Now Available in eBook Format: IBM System i APIs at Work, Second Edition: In this latest edition of the best-selling API reference, acclaimed expert Bruce Vining completely rewrites the book on APIs. With over 700 information-packed pages this is the ultimate API guide and a must-have for any professional working with System i (AS/400, i5/iSeries). Get your copy today!
Adopt the OASIS Open Data Protocol to consistently publish and consume REST services.
Written by Michael Sansoterra
In the article "Implement a Service-Oriented Architecture with REST APIs," I covered some basics about implementing a service-oriented architecture using REST APIs. In general, because the REST methodology doesn't have many standards regarding how to pass parameters, how to format the result data, etc., the implementation of these APIs can vary widely from vendor to vendor and developer to developer.
Originally started by Microsoft, the Open Data Protocol (OData) was devised in part as a means of having a standard input and output so that REST APIs based on OData would be consistent in their implementation.
In this new release of Data Governance Tools, subject matter expert Sunil Soares walks you through all of the available software tools and shows you how to evaluate them for your program. Soares explains why your organization should consider tools to be a critical component of your data governance program, clarifies how these tools integrate with big data technologies, and shows you how the various software vendors stack up. Order this latest release today!
Using the Newer Clients for Accessing IBM i – Good for Security or Not
In this session, Carol is pleased to be joined by long-time friend Tim Rowe – Business Architect for Systems Management and Application Development - from IBM in Rochester, MN. Tim and Carol will be discussing the security ‘pros and cons’ of the newer strategic clients that are available for accessing IBM i – including mobile, IBM i Access Client Solutions and i Access for the Web as well as a discussion on recently discovered vulnerabilities and exploits that may – or may not - affect these clients.