MQ – Using Containers

MQ Technical Conference.  September 2018.  Powerpoint.
MQ, IIB, Docker, Kubernetes, & the IBM Cloud“  (40 slides).

View the Presentation

This Conference presentation provides an overview of the impact of deploying IBM MQ and IBM Integration Bus into the Cloud using Containers.  The presentation first provides an overview of the IBM Cloud software stack relevant to Containers: Docker, Kubernetes, Helm, and Istio.  The presentation then goes on to describe the Open Systems Interconnection (OSI) reference model and its seven layers.  The impact of the OSI model upon containerization is then discussed in terms of Application developers, MQ administrators, and Network engineers.  Finally, the challenges inherent in deploying a MQ network, as opposed to a stand-alone Queue Manager, into one or more Containers are reviewed.

By the end of the presentation, the viewer should have a basic understanding of the Cloud software stack and the purpose and use of Containers.  The viewer should also have an awareness of the OSI software stack model and the implications of placing non-Application layer components into a Container.

MQ – Security

MQ Technical Conference.  September 2018.  Powerpoint.
MQ Security:  A Holistic Approach“  (46 slides).

View the Presentation

This Conference presentation first provides an overview of essential security concepts:  Entities, Identities, Authentication, Authorization, and Audit.  The presentation then goes on to describe how these concepts map to MQ features.  MQ security capabilities covered include SSL/TLS processing, Connection Authentication, Channel Authentication, Object Access Manager (OAM), Security Exits, Advanced Message Security (AMS), Event Queues, and Logs.  All MQ capabilities discussed are mapped back to the essential security concepts that they support.

The available MQ security features are then described in the context of both local Applications (Server Bindings) and Client Connections using TCP/IP (Client Bindings).  Finally, this presentation places MQ security within a larger context.  Additional MQ issues impacting security (Clustering, Triggering, and Command Server) are covered.  Finally,  external security issues such as physical security, enterprise Single Sign-On (SSO), Operating System and file system security, are mentioned to define the context within which MQ security exits.

This presentation is designed to provide an overview of MQ security and to create a framework in which the individual MQ security features can be analyzed and implemented.  Each of the individual security features covered could be, and already have been, individual presentations in their own right.  By the end of the presentation, the viewer should have a basic understanding of security concepts, the MQ features available to implement those concepts, and the way in which the various features can be configured to implement the required security.

Collaboration – Changing Needs

SoCon 13 Conference.  April 2018.  Powerpoint.
Computer Generations & Complexity“  (58 slides).

View the Presentation

This Conference presentation provides a narrative web of the history of computer communications.  The history of computing is broken into four generations; each generation representing two decades of computing progress.  The evolution of communications between hardware products, between software systems, and between human computing professionals is reviewed.  The inter-relationship between these three forms of communications is discussed:  Hardware communications first, software communications dependent upon hardware, increasing complexity of software communications requiring increased human collaboration.

The evolution of the three forms of communication are illustrated across the computer generations (see below).  The dependencies and parallel trends are illustrated.  Finally, some predictions are made based upon these trends.  The computer generations covered are:   

  • 1st Generation (1950s-1960s)  –  Individual Computer Systems
  • 2nd Generation (1970s-1980s)  –  Birth of Distributing Computing
  • 3rd Generation (1990s-2000s)  –  Enterprise Software Integration (SOA)
  • 4th Generation (2010s-current)  –  Total Integration (IoT, Cross Silo, etc.)

By the end of the presentation, the viewer should have a basic understanding of how computer communications have changed over time, the relationship between hardware, software, and human communication evolution, and some guesses about the implications of the identified trends.

MQ – Performance Benchmarking

MQ Technical Conference.  September 2017.  Powerpoint.
MQ Performance Benchmarking“  (69 slides).

View the Presentation

This Conference presentation first reviews the methodology for benchmarking the performance of a MQ infrastructure.  The presentation then covers, in depth, the tools available for performing that benchmark.  The tools covered include:

  • “q” program (formerly SupportPac MA01 by Paul Clarke)
  •  xmqqstat (SupportPac MH04)
  •  PerfHarness (IBM Lab developed tool)
  •  PerfRating (IBM Lab developed tool)
  •  amqsrua program
  •  amqsmon program
  • “top” command (UNIX)
  •  PerfMon (Windows)

By the end of the presentation, the viewer should have a basic understanding of the tools available, and their capabilities, to develop MQ infrastructure benchmark data.

MQ – How MFT uses MQ

MQ Technical Conference.  September 2017.  Powerpoint.
MQ & MFT: How they Work in Tandem“  (53 slides).

View the Presentation

This Conference presentation provides an overview of how the IBM MQ Managed File Transfer (MFT) product uses MQ.  An overview of the MFT product architecture is presented first.  Then the MFT use of MQ Queue Managers, Queues, and Topics are all covered in detail.  Communications between the various MFT components  (Java Agents,  Java Logger, Command Line shells, and Queue Managers) is reviewed.  The specific Queues used by MFT agents, as well as the MQ Topic tree, are discussed in detail.  Finally, both MFT commands and security are discussed.

This presentation provides both an in-depth look at how MFT uses MQ resources and capabilities as well as an example of how a software Application can leverage those capabilities.  The viewer should come away with both a deeper understanding of the capabilities of the MQ product and also how those capabilities can be leveraged to support real world solutions.  Many of the MQ product capabilities are illustrated in the MFT product offering, so an understanding of how MFT uses MQ can carry over into understanding how MQ can support other software Applications.

By the end of the presentation, the viewer should have a basic understanding of the Managed File Transfer product architecture, the MQ components supporting that architecture, and MFT’s overall use of the MQ infrastructure.  This presentation should enable an MQ administrator to begin to provide support and analysis for an MFT installation.

In memory of David Van Doren, who was killed in 2018.  RIP, dear friend and colleague.  

SOA – Architecture Overview

Banking Modernization Conference.  August 2017.  Powerpoint.
SOA Overview“  (33 slides).

View the Presentation

This Conference presentation provides an overview of the Service Oriented Architecture (SOA) architectural model.  The presentation provides a brief history of software design, the challenges that SOA was designed to address, and provides an overview of SOA from a software design, development, and deployment perspective.  The software design principles that form the  foundation of SOA are also covered.  Particular emphasis is placed upon the SOA infrastructure and how software Applications are decoupled to implement a Services approach and leverage a SOA infrastructure.

By the end of the presentation, the viewer should have a basic understanding of fundamental software design principles, how they lead to a SOA infrastructure, and how business Applications should be designed to leverage both those principles and the resulting IT infrastructure.

SOA – SOMA Methodology

Banking Modernization Conference.  August 2017.  Powerpoint.
SOMA Methodology“  (25 slides).

View the Presentation

This Conference workshop presentation provides an overview of the Service Oriented Modeling and Architecture (SOMA) methodology.  This methodology was developed, from experience, to assist in both organizational and software systems transformation in the journey from the “As Is” state to a modernized Services Oriented “To Be” state.  SOMA deals with Service Oriented Architecture (SOA) “in the whole”, at an organizational level, providing both methodologies and tools to manage and coordinate organizational transformation across multiple projects.

By the end of the presentation, the viewer should have a basic understanding of SOMA concepts as well as the challenges, both technical and organizational, that are involved in transforming an organization’s IT infrastructure into a more nimble and loosely-coupled Services based computing foundation.