1 10 th natural conference october 29, 2001 high performance web-enablement of adabas/natural using...
Post on 19-Dec-2015
220 views
TRANSCRIPT
![Page 1: 1 10 th Natural Conference October 29, 2001 High Performance Web-enablement of ADABAS/Natural using ShadowDirect and ShadowWeb Server by Rex Bowe](https://reader036.vdocuments.us/reader036/viewer/2022081519/56649d2b5503460f94a012ed/html5/thumbnails/1.jpg)
1
10th Natural ConferenceOctober 29, 2001
High PerformanceWeb-enablement of
ADABAS/Naturalusing
ShadowDirect and
ShadowWeb Server by Rex Bowe
10th Natural ConferenceOctober 29, 2001
High PerformanceWeb-enablement of
ADABAS/Naturalusing
ShadowDirect and
ShadowWeb Server by Rex Bowe
![Page 2: 1 10 th Natural Conference October 29, 2001 High Performance Web-enablement of ADABAS/Natural using ShadowDirect and ShadowWeb Server by Rex Bowe](https://reader036.vdocuments.us/reader036/viewer/2022081519/56649d2b5503460f94a012ed/html5/thumbnails/2.jpg)
2
SHADOW ® Natural Conference
Agenda
SHADOW ® Natural Conference
Agenda
Who is NEON?
Shadow Architecture Shadow Direct
• NEON Client
• Transaction Level Security
ADABAS Interface Natural Interface Data Mapping Facility Monitoring, Diagnostics, & Controls
• Shadow Event Facility
Shadow Web Server for OS/390
Live Demo
Who is NEON?
Shadow Architecture Shadow Direct
• NEON Client
• Transaction Level Security
ADABAS Interface Natural Interface Data Mapping Facility Monitoring, Diagnostics, & Controls
• Shadow Event Facility
Shadow Web Server for OS/390
Live Demo
![Page 3: 1 10 th Natural Conference October 29, 2001 High Performance Web-enablement of ADABAS/Natural using ShadowDirect and ShadowWeb Server by Rex Bowe](https://reader036.vdocuments.us/reader036/viewer/2022081519/56649d2b5503460f94a012ed/html5/thumbnails/3.jpg)
3
0
5
10
15
20
25
30
FY1996 FY1998 FY2000
Revenue
Founded in 1991 Rapid Market Acceptance Profitable in Four Years No debt Acquisition Growth Model NASDAQ (NESY)
NEON SystemsNEON SystemsCorporate InformationCorporate InformationNEON SystemsNEON SystemsCorporate InformationCorporate Information
SHADOW ® Who is NEON? SHADOW ® Who is NEON?
![Page 4: 1 10 th Natural Conference October 29, 2001 High Performance Web-enablement of ADABAS/Natural using ShadowDirect and ShadowWeb Server by Rex Bowe](https://reader036.vdocuments.us/reader036/viewer/2022081519/56649d2b5503460f94a012ed/html5/thumbnails/4.jpg)
4
SHADOW ® NEON History SHADOW ® NEON History
History of Shadow
Peter Schaffer @ Texaco in 1990 – Power Builder Environment
Developed from 1991 - 1994
First customer in 1995 (BASF)
Formation of NEON Systems
Shadow Today
Active Development - V 4.8 Shipping End of Month
ALL Industry Acceptance
Current Clients No 1No 1 Priority
Customer References
History of Shadow
Peter Schaffer @ Texaco in 1990 – Power Builder Environment
Developed from 1991 - 1994
First customer in 1995 (BASF)
Formation of NEON Systems
Shadow Today
Active Development - V 4.8 Shipping End of Month
ALL Industry Acceptance
Current Clients No 1No 1 Priority
Customer References
![Page 5: 1 10 th Natural Conference October 29, 2001 High Performance Web-enablement of ADABAS/Natural using ShadowDirect and ShadowWeb Server by Rex Bowe](https://reader036.vdocuments.us/reader036/viewer/2022081519/56649d2b5503460f94a012ed/html5/thumbnails/5.jpg)
5
More than 400 customers (over 40% of the Fortune 100) and most are Global 2000, spanning most industries
More than 400 customers (over 40% of the Fortune 100) and most are Global 2000, spanning most industries
![Page 6: 1 10 th Natural Conference October 29, 2001 High Performance Web-enablement of ADABAS/Natural using ShadowDirect and ShadowWeb Server by Rex Bowe](https://reader036.vdocuments.us/reader036/viewer/2022081519/56649d2b5503460f94a012ed/html5/thumbnails/6.jpg)
6
Global 2000 Customer BaseGlobal 2000 Customer Base
![Page 7: 1 10 th Natural Conference October 29, 2001 High Performance Web-enablement of ADABAS/Natural using ShadowDirect and ShadowWeb Server by Rex Bowe](https://reader036.vdocuments.us/reader036/viewer/2022081519/56649d2b5503460f94a012ed/html5/thumbnails/7.jpg)
7
Wells Fargo Bank Wells Fargo Bank BUSINESS GOAL NEON Systems’ SOLUTION
SELECTION CRITERIA
To Web-enable and optimize its customer support initiatives.
Shadow Direct and Shadow Web Server were implemented eliminating problems associated with gateways and increasing customer support capabilities.
Required a CICS transaction server.
Monitoring, control, and diagnostic capabilities.
Fault tolerance
None
COMPETITION
![Page 8: 1 10 th Natural Conference October 29, 2001 High Performance Web-enablement of ADABAS/Natural using ShadowDirect and ShadowWeb Server by Rex Bowe](https://reader036.vdocuments.us/reader036/viewer/2022081519/56649d2b5503460f94a012ed/html5/thumbnails/8.jpg)
8
Merrill LynchMerrill LynchBUSINESS GOAL NEON Systems’ SOLUTION
SELECTION CRITERIA
As one of the world’s largest client/server to mainframe production environments, Merrill Lynch required a safe, simple solution to provide mainframe data access to its users.
Current transaction volumes facilitated through Shadow Direct has topped 800,000 per day and is steadily growing 30%-40% per year.
Shadow Direct was chosen for its simple architecture, large application scalability, ease of implementation, low overall cost, speedy problem identification and resolution, and IT-friendly nature.
An in-house application IBM’s DB2 Connect MDI Gateway
COMPETITION
![Page 9: 1 10 th Natural Conference October 29, 2001 High Performance Web-enablement of ADABAS/Natural using ShadowDirect and ShadowWeb Server by Rex Bowe](https://reader036.vdocuments.us/reader036/viewer/2022081519/56649d2b5503460f94a012ed/html5/thumbnails/9.jpg)
9
GMAC InsuranceGMAC InsuranceBUSINESS GOAL NEON Systems’ SOLUTION
SELECTION CRITERIA
To build Web-enabled access to many years of GMAC ADABAS legacy mainframe data for an easy-to-use, self-service customer website.
GMAC employed Shadow Direct and JDBC driver for data access and legacy application renewal for is customer-focused Web service.
NEON provided access to ADABAS, DB2, and Cobol RPC’s, and Read Write functionality without a required gateway and custom coding.
EDA SQL IBM DB2 Connect EntireX
COMPETITION
![Page 10: 1 10 th Natural Conference October 29, 2001 High Performance Web-enablement of ADABAS/Natural using ShadowDirect and ShadowWeb Server by Rex Bowe](https://reader036.vdocuments.us/reader036/viewer/2022081519/56649d2b5503460f94a012ed/html5/thumbnails/10.jpg)
10
BoeingBoeingBUSINESS GOAL NEON Systems’ SOLUTION
SELECTION CRITERIA
To rapidly Web-enable legacy programs (such as the Employee Timekeeping System) with a secure, scalable, and reliable solution.
Example: Employee Timekeeping System generates 1.5 million hits per day.
Shadow Web Server accessing IMS/TM, DB2, and CICS
Scalability, security, and time required for deployment.
IBM's ICSS
COMPETITION
![Page 11: 1 10 th Natural Conference October 29, 2001 High Performance Web-enablement of ADABAS/Natural using ShadowDirect and ShadowWeb Server by Rex Bowe](https://reader036.vdocuments.us/reader036/viewer/2022081519/56649d2b5503460f94a012ed/html5/thumbnails/11.jpg)
11
Shadow ArchitectureShadow Architecture
SHADOW ®SHADOW ®
![Page 12: 1 10 th Natural Conference October 29, 2001 High Performance Web-enablement of ADABAS/Natural using ShadowDirect and ShadowWeb Server by Rex Bowe](https://reader036.vdocuments.us/reader036/viewer/2022081519/56649d2b5503460f94a012ed/html5/thumbnails/12.jpg)
12
OS/390
SNA
TCPIP
Top Secret
ACF2
RACF
FlatFiles
Natural
ADABAS
IMS/DB
IMS/TM
VSAM
CICS
DB2Shadow Server
Web, Application or Integration ServerPackaged application: ERP, CRM, BI, Portal
Running on NT or Unix
Data Mapping
Auto Management
Monitoring/Diagnostics
RSPRPC
Thread Management
TCB TCB TCB
TCB TCB TCB
WLM
Client AppWindows, NT,
Unix, OS/2, Mac
No gateway required
direct access to OS/390
RRS
SHADOW ® Unique ArchitectureSHADOW ® Unique Architecture
NEONClient
NEONClient
Web BrowserInternet Explorer,
Netscape
![Page 13: 1 10 th Natural Conference October 29, 2001 High Performance Web-enablement of ADABAS/Natural using ShadowDirect and ShadowWeb Server by Rex Bowe](https://reader036.vdocuments.us/reader036/viewer/2022081519/56649d2b5503460f94a012ed/html5/thumbnails/13.jpg)
13
Shadow NO gateways required Many Optimized Connection Modes
SSL Encryption
Load Balancing, Work Load Manager support
Real-time end-to-end diagnostics, Event Facility, Activity Monitor
Access OS/390 data, applications & transactions
Data Mapping Facility for non-relational data
Transaction Level Security
As scalable as S390
SHADOW ® ArchitectureSHADOW ® Architecture
![Page 14: 1 10 th Natural Conference October 29, 2001 High Performance Web-enablement of ADABAS/Natural using ShadowDirect and ShadowWeb Server by Rex Bowe](https://reader036.vdocuments.us/reader036/viewer/2022081519/56649d2b5503460f94a012ed/html5/thumbnails/14.jpg)
14
Runs as own MVS based address space (No USS required)
TCB Architecture (Isolation, scale, monitoring, control)
Run up to 36 address spaces (one address space supports
300-800 connections depending on data sources)
Load balancing among address spaces
Work Load Manager (WLM) Support
DB2 Thread Reuse (Virtual Connection Facility)
Supports ODBC and JDBC connection pooling
Boeing driving 2-3 million IMS Transactions in SWS
during a 2 hour window
Runs as own MVS based address space (No USS required)
TCB Architecture (Isolation, scale, monitoring, control)
Run up to 36 address spaces (one address space supports
300-800 connections depending on data sources)
Load balancing among address spaces
Work Load Manager (WLM) Support
DB2 Thread Reuse (Virtual Connection Facility)
Supports ODBC and JDBC connection pooling
Boeing driving 2-3 million IMS Transactions in SWS
during a 2 hour window
SHADOW ® Why is it scalable and reliable?SHADOW ® Why is it scalable and reliable?
![Page 15: 1 10 th Natural Conference October 29, 2001 High Performance Web-enablement of ADABAS/Natural using ShadowDirect and ShadowWeb Server by Rex Bowe](https://reader036.vdocuments.us/reader036/viewer/2022081519/56649d2b5503460f94a012ed/html5/thumbnails/15.jpg)
15
Enforces native OS/390 security via Security Access Facility (SAF), provides tight integration with RACF, ACF2, TopSecret
Enforces subsystem security• DB2• IMS• CICS• Natural
Encryption of data stream with SSL• Software• Hardware (GSK encryption chip, 10 times faster)
Complete accountability• Detail mainframe logging• Cuts SMF records for connection and query• Extended proxy user logging
Has not been hacked• Security through obscurity
Enforces native OS/390 security via Security Access Facility (SAF), provides tight integration with RACF, ACF2, TopSecret
Enforces subsystem security• DB2• IMS• CICS• Natural
Encryption of data stream with SSL• Software• Hardware (GSK encryption chip, 10 times faster)
Complete accountability• Detail mainframe logging• Cuts SMF records for connection and query• Extended proxy user logging
Has not been hacked• Security through obscurity
SHADOW ® How secure is it?SHADOW ® How secure is it?
![Page 16: 1 10 th Natural Conference October 29, 2001 High Performance Web-enablement of ADABAS/Natural using ShadowDirect and ShadowWeb Server by Rex Bowe](https://reader036.vdocuments.us/reader036/viewer/2022081519/56649d2b5503460f94a012ed/html5/thumbnails/16.jpg)
16
ShadowDirectShadowDirect
SHADOW ®SHADOW ®
![Page 17: 1 10 th Natural Conference October 29, 2001 High Performance Web-enablement of ADABAS/Natural using ShadowDirect and ShadowWeb Server by Rex Bowe](https://reader036.vdocuments.us/reader036/viewer/2022081519/56649d2b5503460f94a012ed/html5/thumbnails/17.jpg)
17
High performance, multi-threaded, thread-safe, scalable driver
Single .dll approx. 2-3 meg (small footprint)
Supports Unix, NT, Windows, OS/2, Mac platforms
Supports ubiquitous database APIs• ODBC • JDBC J2EE Driver• JCA
Client-side optimizations, limits, debugging
Connection Pooling
NEON data stream• Data compression – up to 90%
High performance, multi-threaded, thread-safe, scalable driver
Single .dll approx. 2-3 meg (small footprint)
Supports Unix, NT, Windows, OS/2, Mac platforms
Supports ubiquitous database APIs• ODBC • JDBC J2EE Driver• JCA
Client-side optimizations, limits, debugging
Connection Pooling
NEON data stream• Data compression – up to 90%
SHADOW DirectTM NEON ClientSHADOW DirectTM NEON Client
![Page 18: 1 10 th Natural Conference October 29, 2001 High Performance Web-enablement of ADABAS/Natural using ShadowDirect and ShadowWeb Server by Rex Bowe](https://reader036.vdocuments.us/reader036/viewer/2022081519/56649d2b5503460f94a012ed/html5/thumbnails/18.jpg)
18
Client/Server: VisualBasic, PowerBuilder, Delphi, Microsoft Office, C/C++...
Web Servers: IIS, Apache, Cold Fusion, ...
Application Servers: WebSphere, WebLogic, SilverStream, iPlanet, WebGain ...
Integration Servers: CrossWorlds, Vitria …
Business Intelligence: Brio, Cognos …
CRM and ERP: Siebel, Peoplesoft, …
Portals: Epicentric, Plumtree …
Client/Server: VisualBasic, PowerBuilder, Delphi, Microsoft Office, C/C++...
Web Servers: IIS, Apache, Cold Fusion, ...
Application Servers: WebSphere, WebLogic, SilverStream, iPlanet, WebGain ...
Integration Servers: CrossWorlds, Vitria …
Business Intelligence: Brio, Cognos …
CRM and ERP: Siebel, Peoplesoft, …
Portals: Epicentric, Plumtree …
SHADOW DirectTM provides access to OS/390 for these solutions and products…
![Page 19: 1 10 th Natural Conference October 29, 2001 High Performance Web-enablement of ADABAS/Natural using ShadowDirect and ShadowWeb Server by Rex Bowe](https://reader036.vdocuments.us/reader036/viewer/2022081519/56649d2b5503460f94a012ed/html5/thumbnails/19.jpg)
19
Feature for Shadow Direct in a 3-tier web
When proxy Logon IDs are used by servers to access OS/390 data, applications and transactions
Shadow allows for detailed information about a user to be cut with SMF records for the proxy Logon ID
Provides traceability, chargeback to users, who would otherwise be masked by proxy Logon ID
Only way to properly handled infinite number of Internet users in conjunction with RACF, ACF2 or Top Secret
Feature for Shadow Direct in a 3-tier web
When proxy Logon IDs are used by servers to access OS/390 data, applications and transactions
Shadow allows for detailed information about a user to be cut with SMF records for the proxy Logon ID
Provides traceability, chargeback to users, who would otherwise be masked by proxy Logon ID
Only way to properly handled infinite number of Internet users in conjunction with RACF, ACF2 or Top Secret
SHADOW DirectTM Transaction Level Security
![Page 20: 1 10 th Natural Conference October 29, 2001 High Performance Web-enablement of ADABAS/Natural using ShadowDirect and ShadowWeb Server by Rex Bowe](https://reader036.vdocuments.us/reader036/viewer/2022081519/56649d2b5503460f94a012ed/html5/thumbnails/20.jpg)
20
SAF
Result setTCP/IPListner
OS/390 - MVS Host
TCB
TCP/IP
DiagnosticFacility
RACFACF2TOP S
WLM
ODBC/JDBC
ADABAS
AC I
Natural-transNatural-transNatural-trans
CICS/Batch
TCB
TCB
ADAREP FDT/ADACMP
EventFacility
Data MappingFacility
SQL -> Direct Call
CALL SHADOW_ACI
Shadow Direct
SHADOW DirectTM for ADABAS & NaturalSHADOW DirectTM for ADABAS & Natural
![Page 21: 1 10 th Natural Conference October 29, 2001 High Performance Web-enablement of ADABAS/Natural using ShadowDirect and ShadowWeb Server by Rex Bowe](https://reader036.vdocuments.us/reader036/viewer/2022081519/56649d2b5503460f94a012ed/html5/thumbnails/21.jpg)
21
Interface for ADABASInterface for ADABAS
SHADOW ®SHADOW ®
![Page 22: 1 10 th Natural Conference October 29, 2001 High Performance Web-enablement of ADABAS/Natural using ShadowDirect and ShadowWeb Server by Rex Bowe](https://reader036.vdocuments.us/reader036/viewer/2022081519/56649d2b5503460f94a012ed/html5/thumbnails/22.jpg)
22
SQL syntax and native database syntax
• Supports ADABAS end transaction (ET) and
Backout transaction (BT) commands
ADABAS File Level Security
Multi-file Joins in ADABAS
• Up to 5 files
Supports Native ADABAS Constructs and
Operations:
• Multi-Value fields (MU), Periodic Group (PE)
• Cursor Processing
• Multi-descriptor Processing
SQL syntax and native database syntax
• Supports ADABAS end transaction (ET) and
Backout transaction (BT) commands
ADABAS File Level Security
Multi-file Joins in ADABAS
• Up to 5 files
Supports Native ADABAS Constructs and
Operations:
• Multi-Value fields (MU), Periodic Group (PE)
• Cursor Processing
• Multi-descriptor Processing
SHADOW ® Interface for ADABASSHADOW ® Interface for ADABAS
![Page 23: 1 10 th Natural Conference October 29, 2001 High Performance Web-enablement of ADABAS/Natural using ShadowDirect and ShadowWeb Server by Rex Bowe](https://reader036.vdocuments.us/reader036/viewer/2022081519/56649d2b5503460f94a012ed/html5/thumbnails/23.jpg)
23
SHADOW ® Interface for ADABASSHADOW ® Interface for ADABASAccess ADABAS Meta Data from adistributed tool.
![Page 24: 1 10 th Natural Conference October 29, 2001 High Performance Web-enablement of ADABAS/Natural using ShadowDirect and ShadowWeb Server by Rex Bowe](https://reader036.vdocuments.us/reader036/viewer/2022081519/56649d2b5503460f94a012ed/html5/thumbnails/24.jpg)
24
Interface for Natural/ACIInterface for Natural/ACI
SHADOW ®SHADOW ®
![Page 25: 1 10 th Natural Conference October 29, 2001 High Performance Web-enablement of ADABAS/Natural using ShadowDirect and ShadowWeb Server by Rex Bowe](https://reader036.vdocuments.us/reader036/viewer/2022081519/56649d2b5503460f94a012ed/html5/thumbnails/25.jpg)
25
SHADOW ® Shadow ACI’s benefitsSHADOW ® Shadow ACI’s benefits
Simple Implementation CALL SHADOW_ACI(‘SEND’,’NATSRV1,NATPDA1’,1009,’1’,…)
Input/Output data checking & transformation using mapping
Return multiple column, multiple records CICS connection fail over CICS load balancing Resource protection.
Natural Storage leak protection by limiting the amount times the server is accessed before it is restarted.
Shadow Server automatically start and kill servers according to demand.
Allowing less frequently used servers to “Die” free’s up storage for more often used servers, utilizing the available resources more wisely
Simple Implementation CALL SHADOW_ACI(‘SEND’,’NATSRV1,NATPDA1’,1009,’1’,…)
Input/Output data checking & transformation using mapping
Return multiple column, multiple records CICS connection fail over CICS load balancing Resource protection.
Natural Storage leak protection by limiting the amount times the server is accessed before it is restarted.
Shadow Server automatically start and kill servers according to demand.
Allowing less frequently used servers to “Die” free’s up storage for more often used servers, utilizing the available resources more wisely
![Page 26: 1 10 th Natural Conference October 29, 2001 High Performance Web-enablement of ADABAS/Natural using ShadowDirect and ShadowWeb Server by Rex Bowe](https://reader036.vdocuments.us/reader036/viewer/2022081519/56649d2b5503460f94a012ed/html5/thumbnails/26.jpg)
26
SHADOW SHADOW_ACI() SQL CALL
CALL SHADOW_ACI(‘FUNC’,‘SERVER,MAPIN,MAPOUT’,‘DATA’,…)
Parameter Description‘FUNC’ Function for Call, ex. ‘SEND’, ‘SOC’, ‘EOC’.‘SERVER’ Name of defined Natural “server” process.‘MAPIN’ Name of Map definition taken from data area
definition, to provide data-type checking‘MAPOUT’ Name of Map definition taken from data area
definition, to provide result set of Natural data area
SQL example:
CALL SHADOW_ACI('SEND','EXAMPLE1,PARMMAP1',3009,'1')
![Page 27: 1 10 th Natural Conference October 29, 2001 High Performance Web-enablement of ADABAS/Natural using ShadowDirect and ShadowWeb Server by Rex Bowe](https://reader036.vdocuments.us/reader036/viewer/2022081519/56649d2b5503460f94a012ed/html5/thumbnails/27.jpg)
27
OS/390
Shadow Server
RACF ACF2 TOP SECRET
ADABAS
Automated Management
Monitoring/Diagnostics
SHADOW_ACI
CICS/TSREGION
DATAMAPPINGFACILITY
EXCIXS01
XS02
XS03
XS04
XS05
SHADOW DirectTM Interface for CICS/ACI
DFH$AXCS DEFINE DATA LOCAL
CALL ‘BROKER’ RECEIVEAREAFIND EMPLOYEE WITH NAME EQ NAME-INMOVE DATA TO SENDAREACALL ‘BROKER’ SENDAREA
1 SENDAREA (A250)1 RECEIVEAREA (A250)
![Page 28: 1 10 th Natural Conference October 29, 2001 High Performance Web-enablement of ADABAS/Natural using ShadowDirect and ShadowWeb Server by Rex Bowe](https://reader036.vdocuments.us/reader036/viewer/2022081519/56649d2b5503460f94a012ed/html5/thumbnails/28.jpg)
28
OS/390
Shadow Server
RACF ACF2 TOP SECRET
Automated Management
Monitoring/Diagnostics
CICS/TSREGION-A
CICS/TSREGION-B
SHADOW_ACI
SHADOW ® Interface for Natural/CICSSHADOW ® Interface for Natural/CICS
Fail OverSupport
![Page 29: 1 10 th Natural Conference October 29, 2001 High Performance Web-enablement of ADABAS/Natural using ShadowDirect and ShadowWeb Server by Rex Bowe](https://reader036.vdocuments.us/reader036/viewer/2022081519/56649d2b5503460f94a012ed/html5/thumbnails/29.jpg)
29
SHADOW ® Natural Server ManagementSHADOW ® Natural Server Management
ViewMapDetails
![Page 30: 1 10 th Natural Conference October 29, 2001 High Performance Web-enablement of ADABAS/Natural using ShadowDirect and ShadowWeb Server by Rex Bowe](https://reader036.vdocuments.us/reader036/viewer/2022081519/56649d2b5503460f94a012ed/html5/thumbnails/30.jpg)
30
Data Mapping Facility
Powers Shadow in providing metadata and relational resultsets for non-relational data, applications and transactions
Data Mapping Facility
Powers Shadow in providing metadata and relational resultsets for non-relational data, applications and transactions
SHADOW ®SHADOW ®
![Page 31: 1 10 th Natural Conference October 29, 2001 High Performance Web-enablement of ADABAS/Natural using ShadowDirect and ShadowWeb Server by Rex Bowe](https://reader036.vdocuments.us/reader036/viewer/2022081519/56649d2b5503460f94a012ed/html5/thumbnails/31.jpg)
31
01 DFHCOMMAREA 03 INPUT-ID 03 CUSTOMER-NAME 03 ADDRESS-DETAILS 04 ADDRESS-NUMBER 04 ADDRESS-STREET 04 ADDRESS-CITY 04 ADDRESS-STATE
MAP NAME : CUSTINFO
INPUT-IDCUSTOMER-NAME
ADDRESS-NUMBER
ADDRESS-STREET
ADDRESS-CITY
ADDRESS-STATE
Meta Data repository for non-relational data CICS COMMAREA, IMS MFS, VSAM Copybook, ADAREP, ADAWAN or Natural data area
SHADOW ® Data Mapping FacilitySHADOW ® Data Mapping Facility
![Page 32: 1 10 th Natural Conference October 29, 2001 High Performance Web-enablement of ADABAS/Natural using ShadowDirect and ShadowWeb Server by Rex Bowe](https://reader036.vdocuments.us/reader036/viewer/2022081519/56649d2b5503460f94a012ed/html5/thumbnails/32.jpg)
32
SHADOW ® Natural Data Map CreationSHADOW ® Natural Data Map Creation
ExtractMeta DataFromSource code
![Page 33: 1 10 th Natural Conference October 29, 2001 High Performance Web-enablement of ADABAS/Natural using ShadowDirect and ShadowWeb Server by Rex Bowe](https://reader036.vdocuments.us/reader036/viewer/2022081519/56649d2b5503460f94a012ed/html5/thumbnails/33.jpg)
33
SHADOW ® Data Mapping FacilitySHADOW ® Data Mapping Facility
Source code,Copybook,COMMAREA,MFS,Natural Data Area
![Page 34: 1 10 th Natural Conference October 29, 2001 High Performance Web-enablement of ADABAS/Natural using ShadowDirect and ShadowWeb Server by Rex Bowe](https://reader036.vdocuments.us/reader036/viewer/2022081519/56649d2b5503460f94a012ed/html5/thumbnails/34.jpg)
34
SHADOW ® Data Mapping FacilitySHADOW ® Data Mapping Facility
ViewMapDetails
![Page 35: 1 10 th Natural Conference October 29, 2001 High Performance Web-enablement of ADABAS/Natural using ShadowDirect and ShadowWeb Server by Rex Bowe](https://reader036.vdocuments.us/reader036/viewer/2022081519/56649d2b5503460f94a012ed/html5/thumbnails/35.jpg)
35
Monitoring andDiagnostics
A centralized detailed tracing facility,monitoring real-time usage.
Monitoring andDiagnostics
A centralized detailed tracing facility,monitoring real-time usage.
SHADOW ®SHADOW ®
![Page 36: 1 10 th Natural Conference October 29, 2001 High Performance Web-enablement of ADABAS/Natural using ShadowDirect and ShadowWeb Server by Rex Bowe](https://reader036.vdocuments.us/reader036/viewer/2022081519/56649d2b5503460f94a012ed/html5/thumbnails/36.jpg)
36
Trace ADABAS queries SQL -> ADABAS Direct Calls Display of ADABAS Control Block
Trace Natural servers Natural Server activity Display input and output data buffers
Record error messages
ISPF panel and web monitoring interfaces
Trace ADABAS queries SQL -> ADABAS Direct Calls Display of ADABAS Control Block
Trace Natural servers Natural Server activity Display input and output data buffers
Record error messages
ISPF panel and web monitoring interfaces
SHADOW TM Monitoring and Diagnostics
![Page 37: 1 10 th Natural Conference October 29, 2001 High Performance Web-enablement of ADABAS/Natural using ShadowDirect and ShadowWeb Server by Rex Bowe](https://reader036.vdocuments.us/reader036/viewer/2022081519/56649d2b5503460f94a012ed/html5/thumbnails/37.jpg)
37
SHADOWSHADOW ®® Diagnostic FacilitySHADOWSHADOW ®®
Diagnostic Facility
Monitoring Users
![Page 38: 1 10 th Natural Conference October 29, 2001 High Performance Web-enablement of ADABAS/Natural using ShadowDirect and ShadowWeb Server by Rex Bowe](https://reader036.vdocuments.us/reader036/viewer/2022081519/56649d2b5503460f94a012ed/html5/thumbnails/38.jpg)
38
SHADOW SHADOW ®® Diagnostic FacilityDiagnostic FacilitySHADOW SHADOW ®®
Diagnostic FacilityDiagnostic Facility
Trace Browse
![Page 39: 1 10 th Natural Conference October 29, 2001 High Performance Web-enablement of ADABAS/Natural using ShadowDirect and ShadowWeb Server by Rex Bowe](https://reader036.vdocuments.us/reader036/viewer/2022081519/56649d2b5503460f94a012ed/html5/thumbnails/39.jpg)
39
Maximum Rows Limit resultset size
Maximum DB2 Timerons
• Prevents expensive queries from starting
Maximum CPU Usage
• Per Session• Per Query
DB2 Lock Utilization Limits
• Fail & Warning for:– Shared– Update– Exclusive
Wide range of detectable Shadow events
• Resource management events• Security events• SQL, DL/1, RPC, CICS, IMS• Communication events
Wide range of actions available
• Terminate connection and thread
• Adjust performance profiles• Modify queries• Adjust authorization details • Limit rows and CPU Time
SHADOW ® Event FacilitySHADOW ® Event Facility
![Page 40: 1 10 th Natural Conference October 29, 2001 High Performance Web-enablement of ADABAS/Natural using ShadowDirect and ShadowWeb Server by Rex Bowe](https://reader036.vdocuments.us/reader036/viewer/2022081519/56649d2b5503460f94a012ed/html5/thumbnails/40.jpg)
4017
What are customers doing with SEF?What are customers doing with SEF?•••
•.
•• -like MAXROWS.•
•Modifying or rejection queries before they execute (check for WHERE clause)
•
•Limit the number of connections that a user can have•Restrict access to only certain DB2s from certain Shadows•Obtaining ACF2 Logon information from a user’s ACEE and returning it to the client application.•Granting users additional CPUTIME and unlimited FAILWAITIME
based on userid.•Restricting logons during certain parts of the day•Overriding client connection parameters -like MAXROWS.•Quiescingthe server rather than shutting down nightly when running database backups•Modifying or rejection queries before they execute (check for WHERE clause)
•Prevent expensive queries from running
SHADOW® Event FacilitySHADOW® Event Facility
![Page 41: 1 10 th Natural Conference October 29, 2001 High Performance Web-enablement of ADABAS/Natural using ShadowDirect and ShadowWeb Server by Rex Bowe](https://reader036.vdocuments.us/reader036/viewer/2022081519/56649d2b5503460f94a012ed/html5/thumbnails/41.jpg)
41
ShadowWeb Servervisit http://mkt.neonsys.comShadowWeb Server
visit http://mkt.neonsys.com
SHADOW ®SHADOW ®
![Page 42: 1 10 th Natural Conference October 29, 2001 High Performance Web-enablement of ADABAS/Natural using ShadowDirect and ShadowWeb Server by Rex Bowe](https://reader036.vdocuments.us/reader036/viewer/2022081519/56649d2b5503460f94a012ed/html5/thumbnails/42.jpg)
42
SHADOW Web ServerTM 2-tier Shadow Web SHADOW Web ServerTM 2-tier Shadow Web
MVS-OS/390
TCP/IP
Windows, NT, OS/2,
UNIX
Web Client
Intranet/Internet
Shadow Web ServerRACF
ACF2Top Secret
HTTP
SDF(ISPF)
WWW Rules
DB2
CICS,Natural
IMS
ADABAS
VSAM,IDMS,others
TraceBrowse
![Page 43: 1 10 th Natural Conference October 29, 2001 High Performance Web-enablement of ADABAS/Natural using ShadowDirect and ShadowWeb Server by Rex Bowe](https://reader036.vdocuments.us/reader036/viewer/2022081519/56649d2b5503460f94a012ed/html5/thumbnails/43.jpg)
43
It works on OS/390!
Leverage existing OS/390 skills & assets
Secure, scalable, and reliable
Turn-key and rapid development features
Supports proprietary development approaches
(secure)
Adaptable to emerging http technologies
Cost effective
No additional hardware required
Rapid installation and development
Minimal support staff
It works on OS/390!
Leverage existing OS/390 skills & assets
Secure, scalable, and reliable
Turn-key and rapid development features
Supports proprietary development approaches
(secure)
Adaptable to emerging http technologies
Cost effective
No additional hardware required
Rapid installation and development
Minimal support staff
SHADOW Web ServerTM Why consider it?SHADOW Web ServerTM Why consider it?
![Page 44: 1 10 th Natural Conference October 29, 2001 High Performance Web-enablement of ADABAS/Natural using ShadowDirect and ShadowWeb Server by Rex Bowe](https://reader036.vdocuments.us/reader036/viewer/2022081519/56649d2b5503460f94a012ed/html5/thumbnails/44.jpg)
44
10. References: Many high volume, high performance, HAPPY customers
from the home office in Sugar Land, Texas
SHADOW ® Top Ten Benefits SHADOW ® Top Ten Benefits
9. Visibility: Extraordinary real-time end-to-end monitoring and diagnostics
8. SYSPROG and DBA Control: Automated management to control utilization by distributed applications
7. Transparent access OS/390 Data and Transactions: One product to access DB2, IMS, ADABAS, VSAM, CICS/TS, Natural, more . . .
6. Security: Support RACF, ACF2, TopSecret via SAF; cuts SMF records; Encryption with SSL, TLS, support subsystem security, KILL command
5. Reduce Network Load: Optimizations to reduce bandwidth requirements and network round trips
4. Quality of Service (QoS): High performance, reliable, scalable and secure architecture requiring no gateways
3. Integration Standards: ODBC, JDBC, XML, HTML
2. Leverage Investments: OS/390 hardware, software and skills
1. Reduce Costs: Reduce total cost of ownership (TCO) and manpower to maintain due to “no gateway” architecture
![Page 45: 1 10 th Natural Conference October 29, 2001 High Performance Web-enablement of ADABAS/Natural using ShadowDirect and ShadowWeb Server by Rex Bowe](https://reader036.vdocuments.us/reader036/viewer/2022081519/56649d2b5503460f94a012ed/html5/thumbnails/45.jpg)
45
NEON, Shadow, ShadowDirect, and Enterprise Direct are registered trademarks, and Shadow Activity Monitor, Shadow Advanced Scalability, Shadow AutoHTML, Shadow Enterprise Transactions, Shadow Event Facility, Shadow Interface, Shadow REXX/Tools, Shadow TLS, Shadow Web Interface, Shadow Web Server for OS/390, and Shadow Web Server for VM are trademarks of NEON Systems, Inc.
ADABAS and Natural are registered trademarks of Software AG.
DB2, CICS, MQSeries, and OS/390 are registered trademarks, and MVS and IMS are trademarks of the IBM Corporation.
All other trademarks are the property of their respective owners.
![Page 46: 1 10 th Natural Conference October 29, 2001 High Performance Web-enablement of ADABAS/Natural using ShadowDirect and ShadowWeb Server by Rex Bowe](https://reader036.vdocuments.us/reader036/viewer/2022081519/56649d2b5503460f94a012ed/html5/thumbnails/46.jpg)
46
ShadowLIVE DEMO!
ShadowLIVE DEMO!
SHADOW ®SHADOW ®