Speaking the Right LanguageMachine-to-Machine Communications

Thanks to the significant cost reduction and revenue enhancement benefits provided by direct machine to machine communications between companies, customers and suppliers, the pace of data sharing is growing dramatically. Much of the recent explosive growth has been driven by the “API Economy” – companies connecting via web services using standard technologies like REST and JSON. Yet, connection technology has been around for decades and many IBM i companies are dependent on older, batch oriented sharing technologies like EDI and FTP.

Our customers have significant investments in their EDI systems and FTP file sharing connections. Others have built web services using older API technologies like SOAP and XML. They cannot simply replace those connectors unilaterally. In most cases, a particular EDI solution is embedded in an entire supply chain and is used by all participants. These EDI products may be supporting very complex file formats like detailed product design documents that are very hard to decode. New connection technology must be adopted across the supply chain for it to work. Companies using FTP file sharing have partners who have built code to read those files and extract the data they need. If you have implemented SOAP services, you may have partners who depend on that SOAP infrastructure.

Just like with any other modernization project, as companies move to adopt the latest API technology, they must continue to support their existing techniques. Companies that are dependent on these technologies, can take an incremental approach to adopting current API standards.

If you are using EDI, you can watch for new API offerings provided by your supply chain partners and adopt them when they become available. Often, these options will significantly reduce the cost associated with data sharing as they don’t have the same transaction cost structure as proprietary EDI solutions. Companies using SOAP services can begin offering REST services alongside the SOAP services to give their partners time to adapt. FTP users should probably be looking for a more secure solution for file sharing anyway. As you make the move away from FTP, you can offer file sharing options via web services. Or, you can really take advantage of APIs and give your partners real time access to the data.

These approaches allow you to continue operating at maximum efficiency using your existing processes while over time allowing you to adopt the more cost effective, more performant and easier to use REST API technology as appropriate.

At Eradani, we have worked with many IBM i customers who are working in this kind of blended environment as they implement their API strategy. If you would like to learn more, contact us at www.eradani.com or via email at info@eradani.com.

The post Speaking the Right Language<br>Machine-to-Machine Communications appeared first on Eradani.

2021 Virtual IBM i Security Event [12:00PM BST]

Please join us for an educational discussion about the topic that’s on all of our minds—cybersecurity.

About this Event

Join IBM i security expert Robin Tatam for a discussion that will provide insight and answers about cybersecurity, today’s top corporate initiative.

Security and compliance affect every facet of a business, making them two of today’s top corporate concerns. Robin is on a mission to provide clarity and guidance around cybersecurity and how it relates to Power Systems.

Without leaving your desk, you can join us for an abridged version of the event that draws 5-star ratings from audiences around the world.

Join this exclusive online gathering to learn:

• What working from home and Covid-19 mean for your IBM i server

• Cybersecurity trends and risks

• How compliance differs from security

• What we have learned from our annual State of IBM i Security Study

• What’s new in security for IBM i

• How to get started securing your server and your databases

To register for this event, please select the register button and fill out the form.

We hope to see you on the 13th July!

What Most IBM i Shops Get Wrong About the IFS

Can you trust all of your users all of the time?

A typical end user receives 16 malicious emails each month, but only 17 percent of these phishing campaigns are reported to IT. Once an attack is underway, most organizations won’t discover the breach until six months later.

A staggering amount of damage can occur in that time. Despite these risks, 93 percent of organizations are leaving their IBM i systems vulnerable to cybercrime.

In this on-demand webinar, IBM i security experts Robin Tatam and Sandi Moore will reveal:

How phishing attacks are becoming more sophisticated
Three little-known ways malicious programs can reach your IFS
Why the IFS is IBM i’s “Typhoid Mary”

You’ll also learn why some of the most common malware solutions still leave IBM i systems vulnerable—and what you can do to protect your organization.


Tuesday
Aug 31, 2021

7:00pm

to
8:00pm

Starts:
August 31, 2021 7:0pm UTC+02:00

Ends:
August 31, 2021 8:0pm UTC+02:00

Event dates and times are calculated from your device’s UTC (Coordinated Universal Time) offset.

Meet Your Presenter

Robin Tatam

Director of Security Technologies

HelpSystems

An IBM-certified technical consultant, Robin has two decades of AS/400 and IBM i consulting experience.

View Profile

Meet Your Presenter

Sandi Moore

Principal Security Consultant

HelpSystems

Sandi has been working with HelpSystems customers for over 15 years supporting systems monitoring and security software.

View Profile

Stay up to date on what matters.

Verified by MonsterInsights