© 2014 IBM Corporation The Mobile Enterprise with IBM Integration Bus Andrew Coleman IBM Integration Bus Development Co-Chair, W3C XML Query Working Group
Jan 18, 2015
© 2014 IBM Corporation
The Mobile Enterprise with
IBM Integration Bus
Andrew Coleman
IBM Integration Bus Development
Co-Chair, W3C XML Query Working Group
Agenda
� The mobile revolution
� Challenges for mobile
� Techniques for mobile
� IBM products – IBM Worklight
– IBM MessageSight
– IBM Integration Bus
� Demonstration
� Mobile B2C
• Increase customer satisfaction by enabling banking, insurance, and trading anywhere, anytime
• Reach customers in new ways through mobile applications, SMS, email
� Mobile B2E & B2B
• Enable field employees for increased productivity
• Greater efficiency and accuracy in supply chain operations
• Exchange business information with partners securely
� Mobile M2M
• Enable the exchange of data and events between businesses and machines
• Internet of Things - sensor events feeding information and driving a smarter planet
Mobile � a new frontier of business growth
Mobile is a prelude to the full Internet of Things
Build mobile apps
Connect to, and runbackend systems in support of mobile
Build & Connect
Extend existing business capabilities to mobile devices
Transform the business by creating new opportunities
Extend & Transform
Manage mobile devices and apps
Secure my mobile business
Manage & Secure
IBM Strategy Addresses IBM Client Mobile Initiatives
Key Challenges for mobile
� Bring Your Own Device (BYOD)is forcing companies to support a range of devices.
� Mobile Development is more challenging than traditional Web App Development:– Which smartphone? Which tablet? Which form factor?
• iOS, Android, Blackberry, Windows Phone
– Skills?• Web or native apps? Java or Objective C? Or other?
– Maintenance?• Separate software stacks for each major OS
• Separate applications for each major OS
• How do I keep software current?
– Power consumption • Always on, always connected, battery powered devices
� Mobile brings new challenges to integration– Security?
• Encryption? Authentication?
• Response to stolen/lost devices?
– Management?• How do I provide support and service?
– Enterprise Integration?• How do I build cross-channel app?
– Responsiveness ?• Near-real time delivery of information
– Scalability• Number of clients
• Volume of data
Browser Based, Web Applications� Accessible over the internet without need to
download an app (or install a browser plug-in)
� Use device browser to display content
Native� Able to make use of phone's native features such
as camera, GPS, accelerometer, calendar, etc..
� Supports the richest of user experiences (e.g., gaming applications)
Hybrid – Both Web and Native Components
� Native looking applications which utilize the browser interface to deliver content
� Provide the ability to use native device features without writing code for each device
Techniques for creating Mobile Applications
What to consider: Native, Web, Hybrid
Mobile Browser ExecutionMobile Browser Execution
Traditional Trade-offs
(without MEAP/MAP)
Characteristics
Maintenance Cost (TCO)Maintenance Cost (TCO)
Portability (crossPortability (cross--device reuse)device reuse)
Richness of Mobile Presentation / ServicesRichness of Mobile Presentation / Services
Web Application
Desktop and mobile using open web (HTML,
JavaScript) client programming models
Limited to no device-specific functionality
Web Application
Desktop and mobile using open web (HTML,
JavaScript) client programming models
Limited to no device-specific functionality
AppStore download and installAppStore download and install
Native Mobile Applic.
Mobile only, developed using native languages
or transcode to native via MAP tools
Native appearance anddevice capabilities,
performance
Native Mobile Applic.
Mobile only, developed using native languages
or transcode to native via MAP tools
Native appearance anddevice capabilities,
performance
Mobile Web Application
Mobile only using open web (HTML5, JavaScript)
client programming models
Off-line capabilities
Mobile Web Application
Mobile only using open web (HTML5, JavaScript)
client programming models
Off-line capabilities
Hybrid Mobile Applic.
Mobile only, app runs on device leveraging open
web (HTML5, JS) via JavaScript bridge
Native device capabilities (GPS, camera, contacts)Mimic native appearance
Hybrid Mobile Applic.
Mobile only, app runs on device leveraging open
web (HTML5, JS) via JavaScript bridge
Native device capabilities (GPS, camera, contacts)Mimic native appearance
• Easy to develop and• manage• Only browser
specifics
• Compromise
• Depending on functionality of
• Development environment
• High Performance
• Best Usability
• Always limited to specific devices
� The HTTP standard revolutionized how people
consume data– A single simple model: Send a request, read the
response
– Available via any tablet, laptop, phone, PC etc.
ideal for requesting data from a known source
• Mobile user sending or requesting info
� BUT�.
– when a mobile user submits a transaction or
– when distribution needs to be optimized
across MANY users.. an event-oriented
paradigm can be a game changer:
• Sending information reliably over
unreliable networks
• Transmitting information one to many
• Reacting to events whenever they
happen
• Distributing minimal packets of data in
huge volumes
Origin
Infrastru
cture
12
4 3
Connecting using more than just HTTP
MQTT: Key Features
ReliableReliableReliable
OpenOpenOpen
SimpleSimpleSimple
LeanLeanLean• Open published spec designed for the
world of “devices”• MQTT client code (C and Java) donated
to the Eclipse "Paho" M2M project
• Simple / minimal pub/sub messaging
semantics• Asynchronous (“push”) delivery
• Simple set of verbs -- connect, publish,
subscribe and disconnect.
• Minimized on-the-wire format• Smallest possible packet size is 2 bytes
• No application message headers
• Reduced complexity/footprint• Clients: C=50Kb; Java=100Kb
• Three qualities of service:0 – at most once delivery
1 – assured delivery but may be duplicated
2 – once and once only delivery
• In-built constructs to support loss of
contact between client and server.• “Last will and testament” to publish a
message if the client goes offline.
• Stateful “roll-forward” semantics and
“durable” subscriptions.
IBM Products
Advanced mobile application platform for smartphones and tablets
Worklight
IBM MessageSight: Feature summary
Orders of Magnitude
Improvements
MassiveScale
m2m and Mobile
Optimizedfor Wireless
ClientsDMZ ReadyAppliance
Secureand Reliable
Simple Programming
Model
DeveloperFriendly
Open Standards
Easy to Integrate
Hours notWeeks
Easy toDeploy
•Allows your business to scale to the demands of the mobile and m2m use cases
•Easily and securely extends your existing messaging infrastructure across the
Internet
•Easy to develop applications with simple programming interfaces
IBM Integration Bus
Mobile client initiatives: Build and Connect
Build mobile applications
Connect to, and runbackend systems in support of mobile
Manage mobile devices and applications
Secure my mobile business
Client Initiatives
Customers can now build enterprise mobile
applications that:
• Run on multiple mobile devices
• Connect to enterprise back-end
applications and information systems
• Fulfills fast time-to-market
requirements and can be rapidly
updated with new releases
• Deliver high quality user experience
Extend existing business capabilities to mobile devices
Transform the business by creating new opportunities
Customers able to expose all existing
business applications for mobile access :
• Simple patterns-based approach to
integrating wide range of systems
including SAP, Microsoft, Mainframes,
databases
• Secure, Scalable access to critical data
• Integrate your mobile platform as part
of your core business backbone
+
WLM
1 MILLION Concurrent
Connections
IBM IBM MessageSightMessageSight
Protect and manage high
volume access to backend
systems with traffic traffic
shapingshaping
Minimize requests routed
to backend systems with
embedded caching embedded caching for
rapid response times
Simplify development and
maintain security with
prebuilt patterns prebuilt patterns for
common scenarios
IBM Integration BusIBM Integration Bus
Enable and manage high volume client access to enterprise applications, systems and data
DB
PackagedApplications
MQJMS
Data
SOA
Files
←
Third Party Notification Server
(Google, Apple, RIM, Microsoft)
� Mobile enable any enterprise service in 2 clicks !
� Build robust solutions with integrated caching & security
� Push data to mobile users from enterprise applications
� Create end-to-end mobile solutions for Microsoft .NET
� Content based filtering of publications from mobile devices
� Publishing events from back-ends to mobile devices
Microsoft Dynamics & .NET
IBMSystem z
Now its easy to build connected mobile
applicationsPre-built accelerators in IBM Integration Bus
Simple & Integrated Developer Experience
1
4 3
2
Write your app:Use Worklight
studio – write once, run anywhere
Integrate : GenerateWorklight adapter
ready for deployment
Choose : Select your pattern in
Integration toolkit
Configure :Accept default
values or tailor for your scenario
IIB Patterns are
configurable templates
for common integration
scenarios
Build mobile apps in as few as two-clicks!
� Right-click on any enterprise service (MQ, Database, Web service,
CICS, IMS, etc�)
� Left-click to create mobile service with default options
Example: Expose a Microsoft .NET application as a mobile service
�Simple to configure – Drag and drop .NET assembly into
Integration toolkit and enter Worklight adapter details
�Super quick – Pattern does all the hard work in less than a
minute, generating�
• A Web service implementation exposing desired
operations
• An adapter ready for deployment to Worklight
Server
• Use in-built sample mobile application for easy
testing
Mobile enable your existing Enterprise
Applications
Fast, Controlled and Secure access to the
EnterpriseMaximize response time whilst protecting critical
backend systems
�Built-in global cache available to a network of integration
nodes
�Highly available and scalable data sharing for mobile
�Reduce application load for reused data
�Policy driven workload management for operational control
over requests flowed to backend
Secure access to enterprise data
�Provide secure access to applications from mobile
� IIB acts as a policy decision point for mobile access to
back-end resources via CRUD operations
�Map identities between security domains
�Provide secure external access services to partners
�Complements security features of DataPower
appliances
Push Notify mobile applications of enterprise
events
Deliver alerts to your employees or clients�Worklight supports asynchronous push notifications to mobile applications
�Pattern to rapidly enable enterprise services to send notifications
� e.g. MQ, SAP, Database, Medical system, etc�
� Generates Web service and Worklight adapter to deliver notifications to mobile
applications
Content based filtering of publications from
mobile
Protect backend from incoming noise�Only messages that match specified criteria are forwarded
�Messages that do not match the criteria can be logged or discarded
�Pattern includes javascript based test client
Publish event notification to mobile devices
Extend existing notification mechanisms to reach mobile users� IIB detects events occurring in back-end systems
�Pattern to transform those events and publish to mobile devices
�Pattern includes javascript based test application
Traffic ShapingShape (delay)
Notify
Integration Tools
Create
WLM PolicyEdit
WLM Policy
Operations TimeDesign Time
Policy Enforcement
Integration
BusNotification
Set initial processing rates at design timeSet initial processing rates at design time
Set up notifications at given thresholdsSet up notifications at given thresholds
Shape traffic for processing rate consistencyShape traffic for processing rate consistency
• Develop greater operational awareness
and control over processing traffic with
rate enforcement and notifications
• Maintain availability of business-critical
services with the ability to shape traffic
to prevent backend overload as
demand spikes
• Define policies at design time and
modify operationally
Make updates operationally as neededMake updates operationally as needed
New Capabilities:
Protect backend systems and uncover trends with policy driven enforcement
Observe
Summary
Mobile revolution is presenting new opportunities
Exploiting these opportunities poses new challenges
Different techniques are employed to overcome those challenges
IIB works in concert with Worklight and Message Sight
Caching
Security policy enforcement
Operational monitoring
Traffic shaping
Patterns
Message
Sight
MessageMessage
SightSight
WorklightWorklightWorklight
IBM Integration Bus This Week – Selected Sessions
� Monday– 2.30-3.30 Palazzo H – Integration Featured Session
– 2.30-5.00 Murano 3305 – Healthcare Integration Lab
– 4.00-5.00 Palazzo H – What's New in IIB
– 5.15-6.15 Palazzo H – Introduction to IIB
� Tuesday– 10.30-11.30 Palazzo H – Cloud Integration Options
– 10.30-11.30 San Polo 3502 – Meet The Experts
– 1.00-2.00 Palazzo H – WESB Conversion
– 1.00-2.00 Marcello 4403 – IIB Retail Integration Pack
– 1.00-3.15 Murano 3303 – IIB V9 Lab
– 2.15-3.15 Palazzo H – Designing for Performance
– 3.45-4.45 Palazzo H – Mobile Integration
– 5.00-6.00 Palazzo H – DFDL Introduction
– 5.00-6.00 Marcello 4402 – Manufacturing in IIB
26
IBM Integration Bus This Week – Selected Sessions
� Wednesday– 10.30-11.30 Palazzo H – .NET Integration
– 1.00-2.00 Palazzo H – Effective Application Development
– 1.00-2.00 Marcello 4403 – IIB Healthcare Integration Pack
– 1.00-2.00 San Polo 3503 – Meet The Experts (Repeat)
– 2.15-3.15 Palazzo H – Effective Administration
– 3.45-4.45 Palazzo H – Applications, Libraries, APIs
– 3.45-6.00 Murano 3303 – IIB Open Beta Lab
– 5.00-6.00 Palazzo H – Transformation Options in IIB
� Thursday– 9.00-10.00 Palazzo H – Predictive Analytics
– 10.30-11.30 Palazzo H – BPM Integration
– 1.00-2.00 Palazzo H – Modelling Industry Formats
– 2.15-3.15 Palazzo H – What's New in IIB (Repeat)
27
We Value Your Feedback
� Don’t forget to submit your Impact session and speaker feedback! Your feedback is very important to us – we use it to continually improve the conference.
� Use the Conference Mobile App or the online Agenda Builder to quickly submit your survey
– Navigate to “Surveys” to see a view of surveys for sessions you’ve attended
28
Legal Disclaimer
• © IBM Corporation 2014. All Rights Reserved.
• The information contained in this publication is provided for informational purposes only. While efforts were made to verify the completeness and accuracy of the information contained
in this publication, it is provided AS IS without warranty of any kind, express or implied. In addition, this information is based on IBM’s current product plans and strategy, which are
subject to change by IBM without notice. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, this publication or any other materials. Nothing
contained in this publication is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and
conditions of the applicable license agreement governing the use of IBM software.
• References in this presentation to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and/or
capabilities referenced in this presentation may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to
future product or feature availability in any way. Nothing contained in these materials is intended to, nor shall have the effect of, stating or implying that any activities undertaken by
you will result in any specific sales, revenue growth or other results.
• If the text contains performance statistics or references to benchmarks, insert the following language; otherwise delete:
Performance is based on measurements and projections using standard IBM benchmarks in a controlled environment. The actual throughput or performance that any user will
experience will vary depending upon many factors, including considerations such as the amount of multiprogramming in the user's job stream, the I/O configuration, the storage
configuration, and the workload processed. Therefore, no assurance can be given that an individual user will achieve results similar to those stated here.
• If the text includes any customer examples, please confirm we have prior written approval from such customer and insert the following language; otherwise delete:
All customer examples described are presented as illustrations of how those customers have used IBM products and the results they may have achieved. Actual environmental costs
and performance characteristics may vary by customer.
• Please review text for proper trademark attribution of IBM products. At first use, each product name must be the full name and include appropriate trademark symbols (e.g., IBM
Lotus® Sametime® Unyte™). Subsequent references can drop “IBM” but should include the proper branding (e.g., Lotus Sametime Gateway, or WebSphere Application Server).
Please refer to http://www.ibm.com/legal/copytrade.shtml for guidance on which trademarks require the ® or ™ symbol. Do not use abbreviations for IBM product names in your
presentation. All product names must be used as adjectives rather than nouns. Please list all of the trademarks that you use in your presentation as follows; delete any not included in
your presentation. IBM, the IBM logo, Lotus, Lotus Notes, Notes, Domino, Quickr, Sametime, WebSphere, UC2, PartnerWorld and Lotusphere are trademarks of International
Business Machines Corporation in the United States, other countries, or both. Unyte is a trademark of WebDialogs, Inc., in the United States, other countries, or both.
• If you reference Adobe® in the text, please mark the first use and include the following; otherwise delete:
Adobe, the Adobe logo, PostScript, and the PostScript logo are either registered trademarks or trademarks of Adobe Systems Incorporated in the United States, and/or other countries.
• If you reference Java™ in the text, please mark the first use and include the following; otherwise delete:
Java and all Java-based trademarks are trademarks of Sun Microsystems, Inc. in the United States, other countries, or both.
• If you reference Microsoft® and/or Windows® in the text, please mark the first use and include the following, as applicable; otherwise delete:
Microsoft and Windows are trademarks of Microsoft Corporation in the United States, other countries, or both.
• If you reference Intel® and/or any of the following Intel products in the text, please mark the first use and include those that you use as follows; otherwise delete:
Intel, Intel Centrino, Celeron, Intel Xeon, Intel SpeedStep, Itanium, and Pentium are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and
other countries.
• If you reference UNIX® in the text, please mark the first use and include the following; otherwise delete:
UNIX is a registered trademark of The Open Group in the United States and other countries.
• If you reference Linux® in your presentation, please mark the first use and include the following; otherwise delete:
Linux is a registered trademark of Linus Torvalds in the United States, other countries, or both. Other company, product, or service names may be trademarks or service marks of
others.
• If the text/graphics include screenshots, no actual IBM employee names may be used (even your own), if your screenshots include fictitious company names (e.g., Renovations, Zeta
Bank, Acme) please update and insert the following; otherwise delete: All references to [insert fictitious company name] refer to a fictitious company and are used for illustration
purposes only.