COM R. Schulte

Size: px
Start display at page:

Download "COM R. Schulte"

Transcription

1 R. Schulte Research Note 7 July 2003 Commentary Event-Driven Applications: Definition and Taxonomy Simple event-driven applications are becoming widespread in mainstream enterprises. More-powerful complex-event processing is a niche phenomenon today but will become more common by Although system software, such as operating systems and network and systems management (NSM) tools, has implemented events widely for years, business applications have underutilized events. As business requirements escalate and event-enabling technologies become more available, enterprises will increase the number and sophistication of their event-driven applications. What Is an Event? The term "event" has two meanings in this research. Ordinary events just mean something that happened that is, a large or small change in the state of the universe. In software engineering, however, an event is the automated record of what happened. Software events are objects, often packaged as messages, that describe an ordinary event. Ordinary Events Ordinary events include a house purchase, a stock trade, college graduation and clicking a computer mouse. Events encompass smaller, contributing events. For example, a house purchase may involve multiple meetings, house tours, phone calls, , bank transactions and so forth. Even the tiniest action, such as picking up a pen, results in events (for example, a change in the location of the pen). However, it is seldom useful to analyze events on this fine level of detail. Events are not instantaneous; they result from processes that occur over time. Buying a house may take months. For our purposes, the most important kind of ordinary event is a business event. A business event is a meaningful change in the state of the enterprise or of something relevant to the enterprise, such as a customer order, an employee address change, the arrival of a shipment at a loading dock, a bill payment or a truck breakdown. Software Events Every enterprise has ordinary business events, even if it has no computers. However, software events only come into existence if they are generated by an application or some other software to describe such business events. Not all business events are documented by software events. For example, when a Gartner 2003 Gartner, Inc. and/or its Affiliates. All Rights Reserved. Reproduction of this publication in any form without prior written permission is forbidden. The information contained herein has been obtained from sources believed to be reliable. Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information. Gartner shall have no liability for errors, omissions or inadequacies in the information contained herein or for interpretations thereof. The reader assumes sole responsibility for the selection of these materials to achieve its intended results. The opinions expressed herein are subject to change without notice.

2 person enters an order (a business event), an application program typically records the transaction by updating a database. If this just changes existing data elements (such as sales records and account balances) and any new data is scattered among various tables, then no identifiable software event is created. However, it is often useful for the application to send a message that contains some description of the order (for example, customer name, date, time, item descriptions and quantities) to another application to trigger further processing (see "The Case for Event-Driven Design"). This message describes a particular happening and is a software event (strictly speaking, the message is the form of the event, although programmers often refer to the message as being the event). In event-driven design, a mundane business event, such as a book purchase, could cause a dozen application programs in different locations to emit hundreds of software events over the course of a week. For example, the online-shopping program will send an event when the book is added to the shopping cart, an order-processing program may later send an event to a bank credit card system, and another event may trigger a royalty payment to the author. These are application-level events because they have business meaning and are created and received by applications. Other kinds of software events are continuously generated in the background by the operating system, NSM tools and other system software. Software events that are sent and received by system software are outside the scope of this research because they are not part of application design. However, some system events do affect business users. For example, if a computer fails, an NSM event may be sent to a business activity monitoring (BAM) tool that notifies a business manager that a customer care center application is down. Another example: When a mouse is clicked (a tiny ordinary event) on a screen icon, system software that controls the graphical user interface generates an event that triggers a particular event-driven procedure in a Visual Basic program. This is an example of event-driven programming, not high-level event-driven application design, and is therefore also outside of our scope. Taxonomy Event-driven business applications can be sorted into four categories: Simple event-driven (or message-driven) applications, where application programs explicitly send and receive messages directly to and from each other for example, through message-oriented middleware (MOM) Event-driven applications that are mediated by integration brokers, which transform and route simple event messages according to logical rules Event-driven applications that are directed by business process management (BPM) engines that manage the end-to-end flow of a multistep process using special, BPM-oriented types of events Complex-event processing (CEP) applications, where a sophisticated event manager logically evaluates multiple events to enable decoupled, parallel, asynchronous application processing or BAM Simple Events Simple-event-driven processing is roughly synonymous with message-driven processing. Messages are sent in one direction from an application source to one or more application sinks (recipients). The applications are logically decoupled because they do not "hard wire" any assumptions about each other beyond a shared understanding of message contents. A common mistake is to confuse conceptual design with lower-level implementation. Event-driven processing as a design concept can be implemented with almost any kind of middleware or protocol, 7 July

3 theoretically even TCP/IP or a remote procedure call (RPC). However, event-driven applications are usually built on MOM, Web services or both. Examples of MOM include IBM's Event Broker, IBM's MQSeries, Microsoft Message Queuing (MSMQ), Tibco Software's Rendezvous, and any of the Java Message Service (JMS) MOM products (whether embedded in application servers or unbundled). MOM products that support publish-and-subscribe (pub-sub) are particularly useful for sending events. Not all MOM messages are events. A MOM message may contain a file, a multimedia object that represents no particular activity (for example, a person's portrait), a collection of events packaged together, or a set of parameters for an RPC. None of these messages is an event. A MOM message is (the form of) a software event only if it signifies the occurrence of one particular ordinary event. A software "document" containing a purchase order, loan application, insurance claim or other transaction can be considered a kind of denormalized event if it is sent one way. Such documents, commonly formatted in Extensible Markup Language (XML), are software events in spirit because they contain the digital record of a business event. However, they are less elemental than a strictly designed software event that documents a single change of state. A document is forwarded from one application to the next with various changes and additional data elements, so it is a running log of state changes. If a document is used in a two-way, request/response pattern, then it is not an event even in spirit (see "Event-Driven Architecture Complements SOA"). Enterprises traditionally handled most events (including documents) in batch processes. They have gradually increased their use of near-real-time event-driven computing during the past 10 years. Individual event messages and documents are now widely used in many mainstream applications, including business-to-business (see "B2B Application Integration Is Typically Event-Oriented"). However, a substantial minority of application developers still do not fully understand where events should be used. Their applications invoke a procedure through a method call, or write data to a database or file, when sending an event through MOM or Web services would be more effective. Brokered Event Processing It is often useful to insert an integration broker between an application that sends a simple event and the application(s) that receives the event. Integration brokers perform syntactic and semantic transformation on messages. Integration brokers also perform content-based routing, often using pub-sub communication. Brokers apply application-level intelligence using rules, in contrast to plain communication middleware, such as a MOM, which only provides basic event delivery. Integration suites from vendors such as IBM, Mercator Software, Microsoft, SeeBeyond Technology, Sybase, Tibco, webmethods and Vitria Technology contain such brokers. Integration brokers are also found in application platform suites, some packaged applications and other software products (see "Events Will Transform Application Servers"). The use of an intermediary, such as a broker, is a big step beyond simple event-driven computing, because some decisions on the flow of data and the flow of control are moved out of the end-point applications and into the broker. Although this is different from conventional application design, it is not too difficult for mainstream architects and developers to do. Most large enterprises use an integration broker in at least one application, and many have several different brokers in production. We estimate that about 20 percent of new, integrated applications in 2003 will use an integration broker someplace, and that half of the new integrated applications in 2006 will use a broker (0.7 probability). Note that brokers also support service-oriented architecture (SOA), so they should not be considered just as eventoriented tools. 7 July

4 BPM-Enabled Applications BPM is a different approach from either simple event-driven or brokered applications. BPM software manages process flows by "remembering" the status (holding state data) for each instance of a process. It uses rules to evaluate the context and events, and then triggers execution of the appropriate next steps. BPM engines use events in two ways: Like a broker, they can trigger an application by sending an event that contains application data, using MOM, Web services or another mechanism (alternatively, they also can invoke a program as a service, using Remote Method Invocation, Web services or another request/response mechanism, just as brokers can). Unlike a plain integration broker, however, BPM engines often use specially tailored BPM event messages to communicate between a BPM adapter and a central BPM engine to mark the start or end of an activity. These special system software events help to coordinate the process, but they are not business events. They do not carry application data and are not sent or received by an application program. BPM engines use such events to fork and join the flow of control based on logical rules. All of the major broker vendors, including those listed in the previous section, offer BPM engines that complement their integration brokers. Integration-oriented BPM specialists such as Fuego, Metaserver, Pegasystems and Savvion also support this. Complex-Event Processing CEP is radically different from simple, brokered or BPM-enabled event processing. CEP is enabled by some type of event management software, such as a centralized event manager or a set of distributed event-processing agents. Event managers use rules to: Filter events (selecting or discarding events based on their type and attributes) Aggregate sets of events into higher-level complex events by matching events to patterns Detect event patterns that violate constraint conditions An event manager may create new events to send to applications or to other event managers, or, like a BPM engine or broker, it may directly invoke an application through an application program interface in a request/response manner. CEP is most effective if the event messages carry extra information regarding relationships (relating this event with other events) or causality (historical background on how the event came about). Such data are not included in routine application messages (simple events), so they must be inserted by CEP adapters ("event transformers"). Often, an entire message is tailored for CEP purposes, carrying no business data from application to application. (For further explanation of CEP, see "The Power of Events," by David Luckham, Addison Wesley, 2002, ISBN ) CEP is currently found in leading-edge, niche business applications. The earliest practical use of CEP at an application level was in computer hardware simulation to help debug CPU designs. CEP is also used in business process diagnostics, security and fraud detection. One of the major drivers for the adoption of CEP in business applications is BAM. CEP is a core enabler of BAM and is built into many BAM tools already on the market (see "Opportunistic BAM Pits Users Against IT Planners"). CEP use will further accelerate as architects become more aware of its ability to enable dynamic, parallel, asynchronous processing. A few enterprises have built CEP into business applications by re-purposing NSM-style event managers to handle application events. Others have used event management software from pioneering 7 July

5 vendors such as Apama, ispheres, Systar and others. A few BPM vendors, including Pegasystems and Savvion, and integration vendors, including Tibco and Vitria, have varying degrees of CEP capabilities in their products today. Bottom Line: We recommend that enterprises use a mix of service-oriented architecture and simple event-driven design in most large new applications. Brokered and business-process-managementenabled event-driven approaches should be used in heterogeneous application integration scenarios where the data and flow routing must be systematically designed and managed. Complex-event processing should be reserved for business activity monitoring and for leading-edge projects where agility must be maximized and the enterprise is willing to invest in emerging CEP technology. 7 July

Events Will Transform Application Servers

Events Will Transform Application Servers Technology, Y. Natis Research Note 8 July 2003 Events Will Transform Application Servers Today's application servers can act as simple "event servers." To handle complex events, application servers will

More information

Predicts 2004: Enterprise Service Buses Are Taking Off

Predicts 2004: Enterprise Service Buses Are Taking Off Strategic Planning, R. Schulte Research Note 16 December 2003 Predicts 2004: Enterprise Service Buses Are Taking Off Today, enterprise service buses are used only in leadingedge applications. They quickly

More information

Best Practices for Deploying Web Services via Integration

Best Practices for Deploying Web Services via Integration Tactical Guidelines, M. Pezzini Research Note 23 September 2002 Best Practices for Deploying Web Services via Integration Web services can assemble application logic into coarsegrained business services.

More information

These patterns include: The use of proprietary software

These patterns include: The use of proprietary software Strategic Planning, F. Kenney, J. Thompson Research Note 7 August 2003 B2B Security Patterns: Finding the Perfect Combination Achieving business-to-business security is a combination of examining internal

More information

CHAPTER 2 ARCHITECTURES FOR SYSTEM INTEGRATION

CHAPTER 2 ARCHITECTURES FOR SYSTEM INTEGRATION 8 CHAPTER 2 ARCHITECTURES FOR SYSTEM INTEGRATION 2.1 ENTERPRISE APPLICATION INTEGRATION 2.1.1 What is Enterprise Application Integration? EAI entails integrating applications and enterprise data sources

More information

Enterprise Data Architecture: Why, What and How

Enterprise Data Architecture: Why, What and How Tutorials, G. James, T. Friedman Research Note 3 February 2003 Enterprise Data Architecture: Why, What and How The goal of data architecture is to introduce structure, control and consistency to the fragmented

More information

Prediction: Multimodal transaction processing will emerge

Prediction: Multimodal transaction processing will emerge Strategic Planning, M. Pezzini Research Note 19 December 2003 Predicts 2004: Prepare for Multimodal Transaction Processing Online transaction processing will have to support Web services, mobile channels

More information

Web Services Take Root in Banks and With Asset Managers

Web Services Take Root in Banks and With Asset Managers Strategic Planning, M. Knox, W. Andrews, C. Abrams Research Note 18 December 2003 Web Services Take Root in Banks and With Asset Managers Financial-services providers' early Web services implementations

More information

SOHO and Residential Routers: Worldwide Market Share and Forecast, (Executive Summary) Executive Summary

SOHO and Residential Routers: Worldwide Market Share and Forecast, (Executive Summary) Executive Summary SOHO and Residential Routers: Worldwide Market Share and Forecast, 2002-2007 (Executive Summary) Executive Summary Publication Date: 23 May 2003 Authors Rachna Ahlawat Gauri Pavate This document has been

More information

Predicts 2004: The Future of Windows Server

Predicts 2004: The Future of Windows Server Strategic Planning, T. Bittman Research Note 19 November 2003 Predicts 2004: The Future of Windows Server In 2004, distributed manageability will emerge as the key to the future of Windows Server, especially

More information

IBM's WebSphere Integration Offer Signals Long-Term Plan

IBM's WebSphere Integration Offer Signals Long-Term Plan Products, M. Pezzini, J. Thompson Research Note 8 April 2003 IBM's WebSphere Integration Offer Signals Long-Term Plan Version 4.2 of WebSphere Business Integration bundles more products into one package.

More information

Firewall and IP Virtual Private Network Equipment: Worldwide, 2002 (Executive Summary) Executive Summary

Firewall and IP Virtual Private Network Equipment: Worldwide, 2002 (Executive Summary) Executive Summary Firewall and IP Virtual Private Network Equipment: Worldwide, 2002 (Executive Summary) Executive Summary Publication Date: 20 August 2003 Authors Caroline Jones Andy Rolfe This document has been published

More information

Integration With the Business Modeler

Integration With the Business Modeler Decision Framework, J. Duggan Research Note 11 September 2003 Evaluating OOA&D Functionality Criteria Looking at nine criteria will help you evaluate the functionality of object-oriented analysis and design

More information

zapnote PARASOFT Briefing Date: June 13, 2002 Analyst: Jason Bloomberg

zapnote PARASOFT Briefing Date: June 13, 2002 Analyst: Jason Bloomberg zapthink zapnote ZAPTHINK ZAPNOTE Doc. ID: ZTZN-0605-1D Released: July 17, 2002 PARASOFT TESTING BOTH WEB SERVICES PRODUCERS AND CONSUMERS Briefing Date: June 13, 2002 Analyst: Jason Bloomberg Abstract

More information

Building Better Interfaces: HL7 Conformance Profiles

Building Better Interfaces: HL7 Conformance Profiles Tutorials, W. Rishel Research Note 26 November 2002 Building Better Interfaces: HL7 Conformance Profiles The new Health Level Seven conformance technology allows individual healthcare organizations and

More information

DISRUPTIVE TECHNOLOGIES IN THE DATACENTER

DISRUPTIVE TECHNOLOGIES IN THE DATACENTER DISRUPTIVE TECHNOLOGIES IN THE DATACENTER Ten Technologies Driving a Wave of Change Are there new technologies out there that could disrupt the economics and infrastructure of the modern datacenter and

More information

Can you wait until 2010?

Can you wait until 2010? Decision Framework, M.Silver,A.Park Research Note 5 December 2003 Who Should Deploy Office 2003, and When Enterprises that intend to skip Office 2003 should ensure that they are comfortable with their

More information

NGN: Carriers and Vendors Must Take Security Seriously

NGN: Carriers and Vendors Must Take Security Seriously Research Brief NGN: Carriers and Vendors Must Take Security Seriously Abstract: The next-generation network will need to provide security on many levels. A comprehensive set of standards should be in place

More information

Database Design Tool Magic Quadrant 2H02

Database Design Tool Magic Quadrant 2H02 Markets, J. Duggan Research Note 27 August 2002 Database Design Tool Magic Quadrant 2H02 Despite rapid growth in Unified Modeling Language, objectoriented and business process modeling tools, database

More information

The Clinical Data Repository Provides CPR's Foundation

The Clinical Data Repository Provides CPR's Foundation Tutorials, T.Handler,M.D.,W.Rishel Research Note 6 November 2003 The Clinical Data Repository Provides CPR's Foundation The core of any computer-based patient record system is a permanent data store. The

More information

Central and Eastern Europe: Premises Switching Equipment Market Share, 2002 (Executive Summary) Executive Summary

Central and Eastern Europe: Premises Switching Equipment Market Share, 2002 (Executive Summary) Executive Summary Central and Eastern Europe: Premises Switching Equipment Market Share, (Executive Summary) Executive Summary Publication Date: 15 July 2003 Author Megan Fernandez This document has been published to the

More information

FICON Drives Fibre Channel Security

FICON Drives Fibre Channel Security FICON Drives Fibre Channel Security Research Brief Abstract: FICON products for mainframes impact the Fibre Channel switch market as FICON requirements drive improvements in security, benefiting all Fibre

More information

IT Services: Identifying the Addressable Markets for Telecom Operators (Executive Summary) Executive Summary

IT Services: Identifying the Addressable Markets for Telecom Operators (Executive Summary) Executive Summary IT Services: Identifying the Addressable Markets for Telecom Operators (Executive Summary) Executive Summary Publication Date: 31 March 2003 Author Kobita Desai This document has been published to the

More information

Four Partial Solutions for Remote Network Access

Four Partial Solutions for Remote Network Access Decision Framework, E. Paulak Research Note 29 August 2003 Four Partial Solutions for Remote Network Access Four different solutions can help to meet your remoteaccess needs. Managed-service providers

More information

A Quick Chat about SOMF Logical Design of Service Relationship

A Quick Chat about SOMF Logical Design of Service Relationship www.modelingconcepts.com Do not be afraid to ask! A Quick Chat about SOMF Logical Design of Service Relationship For architects, business analysts, system analysts, software developers, modelers, team

More information

COM F. Troni, L. Fiering

COM F. Troni, L. Fiering F. Troni, L. Fiering Research Note 8 September 2003 Commentary Notebook TCO Comparison: Day Extenders vs. Traveling s Notebooks used by traveling workers, who are out of the office more often and work

More information

Management Update: Storage Management TCO Considerations

Management Update: Storage Management TCO Considerations IGG-09172003-01 C. Stanley Article 17 September 2003 Management Update: Storage Management TCO Considerations CIOs, asset managers, data center managers and business managers should be aware of the total

More information

zapnote INTELLIGENCE WITH XML SPYS August, 2001 Analyst: Ronald Schmelzer

zapnote INTELLIGENCE WITH XML SPYS August, 2001 Analyst: Ronald Schmelzer zapthink zapnote ZAPTHINK ZAPNOTE Doc. ID: ZTZN-0111-1 Released: Dec. 21, 2001 ALTOVA XML DEVELOPER D INTELLIGENCE WITH XML SPYS XML D August, 2001 XML S Analyst: Ronald Schmelzer Abstract While previous

More information

MTAT Enterprise System Integration. Lecture 2: Middleware & Web Services

MTAT Enterprise System Integration. Lecture 2: Middleware & Web Services MTAT.03.229 Enterprise System Integration Lecture 2: Middleware & Web Services Luciano García-Bañuelos Slides by Prof. M. Dumas Overall view 2 Enterprise Java 2 Entity classes (Data layer) 3 Enterprise

More information

Finding Pure-Play Midtier ESPs: A Two-Step Process

Finding Pure-Play Midtier ESPs: A Two-Step Process Research Brief Finding Pure-Play Midtier ESPs: A Two-Step Process Abstract: The pure-play midtier consulting and integration sector can be a competitive option to global integrators. Tier 2 and 3 vendors

More information

webmethods EntireX for ESB: Leveraging Platform and Application Flexibility While Optimizing Service Reuse

webmethods EntireX for ESB: Leveraging Platform and Application Flexibility While Optimizing Service Reuse December 2008 webmethods EntireX for ESB: Leveraging Platform and Application Flexibility While Optimizing Service Reuse By Chris Pottinger, Sr. Manager Product Development, and Juergen Lind, Sr. Product

More information

Connect Applications and Services Together with the Enterprise Service Bus

Connect Applications and Services Together with the Enterprise Service Bus Connect s and Services Together with the On Demand Insurance Business Problems 1. We lose customers because we process new policy applications too slowly. 2. Our claims processing is time-consuming and

More information

zapnote Analyst: Jason Bloomberg

zapnote Analyst: Jason Bloomberg zapthink zapnote ZAPTHINK ZAPNOTE Doc. ID: ZTZN-1198 Released: August 21, 2006 DATADIRECT XQUERY 2.0 ENABLING XQUERY FOR VERY LARGE MESSAGES Analyst: Jason Bloomberg Abstract As the quantity of XML in

More information

Mobile Terminals: Middle East, (Executive Summary) Executive Summary

Mobile Terminals: Middle East, (Executive Summary) Executive Summary Mobile Terminals: Middle East, 2001-2007 (Executive Summary) Executive Summary Publication Date: 25 July 2003 Authors Carolina Milanesi Ben Wood This document has been published to the following Marketplace

More information

Controlled Medical Vocabulary in the CPR Generations

Controlled Medical Vocabulary in the CPR Generations Tutorials, B. Hieb, M.D. Research Note 5 November 2003 Controlled Medical Vocabulary in the CPR Generations A CMV capability becomes progressively more important as computer-based patient record systems

More information

COM I. Keene, B. Hafner

COM I. Keene, B. Hafner I. Keene, B. Hafner Research Note 23 December 2002 Commentary The Telecommunications and Networking Hype Cycle New networking technologies and services continue to stream into the telecommunications marketplace.

More information

Should You Use Liberty or Passport for Digital Identities?

Should You Use Liberty or Passport for Digital Identities? Select Q&A, J. Pescatore, A. Litan Research Note 12 August 2003 Should You Use Liberty or Passport for Digital Identities? Federated digital identities, such as from the Liberty Alliance and Microsoft

More information

NEXT-GENERATION DATACENTER MANAGEMENT

NEXT-GENERATION DATACENTER MANAGEMENT NEXT-GENERATION DATACENTER MANAGEMENT From DCIM to DCSO Sometimes described as the operating or ERP system for the datacenter, datacenter infrastructure management (DCIM) is a technology that helps operators

More information

Connecting ESRI to Anything: EAI Solutions

Connecting ESRI to Anything: EAI Solutions Connecting ESRI to Anything: EAI Solutions Frank Weiss P.E., ESRI User s Conference 2002 Agenda Introduction What is EAI? Industry trends Key integration issues Point-to-point interfaces vs. Middleware

More information

Gartner Client Operating Systems Surveys and Polls: Enterprises Plan Early, but Slow, Move to Windows 7

Gartner Client Operating Systems Surveys and Polls: Enterprises Plan Early, but Slow, Move to Windows 7 Page 1 of 8 Gartner Client Operating Systems Surveys and Polls: Enterprises Plan Early, but Slow, Move to Windows 7 7 June 2010 Michael A. Silver Gartner RAS Core Research Note G00200542 Respondents to

More information

Introduction in Eventing in SOA Suite 11g

Introduction in Eventing in SOA Suite 11g Introduction in Eventing in SOA Suite 11g Ronald van Luttikhuizen Vennster Utrecht, The Netherlands Keywords: Events, EDA, Oracle SOA Suite 11g, SOA, JMS, AQ, EDN Introduction Services and events are highly

More information

Worldwide 2002 Security Software Market and Vendor Shares (Executive Summary) Executive Summary

Worldwide 2002 Security Software Market and Vendor Shares (Executive Summary) Executive Summary Worldwide Security Software Market and Vendor Shares (Executive Summary) Executive Summary Publication Date: 21 July 2003 Author Norma Schroder This document has been published to the following Marketplace

More information

NetIQ's VoIP Management Products

NetIQ's VoIP Management Products Products, D. Neil Research Note 10 September 2002 NetIQ's VoIP Management Products NetIQ has announced its Voice over IP management strategy and has a number of pre- and post-implementation products available.

More information

Survey of Mobile Phone Users in Poland and Russia, 2003 (Executive Summary) Executive Summary

Survey of Mobile Phone Users in Poland and Russia, 2003 (Executive Summary) Executive Summary Survey of Mobile Phone Users in Poland and Russia, 2003 (Executive Summary) Executive Summary Publication Date: 3 December 2003 Author Sarah Randall This document has been published to the following Marketplace

More information

Application Connectivity Strategies

Application Connectivity Strategies Connectivity Strategies Max Dolgicer Director of Technical Services mdolgicer@isg-inc.com Gerhard Bayer Senior Consultant gbayer@isg-inc.com International Systems Group (ISG), Inc 32 Broadway, Suite 414

More information

Global Telecommunications Market Take, 1Q03 (Executive Summary) Executive Summary

Global Telecommunications Market Take, 1Q03 (Executive Summary) Executive Summary Global Telecommunications Market Take, 1Q03 (Executive Summary) Executive Summary Publication Date: 9 April 2003 Author Wm.L.Hahn This document has been published to the following Marketplace codes: TELC-WW-EX-0576

More information

4Q02 Update: Disk Storage Forecast Scenarios,

4Q02 Update: Disk Storage Forecast Scenarios, Forecast Analysis 4Q02 Update: Disk Storage Forecast Scenarios, 2002-2003 Abstract: Clearly, the near-term fate of the disk storage system market is more tightly coupled with micro IT spending trends than

More information

Worldwide Workstation Shipments Rebound in Third Quarter

Worldwide Workstation Shipments Rebound in Third Quarter Market Analysis Worldwide Workstation Shipments Rebound in Third Quarter Abstract: Preliminary worldwide workstation shipments totaled 384,756 units in the third quarter of 2003, for a year-over-year increase

More information

Oracle SOA Suite 11g: Build Composite Applications

Oracle SOA Suite 11g: Build Composite Applications Oracle University Contact Us: 1.800.529.0165 Oracle SOA Suite 11g: Build Composite Applications Duration: 5 Days What you will learn This course covers designing and developing SOA composite applications

More information

HDD Head and Media Markets Show Variable Growth and Decline, (Executive Summary) Executive Summary

HDD Head and Media Markets Show Variable Growth and Decline, (Executive Summary) Executive Summary HDD Head and Media Markets Show Variable Growth and Decline, 1998-2002 (Executive Summary) Executive Summary Publication Date: 12 March 2003 Author John Monroe This document has been published to the following

More information

DBMS Software Market Forecast, (Executive Summary) Executive Summary

DBMS Software Market Forecast, (Executive Summary) Executive Summary DBMS Software Market Forecast, 2003-2007 (Executive Summary) Executive Summary Publication Date: 4 September 2003 Author Colleen Graham This document has been published to the following Marketplace codes:

More information

Dallas EXECUTIVE OVERVIEW. Multi-Tenant Datacenter Market MARKET FORECAST JUL Stefanie Williams, Associate Analyst, Multi-Tenant Datacenters

Dallas EXECUTIVE OVERVIEW. Multi-Tenant Datacenter Market MARKET FORECAST JUL Stefanie Williams, Associate Analyst, Multi-Tenant Datacenters MARKET FORECAST JUL 2016 Dallas Multi-Tenant Datacenter Market Stefanie Williams, Associate Analyst, Multi-Tenant Datacenters This report provides an overview of the competitive dynamics in the Dallas

More information

Market Scope. Magic Quadrant Methodology

Market Scope. Magic Quadrant Methodology Markets, J. Enck, A. Powell Research Note 12 May 2003 Global IA High-Volume Server Magic Quadrant, 1H03 Gartner's Magic Quadrant for Intel Architecture in 1H03 indicates that Dell Computer, Hewlett-Packard

More information

Web Services. Lecture I. Valdas Rapševičius. Vilnius University Faculty of Mathematics and Informatics

Web Services. Lecture I. Valdas Rapševičius. Vilnius University Faculty of Mathematics and Informatics Web Services Lecture I Valdas Rapševičius Vilnius University Faculty of Mathematics and Informatics 2014.02.28 2014.02.28 Valdas Rapševičius. Java Technologies 1 Outline Introduction to SOA SOA Concepts:

More information

Choices Multiply in Midrange and High-End Color Printing

Choices Multiply in Midrange and High-End Color Printing Research Brief Choices Multiply in Midrange and High-End Color Printing Abstract: Color speed is no longer an oxymoron. Color copiers and printers with speeds between 30 and 50 pages per minute are commonly

More information

Mobile Terminals: Western Europe, (Executive Summary) Executive Summary

Mobile Terminals: Western Europe, (Executive Summary) Executive Summary Mobile Terminals: Western Europe, 1998-2007 (Executive Summary) Executive Summary Publication Date: 6 June 2003 Authors Carolina Milanesi Ben Wood This document has been published to the following Marketplace

More information

COMMUNICATION PROTOCOLS

COMMUNICATION PROTOCOLS COMMUNICATION PROTOCOLS Index Chapter 1. Introduction Chapter 2. Software components message exchange JMS and Tibco Rendezvous Chapter 3. Communication over the Internet Simple Object Access Protocol (SOAP)

More information

ISV Support Is Key When Choosing a Server Operating System

ISV Support Is Key When Choosing a Server Operating System Markets, A. Butler Research Note 17 September 2003 ISV Support Is Key When Choosing a Server Operating System It's the support independent software vendors offer that determines the life span of a server

More information

Hong Kong EXECUTIVE OVERVIEW. Multi-Tenant Datacenter Market MARKET FORECAST DEC Dan Thompson, Senior Analyst, Multi-tenant Datacenters

Hong Kong EXECUTIVE OVERVIEW. Multi-Tenant Datacenter Market MARKET FORECAST DEC Dan Thompson, Senior Analyst, Multi-tenant Datacenters MARKET FORECAST DEC 2016 Hong Kong Multi-Tenant Datacenter Market Dan Thompson, Senior Analyst, Multi-tenant Datacenters This report provides an overview of the competitive dynamics in the Hong Kong market,

More information

Europe Wants Security Software, Despite Tight Budgets (Executive Summary) Executive Summary

Europe Wants Security Software, Despite Tight Budgets (Executive Summary) Executive Summary Europe Wants Security Software, Despite Tight Budgets (Executive Summary) Executive Summary Publication Date: 1 July 2003 Authors Fabrizio Biscotti Alain Dang Van Mien Norma Schroder Chris Pang This document

More information

Final 2002 Asia/Pacific Semiconductor Market Share by Geographical Area (Executive Summary) Executive Summary

Final 2002 Asia/Pacific Semiconductor Market Share by Geographical Area (Executive Summary) Executive Summary Final Asia/Pacific Semiconductor Share by Geographical Area (Executive Summary) Executive Summary Publication Date: 22 May 2003 Authors Hee-Chan Lee Adriana Blanco Ada Cheng Jeremey Donovan Tamara Grant

More information

Dialog (interactive) data input. Reporting. Printing processing

Dialog (interactive) data input. Reporting. Printing processing Tutorials, D. Prior Research Note 24 February 2003 Who Sets the Pace in the SAP Performance 'Olympics'? SAP and its hardware vendors use many different application performance benchmarks. But records for

More information

Hype Cycle for Data Warehousing, 2003

Hype Cycle for Data Warehousing, 2003 K. Strange, T. Friedman Strategic Analysis Report 30 May 2003 Hype Cycle for Data Warehousing, 2003 Data warehousing concepts and approaches have become fairly mature during a decade of refinement. However,

More information

Complex event processing in reactive distributed systems

Complex event processing in reactive distributed systems Complex event processing in reactive distributed systems Ján JANÍK Slovak University of Technology Faculty of Informatics and Information Technologies Ilkovičova 3, 842 16 Bratislava, Slovakia xjanikj@is.stuba.sk

More information

South Korea EXECUTIVE OVERVIEW. Multi-Tenant Datacenter Market MARKET FORECAST MAY Dan Thompson, Senior Analyst, Multi-Tenant Datacenters

South Korea EXECUTIVE OVERVIEW. Multi-Tenant Datacenter Market MARKET FORECAST MAY Dan Thompson, Senior Analyst, Multi-Tenant Datacenters MARKET FORECAST MAY 2017 South Korea Multi-Tenant Datacenter Market Dan Thompson, Senior Analyst, Multi-Tenant Datacenters This report provides an overview of the competitive dynamics in the South Korea

More information

Spam Filtering Works Better With a Management Policy

Spam Filtering Works Better With a Management Policy Select Q&A, M. Grey, A. Hallawell Research Note 22 September 2003 Spam Filtering Works Better With a Management Policy A deployment of spam-filtering technology that does not consider business issues will

More information

Leased-Line Market Thrives in Asia/ Pacific Despite Bandwidth Glut (Executive Summary) Executive Summary

Leased-Line Market Thrives in Asia/ Pacific Despite Bandwidth Glut (Executive Summary) Executive Summary Leased-Line Market Thrives in Asia/ Pacific Despite Bandwidth Glut (Executive Summary) Executive Summary Publication Date: December 4, 2002 Authors Alayne Wong To Chee Eng Evelyn Goh Kenshi Tazaki Andrew

More information

MOM MESSAGE ORIENTED MIDDLEWARE OVERVIEW OF MESSAGE ORIENTED MIDDLEWARE TECHNOLOGIES AND CONCEPTS. MOM Message Oriented Middleware

MOM MESSAGE ORIENTED MIDDLEWARE OVERVIEW OF MESSAGE ORIENTED MIDDLEWARE TECHNOLOGIES AND CONCEPTS. MOM Message Oriented Middleware MOM MESSAGE ORIENTED MOM Message Oriented Middleware MIDDLEWARE OVERVIEW OF MESSAGE ORIENTED MIDDLEWARE TECHNOLOGIES AND CONCEPTS Peter R. Egli 1/25 Contents 1. Synchronous versus asynchronous interaction

More information

what do we mean by event processing now, a checklist of capabilities in current event processing tools and applications,

what do we mean by event processing now, a checklist of capabilities in current event processing tools and applications, A View of the Current State of Event Processing what do we mean by event processing now, complex event processing, a checklist of capabilities in current event processing tools and applications, next steps

More information

Solace JMS Broker Delivers Highest Throughput for Persistent and Non-Persistent Delivery

Solace JMS Broker Delivers Highest Throughput for Persistent and Non-Persistent Delivery Solace JMS Broker Delivers Highest Throughput for Persistent and Non-Persistent Delivery Java Message Service (JMS) is a standardized messaging interface that has become a pervasive part of the IT landscape

More information

Ending the Confusion About Software- Defined Networking: A Taxonomy

Ending the Confusion About Software- Defined Networking: A Taxonomy Ending the Confusion About Software- Defined Networking: A Taxonomy This taxonomy cuts through confusion generated by the flood of vendor SDN announcements. It presents a framework that network and server

More information

Nortel Networks Optivity Policy Services

Nortel Networks Optivity Policy Services Sharon Fisher Product Report 7 January 2004 Nortel Networks Optivity Policy Services Summary Optivity Policy Services is system-level software for managing the traffic prioritization and network access

More information

NGN: Enterprise IP Telephony

NGN: Enterprise IP Telephony NGN: Enterprise IP Telephony Research Brief Abstract: Enterprises have been slow to adopt Internet Protocol-based telephony. Vendors should educate them as to its benefits, using realistic calculations

More information

IT Services' IP Telephony-Related Growth Remains Strong Through 2007 (Executive Summary) Executive Summary

IT Services' IP Telephony-Related Growth Remains Strong Through 2007 (Executive Summary) Executive Summary IT Services' IP Telephony-Related Growth Remains Strong Through 2007 (Executive Summary) Executive Summary Publication Date: 15 December 2003 Author Eric Goodness This document has been published to the

More information

Semiconductor Market for Data Processing: Asia/Pacific, 3Q03

Semiconductor Market for Data Processing: Asia/Pacific, 3Q03 Research Brief Semiconductor Market for Data Processing: Asia/Pacific, 3Q03 Abstract: Semiconductor market conditions have improved since the second quarter of 2003, and the industry's recovery is continuing.

More information

A2A EAI. Overview and recommendations Data Transport. Jerome CAPIROSSI. people are keen to argue since they find themselves to be affected.

A2A EAI. Overview and recommendations Data Transport. Jerome CAPIROSSI. people are keen to argue since they find themselves to be affected. . EAI A2A EAI Overview and recommendations Jerome CAPIROSSI Abstract Since customers or corporate users get various terminals (Phone, PDAs, Web, Workstation, ) and therefore various channels for connecting

More information

Mesh Networking Principles

Mesh Networking Principles Technology, N. Jones Research Note 8 July 2003 Mesh Topologies Promise Resilient Wireless Networks Mesh architecture will become an essential element of wireless networking because it is easy to install,

More information

Web Services. Lecture I. Valdas Rapševičius Vilnius University Faculty of Mathematics and Informatics

Web Services. Lecture I. Valdas Rapševičius Vilnius University Faculty of Mathematics and Informatics Web Services Lecture I Valdas Rapševičius Vilnius University Faculty of Mathematics and Informatics 2015.02.19 Outline Introduction to SOA SOA Concepts: Services Loose Coupling Infrastructure SOA Layers

More information

Starting out with Event Driven Systems

Starting out with Event Driven Systems Starting out with Event Driven Systems Software Architect, London October 2011 Eoin Woods www.eoinwoods.info About Me Software architect & dev manager at UBS Investment Bank responsible for equity swaps

More information

Vertical Market Trends: Western Europe, (Executive Summary) Executive Summary

Vertical Market Trends: Western Europe, (Executive Summary) Executive Summary Vertical Market Trends: Western Europe, (Executive Summary) Executive Summary Publication Date: 21 March 2003 Authors Cathy Tornbohm Peter Redshaw This document has been published to the following Marketplace

More information

CIO Update: Security Platforms Will Transform the Network Security Arena

CIO Update: Security Platforms Will Transform the Network Security Arena IGG-11202002-02 J. Pescatore, M. Easley, R. Stiennon Article 20 November 2002 CIO Update: Security Platforms Will Transform the Network Security Arena An integrated network security platform approach will

More information

AIOs Displace Single-Function Printers in Latin America

AIOs Displace Single-Function Printers in Latin America ` Market Analysis AIOs Displace Single-Function Printers in Latin America Abstract: Stand-alone printer shipments have dropped sharply, while inkjet all-in-one printers continue to gain market share in

More information

CLSA DIRECT MARKET ACCESS SERVICES ANNEX

CLSA DIRECT MARKET ACCESS SERVICES ANNEX CLSA DIRECT MARKET ACCESS SERVICES ANNEX 1. Definitions and Interpretation 1.1 In this Direct Market Access Services Annex capitalised terms have the meaning given to them in the CLSA Asia-Pacific Terms

More information

Push-to-Talk Brings Voice-Based Instant Messaging to Europe

Push-to-Talk Brings Voice-Based Instant Messaging to Europe Research Brief Push-to-Talk Brings Voice-Based Instant Messaging to Europe Abstract: Push-to-talk services will soon let Europe s mobile phone users send voice messages via IP, boosting data revenue. Young

More information

NGN: The Evolution of Wireless Networks

NGN: The Evolution of Wireless Networks NGN: The Evolution of Wireless Networks Research Brief Abstract: Operators of mobile phone networks are already working through the financial and technical challenges of their own next generation of networks.

More information

COMMUNICATION IN DISTRIBUTED SYSTEMS

COMMUNICATION IN DISTRIBUTED SYSTEMS Distributed Systems Fö 3-1 Distributed Systems Fö 3-2 COMMUNICATION IN DISTRIBUTED SYSTEMS Communication Models and their Layered Implementation 1. Communication System: Layered Implementation 2. Network

More information

The Unicode Standard Version 11.0 Core Specification

The Unicode Standard Version 11.0 Core Specification The Unicode Standard Version 11.0 Core Specification To learn about the latest version of the Unicode Standard, see http://www.unicode.org/versions/latest/. Many of the designations used by manufacturers

More information

SAML V2.0 Profile for Token Correlation

SAML V2.0 Profile for Token Correlation SAML V2.0 Profile for Token Correlation Committee Draft 01 28 June 2010 Specification URIs: This Version: 0.1 Previous Version: 0 Latest Version: Technical Committee: OASIS Security Services TC Chair(s):

More information

TIBCO Complex Event Processing Evaluation Guide

TIBCO Complex Event Processing Evaluation Guide TIBCO Complex Event Processing Evaluation Guide This document provides a guide to evaluating CEP technologies. http://www.tibco.com Global Headquarters 3303 Hillview Avenue Palo Alto, CA 94304 Tel: +1

More information

APPENDIX 1 EAI TOOLS

APPENDIX 1 EAI TOOLS 87 APPENDIX 1 EAI TOOLS A 1.1 WEBMETHODS COMPONENTS A 1.1.1 Integration Server The Integration Server Administrator is the utility we use to accomplish administrative tasks. It is used to monitor server

More information

IBM App Connect Professional

IBM App Connect Professional Service Description IBM App Connect Professional This Service Description describes the Cloud Service IBM provides to Client. Client means the company and its authorized users and recipients of the Cloud

More information

Complex or Simple Event Processing by David Luckham

Complex or Simple Event Processing by David Luckham Complex or Simple Event Processing by David Luckham Some people, I m told, get scared when they hear the word complex, as in Complex Event Processing (CEP). They want to hear simple event processing or

More information

Wireless Local Loop: Cellular in Waiting? (Executive Summary) Executive Summary

Wireless Local Loop: Cellular in Waiting? (Executive Summary) Executive Summary Wireless Local Loop: Cellular in Waiting? (Executive Summary) Executive Summary Publication Date: October 14, 2002 Authors To Chee Eng Evelyn Goh Kobita Desai This document has been published to the following

More information

External RAID-Based Storage System Analysis by Form Factor

External RAID-Based Storage System Analysis by Form Factor Research Brief External RAID-Based Storage System Analysis by Form Factor Abstract: Gartner Dataquest forecasts factory revenue for modular external RAID controllerbased storage systems will grow at a

More information

Huawei W-CDMA/HSPA Baseband Unit WD2BBBUC-HERT BBU Model BBU3900. July 2014

Huawei W-CDMA/HSPA Baseband Unit WD2BBBUC-HERT BBU Model BBU3900. July 2014 DesigN Analysis - Infrastructure Earl J. Lum +1-650-430-2221 elum@ejlwireless.com Huawei W-CDMA/HSPA Baseband Unit WD2BBBUC-HERT BBU Model BBU3900 July 2014 Entire contents. Reproduction of this publication

More information

DRAFT A Survey of Event Processing Languages (EPLs)

DRAFT A Survey of Event Processing Languages (EPLs) DRAFT A Survey of Event Processing Languages (EPLs) October 15, 2006 (v14) Tim Bass, CISSP Co-Chair Event Processing Reference Architecture Working Group Principal Global Architect, Director TIBCO Software

More information

TransactionVision Technical White Paper

TransactionVision Technical White Paper E X E C U T I V E S U M M A R Y Unique Solution TransactionVision is transaction tracking and analysis software that provides a real-time view of business transactions flowing through a distributed enterprise

More information

Midsize Business Voice Service Spending Steady for 2003

Midsize Business Voice Service Spending Steady for 2003 End-User Analysis Midsize Business Voice Service Spending Steady for 23 Abstract: Telecom service providers need to know the voice telecom spending plans of the margin-rich midsize business segment in

More information

LAB-03 BPMN Resource Perspective and Events

LAB-03 BPMN Resource Perspective and Events Lab for the course on Process and Service Modeling and Analysis LAB-03 BPMN Resource Perspective and Events Lecturer: Andrea MARRELLA Objectives of this lecture Recap: Pools, Swimlanes and Message Flows

More information

OpenService NerveCenter Event Correlation Network Management

OpenService NerveCenter Event Correlation Network Management John Inverso Product Report 31 July 2003 OpenService NerveCenter Event Correlation Network Management Summary NerveCenter provides network-event correlation and root-cause analysis abilities which its

More information