Engineering
Releases
News and Events

SpringOne2GX 2013 Replay: Migrating from WLS, WAS, JBoss to Pivotal tc Server

Recorded at SpringOne2GX 2013 in Santa Clara, CA

Speaker: Zhiyong Li

SAS® Institute has a large portfolio of Java EE applications. SAS had previously provided support to deploy and run all of these applications in WebLogic, WebSphere and JBoss. Beginning with SAS 9.4, which was released in July 2013, SAS updated its infrastructure and middle tier platform to deliver and run on Pivotal tc Server. In this talk, we will discuss the motivation, technology selection, architecture, system administration, automated installation and configuration, etc., that SAS used to improve value for its customers. Specifically, we will discuss the following areas in detail:

  • Technology selection: To make tc Server viable, we include the messaging, caching and the transaction management system.
  • Architecture: To leverage tc Server scalability and reliability in SAS products, we support clustering by using the Pivotal Web Server and the mod_proxy. Application migration: We provide guidance to our Java developers and configuration developers on how to migrate their applications to the tc Server environment.
  • Security: We support SSL, single sign-on and other enterprise security protocols such as Integrated Windows Authentication, CA Site Minder, IBM Web Seal, SAML, etc.
  • System administration: We provide a single entry point to manage all SAS application stacks including all web applications by leveraging the Hyperic product.
  • Automated installation / configuration: We provide the automated process to install and configure Hyperic and all Pivotal Application Fabric products (tc Server, vFWS and GemFire) and SAS web applications.
  • Delivery and support: SAS delivers embedded tc Server as the SAS Web Application Server for use with all our offerings with a midtier on all our supported host platforms. This enables SAS to provide complete supported application architecture with more complete visibility and control of the critical software.
  • Cloud deployment: This approach also provides advantages for our customers leveraging virtualization and cloud deployment strategies.
comments powered by Disqus