Solved

Call MDB from a COBOL/MQ client

Posted on 2008-06-25
5
1,073 Views
Last Modified: 2013-11-25
From COBOL /MQ [MainFrame Client], can we call a Message Driven Bean deployed in Websphere [Windows Server].

If this is possible, what is the method, any tutorials for this?
0
Comment
Question by:cakurien
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
5 Comments
 

Author Comment

by:cakurien
ID: 21872593
Can any one help on this
MDB(Message Driven Bean)
0
 
LVL 5

Accepted Solution

by:
lgacs earned 500 total points
ID: 21873387
Yes, it is possible, but the "call" is not the correct word in the messaging world.
You can send a MQ message from a COBOL (or any other) program into a
message queue which a MDB can listen to.
0
 

Author Comment

by:cakurien
ID: 21880903
Thanks a lot sir,

Can you give me some tips/tutorials/links related to this
0
 
LVL 5

Expert Comment

by:lgacs
ID: 21882534
See the IBM MQ product documentation especially

- WebSphere MQ Application Programming Guide (SC34-6595-01) on
http://www.elink.ibmlink.ibm.com/publications/servlet/pbi.wss?CTY=US&FNC=SRX&PBL=SC34659501#

and

- WebSphere MQ Using Java (SC34-6591-02)
http://www.elink.ibmlink.ibm.com/publications/servlet/pbi.wss?CTY=US&FNC=SRX&PBL=SC34659102

You can browse them online too on IBM's infocenter
http://publib.boulder.ibm.com/infocenter/wmqv6/v6r0/index.jsp

See some COBOL example on:
http://publib.boulder.ibm.com/infocenter/wmqv6/v6r0/index.jsp?topic=/com.ibm.mq.csqzal.doc/fg18930_.htm
0

Featured Post

[Webinar] How Hackers Steal Your Credentials

Do You Know How Hackers Steal Your Credentials? Join us and Skyport Systems to learn how hackers steal your credentials and why Active Directory must be secure to stop them. Thursday, July 13, 2017 10:00 A.M. PDT

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Healthcare organizations in the United States must adhere to the guidance of both the HIPAA (Health Insurance Portability and Accountability Act) and HITECH (Health Information Technology for Economic and Clinical Health Act) for securing and protec…
Invest in your employees with these five simple steps to improve employee engagement and retention.
With the power of JIRA, there's an unlimited number of ways you can customize it, use it and benefit from it. With that in mind, there's bound to be things that I wasn't able to cover in this course. With this summary we'll look at some places to go…
In this brief tutorial Pawel from AdRem Software explains how you can quickly find out which services are running on your network, or what are the IP addresses of servers responsible for each service. Software used is freeware NetCrunch Tools (https…

717 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question