securing legacy applications with extend composer and novell ichain kirk noren application services...

13
Securing Legacy Applications with exteNd Composer and Novell iChain Kirk Noren Application Services Specialist Novell, Inc.

Upload: percival-horton

Post on 18-Jan-2018

216 views

Category:

Documents


0 download

DESCRIPTION

© March 10, 2004 Novell Inc. 3 The one Net vision Novell exteNd solutions provide you with a range of advanced Web application development tools to liberate information and create more effective business solutions for your customers, partners, and employees. Novell exteNd ™ Novell Nsure ™ Novell Nterprise ™ Novell Ngage SM : : : :

TRANSCRIPT

Page 1: Securing Legacy Applications with exteNd Composer and Novell iChain Kirk Noren Application Services Specialist Novell, Inc

Securing Legacy Applications with exteNd Composer and Novell iChain

Kirk NorenApplication Services SpecialistNovell, Inc.

Page 2: Securing Legacy Applications with exteNd Composer and Novell iChain Kirk Noren Application Services Specialist Novell, Inc

© March 10, 2004 Novell Inc.2

one Net: Information without boundaries…where the right people are connected with the right information at the right time to make the right decisions.

The one Net vision

Novell exteNd™ Novell Nsure™ Novell Nterprise™ Novell NgageSM

:

:

:

:

Page 3: Securing Legacy Applications with exteNd Composer and Novell iChain Kirk Noren Application Services Specialist Novell, Inc

© March 10, 2004 Novell Inc.3

The one Net vision

Novell exteNd solutions provide you with a range of advanced Web application development tools to liberate information and create more effective business solutions for your customers, partners, and employees.

Novell exteNd™

Novell exteNd™ Novell Nsure™ Novell Nterprise™ Novell NgageSM

:

:

:

:

Page 4: Securing Legacy Applications with exteNd Composer and Novell iChain Kirk Noren Application Services Specialist Novell, Inc

© March 10, 2004 Novell Inc.4

We will cover:

• Why create applications from legacy systems?

• What legacy applications can we use?• Who would want or need exteNd

Composer?• When should we create applications from

legacy systems?• How do we create an application? - Demo• How do we secure the application? - Demo

Page 5: Securing Legacy Applications with exteNd Composer and Novell iChain Kirk Noren Application Services Specialist Novell, Inc

© March 10, 2004 Novell Inc.5

Why create applications from legacy systems?

• Legacy systems were there before you and they will be there when you're gone.

• Legacy systems contain vast amounts of data stored in perfectly good systems.

• The people who once took care of the system may now be dead.

• Bottom line - cost

Page 6: Securing Legacy Applications with exteNd Composer and Novell iChain Kirk Noren Application Services Specialist Novell, Inc

© March 10, 2004 Novell Inc.6

Broad Range of Non-invasive Connectivity

32705250Microsoft .NETMS SQL ServerCORBAWeb/HTMLFlat FileSAP R/3ANSI X.12/EDIFACTPeopleSoftXMLData General

CICSInformixJavaEmailSiebelODBC/JDBCOracleMQ SeriesDB2JMSSybaseHP/3000Tandem

3270 52

50Telnet

Data

General

HP/

3000

Tandem

HTMLCI

CSRPC

JMS,

MQSeries

SAP

JDBC

EDI

XML

JAVA

SDK

Page 7: Securing Legacy Applications with exteNd Composer and Novell iChain Kirk Noren Application Services Specialist Novell, Inc

What legacy applicationscan we use?

Page 8: Securing Legacy Applications with exteNd Composer and Novell iChain Kirk Noren Application Services Specialist Novell, Inc

© March 10, 2004 Novell Inc.8

Who would want or need exteNd Composer™?

• People who don't have the skills to make new applications in the existing system.

• People who want to “web-enable” applications from legacy systems.

• People who are legacy developers that have no JAVA coding skills.

• People that would want to look so good that they get promoted to CIO.

Page 9: Securing Legacy Applications with exteNd Composer and Novell iChain Kirk Noren Application Services Specialist Novell, Inc

© March 10, 2004 Novell Inc.9

When should we create applications from legacy systems?

• When you require a non invasive method for reducing the impact of integrating the enterprise.

• When the likelihood that the legacy system will be around for a long time.

• When you need to quickly make legacy applications available from a browser.

• When all of the other “solutions” you've tried never come to fruition and cost you a fortune.

Page 10: Securing Legacy Applications with exteNd Composer and Novell iChain Kirk Noren Application Services Specialist Novell, Inc

How do we create an application?

Page 11: Securing Legacy Applications with exteNd Composer and Novell iChain Kirk Noren Application Services Specialist Novell, Inc

How do we secure the application?

Page 12: Securing Legacy Applications with exteNd Composer and Novell iChain Kirk Noren Application Services Specialist Novell, Inc
Page 13: Securing Legacy Applications with exteNd Composer and Novell iChain Kirk Noren Application Services Specialist Novell, Inc

General DisclaimerThis document is not to be construed as a promise by any participating company to develop, deliver, or market a product. Novell, Inc., makes no representations or warranties with respect to the contents of this document, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. Further, Novell, Inc., reserves the right to revise this document and to make changes to its content, at any time, without obligation to notify any person or entity of such revisions or changes. All Novell marks referenced in this presentation are trademarks or registered trademarks of Novell, Inc. in the United States and other countries. All third-party trademarks are the property of their respective owners.

No part of this work may be practiced, performed, copied, distributed, revised, modified, translated, abridged, condensed, expanded, collected, or adapted without the prior written consent of Novell, Inc. Any use or exploitation of this work without authorization could subject the perpetrator to criminal and civil liability.