IBM WebSphere Developer Technical Journal

Issue 17.2: April 9, 2014


In this issue

This issue of the IBM WebSphere Developer Technical Journal has some compelling reading if you're working on mobile or cloud projects - which, it seems, almost everyone is. You'll find a list of dos and don'ts for readying your applications for the cloud, steps for freeing your web content from mobile browsers, and a real world mobile case study describing how a set of integrated IBM products helps people save lives. If security makes you feel better, there's a piece explaining how you can protect your MQ cluster queues from their neighbors, and another that shows how to make sure your IBM PureApplication System workload and pattern data get backed up.

Your required reading begins below...

Featured articles

  • Journal
                                    Article

    Real world, real urgency: How IBM Worklight, MQ and WebSphere Message Broker deliver near real-time 911 call data to emergency responders

    by Bill Paris
    In an emergency, seconds count. Providing information to emergency responders even before they’re dispatched to the scene can mean the difference between life and death. Delivering that information quickly and reliably requires careful planning and the right combination of technologies. This article provides a case study of a real world emergency mobile web application developed with a combination of IBM® Worklight®, IBM MQ and IBM WebSphere® Message Broker technologies for a specialized rescue team in a major urban police department.

  • Journal
                                    Article

    Top 9 rules for cloud applications: The dos and don'ts of making your application cloud-ready

    by Kyle Brown and Mike Capern
    An application is cloud-ready if it can be effectively deployed into either a public or private cloud. This means that the application needs to be designed so that it can leverage the Platform as a Service (PaaS) layer on which it runs, and that it won't break because of design limitations that collide with assumptions made in the PaaS layer. But that doesn't mean you have to start from scratch. If you follow some simple rules in your application design, you can usually make your existing applications cloud-ready without having to go through an entire re-implementation.

  • Journal
                                    Article

    IBM PureApplication System backup and restore, Part 3: Workload backup

    by Bobby Woolf and Tamiko Brown
    IBM® PureApplication® System is a cloud computing system-in-a-box with integrated hardware and software for deploying and executing workloads in a cloud. As with other systems, administrators should maintain a current set of backups of the system and its workloads. While the system backup feature in PureApplication System captures the system’s configuration, other backup techniques are needed if you need to recreate or restore cloud, workload, or data components at a more granular level. The first two articles in this series described possible recovery scenarios for PureApplication System, and administrative information for backing up application and workload data. This article explains how to backup workload components, and also how to add configuration to patterns so that their pattern instances will backup their application data.

  • Journal
                                    Article

    Liberate mobile devices from their browsers: Integrating IBM Web Content Manager and Worklight to make web content consumable by a mobile app

    by Hala Aziz, Hisham Abdel Hafez and Tamer Mahfouz
    IBM® Web Content Manager enables users to create and manage content that is displayed on the web. Because there is no direct integration between Web Content Manager and mobile applications, a user needs to use a web browser in order to render Web Content Manager contents on a mobile device or tablet. Mobile applications built with IBM Worklight® use REST interfaces to retrieve data from the server side in JSON format. This article shows how you can expose Web Content Manager content using a REST/JSON interface that can be consumed by mobile applications implemented with Worklight. This same technique can also be used for a REST/XML interface, and also for non-Worklight applications.

  • Journal
                                    Article

    A neighborhood watch for your clusters: Securing cluster queues from unauthorized applications

    by Nandini Devi
    When you have multiple applications connected to a cluster, it will become necessary to secure your cluster queues from unauthorized applications putting messages to them. Authorizing those applications to put messages into the cluster queues can be done by a remote queue manager or by the local queue manager in the cluster. As per business security demands, IBM MQ clusters are configured with SSL, channel exits, and other means of security that decide whether the cluster queue managers can trust each other. Based on those security settings between the cluster queue managers, the MQ admininistrator who is designing the cluster needs to decide whether users should be authorized locally or remotely to access the clustered queues. In a complex cluster environment, it is difficult to set different levels of access for the cluster queues residing in the same queue manager. This article describes scenarios using features available in IBM MQ V7.5 and earlier. It also describes the problem scenarios associated with them and explains the best cluster queue security practices that help when designing complex MQ cluster environments.

More columns

  • + ExpandComment lines

    Comment lines editorials feature a diverse roster of subject matter experts discussing a wide array of topics, whether it's something related to the use of IBM products, emerging technologies, industry trends, or something else that WebSphere software users need to know.

  • + ExpandConquering complexity

    Each installment of Conquering complexity addresses a common issue related to security that can be resolved or simplified using IBM WebSphere DataPower Appliances and other IBM technologies.

  • + ExpandInnovations within reach

    Innovations within reach features new information and discussions on topics related to emerging technologies, from both developer and practitioner standpoints, plus behind-the-scenes looks at leading edge IBM WebSphere products.

  • + ExpandMission: Messaging

    The WebSphere Contrarian answers questions, provides guidance, and otherwise discusses fundamental topics related to the use of WebSphere products, often dispensing field-proven advice that contradicts prevailing wisdom.

  • + ExpandThe Support Authority

    The Support Authority discusses resources, tools, and other elements of IBM Technical Support that are available for WebSphere products, plus techniques and new ideas that can further enhance your IBM support experience.

  • + ExpandThe WebSphere Contrarian

    The WebSphere Contrarian answers questions, provides guidance, and otherwise discusses fundamental topics related to the use of WebSphere products, often dispensing field-proven advice that contradicts prevailing wisdom.