EasyManuals Logo

IBM i Series Handbook

IBM i Series
908 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #624 background imageLoading...
Page #624 background image
WebSphere and e-business
594 iSeries Handbook
Enterprise-class Functionality
To enhance performance, WebSphere Host Publisher provides connection pools, which are
defined in the Host Publisher Studio. Connection pools are used during runtime to cache
connected, logged on, and ready connections to improve response time to end users. A
user-defined number of connections will be started on demand and remain active in the pool
for subsequent requests from any user. This eliminates the overhead of establishing a
connection, and connecting and disconnecting each host request.
WebSphere Host Publisher supports object chaining. Object chaining allows you to break a
complex task into logical subtasks to improve performance and flexibility, and reduce the
administration of creating complex Web pages. For example, you might use chaining in a
typical 3270 application that uses multi-level menus. A corporate phone directory might have
several menus to take you step-by-step to the point where you can list everyone in a
particular department. At this point, you want to display the office location of someone in the
list, return to the department list, select a new name, and then display the second person's
office location. Object chaining enables you to break the task into several reusable
Integration Objects so that the end user does not have to navigate back down through the
several menus to reach the department list again.
Secure Sockets Layer (SSL) Security
Host Publisher provides SSL V3 for helping to secure the connections for TN3270E and
TN5250 communications with hosts and iSeries and AS/400e servers. The SSL support
provides data encryption and server authentication using signed certificates.
The SSL support is now available on a worldwide basis with 128-bit encryption. The
encryption level can negotiate to the specific encryption level of the clients (either 128-bit or
40-bit). You should have your IBM representative contact the importing country's Export
Regulation Coordinator (ERC) for details.
Suggested Reading
•
IBM Web-to-Host Integration Update
, SG24-5237
•
Building Integration Objects With IBM SecureWay Host Publisher Version 2.1
,
SG24-5385

Table of Contents

Other manuals for IBM i Series

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the IBM i Series and is the answer not in the manual?

IBM i Series Specifications

General IconGeneral
Operating SystemIBM i
Form FactorRack, Tower
StorageSSD and HDD options
Securitycompliance
VirtualizationIBM PowerVM
CPUPOWER processors
ScalabilityScale-up

Related product manuals