaker Net 3270 Emulation 3270 Emulation FTP FTP Screen Scrapers Screen Scrapers Sneaker Net Sneaker Net
Viaserv Over The Years Liberating Enterprise Data
Solutions Over The Years Client/Server Client/Server Decision Support Decision Support Data Warehousing Data Warehousing Business Intelligence Business Intelligence E-Business E-Business Enterprise Information Portals Enterprise Information Portals Client/Server Client/Server Decision Support Decision Support Data Warehousing Data Warehousing Business Intelligence Business Intelligence E-Business E-Business Enterprise Information Portals Enterprise Information Portals
It Still Comes Down To Basics ODBC and JDBC access to S/390 data and applications ODBC and JDBC access to S/390 data and applications
A Relational Layer RelationalEngine VSAM IMS D
Two Very Different Approaches S/390 RelationalEngine RelationalEngine CICS 1 2 Standalone Engine CICS-Coupled Engine
So What’s Important? Full SQL DML support Full SQL DML support CICS control of files CICS control of files Transaction management Transaction management Programmatic access Programmatic access Data movement Data movement Security Security Scalability Scalability Advanced features Advanced features Full SQL DML support Full SQL DML support CICS control of files CICS control of files Transaction management Transaction management Programmatic access Programmatic access Data movement Data movement Security Security Scalability Scalability Advanced features Advanced features
Full DML Support SELECT SELECT INSERT INSERT UPDATE UPDATE DELETE DELETE SELECT SELECT INSERT INSERT UPDATE UPDATE DELETE DELETE
CICS Control of Files VSAM shareoptions are problematic VSAM shareoptions are problematic Robust transaction management Robust transaction management Standard security features Standard security features Concurrency controls Concurrency controls VSAM shareoptions are problematic VSAM shareoptions are problematic Robust transaction management Robust transaction management Standard security features Standard security features Concurrency controls Concurrency controls
Transaction Management Read and write capabilities Read and write capabilities Transaction management Transaction management Long and short transactions Long and short transactions Read and write capabilities Read and write capabilities Transaction management Transaction management Long and short transactions Long and short transactions
Programmatic Access LAN clients access CICS resources LAN clients access CICS resources access any S/390 data store utilize existing business logic special processing CICS clients access LAN resources CICS clients access LAN resources mainframe is central SQL access to LAN-based DBMS utilize newly-evolved business logic data distribution LAN clients access CICS resources LAN clients access CICS resources access any S/390 data store utilize existing business logic special processing CICS clients access LAN resources CICS clients access LAN resources mainframe is central SQL access to LAN-based DBMS utilize newly-evolved business logic data distribution
Data Movement Move data directly into target DBMS Move data directly into target DBMS Bi-directional Bi-directional Ideally, SQL is used to select the data Ideally, SQL is used to select the data Move data directly into target DBMS Move data directly into target DBMS Bi-directional Bi-directional Ideally, SQL is used to select the data Ideally, SQL is used to select the data VSAM DL/I Other Oracle Other SQL Server
Security Workstation-side Workstation-side support for user authentication Server-side Server-side use standard CICS security support SQL GRANT and REVOKE Workstation-side Workstation-side support for user authentication Server-side Server-side use standard CICS security support SQL GRANT and REVOKE
Scalability Multi-user, multi-tasking server Multi-user, multi-tasking server Multiple users serviced by one address space or partition Multiple users serviced by one address space or partition Multi-user, multi-tasking server Multi-user, multi-tasking server Multiple users serviced by one address space or partition Multiple users serviced by one address space or partition
Advanced Features Client-idle timeout Client-idle timeout Data compression Data compression Cross-datasource joins Cross-datasource joins Cursors and dynamic events Cursors and dynamic events Client-idle timeout Client-idle timeout Data compression Data compression Cross-datasource joins Cross-datasource joins Cursors and dynamic events Cursors and dynamic events
So What’s Important? Full SQL DML support Full SQL DML support CICS control of files CICS control of files Transaction management Transaction management Programmatic access Programmatic access Data movement Data movement Security Security Scalability Scalability Advanced features Advanced features Full SQL DML support Full SQL DML support CICS control of files CICS control of files Transaction management Transaction management Programmatic access Programmatic access Data movement Data movement Security Security Scalability Scalability Advanced features Advanced features
Liberating Enterprise Data Desktop Access Desktop Access Web Integration Web Integration Data Staging and Movement Data Staging and Movement Multi-tiered Applications Multi-tiered Applications Desktop Access Desktop Access Web Integration Web Integration Data Staging and Movement Data Staging and Movement Multi-tiered Applications Multi-tiered Applications S/390
Liberating Enterprise Data Services Professional
Liberating Enterprise Data