SlideShare ist ein Scribd-Unternehmen logo
1 von 21
Downloaden Sie, um offline zu lesen
Chapter 1
The Global Information Society and
the Need for New Technology
jwj0831@gmail.com
Topics covered in this Chapter
● Events everywhere in our information systems
● The Internet and the growth of global communication
spaghetti

● Layer upon layers in enterprise system architecture
● Global electronic trade - understanding what is
happening

● Agile systems - future reality or just a dream
● Can an open electronic society defend itself?
● The gathering storm-global coordination or global chaos
1.1 Distributed Information Systems
Everywhere 1/3
● The Internet has promoted and speeded the growth
of distributed information processing beyond the
single enterprise, across the boundaries between
enterprises.
1.1 Distributed Information Systems
Everywhere 2/3
● Messages(or events) flow across networks between
these enterprises.
● They react to the events they receive and issue new
events that are sent to other components
● The system is “event driven”-it lives or dies baed upon
the message flowing across its IT networks.
1.1 Distributed Information Systems
Everywhere 3/3
● There is no technology that enables us to view those
events and activities thar are going on inside these
systems in ways that we humans can understand.
1.2 The Global Communication
Spaghetti Pot
● We can't tell where it starts and where it ends, we can't
unravel it, and most of the time we don't know how it
happend.

● The challenge is not to restrict communication
flexibility, but to develop new technologies to
understand it.
1.2. Event Causality
● Events are flowing all the time through our Internetbased systems from one part of the world and causing
events in another part of the world.
Horizontal
Application Layer
Causality

Collaboration Layer

Middleware Layer

Network Layer

Engineers

Administrators

Internet Portals

CORBA

Networks

Maintenance

Databases

Surfers

Teamware

Vertical
Causality

Information Buses

Gateways

Firewalls
1.3 Electronic Archeology:
Layers upon Layers
● Enterprise systems are distributed, event-driven
systems. They are layered systems.

Application Layer

Collaboration Layer

Middleware Layer

Network Layer

Engineers

Administrators

Internet Portals

CORBA

Networks

Maintenance

Databases

Surfers

Teamware

Information Buses

Gateways

Firewalls
1.3 Electronic Archeology:
Layers upon Layers - Application
Application Layer

Engineers

Administrators

Maintenance

Surfers

● The top layer is called the business level or strategic
planning level because it is the layer at which an
enterprise plans and transacts its business.
● Virtual Event: An inferred events are aggregated from
sets of other high-level events and are the events of
interest to the business level or strategic planning level
of the enterprise.
1.3 Electronic Archeology:
Layers upon Layers - Collaboration
Collaboration Layer

Internet Portals

Databases

Teamware

● The collaboration layer contains components that help
make applications available to users.
● The dividing line between the collaboration layer and
the application layer is not a definite, rigorous line.
1.3 Electronic Archeology:
Layers upon Layers - Middleware
Middleware Layer

CORBA

Information Buses

● This level of communications sits on top of the basic
networks and lets all the applications and application
servers talk to one another.
● It contains the system components that are often
categorized as Enterprise Application Integration (EAI)
products.
1.3 Electronic Archeology:
Layers upon Layers - Network
Network Layer

Networks

Gateways

Firewalls

● At the bottom is the network layer-the essential
plumbing for transporting information from one point to
another, both within an enterpise and across enterprise.
○ Issues of security and privacy
○ Making sense of all this network-level information.
1.3.2 Vertical Causality: Tracking
Events up and down the Layers 1/2
● Acitivity at each layer is translated into activities at the
layers below and conversely.
● Discovering the causal relationships across layers,
between high- and low-level activities, especially in real
time, is another outstanding issue in enterprise systems.
Application Layer

Collaboration Layer

Middleware Layer

Network Layer

Engineers

Administrators

Internet Portals

Maintenance

Databases

Vertical
Causality

CORBA

Networks

Surfers

Teamware

Information Buses

Gateways

Firewalls
1.3.2 Vertical Causality: Tracking
Events up and down the Layers 2/2
● Tracking vertical causality is not a simple problem
because there is almost as much dynamism in the
layers of our enterprise systems as there is in the
communication between them across the Internet.
● Keeping up with what our systems do is not an eask
task.
1.3.3 Event Aggregation: Making High-Level
Sense out of Low-Level Event
● The complementary operation to downward tracking of
vertical causality is the aggregation of sets or groups of
lower events into a single higher-level event that
expresses the meaning of the lower-level events, taken
together.
● Recognizing or detecting a significant group of lowerlevel events from among all the enterprise event traffic,
and creating a single event that summarizes in its data
their significance, is called event aggregation
1.4 The Gathering Storm of New
Activities on the Web
● There is already an urgent need for new technology to
help us understand the information in our IT systems, at
every level from low to high.
● In the next three sections, we look at some of the newer
activities now developing in the Internet world:
Global Electronic Trade

Agile System

Cyber Warfare
1.5 Global Electronic Trade
● Global electronic trade involves collaboration between
enterprises to transact business electronically on a
scale unforeseen a few years ago.
● This is the electronic collaboration model of doning
business.
Global Trade Hub

Real-time Market
1.6 Agile System
● An agile system is defined as a system that is able to
adapt rapidly to changes in its environment.
● Agile systems are expected to deal with quite
challenging situations, well beyond the scope of
workflow engines and business process integration.
1.7 Cyber Warfare and the Open
Electronic Society
● Cyber warfare involves the development of new ways to
defend our IT layers against an increasing set of
criminal and destructive activities.
1.8 Summary: Staying Ahead of
Chaos 1/2
● Monitor events at every level in IT systems - worldwide
and in real time.
● Detect complex patterns of events, consisting of events
that are widely distributed in time and location of
occurence.
● Trace causal relationships between events in real time,
both horizontally within a level of system activity and
vertically between high and low levels of system activity.
1.8 Summary: Staying Ahead of
Chaos 2/2
● Take a appropriate action when patterns of events
interest or concern detected.
● Modify our monitoring and action strategies in real time,
on the fly.
● Design our monitoring and action autonomus processes
for applying levelwise event monitoring and viewing and
for taking appropriate actions.

Weitere ähnliche Inhalte

Was ist angesagt?

Operating System : Ch18 distributed coordination
Operating System : Ch18 distributed coordinationOperating System : Ch18 distributed coordination
Operating System : Ch18 distributed coordinationSyaiful Ahdan
 
Fuzzy logic in computer networks and systems management
Fuzzy logic in computer networks and systems managementFuzzy logic in computer networks and systems management
Fuzzy logic in computer networks and systems managementDamir Delija
 
ADVISE - a Framework for Evaluating Cloud Service Elasticity Behavior - Best...
 ADVISE - a Framework for Evaluating Cloud Service Elasticity Behavior - Best... ADVISE - a Framework for Evaluating Cloud Service Elasticity Behavior - Best...
ADVISE - a Framework for Evaluating Cloud Service Elasticity Behavior - Best...Georgiana Copil
 
Multi-level Elasticity Control of Cloud Services -- ICSOC 2013
Multi-level Elasticity Control of Cloud Services -- ICSOC 2013Multi-level Elasticity Control of Cloud Services -- ICSOC 2013
Multi-level Elasticity Control of Cloud Services -- ICSOC 2013Georgiana Copil
 
Distributed Transactions(flat and nested) and Atomic Commit Protocols
Distributed Transactions(flat and nested) and Atomic Commit ProtocolsDistributed Transactions(flat and nested) and Atomic Commit Protocols
Distributed Transactions(flat and nested) and Atomic Commit ProtocolsSachin Chauhan
 
QMS : Action Management (CAPA), Effectivly manage Corrective/Preventive Actio...
QMS : Action Management (CAPA), Effectivly manage Corrective/Preventive Actio...QMS : Action Management (CAPA), Effectivly manage Corrective/Preventive Actio...
QMS : Action Management (CAPA), Effectivly manage Corrective/Preventive Actio...Qplan.net
 
SYBL: An extensible language for elasticity specifications in cloud applicati...
SYBL: An extensible language for elasticity specifications in cloud applicati...SYBL: An extensible language for elasticity specifications in cloud applicati...
SYBL: An extensible language for elasticity specifications in cloud applicati...Georgiana Copil
 
Cost-aware scalability of applications in public clouds
Cost-aware scalability of applications in public clouds Cost-aware scalability of applications in public clouds
Cost-aware scalability of applications in public clouds Daniel Moldovan
 
Supporting Cloud Service Operation Management for Elasticity
Supporting Cloud Service Operation Management for Elasticity Supporting Cloud Service Operation Management for Elasticity
Supporting Cloud Service Operation Management for Elasticity Georgiana Copil
 
On Analyzing Elasticity Relationships of Cloud Services
On Analyzing Elasticity Relationships of Cloud ServicesOn Analyzing Elasticity Relationships of Cloud Services
On Analyzing Elasticity Relationships of Cloud ServicesDaniel Moldovan
 
Monitoring and observability
Monitoring and observabilityMonitoring and observability
Monitoring and observabilityDanylenko Max
 
Real time-system
Real time-systemReal time-system
Real time-systemysush
 

Was ist angesagt? (15)

Operating System : Ch18 distributed coordination
Operating System : Ch18 distributed coordinationOperating System : Ch18 distributed coordination
Operating System : Ch18 distributed coordination
 
Fuzzy logic in computer networks and systems management
Fuzzy logic in computer networks and systems managementFuzzy logic in computer networks and systems management
Fuzzy logic in computer networks and systems management
 
ADVISE - a Framework for Evaluating Cloud Service Elasticity Behavior - Best...
 ADVISE - a Framework for Evaluating Cloud Service Elasticity Behavior - Best... ADVISE - a Framework for Evaluating Cloud Service Elasticity Behavior - Best...
ADVISE - a Framework for Evaluating Cloud Service Elasticity Behavior - Best...
 
Multi-level Elasticity Control of Cloud Services -- ICSOC 2013
Multi-level Elasticity Control of Cloud Services -- ICSOC 2013Multi-level Elasticity Control of Cloud Services -- ICSOC 2013
Multi-level Elasticity Control of Cloud Services -- ICSOC 2013
 
eBiz#3: CEP
eBiz#3: CEPeBiz#3: CEP
eBiz#3: CEP
 
Distributed Transactions(flat and nested) and Atomic Commit Protocols
Distributed Transactions(flat and nested) and Atomic Commit ProtocolsDistributed Transactions(flat and nested) and Atomic Commit Protocols
Distributed Transactions(flat and nested) and Atomic Commit Protocols
 
운영체제론 Ch16
운영체제론 Ch16운영체제론 Ch16
운영체제론 Ch16
 
QMS : Action Management (CAPA), Effectivly manage Corrective/Preventive Actio...
QMS : Action Management (CAPA), Effectivly manage Corrective/Preventive Actio...QMS : Action Management (CAPA), Effectivly manage Corrective/Preventive Actio...
QMS : Action Management (CAPA), Effectivly manage Corrective/Preventive Actio...
 
SYBL: An extensible language for elasticity specifications in cloud applicati...
SYBL: An extensible language for elasticity specifications in cloud applicati...SYBL: An extensible language for elasticity specifications in cloud applicati...
SYBL: An extensible language for elasticity specifications in cloud applicati...
 
Cost-aware scalability of applications in public clouds
Cost-aware scalability of applications in public clouds Cost-aware scalability of applications in public clouds
Cost-aware scalability of applications in public clouds
 
Supporting Cloud Service Operation Management for Elasticity
Supporting Cloud Service Operation Management for Elasticity Supporting Cloud Service Operation Management for Elasticity
Supporting Cloud Service Operation Management for Elasticity
 
Replication in Distributed Systems
Replication in Distributed SystemsReplication in Distributed Systems
Replication in Distributed Systems
 
On Analyzing Elasticity Relationships of Cloud Services
On Analyzing Elasticity Relationships of Cloud ServicesOn Analyzing Elasticity Relationships of Cloud Services
On Analyzing Elasticity Relationships of Cloud Services
 
Monitoring and observability
Monitoring and observabilityMonitoring and observability
Monitoring and observability
 
Real time-system
Real time-systemReal time-system
Real time-system
 

Ähnlich wie The Power Of Event Chapter 1

A Model of Local Area Network Based Application for Inter-office Communication
A Model of Local Area Network Based Application for Inter-office CommunicationA Model of Local Area Network Based Application for Inter-office Communication
A Model of Local Area Network Based Application for Inter-office Communicationtheijes
 
Cisco network management
Cisco network managementCisco network management
Cisco network managementIT Tech
 
Event Driven Software Architecture Pattern
Event Driven Software Architecture PatternEvent Driven Software Architecture Pattern
Event Driven Software Architecture Patternjeetendra mandal
 
Nregs web app 1.0 presentation
Nregs web app 1.0 presentationNregs web app 1.0 presentation
Nregs web app 1.0 presentationHarsha
 
HOST AND NETWORK SECURITY by ThesisScientist.com
HOST AND NETWORK SECURITY by ThesisScientist.comHOST AND NETWORK SECURITY by ThesisScientist.com
HOST AND NETWORK SECURITY by ThesisScientist.comProf Ansari
 
Indexing Building Evaluation Criteria
Indexing Building Evaluation CriteriaIndexing Building Evaluation Criteria
Indexing Building Evaluation CriteriaIJERA Editor
 
Multi agent based network monitoring and management using jade
Multi agent based network monitoring and management using jadeMulti agent based network monitoring and management using jade
Multi agent based network monitoring and management using jadeAlexander Decker
 
Finding Critical Link and Critical Node Vulnerability for Network
Finding Critical Link and Critical Node Vulnerability for NetworkFinding Critical Link and Critical Node Vulnerability for Network
Finding Critical Link and Critical Node Vulnerability for Networkijircee
 
Ch18-Software Engineering 9
Ch18-Software Engineering 9Ch18-Software Engineering 9
Ch18-Software Engineering 9Ian Sommerville
 
A CLOUD BASED ARCHITECTURE FOR WORKING ON BIG DATA WITH WORKFLOW MANAGEMENT
A CLOUD BASED ARCHITECTURE FOR WORKING ON BIG DATA WITH WORKFLOW MANAGEMENTA CLOUD BASED ARCHITECTURE FOR WORKING ON BIG DATA WITH WORKFLOW MANAGEMENT
A CLOUD BASED ARCHITECTURE FOR WORKING ON BIG DATA WITH WORKFLOW MANAGEMENTIJwest
 
Security Issues & Threats in IoT Infrastructure
Security Issues & Threats in IoT InfrastructureSecurity Issues & Threats in IoT Infrastructure
Security Issues & Threats in IoT InfrastructureIJAEMSJORNAL
 
Distributed computing by Dr.C.R.Dhivyaa, Assistant Professor, Kongu Engineeri...
Distributed computing by Dr.C.R.Dhivyaa, Assistant Professor, Kongu Engineeri...Distributed computing by Dr.C.R.Dhivyaa, Assistant Professor, Kongu Engineeri...
Distributed computing by Dr.C.R.Dhivyaa, Assistant Professor, Kongu Engineeri...Dhivyaa C.R
 
IRJET- Comparative Study on Network Monitoring Tools of Nagios Versus Hyp...
IRJET-  	  Comparative Study on Network Monitoring Tools of Nagios Versus Hyp...IRJET-  	  Comparative Study on Network Monitoring Tools of Nagios Versus Hyp...
IRJET- Comparative Study on Network Monitoring Tools of Nagios Versus Hyp...IRJET Journal
 
Debs 2011 tutorial on non functional properties of event processing
Debs 2011 tutorial  on non functional properties of event processingDebs 2011 tutorial  on non functional properties of event processing
Debs 2011 tutorial on non functional properties of event processingOpher Etzion
 
D sys ch-vvdp-unit-1
D sys ch-vvdp-unit-1D sys ch-vvdp-unit-1
D sys ch-vvdp-unit-1shaik subhani
 

Ähnlich wie The Power Of Event Chapter 1 (20)

A Model of Local Area Network Based Application for Inter-office Communication
A Model of Local Area Network Based Application for Inter-office CommunicationA Model of Local Area Network Based Application for Inter-office Communication
A Model of Local Area Network Based Application for Inter-office Communication
 
Report_Internships
Report_InternshipsReport_Internships
Report_Internships
 
Adidrds
AdidrdsAdidrds
Adidrds
 
Cisco network management
Cisco network managementCisco network management
Cisco network management
 
Event Driven Software Architecture Pattern
Event Driven Software Architecture PatternEvent Driven Software Architecture Pattern
Event Driven Software Architecture Pattern
 
Nregs web app 1.0 presentation
Nregs web app 1.0 presentationNregs web app 1.0 presentation
Nregs web app 1.0 presentation
 
HOST AND NETWORK SECURITY by ThesisScientist.com
HOST AND NETWORK SECURITY by ThesisScientist.comHOST AND NETWORK SECURITY by ThesisScientist.com
HOST AND NETWORK SECURITY by ThesisScientist.com
 
Hari proposal
Hari proposalHari proposal
Hari proposal
 
Indexing Building Evaluation Criteria
Indexing Building Evaluation CriteriaIndexing Building Evaluation Criteria
Indexing Building Evaluation Criteria
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Multi agent based network monitoring and management using jade
Multi agent based network monitoring and management using jadeMulti agent based network monitoring and management using jade
Multi agent based network monitoring and management using jade
 
Finding Critical Link and Critical Node Vulnerability for Network
Finding Critical Link and Critical Node Vulnerability for NetworkFinding Critical Link and Critical Node Vulnerability for Network
Finding Critical Link and Critical Node Vulnerability for Network
 
Ch18-Software Engineering 9
Ch18-Software Engineering 9Ch18-Software Engineering 9
Ch18-Software Engineering 9
 
A CLOUD BASED ARCHITECTURE FOR WORKING ON BIG DATA WITH WORKFLOW MANAGEMENT
A CLOUD BASED ARCHITECTURE FOR WORKING ON BIG DATA WITH WORKFLOW MANAGEMENTA CLOUD BASED ARCHITECTURE FOR WORKING ON BIG DATA WITH WORKFLOW MANAGEMENT
A CLOUD BASED ARCHITECTURE FOR WORKING ON BIG DATA WITH WORKFLOW MANAGEMENT
 
Security Issues & Threats in IoT Infrastructure
Security Issues & Threats in IoT InfrastructureSecurity Issues & Threats in IoT Infrastructure
Security Issues & Threats in IoT Infrastructure
 
Distributed computing by Dr.C.R.Dhivyaa, Assistant Professor, Kongu Engineeri...
Distributed computing by Dr.C.R.Dhivyaa, Assistant Professor, Kongu Engineeri...Distributed computing by Dr.C.R.Dhivyaa, Assistant Professor, Kongu Engineeri...
Distributed computing by Dr.C.R.Dhivyaa, Assistant Professor, Kongu Engineeri...
 
IRJET- Comparative Study on Network Monitoring Tools of Nagios Versus Hyp...
IRJET-  	  Comparative Study on Network Monitoring Tools of Nagios Versus Hyp...IRJET-  	  Comparative Study on Network Monitoring Tools of Nagios Versus Hyp...
IRJET- Comparative Study on Network Monitoring Tools of Nagios Versus Hyp...
 
Debs 2011 tutorial on non functional properties of event processing
Debs 2011 tutorial  on non functional properties of event processingDebs 2011 tutorial  on non functional properties of event processing
Debs 2011 tutorial on non functional properties of event processing
 
Ch18
Ch18Ch18
Ch18
 
D sys ch-vvdp-unit-1
D sys ch-vvdp-unit-1D sys ch-vvdp-unit-1
D sys ch-vvdp-unit-1
 

Mehr von Woojin Joe

Angular Seminar [한빛미디어 리얼타임 세미나]
Angular Seminar [한빛미디어 리얼타임 세미나]Angular Seminar [한빛미디어 리얼타임 세미나]
Angular Seminar [한빛미디어 리얼타임 세미나]Woojin Joe
 
자바 네트워크 소녀 Netty 리뷰
자바 네트워크 소녀 Netty 리뷰자바 네트워크 소녀 Netty 리뷰
자바 네트워크 소녀 Netty 리뷰Woojin Joe
 
Fusion prj-proposal for 10 2 class
Fusion prj-proposal for 10 2 classFusion prj-proposal for 10 2 class
Fusion prj-proposal for 10 2 classWoojin Joe
 
신학과 사회에 대한 성경의 가르침
신학과 사회에 대한 성경의 가르침신학과 사회에 대한 성경의 가르침
신학과 사회에 대한 성경의 가르침Woojin Joe
 
ITBC Orientation
ITBC OrientationITBC Orientation
ITBC OrientationWoojin Joe
 
2010년 여름 신입부원 프로젝트 제안서(수정)
2010년 여름 신입부원 프로젝트 제안서(수정)2010년 여름 신입부원 프로젝트 제안서(수정)
2010년 여름 신입부원 프로젝트 제안서(수정)Woojin Joe
 

Mehr von Woojin Joe (6)

Angular Seminar [한빛미디어 리얼타임 세미나]
Angular Seminar [한빛미디어 리얼타임 세미나]Angular Seminar [한빛미디어 리얼타임 세미나]
Angular Seminar [한빛미디어 리얼타임 세미나]
 
자바 네트워크 소녀 Netty 리뷰
자바 네트워크 소녀 Netty 리뷰자바 네트워크 소녀 Netty 리뷰
자바 네트워크 소녀 Netty 리뷰
 
Fusion prj-proposal for 10 2 class
Fusion prj-proposal for 10 2 classFusion prj-proposal for 10 2 class
Fusion prj-proposal for 10 2 class
 
신학과 사회에 대한 성경의 가르침
신학과 사회에 대한 성경의 가르침신학과 사회에 대한 성경의 가르침
신학과 사회에 대한 성경의 가르침
 
ITBC Orientation
ITBC OrientationITBC Orientation
ITBC Orientation
 
2010년 여름 신입부원 프로젝트 제안서(수정)
2010년 여름 신입부원 프로젝트 제안서(수정)2010년 여름 신입부원 프로젝트 제안서(수정)
2010년 여름 신입부원 프로젝트 제안서(수정)
 

Kürzlich hochgeladen

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 

Kürzlich hochgeladen (20)

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 

The Power Of Event Chapter 1

  • 1. Chapter 1 The Global Information Society and the Need for New Technology jwj0831@gmail.com
  • 2. Topics covered in this Chapter ● Events everywhere in our information systems ● The Internet and the growth of global communication spaghetti ● Layer upon layers in enterprise system architecture ● Global electronic trade - understanding what is happening ● Agile systems - future reality or just a dream ● Can an open electronic society defend itself? ● The gathering storm-global coordination or global chaos
  • 3. 1.1 Distributed Information Systems Everywhere 1/3 ● The Internet has promoted and speeded the growth of distributed information processing beyond the single enterprise, across the boundaries between enterprises.
  • 4. 1.1 Distributed Information Systems Everywhere 2/3 ● Messages(or events) flow across networks between these enterprises. ● They react to the events they receive and issue new events that are sent to other components ● The system is “event driven”-it lives or dies baed upon the message flowing across its IT networks.
  • 5. 1.1 Distributed Information Systems Everywhere 3/3 ● There is no technology that enables us to view those events and activities thar are going on inside these systems in ways that we humans can understand.
  • 6. 1.2 The Global Communication Spaghetti Pot ● We can't tell where it starts and where it ends, we can't unravel it, and most of the time we don't know how it happend. ● The challenge is not to restrict communication flexibility, but to develop new technologies to understand it.
  • 7. 1.2. Event Causality ● Events are flowing all the time through our Internetbased systems from one part of the world and causing events in another part of the world. Horizontal Application Layer Causality Collaboration Layer Middleware Layer Network Layer Engineers Administrators Internet Portals CORBA Networks Maintenance Databases Surfers Teamware Vertical Causality Information Buses Gateways Firewalls
  • 8. 1.3 Electronic Archeology: Layers upon Layers ● Enterprise systems are distributed, event-driven systems. They are layered systems. Application Layer Collaboration Layer Middleware Layer Network Layer Engineers Administrators Internet Portals CORBA Networks Maintenance Databases Surfers Teamware Information Buses Gateways Firewalls
  • 9. 1.3 Electronic Archeology: Layers upon Layers - Application Application Layer Engineers Administrators Maintenance Surfers ● The top layer is called the business level or strategic planning level because it is the layer at which an enterprise plans and transacts its business. ● Virtual Event: An inferred events are aggregated from sets of other high-level events and are the events of interest to the business level or strategic planning level of the enterprise.
  • 10. 1.3 Electronic Archeology: Layers upon Layers - Collaboration Collaboration Layer Internet Portals Databases Teamware ● The collaboration layer contains components that help make applications available to users. ● The dividing line between the collaboration layer and the application layer is not a definite, rigorous line.
  • 11. 1.3 Electronic Archeology: Layers upon Layers - Middleware Middleware Layer CORBA Information Buses ● This level of communications sits on top of the basic networks and lets all the applications and application servers talk to one another. ● It contains the system components that are often categorized as Enterprise Application Integration (EAI) products.
  • 12. 1.3 Electronic Archeology: Layers upon Layers - Network Network Layer Networks Gateways Firewalls ● At the bottom is the network layer-the essential plumbing for transporting information from one point to another, both within an enterpise and across enterprise. ○ Issues of security and privacy ○ Making sense of all this network-level information.
  • 13. 1.3.2 Vertical Causality: Tracking Events up and down the Layers 1/2 ● Acitivity at each layer is translated into activities at the layers below and conversely. ● Discovering the causal relationships across layers, between high- and low-level activities, especially in real time, is another outstanding issue in enterprise systems. Application Layer Collaboration Layer Middleware Layer Network Layer Engineers Administrators Internet Portals Maintenance Databases Vertical Causality CORBA Networks Surfers Teamware Information Buses Gateways Firewalls
  • 14. 1.3.2 Vertical Causality: Tracking Events up and down the Layers 2/2 ● Tracking vertical causality is not a simple problem because there is almost as much dynamism in the layers of our enterprise systems as there is in the communication between them across the Internet. ● Keeping up with what our systems do is not an eask task.
  • 15. 1.3.3 Event Aggregation: Making High-Level Sense out of Low-Level Event ● The complementary operation to downward tracking of vertical causality is the aggregation of sets or groups of lower events into a single higher-level event that expresses the meaning of the lower-level events, taken together. ● Recognizing or detecting a significant group of lowerlevel events from among all the enterprise event traffic, and creating a single event that summarizes in its data their significance, is called event aggregation
  • 16. 1.4 The Gathering Storm of New Activities on the Web ● There is already an urgent need for new technology to help us understand the information in our IT systems, at every level from low to high. ● In the next three sections, we look at some of the newer activities now developing in the Internet world: Global Electronic Trade Agile System Cyber Warfare
  • 17. 1.5 Global Electronic Trade ● Global electronic trade involves collaboration between enterprises to transact business electronically on a scale unforeseen a few years ago. ● This is the electronic collaboration model of doning business. Global Trade Hub Real-time Market
  • 18. 1.6 Agile System ● An agile system is defined as a system that is able to adapt rapidly to changes in its environment. ● Agile systems are expected to deal with quite challenging situations, well beyond the scope of workflow engines and business process integration.
  • 19. 1.7 Cyber Warfare and the Open Electronic Society ● Cyber warfare involves the development of new ways to defend our IT layers against an increasing set of criminal and destructive activities.
  • 20. 1.8 Summary: Staying Ahead of Chaos 1/2 ● Monitor events at every level in IT systems - worldwide and in real time. ● Detect complex patterns of events, consisting of events that are widely distributed in time and location of occurence. ● Trace causal relationships between events in real time, both horizontally within a level of system activity and vertically between high and low levels of system activity.
  • 21. 1.8 Summary: Staying Ahead of Chaos 2/2 ● Take a appropriate action when patterns of events interest or concern detected. ● Modify our monitoring and action strategies in real time, on the fly. ● Design our monitoring and action autonomus processes for applying levelwise event monitoring and viewing and for taking appropriate actions.