securing legacy applications with extend composer and novell ichain kirk noren application services...
DESCRIPTION
© March 10, 2004 Novell Inc. 3 The one Net vision Novell exteNd solutions provide you with a range of advanced Web application development tools to liberate information and create more effective business solutions for your customers, partners, and employees. Novell exteNd ™ Novell Nsure ™ Novell Nterprise ™ Novell Ngage SM : : : :TRANSCRIPT
Securing Legacy Applications with exteNd Composer and Novell iChain
Kirk NorenApplication Services SpecialistNovell, Inc.
© March 10, 2004 Novell Inc.2
one Net: Information without boundaries…where the right people are connected with the right information at the right time to make the right decisions.
The one Net vision
Novell exteNd™ Novell Nsure™ Novell Nterprise™ Novell NgageSM
:
:
:
:
© March 10, 2004 Novell Inc.3
The one Net vision
Novell exteNd solutions provide you with a range of advanced Web application development tools to liberate information and create more effective business solutions for your customers, partners, and employees.
Novell exteNd™
Novell exteNd™ Novell Nsure™ Novell Nterprise™ Novell NgageSM
:
:
:
:
© March 10, 2004 Novell Inc.4
We will cover:
• Why create applications from legacy systems?
• What legacy applications can we use?• Who would want or need exteNd
Composer?• When should we create applications from
legacy systems?• How do we create an application? - Demo• How do we secure the application? - Demo
© March 10, 2004 Novell Inc.5
Why create applications from legacy systems?
• Legacy systems were there before you and they will be there when you're gone.
• Legacy systems contain vast amounts of data stored in perfectly good systems.
• The people who once took care of the system may now be dead.
• Bottom line - cost
© March 10, 2004 Novell Inc.6
Broad Range of Non-invasive Connectivity
32705250Microsoft .NETMS SQL ServerCORBAWeb/HTMLFlat FileSAP R/3ANSI X.12/EDIFACTPeopleSoftXMLData General
CICSInformixJavaEmailSiebelODBC/JDBCOracleMQ SeriesDB2JMSSybaseHP/3000Tandem
3270 52
50Telnet
Data
General
HP/
3000
Tandem
HTMLCI
CSRPC
JMS,
MQSeries
SAP
JDBC
EDI
XML
JAVA
SDK
What legacy applicationscan we use?
© March 10, 2004 Novell Inc.8
Who would want or need exteNd Composer™?
• People who don't have the skills to make new applications in the existing system.
• People who want to “web-enable” applications from legacy systems.
• People who are legacy developers that have no JAVA coding skills.
• People that would want to look so good that they get promoted to CIO.
© March 10, 2004 Novell Inc.9
When should we create applications from legacy systems?
• When you require a non invasive method for reducing the impact of integrating the enterprise.
• When the likelihood that the legacy system will be around for a long time.
• When you need to quickly make legacy applications available from a browser.
• When all of the other “solutions” you've tried never come to fruition and cost you a fortune.
How do we create an application?
How do we secure the application?
General DisclaimerThis document is not to be construed as a promise by any participating company to develop, deliver, or market a product. Novell, Inc., makes no representations or warranties with respect to the contents of this document, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. Further, Novell, Inc., reserves the right to revise this document and to make changes to its content, at any time, without obligation to notify any person or entity of such revisions or changes. All Novell marks referenced in this presentation are trademarks or registered trademarks of Novell, Inc. in the United States and other countries. All third-party trademarks are the property of their respective owners.
No part of this work may be practiced, performed, copied, distributed, revised, modified, translated, abridged, condensed, expanded, collected, or adapted without the prior written consent of Novell, Inc. Any use or exploitation of this work without authorization could subject the perpetrator to criminal and civil liability.