WebSphere Business Integration Message Broker Basics

WebSphere Business Integration Message Broker Basics

Author: Saida Davies

Publisher:

Published: 2004

Total Pages: 256

ISBN-13:

DOWNLOAD EBOOK

This IBM Redbooks publication provides an overview of the latest release of WebSphere Business Integration Message Brokers and the new Message Brokers Toolkit for WebSphere Studio. It covers the following topics: - Installing WebSphere Business Integration Message Broker and WebSphere Business Integration Event Broker on Windows - Creating and verifying a default configuration - Developing a simple message flow and message set in the Message Brokers Toolkit - Deploying a message flow application to a broker - Diagnosing and fixing problems The book also describes where to find more information, including product documentation and sample applications.


Using WebSphere Message Broker V8 in Mid-Market Environments

Using WebSphere Message Broker V8 in Mid-Market Environments

Author: Carla Sadtler

Publisher: IBM Redbooks

Published: 2012-08-31

Total Pages: 510

ISBN-13: 073843700X

DOWNLOAD EBOOK

IBM WebSphere® Message Broker is a lightweight, advanced enterprise service bus (ESB) that provides a broad range of integration capabilities that enable companies to rapidly integrate internal applications and connect to partner applications. Messages from business applications can be transformed, augmented and routed to other business applications. The types and complexity of the integration required will vary by company, application types, and a number of other factors. Processing logic in WebSphere Message Broker is implemented using message flows. Through message flows, messages from business applications can be transformed, augmented, and routed to other business applications. Message flows are created by connecting nodes together. A wide selection of built-in nodes are provided with WebSphere Message Broker. These nodes perform tasks that are associated with message routing, transformation, and enrichment. Message flows are created and tested using the Message Broker Toolkit, a sophisticated, easy-to-use programming tool that provides a full range of programming aids. This IBM® Redbooks® publication focuses on two specific integration requirements that apply to many midmarket companies. The first is the ability to use WebSphere Message Broker to integrate Microsoft.NET applications into a broader connectivity solution. WebSphere Message Broker V8 introduces the ability to integrate with existing Microsoft .NET Framework applications. A .NET assembly can be called from within a message flow and the WebSphere Message Broker runtime can host and run .NET code. Solutions explored in this book cover connectivity to applications using Windows Communications Framework (WCF), Microsoft Message Queuing, Microsoft Dynamics CRM, and other Microsoft applications. The second is the ability to integrate WebSphere Message Broker with file transfer networks, specifically with WebSphere MQ File Transfer Edition and IBM Sterling Connect Direct.


WebSphere MQ V6 Fundamentals

WebSphere MQ V6 Fundamentals

Author: Saida Davies

Publisher: IBM Redbooks

Published: 2005-12-15

Total Pages: 446

ISBN-13: 073849299X

DOWNLOAD EBOOK

This IBM Redbooks publication describes the fundamental concepts and benefits of message queuing technology. This book is an update of a very popular Redpaper (REDP-0021) based on IBM WebSphere MQ Versions 5.0 to 5.2. This publication provides a design-level overview and technical introduction for the established and reliable WebSphere MQ product. A broad technical understanding of the WebSphere MQ product can improve design and implementation decisions for WebSphere MQ infrastructures and applications. To reduce the time required to gain this understanding, this book summarizes relevant information from across the WebSphere MQ product documentation. We also include hands-on security and troubleshooting sections to aid understanding and provide a reference for common administrative actions performed when building and maintaining WebSphere MQ infrastructures. In the appendix, we provide a summary of the new features in WebSphere MQ Version 6.0.


Building Smarter Planet Solutions with MQTT and IBM WebSphere MQ Telemetry

Building Smarter Planet Solutions with MQTT and IBM WebSphere MQ Telemetry

Author: Valerie Lampkin

Publisher: IBM Redbooks

Published: 2012-09-07

Total Pages: 268

ISBN-13: 0738437085

DOWNLOAD EBOOK

MQ Telemetry Transport (MQTT) is a messaging protocol that is lightweight enough to be supported by the smallest devices, yet robust enough to ensure that important messages get to their destinations every time. With MQTT devices such as smart energy meters, cars, trains, satellite receivers, and personal health care devices can communicate with each other and with other systems or applications. This IBM® Redbooks® publication introduces MQTT and takes a scenario-based approach to demonstrate its capabilities. It provides a quick guide to getting started and then shows how to grow to an enterprise scale MQTT server using IBM WebSphere® MQ Telemetry. Scenarios demonstrate how to integrate MQTT with other IBM products, including WebSphere Message Broker. This book also provides typical usage patterns and guidance on scaling a solution. The intended audience for this book ranges from new users of MQTT and telemetry to those readers who are looking for in-depth knowledge and advanced topics.


Secure Messaging Scenarios with WebSphere MQ

Secure Messaging Scenarios with WebSphere MQ

Author: T.Rob Wyatt

Publisher: IBM Redbooks

Published: 2013-04-02

Total Pages: 366

ISBN-13: 0738437409

DOWNLOAD EBOOK

The differences between well-designed security and poorly designed security are not always readily apparent. Poorly designed systems give the appearance of being secure but can over-authorize users or allow access to non-users in subtle ways. The problem is that poorly designed security gives a false sense of confidence. In some ways, it is better to knowingly have no security than to have inadequate security believing it to be stronger than it actually is. But how do you tell the difference? Although it is not rocket science, designing and implementing strong security requires strong foundational skills, some examples to build on, and the capacity to devise new solutions in response to novel challenges. This IBM® Redbooks® publication addresses itself to the first two of these requirements. This book is intended primarily for security specialists and IBM WebSphere® MQ administrators that are responsible for securing WebSphere MQ networks but other stakeholders should find the information useful as well. Chapters 1 through 6 provide a foundational background for WebSphere MQ security. These chapters take a holistic approach positioning WebSphere MQ in the context of a larger system of security controls including those of adjacent platforms' technologies as well as human processes. This approach seeks to eliminate the simplistic model of security as an island, replacing it instead with the model of security as an interconnected and living system. The intended audience for these chapters includes all stakeholders in the messaging system from architects and designers to developers and operations. Chapters 7 and 8 provide technical background to assist in preparing and configuring the scenarios and chapters 9 through 14 are the scenarios themselves. These chapters provide fully realized example configurations. One of the requirements for any scenario to be included was that it must first be successfully implemented in the team's lab environment. In addition, the advice provided is the cumulative result of years of participation in the online community by the authors and reflect real-world practices adapted for the latest security features in WebSphere MQ V7.1 and WebSphere MQ V7.5. Although these chapters are written with WebSphere MQ administrators in mind, developers, project leaders, operations staff, and architects are all stakeholders who will find the configurations and topologies described here useful. The third requirement mentioned in the opening paragraph was the capacity to devise new solutions in response to novel challenges. The only constant in the security field is that the technology is always changing. Although this book provides some configurations in a checklist format, these should be considered a snapshot at a point in time. It will be up to you as the security designer and implementor to stay current with security news for the products you work with and integrate fixes, patches, or new solutions as the state of the art evolves.


High Availability in WebSphere Messaging Solutions

High Availability in WebSphere Messaging Solutions

Author: Bhushan Bharat

Publisher: IBM Redbooks

Published: 2010-05-02

Total Pages: 268

ISBN-13: 0738434264

DOWNLOAD EBOOK

This IBM® Redbooks® publication is for anyone needing to increase WebSphere® messaging availability, especially people interested in the new capabilities of WebSphere MQ and WebSphere Message Broker. It discusses and demonstrates solutions to provide high availability for WebSphere Messaging solutions. For the distributed platforms, this ranges from the traditional PowerHATM for AIX® to the new WebSphere MQ multi-instance queue managers and WebSphere Message Broker multi-instance brokers. For the appliance users, we included solutions for WebSphere DataPower®. For enterprises that need continuous availability of WebSphere MQ messages, MQ Queue Sharing Groups and the CICS® Group Attach features are demonstrated. The book includes guidance on HA options, such as when you might need PowerHA (or a similar solution for your platform), when the multi-instance features work for your applications, and when duplexing the coupling facility structures might be appropriate.


Exploiting IBM PowerHA SystemMirror V6.1 for AIX Enterprise Edition

Exploiting IBM PowerHA SystemMirror V6.1 for AIX Enterprise Edition

Author: Dino Quintero

Publisher: IBM Redbooks

Published: 2014-02-18

Total Pages: 598

ISBN-13: 0738437999

DOWNLOAD EBOOK

This IBM® Redbooks® publication positions the IBM PowerHA® SystemMirror® V6.1 for AIX® Enterprise Edition as the cluster management solution for high availability. This solution enables near-continuous application service and minimizes the impact of planned and unplanned outages. The primary goal of this high-availability solution is to recover operations at a remote location after a system or data center failure, establish or strengthen a business recovery plan, and provide separate recovery location. The IBM PowerHA SystemMirror Enterprise Edition is targeted at multisite high-availability disaster recovery. The objective of this book is to help new and existing PowerHA customers to understand how to plan to accomplish a successful installation and configuration of the PowerHA SystemMirror for AIX Enterprise Edition. This book emphasizes the IBM Power SystemsTM strategy to deliver more advanced functional capabilities for business resiliency and to enhance product usability and robustness through deep integration with AIX, affiliated software stack, and storage technologies. PowerHA SystemMirror is designed, developed, integrated, tested, and supported by IBM from top to bottom.