<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom">
  <title>chrispoole.com</title>
  <link href="https://chrispoole.com/atom.xml" rel="self"/>
  <link href="https://chrispoole.com"/>
  <updated>2021-03-21T11:45:39+00:00</updated>
  <id>https://chrispoole.com/</id>
  <author>
    <name>Chris Poole</name>
  </author>
  
    <entry>
      <title>Code Pattern: Disaster Donations Website</title>
      <link href="https://chrispoole.com/article/2019/11/15/code-pattern-disaster-donations-website"/>
      <updated>2019-11-15T00:00:00+00:00</updated>
      <id>https://chrispoole.com/article/2019/11/15/code-pattern-disaster-donations-website</id>
      <content type="html">&lt;p&gt;I wrote a quick &lt;a href=&quot;https://developer.ibm.com/patterns/systems-create-a-secure-disaster-donations-website/&quot;&gt;code pattern&lt;/a&gt; for IBM Developer. To start, I’ll show you how to create an IBM Cloud Hyper Protect DBaaS MongoDB instance, a managed MongoDB instance with encrypted connections and storage. You’ll then build and deploy a Python backend application that converts RESTful JSON requests into Mongo calls, to make it easier to interface with the database. Finally, you’ll build and deploy a Node.js application using the Express framework to serve a static website that employs jQuery to make requests to the Python backend app; this, in turn, can be served over HTTPS. The result is a donations website that can accept credit card details and send some of this sensitive information to a database, ensuring that it is encrypted at all times. By running the applications on an IBM Cloud Hyper Protect Virtual Server, you can ensure that the storage used by the applications is also encrypted.&lt;/p&gt;

</content>
    </entry>
  
    <entry>
      <title>Use IBM Cloud Hyper Protect Crypto Services to Encrypt VMware Disks</title>
      <link href="https://chrispoole.com/article/2019/08/02/use-ibm-cloud-hyper-protect-crypto-services-to-encrypt-vmware-disks"/>
      <updated>2019-08-02T00:00:00+01:00</updated>
      <id>https://chrispoole.com/article/2019/08/02/use-ibm-cloud-hyper-protect-crypto-services-to-encrypt-vmware-disks</id>
      <content type="html">&lt;p&gt;If you have a VMware estate in IBM Cloud you can, of course, encrypt the disks the VMs are coupled to. Then it becomes a question of where those keys are stored, how safe they are, and how you get some key store to talk to VMware. Since &lt;a href=&quot;https://www.ibm.com/cloud/hyper-protect-crypto&quot;&gt;IBM Cloud Hyper Protect Crypto Services&lt;/a&gt; offers the only public cloud FIPS 140-2 level 4 compliant HSM, thus being highly tamper resistant, it’s an ideal place for these keys.&lt;/p&gt;

&lt;p&gt;In &lt;a href=&quot;https://developer.ibm.com/tutorials/use-hyper-protect-crypto-services-to-encrypt-vmware-disks/&quot;&gt;this tutorial&lt;/a&gt; I walk you through how to set these two systems up. We also released an accompanying &lt;a href=&quot;https://www.ibm.com/demos/collection/IBM-Cloud-Hyper-Protect-Crypto-Services/&quot;&gt;video series&lt;/a&gt; to walk you through visually.&lt;/p&gt;

</content>
    </entry>
  
    <entry>
      <title>Create a Secure Server-Side Application Where All Data Is Encrypted in Flight, at Rest, and in Use</title>
      <link href="https://chrispoole.com/article/2018/12/13/create-a-secure-server-side-application"/>
      <updated>2018-12-13T00:00:00+00:00</updated>
      <id>https://chrispoole.com/article/2018/12/13/create-a-secure-server-side-application</id>
      <content type="html">&lt;p&gt;I helped create &lt;a href=&quot;https://developer.ibm.com/patterns/backend-for-ibm-hyper-protect-services-apple/&quot;&gt;this server-side application&lt;/a&gt;, written in Swift. It acts as the backend for the &lt;a href=&quot;/article/2018/12/13/create-a-secure-mobile-application&quot;&gt;mobile application&lt;/a&gt; and interfaces to an instance of IBM Cloud Hyper Protect DBaaS service on the backend.&lt;/p&gt;
</content>
    </entry>
  
    <entry>
      <title>Create a Secure Mobile Application Where All Data Is Encrypted in Flight, at Rest, and in Use</title>
      <link href="https://chrispoole.com/article/2018/12/13/create-a-secure-mobile-application"/>
      <updated>2018-12-13T00:00:00+00:00</updated>
      <id>https://chrispoole.com/article/2018/12/13/create-a-secure-mobile-application</id>
      <content type="html">&lt;p&gt;I helped with the creation of this &lt;a href=&quot;https://developer.ibm.com/patterns/mbaas-with-ibm-hyper-protect-services-apple/&quot;&gt;code pattern&lt;/a&gt;: an iOS app that integrates with a secure mobile backend as a service (MBaaS). On the backend it integrates with IBM Cloud Hyper Protect Services to simplify compliance issues around storing sensitive information by ensuring all data at rest and being transported is encrypted.&lt;/p&gt;
</content>
    </entry>
  
    <entry>
      <title>Ensuring Your Customers’ Data Privacy With Applications Secured on IBM Z</title>
      <link href="https://chrispoole.com/article/2018/10/25/securing-applications-on-ibm-z"/>
      <updated>2018-10-25T00:00:00+01:00</updated>
      <id>https://chrispoole.com/article/2018/10/25/securing-applications-on-ibm-z</id>
      <content type="html">&lt;p&gt;I was invited to &lt;a href=&quot;https://developer.ibm.com/videos/ensuring-your-customers-data-privacy-with-applications-secured-on-ibm-z/&quot;&gt;present a tech talk&lt;/a&gt; on IBM Cloud Hyper Protect Services. I talked about attack vectors being used to obtain sensitive information, and what you can do to mitigate against them. I showed how the family of IBM Cloud Hyper Protect Services can be used to secure an existing application with minimal code changes, to provide mandatory encryption at rest and during transport.&lt;/p&gt;
</content>
    </entry>
  
    <entry>
      <title>Podcast on CICS: Terminal Talk</title>
      <link href="https://chrispoole.com/article/2018/09/17/terminal-talk-cics"/>
      <updated>2018-09-17T00:00:00+01:00</updated>
      <id>https://chrispoole.com/article/2018/09/17/terminal-talk-cics</id>
      <content type="html">&lt;p&gt;While at &lt;a href=&quot;https://www.share.org/&quot;&gt;SHARE St. Louis&lt;/a&gt; I was interviewed with Mark Cocker
for the &lt;a href=&quot;http://terminaltalk.net/PodcastGenerator/?name=episode_56_-_chris_poole_and_mark_cocker_-_9.17.2018.mp3&quot;&gt;Terminal Talk&lt;/a&gt; podcast, talking about CICS. Check out their
&lt;a href=&quot;http://terminaltalk.net/PodcastGenerator/&quot;&gt;other episodes too&lt;/a&gt;.&lt;/p&gt;

</content>
    </entry>
  
    <entry>
      <title>Integrating Systems of Record Applications With IBM Blockchain</title>
      <link href="https://chrispoole.com/article/2018/02/27/blockchain-and-sor-applications"/>
      <updated>2018-02-27T00:00:00+00:00</updated>
      <id>https://chrispoole.com/article/2018/02/27/blockchain-and-sor-applications</id>
      <content type="html">&lt;p&gt;I was invited to &lt;a href=&quot;https://developer.ibm.com/tv/integrating-systems-of-record-applications-with-ibm-blockchain/&quot;&gt;present on a demo I helped create&lt;/a&gt;, linking Blockchain to an existing system of record application. The idea is that the CICS application is for a motor vehicle insurance company, and is updated through a 3270 panel. This allows mistakes, or nefarious updates, to the records by anyone with access. Since another team in the organisation is using Blockchain for vehicle data provenance and sharing with third parties, we show how to couple this to the CICS application with minimal code changes. z/OS Connect EE is used along the way.&lt;/p&gt;
</content>
    </entry>
  
    <entry>
      <title>IBM CICS Asynchronous API: Concurrent Processing Made Simple</title>
      <link href="https://chrispoole.com/article/2017/12/22/cics-async-api-redbooks"/>
      <updated>2017-12-22T00:00:00+00:00</updated>
      <id>https://chrispoole.com/article/2017/12/22/cics-async-api-redbooks</id>
      <content type="html">&lt;p&gt;CICS asynchronous API, which is a simple, accessible API that is
designed to enable CICS application developers to create efficient
asynchronous programs in all CICS-supported languages. Using the API,
application developers can eliminate the overhead that is involved in
coding and managing homegrown asynchronous solutions, instead using a
set of CICS-supported API commands to underpin CICS applications,
which are more responsive and robust than ever.&lt;/p&gt;

&lt;p&gt;I co-authored the &lt;a href=&quot;https://www.redbooks.ibm.com/Redbooks.nsf/RedbookAbstracts/sg248411.html?Open&quot;&gt;Redbook&lt;/a&gt; on the subject; give it a read! There’s
also a &lt;a href=&quot;https://github.com/cicsdev/cics-async-api-redbooks&quot;&gt;GitHub&lt;/a&gt; repo with the source code.&lt;/p&gt;

</content>
    </entry>
  
    <entry>
      <title>Scripting with z/OS Provisioning Toolkit: Removing Old Containers</title>
      <link href="https://chrispoole.com/article/2017/07/21/removing-old-containers"/>
      <updated>2017-07-21T00:00:00+01:00</updated>
      <id>https://chrispoole.com/article/2017/07/21/removing-old-containers</id>
      <content type="html">&lt;p&gt;In this &lt;a href=&quot;https://developer.ibm.com/mainframe/2017/07/21/scripting-zos-provisioning-toolkit-removing-old-containers/&quot;&gt;article&lt;/a&gt; I explain how I wrote a script to be able to remove all
containers in the system older than x days. This can then be scheduled to run
every night, to ensure developers don’t leave their CICS regions (or any other
container contents) sat around unnecessarily. Treat your z/OS PT-created CICS
regions like livestock, not pets, remember. All source code for this example is
on CICSDev on &lt;a href=&quot;https://github.com/cicsdev/zospt-scripts&quot;&gt;GitHub&lt;/a&gt;.&lt;/p&gt;

</content>
    </entry>
  
    <entry>
      <title>IBM CICS Asynchronous API Allows for More Natural Program Creation</title>
      <link href="https://chrispoole.com/article/2017/05/01/cics-async-article"/>
      <updated>2017-05-01T00:00:00+01:00</updated>
      <id>https://chrispoole.com/article/2017/05/01/cics-async-article</id>
      <content type="html">&lt;p&gt;I wrote a magazine &lt;a href=&quot;http://ibmsystemsmag.com/mainframe/administrator/cics/asynchronous-api-creation/&quot;&gt;article&lt;/a&gt; on the new CICS Asynchronous API that I
helped design and develop. Give it a read.&lt;/p&gt;

</content>
    </entry>
  
</feed>
