Presentation is loading. Please wait.

Presentation is loading. Please wait.

Securing Legacy Applications with exteNd Composer and Novell iChain Kirk Noren Application Services Specialist Novell, Inc.

Similar presentations


Presentation on theme: "Securing Legacy Applications with exteNd Composer and Novell iChain Kirk Noren Application Services Specialist Novell, Inc."— Presentation transcript:

1 Securing Legacy Applications with exteNd Composer and Novell iChain Kirk Noren Application Services Specialist Novell, Inc.

2 © March 10, 2004 Novell Inc. 2 one Net: Information without boundaries…where the right people are connected with the right information at the right time to make the right decisions. The one Net vision Novell exteNd ™ Novell Nsure ™ Novell Nterprise ™ Novell Ngage SM : : : :

3 © March 10, 2004 Novell Inc. 3 The one Net vision Novell exteNd solutions provide you with a range of advanced Web application development tools to liberate information and create more effective business solutions for your customers, partners, and employees. Novell exteNd ™ Novell Nsure ™ Novell Nterprise ™ Novell Ngage SM : : : :

4 © March 10, 2004 Novell Inc. 4 We will cover: Why create applications from legacy systems? What legacy applications can we use? Who would want or need exteNd Composer? When should we create applications from legacy systems? How do we create an application? - Demo How do we secure the application? - Demo

5 © March 10, 2004 Novell Inc. 5 Why create applications from legacy systems? Legacy systems were there before you and they will be there when you're gone. Legacy systems contain vast amounts of data stored in perfectly good systems. The people who once took care of the system may now be dead. Bottom line - cost

6 © March 10, 2004 Novell Inc. 6 Broad Range of Non-invasive Connectivity 3270 5250 Microsoft.NET MS SQL Server CORBA Web/HTML Flat File SAP R/3 ANSI X.12/EDIFACT PeopleSoft XML Data General CICS Informix Java Email Siebel ODBC/JDBC Oracle MQ Series DB2 JMS Sybase HP/3000 Tandem 32 70 52 50 Tel net Dat a Gen eral HP / 30 00 Tan de m HT ML CIC S RP C JMS, MQ Ser ies SA P JD BC EDI XM L JA VA SD K

7 What legacy applications can we use?

8 © March 10, 2004 Novell Inc. 8 Who would want or need exteNd Composer™? People who don't have the skills to make new applications in the existing system. People who want to “web-enable” applications from legacy systems. People who are legacy developers that have no JAVA coding skills. People that would want to look so good that they get promoted to CIO.

9 © March 10, 2004 Novell Inc. 9 When should we create applications from legacy systems? When you require a non invasive method for reducing the impact of integrating the enterprise. When the likelihood that the legacy system will be around for a long time. When you need to quickly make legacy applications available from a browser. When all of the other “solutions” you've tried never come to fruition and cost you a fortune.

10 How do we create an application?

11 How do we secure the application?

12

13 General Disclaimer This document is not to be construed as a promise by any participating company to develop, deliver, or market a product. Novell, Inc., makes no representations or warranties with respect to the contents of this document, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. Further, Novell, Inc., reserves the right to revise this document and to make changes to its content, at any time, without obligation to notify any person or entity of such revisions or changes. All Novell marks referenced in this presentation are trademarks or registered trademarks of Novell, Inc. in the United States and other countries. All third-party trademarks are the property of their respective owners. No part of this work may be practiced, performed, copied, distributed, revised, modified, translated, abridged, condensed, expanded, collected, or adapted without the prior written consent of Novell, Inc. Any use or exploitation of this work without authorization could subject the perpetrator to criminal and civil liability.


Download ppt "Securing Legacy Applications with exteNd Composer and Novell iChain Kirk Noren Application Services Specialist Novell, Inc."

Similar presentations


Ads by Google