COM R. Schulte
|
|
- Delilah Arnold
- 5 years ago
- Views:
Transcription
1 R. Schulte Research Note 7 July 2003 Commentary Event-Driven Applications: Definition and Taxonomy Simple event-driven applications are becoming widespread in mainstream enterprises. More-powerful complex-event processing is a niche phenomenon today but will become more common by Although system software, such as operating systems and network and systems management (NSM) tools, has implemented events widely for years, business applications have underutilized events. As business requirements escalate and event-enabling technologies become more available, enterprises will increase the number and sophistication of their event-driven applications. What Is an Event? The term "event" has two meanings in this research. Ordinary events just mean something that happened that is, a large or small change in the state of the universe. In software engineering, however, an event is the automated record of what happened. Software events are objects, often packaged as messages, that describe an ordinary event. Ordinary Events Ordinary events include a house purchase, a stock trade, college graduation and clicking a computer mouse. Events encompass smaller, contributing events. For example, a house purchase may involve multiple meetings, house tours, phone calls, , bank transactions and so forth. Even the tiniest action, such as picking up a pen, results in events (for example, a change in the location of the pen). However, it is seldom useful to analyze events on this fine level of detail. Events are not instantaneous; they result from processes that occur over time. Buying a house may take months. For our purposes, the most important kind of ordinary event is a business event. A business event is a meaningful change in the state of the enterprise or of something relevant to the enterprise, such as a customer order, an employee address change, the arrival of a shipment at a loading dock, a bill payment or a truck breakdown. Software Events Every enterprise has ordinary business events, even if it has no computers. However, software events only come into existence if they are generated by an application or some other software to describe such business events. Not all business events are documented by software events. For example, when a Gartner 2003 Gartner, Inc. and/or its Affiliates. All Rights Reserved. Reproduction of this publication in any form without prior written permission is forbidden. The information contained herein has been obtained from sources believed to be reliable. Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information. Gartner shall have no liability for errors, omissions or inadequacies in the information contained herein or for interpretations thereof. The reader assumes sole responsibility for the selection of these materials to achieve its intended results. The opinions expressed herein are subject to change without notice.
2 person enters an order (a business event), an application program typically records the transaction by updating a database. If this just changes existing data elements (such as sales records and account balances) and any new data is scattered among various tables, then no identifiable software event is created. However, it is often useful for the application to send a message that contains some description of the order (for example, customer name, date, time, item descriptions and quantities) to another application to trigger further processing (see "The Case for Event-Driven Design"). This message describes a particular happening and is a software event (strictly speaking, the message is the form of the event, although programmers often refer to the message as being the event). In event-driven design, a mundane business event, such as a book purchase, could cause a dozen application programs in different locations to emit hundreds of software events over the course of a week. For example, the online-shopping program will send an event when the book is added to the shopping cart, an order-processing program may later send an event to a bank credit card system, and another event may trigger a royalty payment to the author. These are application-level events because they have business meaning and are created and received by applications. Other kinds of software events are continuously generated in the background by the operating system, NSM tools and other system software. Software events that are sent and received by system software are outside the scope of this research because they are not part of application design. However, some system events do affect business users. For example, if a computer fails, an NSM event may be sent to a business activity monitoring (BAM) tool that notifies a business manager that a customer care center application is down. Another example: When a mouse is clicked (a tiny ordinary event) on a screen icon, system software that controls the graphical user interface generates an event that triggers a particular event-driven procedure in a Visual Basic program. This is an example of event-driven programming, not high-level event-driven application design, and is therefore also outside of our scope. Taxonomy Event-driven business applications can be sorted into four categories: Simple event-driven (or message-driven) applications, where application programs explicitly send and receive messages directly to and from each other for example, through message-oriented middleware (MOM) Event-driven applications that are mediated by integration brokers, which transform and route simple event messages according to logical rules Event-driven applications that are directed by business process management (BPM) engines that manage the end-to-end flow of a multistep process using special, BPM-oriented types of events Complex-event processing (CEP) applications, where a sophisticated event manager logically evaluates multiple events to enable decoupled, parallel, asynchronous application processing or BAM Simple Events Simple-event-driven processing is roughly synonymous with message-driven processing. Messages are sent in one direction from an application source to one or more application sinks (recipients). The applications are logically decoupled because they do not "hard wire" any assumptions about each other beyond a shared understanding of message contents. A common mistake is to confuse conceptual design with lower-level implementation. Event-driven processing as a design concept can be implemented with almost any kind of middleware or protocol, 7 July
3 theoretically even TCP/IP or a remote procedure call (RPC). However, event-driven applications are usually built on MOM, Web services or both. Examples of MOM include IBM's Event Broker, IBM's MQSeries, Microsoft Message Queuing (MSMQ), Tibco Software's Rendezvous, and any of the Java Message Service (JMS) MOM products (whether embedded in application servers or unbundled). MOM products that support publish-and-subscribe (pub-sub) are particularly useful for sending events. Not all MOM messages are events. A MOM message may contain a file, a multimedia object that represents no particular activity (for example, a person's portrait), a collection of events packaged together, or a set of parameters for an RPC. None of these messages is an event. A MOM message is (the form of) a software event only if it signifies the occurrence of one particular ordinary event. A software "document" containing a purchase order, loan application, insurance claim or other transaction can be considered a kind of denormalized event if it is sent one way. Such documents, commonly formatted in Extensible Markup Language (XML), are software events in spirit because they contain the digital record of a business event. However, they are less elemental than a strictly designed software event that documents a single change of state. A document is forwarded from one application to the next with various changes and additional data elements, so it is a running log of state changes. If a document is used in a two-way, request/response pattern, then it is not an event even in spirit (see "Event-Driven Architecture Complements SOA"). Enterprises traditionally handled most events (including documents) in batch processes. They have gradually increased their use of near-real-time event-driven computing during the past 10 years. Individual event messages and documents are now widely used in many mainstream applications, including business-to-business (see "B2B Application Integration Is Typically Event-Oriented"). However, a substantial minority of application developers still do not fully understand where events should be used. Their applications invoke a procedure through a method call, or write data to a database or file, when sending an event through MOM or Web services would be more effective. Brokered Event Processing It is often useful to insert an integration broker between an application that sends a simple event and the application(s) that receives the event. Integration brokers perform syntactic and semantic transformation on messages. Integration brokers also perform content-based routing, often using pub-sub communication. Brokers apply application-level intelligence using rules, in contrast to plain communication middleware, such as a MOM, which only provides basic event delivery. Integration suites from vendors such as IBM, Mercator Software, Microsoft, SeeBeyond Technology, Sybase, Tibco, webmethods and Vitria Technology contain such brokers. Integration brokers are also found in application platform suites, some packaged applications and other software products (see "Events Will Transform Application Servers"). The use of an intermediary, such as a broker, is a big step beyond simple event-driven computing, because some decisions on the flow of data and the flow of control are moved out of the end-point applications and into the broker. Although this is different from conventional application design, it is not too difficult for mainstream architects and developers to do. Most large enterprises use an integration broker in at least one application, and many have several different brokers in production. We estimate that about 20 percent of new, integrated applications in 2003 will use an integration broker someplace, and that half of the new integrated applications in 2006 will use a broker (0.7 probability). Note that brokers also support service-oriented architecture (SOA), so they should not be considered just as eventoriented tools. 7 July
4 BPM-Enabled Applications BPM is a different approach from either simple event-driven or brokered applications. BPM software manages process flows by "remembering" the status (holding state data) for each instance of a process. It uses rules to evaluate the context and events, and then triggers execution of the appropriate next steps. BPM engines use events in two ways: Like a broker, they can trigger an application by sending an event that contains application data, using MOM, Web services or another mechanism (alternatively, they also can invoke a program as a service, using Remote Method Invocation, Web services or another request/response mechanism, just as brokers can). Unlike a plain integration broker, however, BPM engines often use specially tailored BPM event messages to communicate between a BPM adapter and a central BPM engine to mark the start or end of an activity. These special system software events help to coordinate the process, but they are not business events. They do not carry application data and are not sent or received by an application program. BPM engines use such events to fork and join the flow of control based on logical rules. All of the major broker vendors, including those listed in the previous section, offer BPM engines that complement their integration brokers. Integration-oriented BPM specialists such as Fuego, Metaserver, Pegasystems and Savvion also support this. Complex-Event Processing CEP is radically different from simple, brokered or BPM-enabled event processing. CEP is enabled by some type of event management software, such as a centralized event manager or a set of distributed event-processing agents. Event managers use rules to: Filter events (selecting or discarding events based on their type and attributes) Aggregate sets of events into higher-level complex events by matching events to patterns Detect event patterns that violate constraint conditions An event manager may create new events to send to applications or to other event managers, or, like a BPM engine or broker, it may directly invoke an application through an application program interface in a request/response manner. CEP is most effective if the event messages carry extra information regarding relationships (relating this event with other events) or causality (historical background on how the event came about). Such data are not included in routine application messages (simple events), so they must be inserted by CEP adapters ("event transformers"). Often, an entire message is tailored for CEP purposes, carrying no business data from application to application. (For further explanation of CEP, see "The Power of Events," by David Luckham, Addison Wesley, 2002, ISBN ) CEP is currently found in leading-edge, niche business applications. The earliest practical use of CEP at an application level was in computer hardware simulation to help debug CPU designs. CEP is also used in business process diagnostics, security and fraud detection. One of the major drivers for the adoption of CEP in business applications is BAM. CEP is a core enabler of BAM and is built into many BAM tools already on the market (see "Opportunistic BAM Pits Users Against IT Planners"). CEP use will further accelerate as architects become more aware of its ability to enable dynamic, parallel, asynchronous processing. A few enterprises have built CEP into business applications by re-purposing NSM-style event managers to handle application events. Others have used event management software from pioneering 7 July
5 vendors such as Apama, ispheres, Systar and others. A few BPM vendors, including Pegasystems and Savvion, and integration vendors, including Tibco and Vitria, have varying degrees of CEP capabilities in their products today. Bottom Line: We recommend that enterprises use a mix of service-oriented architecture and simple event-driven design in most large new applications. Brokered and business-process-managementenabled event-driven approaches should be used in heterogeneous application integration scenarios where the data and flow routing must be systematically designed and managed. Complex-event processing should be reserved for business activity monitoring and for leading-edge projects where agility must be maximized and the enterprise is willing to invest in emerging CEP technology. 7 July
Events Will Transform Application Servers
Technology, Y. Natis Research Note 8 July 2003 Events Will Transform Application Servers Today's application servers can act as simple "event servers." To handle complex events, application servers will
More informationPredicts 2004: Enterprise Service Buses Are Taking Off
Strategic Planning, R. Schulte Research Note 16 December 2003 Predicts 2004: Enterprise Service Buses Are Taking Off Today, enterprise service buses are used only in leadingedge applications. They quickly
More informationBest Practices for Deploying Web Services via Integration
Tactical Guidelines, M. Pezzini Research Note 23 September 2002 Best Practices for Deploying Web Services via Integration Web services can assemble application logic into coarsegrained business services.
More informationThese patterns include: The use of proprietary software
Strategic Planning, F. Kenney, J. Thompson Research Note 7 August 2003 B2B Security Patterns: Finding the Perfect Combination Achieving business-to-business security is a combination of examining internal
More informationCHAPTER 2 ARCHITECTURES FOR SYSTEM INTEGRATION
8 CHAPTER 2 ARCHITECTURES FOR SYSTEM INTEGRATION 2.1 ENTERPRISE APPLICATION INTEGRATION 2.1.1 What is Enterprise Application Integration? EAI entails integrating applications and enterprise data sources
More informationEnterprise Data Architecture: Why, What and How
Tutorials, G. James, T. Friedman Research Note 3 February 2003 Enterprise Data Architecture: Why, What and How The goal of data architecture is to introduce structure, control and consistency to the fragmented
More informationPrediction: Multimodal transaction processing will emerge
Strategic Planning, M. Pezzini Research Note 19 December 2003 Predicts 2004: Prepare for Multimodal Transaction Processing Online transaction processing will have to support Web services, mobile channels
More informationWeb Services Take Root in Banks and With Asset Managers
Strategic Planning, M. Knox, W. Andrews, C. Abrams Research Note 18 December 2003 Web Services Take Root in Banks and With Asset Managers Financial-services providers' early Web services implementations
More informationSOHO and Residential Routers: Worldwide Market Share and Forecast, (Executive Summary) Executive Summary
SOHO and Residential Routers: Worldwide Market Share and Forecast, 2002-2007 (Executive Summary) Executive Summary Publication Date: 23 May 2003 Authors Rachna Ahlawat Gauri Pavate This document has been
More informationPredicts 2004: The Future of Windows Server
Strategic Planning, T. Bittman Research Note 19 November 2003 Predicts 2004: The Future of Windows Server In 2004, distributed manageability will emerge as the key to the future of Windows Server, especially
More informationIBM's WebSphere Integration Offer Signals Long-Term Plan
Products, M. Pezzini, J. Thompson Research Note 8 April 2003 IBM's WebSphere Integration Offer Signals Long-Term Plan Version 4.2 of WebSphere Business Integration bundles more products into one package.
More informationFirewall and IP Virtual Private Network Equipment: Worldwide, 2002 (Executive Summary) Executive Summary
Firewall and IP Virtual Private Network Equipment: Worldwide, 2002 (Executive Summary) Executive Summary Publication Date: 20 August 2003 Authors Caroline Jones Andy Rolfe This document has been published
More informationIntegration With the Business Modeler
Decision Framework, J. Duggan Research Note 11 September 2003 Evaluating OOA&D Functionality Criteria Looking at nine criteria will help you evaluate the functionality of object-oriented analysis and design
More informationzapnote PARASOFT Briefing Date: June 13, 2002 Analyst: Jason Bloomberg
zapthink zapnote ZAPTHINK ZAPNOTE Doc. ID: ZTZN-0605-1D Released: July 17, 2002 PARASOFT TESTING BOTH WEB SERVICES PRODUCERS AND CONSUMERS Briefing Date: June 13, 2002 Analyst: Jason Bloomberg Abstract
More informationBuilding Better Interfaces: HL7 Conformance Profiles
Tutorials, W. Rishel Research Note 26 November 2002 Building Better Interfaces: HL7 Conformance Profiles The new Health Level Seven conformance technology allows individual healthcare organizations and
More informationDISRUPTIVE TECHNOLOGIES IN THE DATACENTER
DISRUPTIVE TECHNOLOGIES IN THE DATACENTER Ten Technologies Driving a Wave of Change Are there new technologies out there that could disrupt the economics and infrastructure of the modern datacenter and
More informationCan you wait until 2010?
Decision Framework, M.Silver,A.Park Research Note 5 December 2003 Who Should Deploy Office 2003, and When Enterprises that intend to skip Office 2003 should ensure that they are comfortable with their
More informationNGN: Carriers and Vendors Must Take Security Seriously
Research Brief NGN: Carriers and Vendors Must Take Security Seriously Abstract: The next-generation network will need to provide security on many levels. A comprehensive set of standards should be in place
More informationDatabase Design Tool Magic Quadrant 2H02
Markets, J. Duggan Research Note 27 August 2002 Database Design Tool Magic Quadrant 2H02 Despite rapid growth in Unified Modeling Language, objectoriented and business process modeling tools, database
More informationThe Clinical Data Repository Provides CPR's Foundation
Tutorials, T.Handler,M.D.,W.Rishel Research Note 6 November 2003 The Clinical Data Repository Provides CPR's Foundation The core of any computer-based patient record system is a permanent data store. The
More informationCentral and Eastern Europe: Premises Switching Equipment Market Share, 2002 (Executive Summary) Executive Summary
Central and Eastern Europe: Premises Switching Equipment Market Share, (Executive Summary) Executive Summary Publication Date: 15 July 2003 Author Megan Fernandez This document has been published to the
More informationFICON Drives Fibre Channel Security
FICON Drives Fibre Channel Security Research Brief Abstract: FICON products for mainframes impact the Fibre Channel switch market as FICON requirements drive improvements in security, benefiting all Fibre
More informationIT Services: Identifying the Addressable Markets for Telecom Operators (Executive Summary) Executive Summary
IT Services: Identifying the Addressable Markets for Telecom Operators (Executive Summary) Executive Summary Publication Date: 31 March 2003 Author Kobita Desai This document has been published to the
More informationFour Partial Solutions for Remote Network Access
Decision Framework, E. Paulak Research Note 29 August 2003 Four Partial Solutions for Remote Network Access Four different solutions can help to meet your remoteaccess needs. Managed-service providers
More informationA Quick Chat about SOMF Logical Design of Service Relationship
www.modelingconcepts.com Do not be afraid to ask! A Quick Chat about SOMF Logical Design of Service Relationship For architects, business analysts, system analysts, software developers, modelers, team
More informationCOM F. Troni, L. Fiering
F. Troni, L. Fiering Research Note 8 September 2003 Commentary Notebook TCO Comparison: Day Extenders vs. Traveling s Notebooks used by traveling workers, who are out of the office more often and work
More informationManagement Update: Storage Management TCO Considerations
IGG-09172003-01 C. Stanley Article 17 September 2003 Management Update: Storage Management TCO Considerations CIOs, asset managers, data center managers and business managers should be aware of the total
More informationzapnote INTELLIGENCE WITH XML SPYS August, 2001 Analyst: Ronald Schmelzer
zapthink zapnote ZAPTHINK ZAPNOTE Doc. ID: ZTZN-0111-1 Released: Dec. 21, 2001 ALTOVA XML DEVELOPER D INTELLIGENCE WITH XML SPYS XML D August, 2001 XML S Analyst: Ronald Schmelzer Abstract While previous
More informationMTAT Enterprise System Integration. Lecture 2: Middleware & Web Services
MTAT.03.229 Enterprise System Integration Lecture 2: Middleware & Web Services Luciano García-Bañuelos Slides by Prof. M. Dumas Overall view 2 Enterprise Java 2 Entity classes (Data layer) 3 Enterprise
More informationFinding Pure-Play Midtier ESPs: A Two-Step Process
Research Brief Finding Pure-Play Midtier ESPs: A Two-Step Process Abstract: The pure-play midtier consulting and integration sector can be a competitive option to global integrators. Tier 2 and 3 vendors
More informationwebmethods EntireX for ESB: Leveraging Platform and Application Flexibility While Optimizing Service Reuse
December 2008 webmethods EntireX for ESB: Leveraging Platform and Application Flexibility While Optimizing Service Reuse By Chris Pottinger, Sr. Manager Product Development, and Juergen Lind, Sr. Product
More informationConnect Applications and Services Together with the Enterprise Service Bus
Connect s and Services Together with the On Demand Insurance Business Problems 1. We lose customers because we process new policy applications too slowly. 2. Our claims processing is time-consuming and
More informationzapnote Analyst: Jason Bloomberg
zapthink zapnote ZAPTHINK ZAPNOTE Doc. ID: ZTZN-1198 Released: August 21, 2006 DATADIRECT XQUERY 2.0 ENABLING XQUERY FOR VERY LARGE MESSAGES Analyst: Jason Bloomberg Abstract As the quantity of XML in
More informationMobile Terminals: Middle East, (Executive Summary) Executive Summary
Mobile Terminals: Middle East, 2001-2007 (Executive Summary) Executive Summary Publication Date: 25 July 2003 Authors Carolina Milanesi Ben Wood This document has been published to the following Marketplace
More informationControlled Medical Vocabulary in the CPR Generations
Tutorials, B. Hieb, M.D. Research Note 5 November 2003 Controlled Medical Vocabulary in the CPR Generations A CMV capability becomes progressively more important as computer-based patient record systems
More informationCOM I. Keene, B. Hafner
I. Keene, B. Hafner Research Note 23 December 2002 Commentary The Telecommunications and Networking Hype Cycle New networking technologies and services continue to stream into the telecommunications marketplace.
More informationShould You Use Liberty or Passport for Digital Identities?
Select Q&A, J. Pescatore, A. Litan Research Note 12 August 2003 Should You Use Liberty or Passport for Digital Identities? Federated digital identities, such as from the Liberty Alliance and Microsoft
More informationNEXT-GENERATION DATACENTER MANAGEMENT
NEXT-GENERATION DATACENTER MANAGEMENT From DCIM to DCSO Sometimes described as the operating or ERP system for the datacenter, datacenter infrastructure management (DCIM) is a technology that helps operators
More informationConnecting ESRI to Anything: EAI Solutions
Connecting ESRI to Anything: EAI Solutions Frank Weiss P.E., ESRI User s Conference 2002 Agenda Introduction What is EAI? Industry trends Key integration issues Point-to-point interfaces vs. Middleware
More informationGartner Client Operating Systems Surveys and Polls: Enterprises Plan Early, but Slow, Move to Windows 7
Page 1 of 8 Gartner Client Operating Systems Surveys and Polls: Enterprises Plan Early, but Slow, Move to Windows 7 7 June 2010 Michael A. Silver Gartner RAS Core Research Note G00200542 Respondents to
More informationIntroduction in Eventing in SOA Suite 11g
Introduction in Eventing in SOA Suite 11g Ronald van Luttikhuizen Vennster Utrecht, The Netherlands Keywords: Events, EDA, Oracle SOA Suite 11g, SOA, JMS, AQ, EDN Introduction Services and events are highly
More informationWorldwide 2002 Security Software Market and Vendor Shares (Executive Summary) Executive Summary
Worldwide Security Software Market and Vendor Shares (Executive Summary) Executive Summary Publication Date: 21 July 2003 Author Norma Schroder This document has been published to the following Marketplace
More informationNetIQ's VoIP Management Products
Products, D. Neil Research Note 10 September 2002 NetIQ's VoIP Management Products NetIQ has announced its Voice over IP management strategy and has a number of pre- and post-implementation products available.
More informationSurvey of Mobile Phone Users in Poland and Russia, 2003 (Executive Summary) Executive Summary
Survey of Mobile Phone Users in Poland and Russia, 2003 (Executive Summary) Executive Summary Publication Date: 3 December 2003 Author Sarah Randall This document has been published to the following Marketplace
More informationApplication Connectivity Strategies
Connectivity Strategies Max Dolgicer Director of Technical Services mdolgicer@isg-inc.com Gerhard Bayer Senior Consultant gbayer@isg-inc.com International Systems Group (ISG), Inc 32 Broadway, Suite 414
More informationGlobal Telecommunications Market Take, 1Q03 (Executive Summary) Executive Summary
Global Telecommunications Market Take, 1Q03 (Executive Summary) Executive Summary Publication Date: 9 April 2003 Author Wm.L.Hahn This document has been published to the following Marketplace codes: TELC-WW-EX-0576
More information4Q02 Update: Disk Storage Forecast Scenarios,
Forecast Analysis 4Q02 Update: Disk Storage Forecast Scenarios, 2002-2003 Abstract: Clearly, the near-term fate of the disk storage system market is more tightly coupled with micro IT spending trends than
More informationWorldwide Workstation Shipments Rebound in Third Quarter
Market Analysis Worldwide Workstation Shipments Rebound in Third Quarter Abstract: Preliminary worldwide workstation shipments totaled 384,756 units in the third quarter of 2003, for a year-over-year increase
More informationOracle SOA Suite 11g: Build Composite Applications
Oracle University Contact Us: 1.800.529.0165 Oracle SOA Suite 11g: Build Composite Applications Duration: 5 Days What you will learn This course covers designing and developing SOA composite applications
More informationHDD Head and Media Markets Show Variable Growth and Decline, (Executive Summary) Executive Summary
HDD Head and Media Markets Show Variable Growth and Decline, 1998-2002 (Executive Summary) Executive Summary Publication Date: 12 March 2003 Author John Monroe This document has been published to the following
More informationDBMS Software Market Forecast, (Executive Summary) Executive Summary
DBMS Software Market Forecast, 2003-2007 (Executive Summary) Executive Summary Publication Date: 4 September 2003 Author Colleen Graham This document has been published to the following Marketplace codes:
More informationDallas EXECUTIVE OVERVIEW. Multi-Tenant Datacenter Market MARKET FORECAST JUL Stefanie Williams, Associate Analyst, Multi-Tenant Datacenters
MARKET FORECAST JUL 2016 Dallas Multi-Tenant Datacenter Market Stefanie Williams, Associate Analyst, Multi-Tenant Datacenters This report provides an overview of the competitive dynamics in the Dallas
More informationMarket Scope. Magic Quadrant Methodology
Markets, J. Enck, A. Powell Research Note 12 May 2003 Global IA High-Volume Server Magic Quadrant, 1H03 Gartner's Magic Quadrant for Intel Architecture in 1H03 indicates that Dell Computer, Hewlett-Packard
More informationWeb Services. Lecture I. Valdas Rapševičius. Vilnius University Faculty of Mathematics and Informatics
Web Services Lecture I Valdas Rapševičius Vilnius University Faculty of Mathematics and Informatics 2014.02.28 2014.02.28 Valdas Rapševičius. Java Technologies 1 Outline Introduction to SOA SOA Concepts:
More informationChoices Multiply in Midrange and High-End Color Printing
Research Brief Choices Multiply in Midrange and High-End Color Printing Abstract: Color speed is no longer an oxymoron. Color copiers and printers with speeds between 30 and 50 pages per minute are commonly
More informationMobile Terminals: Western Europe, (Executive Summary) Executive Summary
Mobile Terminals: Western Europe, 1998-2007 (Executive Summary) Executive Summary Publication Date: 6 June 2003 Authors Carolina Milanesi Ben Wood This document has been published to the following Marketplace
More informationCOMMUNICATION PROTOCOLS
COMMUNICATION PROTOCOLS Index Chapter 1. Introduction Chapter 2. Software components message exchange JMS and Tibco Rendezvous Chapter 3. Communication over the Internet Simple Object Access Protocol (SOAP)
More informationISV Support Is Key When Choosing a Server Operating System
Markets, A. Butler Research Note 17 September 2003 ISV Support Is Key When Choosing a Server Operating System It's the support independent software vendors offer that determines the life span of a server
More informationHong Kong EXECUTIVE OVERVIEW. Multi-Tenant Datacenter Market MARKET FORECAST DEC Dan Thompson, Senior Analyst, Multi-tenant Datacenters
MARKET FORECAST DEC 2016 Hong Kong Multi-Tenant Datacenter Market Dan Thompson, Senior Analyst, Multi-tenant Datacenters This report provides an overview of the competitive dynamics in the Hong Kong market,
More informationEurope Wants Security Software, Despite Tight Budgets (Executive Summary) Executive Summary
Europe Wants Security Software, Despite Tight Budgets (Executive Summary) Executive Summary Publication Date: 1 July 2003 Authors Fabrizio Biscotti Alain Dang Van Mien Norma Schroder Chris Pang This document
More informationFinal 2002 Asia/Pacific Semiconductor Market Share by Geographical Area (Executive Summary) Executive Summary
Final Asia/Pacific Semiconductor Share by Geographical Area (Executive Summary) Executive Summary Publication Date: 22 May 2003 Authors Hee-Chan Lee Adriana Blanco Ada Cheng Jeremey Donovan Tamara Grant
More informationDialog (interactive) data input. Reporting. Printing processing
Tutorials, D. Prior Research Note 24 February 2003 Who Sets the Pace in the SAP Performance 'Olympics'? SAP and its hardware vendors use many different application performance benchmarks. But records for
More informationHype Cycle for Data Warehousing, 2003
K. Strange, T. Friedman Strategic Analysis Report 30 May 2003 Hype Cycle for Data Warehousing, 2003 Data warehousing concepts and approaches have become fairly mature during a decade of refinement. However,
More informationComplex event processing in reactive distributed systems
Complex event processing in reactive distributed systems Ján JANÍK Slovak University of Technology Faculty of Informatics and Information Technologies Ilkovičova 3, 842 16 Bratislava, Slovakia xjanikj@is.stuba.sk
More informationSouth Korea EXECUTIVE OVERVIEW. Multi-Tenant Datacenter Market MARKET FORECAST MAY Dan Thompson, Senior Analyst, Multi-Tenant Datacenters
MARKET FORECAST MAY 2017 South Korea Multi-Tenant Datacenter Market Dan Thompson, Senior Analyst, Multi-Tenant Datacenters This report provides an overview of the competitive dynamics in the South Korea
More informationSpam Filtering Works Better With a Management Policy
Select Q&A, M. Grey, A. Hallawell Research Note 22 September 2003 Spam Filtering Works Better With a Management Policy A deployment of spam-filtering technology that does not consider business issues will
More informationLeased-Line Market Thrives in Asia/ Pacific Despite Bandwidth Glut (Executive Summary) Executive Summary
Leased-Line Market Thrives in Asia/ Pacific Despite Bandwidth Glut (Executive Summary) Executive Summary Publication Date: December 4, 2002 Authors Alayne Wong To Chee Eng Evelyn Goh Kenshi Tazaki Andrew
More informationMOM MESSAGE ORIENTED MIDDLEWARE OVERVIEW OF MESSAGE ORIENTED MIDDLEWARE TECHNOLOGIES AND CONCEPTS. MOM Message Oriented Middleware
MOM MESSAGE ORIENTED MOM Message Oriented Middleware MIDDLEWARE OVERVIEW OF MESSAGE ORIENTED MIDDLEWARE TECHNOLOGIES AND CONCEPTS Peter R. Egli 1/25 Contents 1. Synchronous versus asynchronous interaction
More informationwhat do we mean by event processing now, a checklist of capabilities in current event processing tools and applications,
A View of the Current State of Event Processing what do we mean by event processing now, complex event processing, a checklist of capabilities in current event processing tools and applications, next steps
More informationSolace JMS Broker Delivers Highest Throughput for Persistent and Non-Persistent Delivery
Solace JMS Broker Delivers Highest Throughput for Persistent and Non-Persistent Delivery Java Message Service (JMS) is a standardized messaging interface that has become a pervasive part of the IT landscape
More informationEnding the Confusion About Software- Defined Networking: A Taxonomy
Ending the Confusion About Software- Defined Networking: A Taxonomy This taxonomy cuts through confusion generated by the flood of vendor SDN announcements. It presents a framework that network and server
More informationNortel Networks Optivity Policy Services
Sharon Fisher Product Report 7 January 2004 Nortel Networks Optivity Policy Services Summary Optivity Policy Services is system-level software for managing the traffic prioritization and network access
More informationNGN: Enterprise IP Telephony
NGN: Enterprise IP Telephony Research Brief Abstract: Enterprises have been slow to adopt Internet Protocol-based telephony. Vendors should educate them as to its benefits, using realistic calculations
More informationIT Services' IP Telephony-Related Growth Remains Strong Through 2007 (Executive Summary) Executive Summary
IT Services' IP Telephony-Related Growth Remains Strong Through 2007 (Executive Summary) Executive Summary Publication Date: 15 December 2003 Author Eric Goodness This document has been published to the
More informationSemiconductor Market for Data Processing: Asia/Pacific, 3Q03
Research Brief Semiconductor Market for Data Processing: Asia/Pacific, 3Q03 Abstract: Semiconductor market conditions have improved since the second quarter of 2003, and the industry's recovery is continuing.
More informationA2A EAI. Overview and recommendations Data Transport. Jerome CAPIROSSI. people are keen to argue since they find themselves to be affected.
. EAI A2A EAI Overview and recommendations Jerome CAPIROSSI Abstract Since customers or corporate users get various terminals (Phone, PDAs, Web, Workstation, ) and therefore various channels for connecting
More informationMesh Networking Principles
Technology, N. Jones Research Note 8 July 2003 Mesh Topologies Promise Resilient Wireless Networks Mesh architecture will become an essential element of wireless networking because it is easy to install,
More informationWeb Services. Lecture I. Valdas Rapševičius Vilnius University Faculty of Mathematics and Informatics
Web Services Lecture I Valdas Rapševičius Vilnius University Faculty of Mathematics and Informatics 2015.02.19 Outline Introduction to SOA SOA Concepts: Services Loose Coupling Infrastructure SOA Layers
More informationStarting out with Event Driven Systems
Starting out with Event Driven Systems Software Architect, London October 2011 Eoin Woods www.eoinwoods.info About Me Software architect & dev manager at UBS Investment Bank responsible for equity swaps
More informationVertical Market Trends: Western Europe, (Executive Summary) Executive Summary
Vertical Market Trends: Western Europe, (Executive Summary) Executive Summary Publication Date: 21 March 2003 Authors Cathy Tornbohm Peter Redshaw This document has been published to the following Marketplace
More informationCIO Update: Security Platforms Will Transform the Network Security Arena
IGG-11202002-02 J. Pescatore, M. Easley, R. Stiennon Article 20 November 2002 CIO Update: Security Platforms Will Transform the Network Security Arena An integrated network security platform approach will
More informationAIOs Displace Single-Function Printers in Latin America
` Market Analysis AIOs Displace Single-Function Printers in Latin America Abstract: Stand-alone printer shipments have dropped sharply, while inkjet all-in-one printers continue to gain market share in
More informationCLSA DIRECT MARKET ACCESS SERVICES ANNEX
CLSA DIRECT MARKET ACCESS SERVICES ANNEX 1. Definitions and Interpretation 1.1 In this Direct Market Access Services Annex capitalised terms have the meaning given to them in the CLSA Asia-Pacific Terms
More informationPush-to-Talk Brings Voice-Based Instant Messaging to Europe
Research Brief Push-to-Talk Brings Voice-Based Instant Messaging to Europe Abstract: Push-to-talk services will soon let Europe s mobile phone users send voice messages via IP, boosting data revenue. Young
More informationNGN: The Evolution of Wireless Networks
NGN: The Evolution of Wireless Networks Research Brief Abstract: Operators of mobile phone networks are already working through the financial and technical challenges of their own next generation of networks.
More informationCOMMUNICATION IN DISTRIBUTED SYSTEMS
Distributed Systems Fö 3-1 Distributed Systems Fö 3-2 COMMUNICATION IN DISTRIBUTED SYSTEMS Communication Models and their Layered Implementation 1. Communication System: Layered Implementation 2. Network
More informationThe Unicode Standard Version 11.0 Core Specification
The Unicode Standard Version 11.0 Core Specification To learn about the latest version of the Unicode Standard, see http://www.unicode.org/versions/latest/. Many of the designations used by manufacturers
More informationSAML V2.0 Profile for Token Correlation
SAML V2.0 Profile for Token Correlation Committee Draft 01 28 June 2010 Specification URIs: This Version: 0.1 Previous Version: 0 Latest Version: Technical Committee: OASIS Security Services TC Chair(s):
More informationTIBCO Complex Event Processing Evaluation Guide
TIBCO Complex Event Processing Evaluation Guide This document provides a guide to evaluating CEP technologies. http://www.tibco.com Global Headquarters 3303 Hillview Avenue Palo Alto, CA 94304 Tel: +1
More informationAPPENDIX 1 EAI TOOLS
87 APPENDIX 1 EAI TOOLS A 1.1 WEBMETHODS COMPONENTS A 1.1.1 Integration Server The Integration Server Administrator is the utility we use to accomplish administrative tasks. It is used to monitor server
More informationIBM App Connect Professional
Service Description IBM App Connect Professional This Service Description describes the Cloud Service IBM provides to Client. Client means the company and its authorized users and recipients of the Cloud
More informationComplex or Simple Event Processing by David Luckham
Complex or Simple Event Processing by David Luckham Some people, I m told, get scared when they hear the word complex, as in Complex Event Processing (CEP). They want to hear simple event processing or
More informationWireless Local Loop: Cellular in Waiting? (Executive Summary) Executive Summary
Wireless Local Loop: Cellular in Waiting? (Executive Summary) Executive Summary Publication Date: October 14, 2002 Authors To Chee Eng Evelyn Goh Kobita Desai This document has been published to the following
More informationExternal RAID-Based Storage System Analysis by Form Factor
Research Brief External RAID-Based Storage System Analysis by Form Factor Abstract: Gartner Dataquest forecasts factory revenue for modular external RAID controllerbased storage systems will grow at a
More informationHuawei W-CDMA/HSPA Baseband Unit WD2BBBUC-HERT BBU Model BBU3900. July 2014
DesigN Analysis - Infrastructure Earl J. Lum +1-650-430-2221 elum@ejlwireless.com Huawei W-CDMA/HSPA Baseband Unit WD2BBBUC-HERT BBU Model BBU3900 July 2014 Entire contents. Reproduction of this publication
More informationDRAFT A Survey of Event Processing Languages (EPLs)
DRAFT A Survey of Event Processing Languages (EPLs) October 15, 2006 (v14) Tim Bass, CISSP Co-Chair Event Processing Reference Architecture Working Group Principal Global Architect, Director TIBCO Software
More informationTransactionVision Technical White Paper
E X E C U T I V E S U M M A R Y Unique Solution TransactionVision is transaction tracking and analysis software that provides a real-time view of business transactions flowing through a distributed enterprise
More informationMidsize Business Voice Service Spending Steady for 2003
End-User Analysis Midsize Business Voice Service Spending Steady for 23 Abstract: Telecom service providers need to know the voice telecom spending plans of the margin-rich midsize business segment in
More informationLAB-03 BPMN Resource Perspective and Events
Lab for the course on Process and Service Modeling and Analysis LAB-03 BPMN Resource Perspective and Events Lecturer: Andrea MARRELLA Objectives of this lecture Recap: Pools, Swimlanes and Message Flows
More informationOpenService NerveCenter Event Correlation Network Management
John Inverso Product Report 31 July 2003 OpenService NerveCenter Event Correlation Network Management Summary NerveCenter provides network-event correlation and root-cause analysis abilities which its
More information