Middleware analyst

Middleware analyst

Middleware analysts are computer software engineers with a specialization in products that connect two different computer systems together. These products can be open-source or proprietary. As the term implies, the software, tools, and technologies used by Middleware analysts sit "in-the-middle", between two or more systems; the purpose being to enable two systems to communicate and share information.

Contents

Role and Responsibility of a Middleware Analyst

Middleware analysts[1] look at the system of systems[2]. They solve technical problems which involve large scale inter-disciplinary objectives with multiple, heterogeneous, distributed systems that are embedded in networks at multiple levels[3]. Middleware analysts hold and maintain proficiency in middleware technologies. Middleware is computer software that connects software components or applications. A senior middleware analyst should be able to articulate why SOA is important to business. SOA is a central theme in most middleware analyst roles within organizations.[4].

Best Practices for Implementations

Middleware best practices encompass generally accepted principles to promote usability and maintainability. A selected few examples of best practices are included here to provide valuable insight and enlightenment as to how middleware addresses key principles of standards-based computing.

A common problem new implementations of middleware stumble into is how user-defined applications are configured so that queue references bypass Queue Alias definitions referring directly to the Queue Local or Queue Remote definition. This is a deviation from Best Practices and should be corrected when the administrator and/or programmer can correct it within time and scope parameters. All references from user-defined Applications should point to Queue Aliases. Then the Queue Aliases should point to the defined Queue Local or Queue Remote.

Queue Aliases[5] allow flexibility for middleware administrators to resolve or relieve production problems quickly. By using Queue Aliases, middleware administrators can redirect message flow, in the event of a service problem, without changes to the user-defined application. For example, if a Queue Local were overflowing, a middleware admin could change the Queue Alias to point to a temporary Queue Local, thereby allowing the user-defined application to continue its processing without interruption while the underlying root cause is corrected.

By pointing all user-defined Application references to Queue Aliases, it preserves the flexibility that middleware admins would have to help with Production issues that may occur. If the Best Practice of Queue Aliases were not followed, the ability of a middleware admin to help with a Production outage would be hindered.

Skills required of a Middleware Analyst

Message queuing (“MQ”) is a middleware technology that greatly simplifies communication between the nodes of a system and between the nodes that connect systems together. Information System Consultants use Message Queuing as their skill base. Upon this base, Information System Consultants add Workflow management, Message brokering, and cutting edge J2EE implementations using Java Virtual Machines (JVMs) and Message Driven Beans (MDBs).

Arguably the most important skill a middleware analyst uses is not technical, it is surely cultural. SOA does require people to think of business and technology differently. Instead of thinking of technology first (If we implement this system, what kinds of things can we do with it?), middleware analysts must first think in terms of business functions, or services (My company does these business functions, so how can I set up my IT system to do those things for me most efficiently?). It is expected that adoption of SOA will change business IT departments, creating service-oriented (instead of technology-oriented) IT organizations. Middleware analysts perform crucial evangelization of this concept.

The enterprise service bus is a core element of any SOA. ESBs provide the "any to any" connectivity between services within a company, and beyond that company to connect to the company's trading partners. Therefore, middleware analysts need to be skilled in SOA and enterprise service bus concepts first and foremost. Middleware analysts rely on an SOA Reference Architecture to lay out an SOA environment that meets the company's needs and priorities. The ESB is part of this reference architecture and provides the backbone of an SOA but is not considered an SOA by itself.

Security Concerns

Generic Common Practices

Because middleware is a cross-platform tool, the sophistication of your middleware analysts are expected to be acute. People that are designing and implementing the middleware message flow need to fully understand how the security model on each target platform works. This may include Windows, Unix, z/OS or AS/400.

Middleware protects data in transit through PKI and SSL technology. Security certificates are procured from a Certification Authority and regularly deployed and updated on servers. This protects data while it is in-transit as it leaves one Server and arrives on the next server in the chain. It does not protect data while data is at rest.

Supplemental transmission security can augment the primary SSL measures that exist on your server. These are SSL client authentication, DN filtering, CRL check by LDAP, and cryptographic hardware (IPSEC-level encryption). This type of security is called "border-level security" because it only protects the data from when it leaves your borders until it gets to your trading partner's borders. It does not protect data once data has entered the border. IPSEC is the most efficient and least costly protection method. SSL is the middle ground, with a balance between flexibility, resource consumption, and transmission time.

When data is at rest in queues, it is not protected by MQ. That is, data is in "plain text". Therefore, if the data contained in messages is so sensitive that you do not want your trusted administrators to see this data, then it is essential that application-level data encryption be used. Examples of data which could be protected by this strategy include banking data (account numbers, banking transactions, etc.) Application-level transaction security is the most secure form of protection but also the most costly in terms of CPU and I/O bandwidth consumption of both the sending and receiving servers. It is also the least efficient.

Middleware data channels can be set up to provide varying degrees of protection. A sender/receiver channel pair could be configured to provide IPSEC transport-level security not using SSL. A second sender/receiver pair could be configured to provide SSL border-to-border level security not using IPSEC. A third sender/receiver channel pair could be set up to provide application-level encryption. Using this scheme, you provision a wide selection of protection mechanisms from which your applications can choose at runtime. This offers your applications the ability to achieve best security when needed or more efficient security when data is not quite so sensitive.

HIPAA-specific Considerations

If your enterprise handles HIPAA ePHI data, then your middleware analysts need to know and understand the requirements set forth by law[6]. Failure to protect data at-rest may subject your organization to fines and penalties levied by the Federal government or other authority[7]. This requires application-level data encryption prior to delivering the data to the queuing system for transport[8].

System administrators, including middleware analysts, are not permitted to view unprotected ePHI data. Therefore, whenever ePHI data is present in any information system, it must be protected from the ability of an administrator to view it. It is not permissible to allow ePHI data to be kept in a queue unprotected.

See also

References


Wikimedia Foundation. 2010.

Игры ⚽ Поможем сделать НИР

Look at other dictionaries:

  • Application analyst — In the USA, an application analyst is someone whose job is to support a given application or applications. This may entail some programming, some system administration skills, and the ability to analyse a given problem, diagnose it and find its… …   Wikipedia

  • Oracle Corporation — Type Public Traded as NYSE: ORCL NASDAQ:  …   Wikipedia

  • Configurable Network Computing — or CNC is JD Edwards s (JDE) client–server proprietary architecture and methodology that implements its highly scalable enterprise wide business solutions software that can run on a wide variety of hardware, operating systems (OS) and hardware… …   Wikipedia

  • BMC Software — BMC Software, Inc. Type Public Traded as NASDAQ: BMC NASDAQ …   Wikipedia

  • Enterprise content management — (ECM) is a set of technologies used to capture, store, preserve and deliver content and documents and content related to organizational processes. ECM tools and strategies allow the management of an organization s unstructured information,… …   Wikipedia

  • Enterprise Service Bus — Mit Enterprise Service Bus (ESB) bezeichnet man in der Informationstechnik (IT) eine Kategorie von Softwareprodukten, die die Integration verteilter Dienste (engl. service) in der Anwendungslandschaft eines Unternehmens (engl. enterprise) auf… …   Deutsch Wikipedia

  • Mobile enterprise application platform — A mobile enterprise application platform (MEAP) is a comprehensive suite of products and services that enable development of mobile applications.[1] Contents 1 Purpose 2 Rule of three 3 Components and Features …   Wikipedia

  • Itanium — 2 processor Produced From mid 2001 to present Common manufacturer(s) Intel Max. CPU c …   Wikipedia

  • Subrata Chakraborty — Infobox Person name = Subrata Chakraborty caption = Subrata Chakraborty, circa 2008 birth place = Kolkata, West Bengal, India citizenship = American fields = Computer Science spouse = Krishna Chakraborty children = Ankita Chakraboty, Anushka… …   Wikipedia

  • Kinect — for Xbox 360 …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”