SlideShare ist ein Scribd-Unternehmen logo
1 von 15
Downloaden Sie, um offline zu lesen
Chapter 3
Viewing the Electronic EnterpriseKeeping the Human in Control
jwj0831@gmail.com
Topics covered in this Chapter
● Event monitoring - the standard technology today
● Enterprise viewing - a step beyond monitoring
● Recognizing sets of events from the global event cloud a key to personalized viewing
● Information gaps
● Enterprise structure and abstraction hierarchies
● Hierarchical viewing - the key to human control of the
enterprise
3.1 Today’s Event Monitoring Is Too
Primitive
● Why is it difficult to get events that are relavant to the
decisions we are trying to make?
● Part of the answer lies in the historical progression of
problems that have arisen in running an IT-based
enterprise, from the low-level network problems of
yesterday, ascending to the high-level problems of
today.
3.1.1 System Monitoring Focuses on
the Network Layer
● Major headaches happen when the performance of the
communication layer deteriorates, or parts of it fail
altogether. This class of problems is generally lumped
together under one category, network management.
● The bulk of the considerable commercial effort that has
been put into enterprise system monitoring until now
has been concentrated largely on the low-level IT
layers.
3.1.2 Network-Level Monitoring Doesn’t
Even Solve Network Problems
● Network managers have to figure out from the event
logs and statistical views of the event traffic exactly
what is happening.
● They are faced daily with the following kinds of issues.
○ The network event logs can become very large and
difficult to handle in real-time.
○ Tools to aid in picking out sets of related events are
needed.
○ Causal tracking is needed
○ Predictive monitoring is beyond the state of the art
3.2 An Example of Causal Tracking
● Our example applies causal tracking to monitoring a
simple transaction protocol
● Many transaction systems, particularly those dealing
with database entries, use a two-phase commit
protocol to terminate multistep transactions.
○ A polling phase
○ A commit phase
3.3 Information Gaps 1/2
● Different people engaged in the operations of an
enterprise need different kinds of information. This leads
to information gaps between the kind of information
people need to do their jobs effectively and easily, and
the information they actually get.
Business and
Operation
Corporate
Management

Application
Middleware and
Network

Supervisor
IT Manager
Enterprise IT Layer Monitoring and Analysis
3.3 Information Gaps 2/2
● An information gap generally has two dimensions:
○ A vertical dimension, which is the difference
between the level of the enterprise at which events
and other data are monitored and the level at which
the user is operating within the enterprise.
○ A horizontal dimension, which is the amount of
analysis needed to render the monitored information
in a userful form for the user's tasks.
3.4 Problem-Relevant Information
● To bridge information gaps we need a technology for
constructing problem-relevant information from
whatever events we can monitor.
● How to get problem-relevant information
1. Relevance to the problem of immediate interest
2. Ease of understandability
3. Ease of analysis
4. Ease with which multiple views can be coordinated
3.5 Viewing Enterprise System 1/2
● A view of a system is a selection of information
about what the system is doing currently or did in the
past that is processed to abstract or extract those
aspects relevant to a problem of interest.
● How to get problem-relevant information
1. Relevance to the problem of immediate interest
2. Ease of understandability
3. Ease of analysis
4. Ease with which multiple views can be coordinated
3.5 Viewing Enterprise System 2/2
● Each of these examples of a view has the following
elements
○ Each view has a problem of interest.
○ Each view is event driven.
○ The view are provided in humanly understandable forms using
graphics.
○ Each view provides relevant events that can be used to drive
automated decision making processes.
○ Most important, a view must be easy to modify, on the fly, to
incorporate new types of events, change the aggregation
technique.
3.6 Creating and Coordinating
Multiple Views
● Different people need different views.
● Simply, this is because different users are interested in
different kinds of information about the system.
● Not only do we need multiple views of a system, but
each user needs to be able to customize their own view.
3.7 Hierarchical Viewing 1/2
● A powerful technique to help in understanding a
complex enterprise system is to seperate the system's
activities, and the operations that implement those
activities, into layers-called levels.
● This is called an abstraction hierarchy.
● Viewing a system's behavior at different level is called
hierarhchical viewing.
3.7 Hierarchical Viewing 2/2
● To build hierarchical views we must first define an
abstracttion hierarchy.
○ Operational description: There must be general agreement on
what the activities and operations of the enterprse are.
○ Hierarchical structuring: The levels must be ordered, top down,
and the events signifying operations at any level must be
defined as sets of sequence of events at the lower levels.

● Hierarchical structuring is a foundation for building
mulitple views.
3.7.1 An Example of Hierarchical
Viewing
Financial Trade
Level

Abstarction
Drill Down

Transaction
Protocol
Level

Weitere ähnliche Inhalte

Ähnlich wie The Power Of Event Chapter 3

Development of Intelligence Process Tracking System for Job Seekers
Development of Intelligence Process Tracking System for Job SeekersDevelopment of Intelligence Process Tracking System for Job Seekers
Development of Intelligence Process Tracking System for Job SeekersIJMIT JOURNAL
 
How much does it cost to be Secure?
How much does it cost to be Secure?How much does it cost to be Secure?
How much does it cost to be Secure?mbmobile
 
2. INFORMATION GATHERING.pptx Computer Applications in Pharmacy
2. INFORMATION GATHERING.pptx Computer Applications in Pharmacy2. INFORMATION GATHERING.pptx Computer Applications in Pharmacy
2. INFORMATION GATHERING.pptx Computer Applications in PharmacyVedika Narvekar
 
Sharda_dss11_im_01.docChapter 1An Overview of Analy.docx
Sharda_dss11_im_01.docChapter 1An Overview of Analy.docxSharda_dss11_im_01.docChapter 1An Overview of Analy.docx
Sharda_dss11_im_01.docChapter 1An Overview of Analy.docxklinda1
 
Sharda_dss11_im_01.docChapter 1An Overview of Analy.docx
Sharda_dss11_im_01.docChapter 1An Overview of Analy.docxSharda_dss11_im_01.docChapter 1An Overview of Analy.docx
Sharda_dss11_im_01.docChapter 1An Overview of Analy.docxlesleyryder69361
 
ThinkDox implementation whitepaper for ECM
ThinkDox implementation whitepaper for ECMThinkDox implementation whitepaper for ECM
ThinkDox implementation whitepaper for ECMChristopher Wynder
 
Chapter_1_INTRODUCTION.pdf
Chapter_1_INTRODUCTION.pdfChapter_1_INTRODUCTION.pdf
Chapter_1_INTRODUCTION.pdfKamal Acharya
 
Chapter_1_INTRODUCTION.pdf
Chapter_1_INTRODUCTION.pdfChapter_1_INTRODUCTION.pdf
Chapter_1_INTRODUCTION.pdfKamal Acharya
 
Introdunction to Network Management Protocols - SNMP & TR-069
Introdunction to Network Management Protocols - SNMP & TR-069Introdunction to Network Management Protocols - SNMP & TR-069
Introdunction to Network Management Protocols - SNMP & TR-069William Lee
 
Behavior modeling of soft real time system using stereotyped extension mechan...
Behavior modeling of soft real time system using stereotyped extension mechan...Behavior modeling of soft real time system using stereotyped extension mechan...
Behavior modeling of soft real time system using stereotyped extension mechan...eSAT Publishing House
 
Observability at Scale
Observability at Scale Observability at Scale
Observability at Scale Knoldus Inc.
 
Observability in highly distributed systems
Observability in highly distributed systemsObservability in highly distributed systems
Observability in highly distributed systemsDevOps Indonesia
 
Enterprise Asset Management- Mobility Readiness Checklist
Enterprise Asset Management- Mobility Readiness ChecklistEnterprise Asset Management- Mobility Readiness Checklist
Enterprise Asset Management- Mobility Readiness ChecklistUnvired Inc.
 
2 System development life cycle has six stages of creating a sys.docx
2 System development life cycle has six stages of creating a sys.docx2 System development life cycle has six stages of creating a sys.docx
2 System development life cycle has six stages of creating a sys.docxtamicawaysmith
 
Hotel management
Hotel managementHotel management
Hotel managementArman Ahmed
 
School management System
School management SystemSchool management System
School management SystemHATIM Bhagat
 
Cyber Rangers S1 E2
Cyber Rangers S1 E2Cyber Rangers S1 E2
Cyber Rangers S1 E2JudyEvans8
 

Ähnlich wie The Power Of Event Chapter 3 (20)

Development of Intelligence Process Tracking System for Job Seekers
Development of Intelligence Process Tracking System for Job SeekersDevelopment of Intelligence Process Tracking System for Job Seekers
Development of Intelligence Process Tracking System for Job Seekers
 
How much does it cost to be Secure?
How much does it cost to be Secure?How much does it cost to be Secure?
How much does it cost to be Secure?
 
Building cbis, mis, csvtu
Building cbis, mis, csvtuBuilding cbis, mis, csvtu
Building cbis, mis, csvtu
 
2. INFORMATION GATHERING.pptx Computer Applications in Pharmacy
2. INFORMATION GATHERING.pptx Computer Applications in Pharmacy2. INFORMATION GATHERING.pptx Computer Applications in Pharmacy
2. INFORMATION GATHERING.pptx Computer Applications in Pharmacy
 
Sharda_dss11_im_01.docChapter 1An Overview of Analy.docx
Sharda_dss11_im_01.docChapter 1An Overview of Analy.docxSharda_dss11_im_01.docChapter 1An Overview of Analy.docx
Sharda_dss11_im_01.docChapter 1An Overview of Analy.docx
 
Sharda_dss11_im_01.docChapter 1An Overview of Analy.docx
Sharda_dss11_im_01.docChapter 1An Overview of Analy.docxSharda_dss11_im_01.docChapter 1An Overview of Analy.docx
Sharda_dss11_im_01.docChapter 1An Overview of Analy.docx
 
Hms project report
Hms project reportHms project report
Hms project report
 
ThinkDox implementation whitepaper for ECM
ThinkDox implementation whitepaper for ECMThinkDox implementation whitepaper for ECM
ThinkDox implementation whitepaper for ECM
 
Presentation2
Presentation2Presentation2
Presentation2
 
Chapter_1_INTRODUCTION.pdf
Chapter_1_INTRODUCTION.pdfChapter_1_INTRODUCTION.pdf
Chapter_1_INTRODUCTION.pdf
 
Chapter_1_INTRODUCTION.pdf
Chapter_1_INTRODUCTION.pdfChapter_1_INTRODUCTION.pdf
Chapter_1_INTRODUCTION.pdf
 
Introdunction to Network Management Protocols - SNMP & TR-069
Introdunction to Network Management Protocols - SNMP & TR-069Introdunction to Network Management Protocols - SNMP & TR-069
Introdunction to Network Management Protocols - SNMP & TR-069
 
Behavior modeling of soft real time system using stereotyped extension mechan...
Behavior modeling of soft real time system using stereotyped extension mechan...Behavior modeling of soft real time system using stereotyped extension mechan...
Behavior modeling of soft real time system using stereotyped extension mechan...
 
Observability at Scale
Observability at Scale Observability at Scale
Observability at Scale
 
Observability in highly distributed systems
Observability in highly distributed systemsObservability in highly distributed systems
Observability in highly distributed systems
 
Enterprise Asset Management- Mobility Readiness Checklist
Enterprise Asset Management- Mobility Readiness ChecklistEnterprise Asset Management- Mobility Readiness Checklist
Enterprise Asset Management- Mobility Readiness Checklist
 
2 System development life cycle has six stages of creating a sys.docx
2 System development life cycle has six stages of creating a sys.docx2 System development life cycle has six stages of creating a sys.docx
2 System development life cycle has six stages of creating a sys.docx
 
Hotel management
Hotel managementHotel management
Hotel management
 
School management System
School management SystemSchool management System
School management System
 
Cyber Rangers S1 E2
Cyber Rangers S1 E2Cyber Rangers S1 E2
Cyber Rangers S1 E2
 

Mehr von Woojin Joe

Angular Seminar [한빛미디어 리얼타임 세미나]
Angular Seminar [한빛미디어 리얼타임 세미나]Angular Seminar [한빛미디어 리얼타임 세미나]
Angular Seminar [한빛미디어 리얼타임 세미나]Woojin Joe
 
자바 네트워크 소녀 Netty 리뷰
자바 네트워크 소녀 Netty 리뷰자바 네트워크 소녀 Netty 리뷰
자바 네트워크 소녀 Netty 리뷰Woojin Joe
 
The Power Of Event Chapter 7
The Power Of Event Chapter 7The Power Of Event Chapter 7
The Power Of Event Chapter 7Woojin Joe
 
The Power Of Event Chapter 6
The Power Of Event Chapter 6The Power Of Event Chapter 6
The Power Of Event Chapter 6Woojin Joe
 
The Power Of Event Chapter 5
The Power Of Event Chapter 5The Power Of Event Chapter 5
The Power Of Event Chapter 5Woojin Joe
 
Fusion prj-proposal for 10 2 class
Fusion prj-proposal for 10 2 classFusion prj-proposal for 10 2 class
Fusion prj-proposal for 10 2 classWoojin Joe
 
신학과 사회에 대한 성경의 가르침
신학과 사회에 대한 성경의 가르침신학과 사회에 대한 성경의 가르침
신학과 사회에 대한 성경의 가르침Woojin Joe
 
ITBC Orientation
ITBC OrientationITBC Orientation
ITBC OrientationWoojin Joe
 
2010년 여름 신입부원 프로젝트 제안서(수정)
2010년 여름 신입부원 프로젝트 제안서(수정)2010년 여름 신입부원 프로젝트 제안서(수정)
2010년 여름 신입부원 프로젝트 제안서(수정)Woojin Joe
 

Mehr von Woojin Joe (9)

Angular Seminar [한빛미디어 리얼타임 세미나]
Angular Seminar [한빛미디어 리얼타임 세미나]Angular Seminar [한빛미디어 리얼타임 세미나]
Angular Seminar [한빛미디어 리얼타임 세미나]
 
자바 네트워크 소녀 Netty 리뷰
자바 네트워크 소녀 Netty 리뷰자바 네트워크 소녀 Netty 리뷰
자바 네트워크 소녀 Netty 리뷰
 
The Power Of Event Chapter 7
The Power Of Event Chapter 7The Power Of Event Chapter 7
The Power Of Event Chapter 7
 
The Power Of Event Chapter 6
The Power Of Event Chapter 6The Power Of Event Chapter 6
The Power Of Event Chapter 6
 
The Power Of Event Chapter 5
The Power Of Event Chapter 5The Power Of Event Chapter 5
The Power Of Event Chapter 5
 
Fusion prj-proposal for 10 2 class
Fusion prj-proposal for 10 2 classFusion prj-proposal for 10 2 class
Fusion prj-proposal for 10 2 class
 
신학과 사회에 대한 성경의 가르침
신학과 사회에 대한 성경의 가르침신학과 사회에 대한 성경의 가르침
신학과 사회에 대한 성경의 가르침
 
ITBC Orientation
ITBC OrientationITBC Orientation
ITBC Orientation
 
2010년 여름 신입부원 프로젝트 제안서(수정)
2010년 여름 신입부원 프로젝트 제안서(수정)2010년 여름 신입부원 프로젝트 제안서(수정)
2010년 여름 신입부원 프로젝트 제안서(수정)
 

Kürzlich hochgeladen

Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfOverkill Security
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 

Kürzlich hochgeladen (20)

Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 

The Power Of Event Chapter 3

  • 1. Chapter 3 Viewing the Electronic EnterpriseKeeping the Human in Control jwj0831@gmail.com
  • 2. Topics covered in this Chapter ● Event monitoring - the standard technology today ● Enterprise viewing - a step beyond monitoring ● Recognizing sets of events from the global event cloud a key to personalized viewing ● Information gaps ● Enterprise structure and abstraction hierarchies ● Hierarchical viewing - the key to human control of the enterprise
  • 3. 3.1 Today’s Event Monitoring Is Too Primitive ● Why is it difficult to get events that are relavant to the decisions we are trying to make? ● Part of the answer lies in the historical progression of problems that have arisen in running an IT-based enterprise, from the low-level network problems of yesterday, ascending to the high-level problems of today.
  • 4. 3.1.1 System Monitoring Focuses on the Network Layer ● Major headaches happen when the performance of the communication layer deteriorates, or parts of it fail altogether. This class of problems is generally lumped together under one category, network management. ● The bulk of the considerable commercial effort that has been put into enterprise system monitoring until now has been concentrated largely on the low-level IT layers.
  • 5. 3.1.2 Network-Level Monitoring Doesn’t Even Solve Network Problems ● Network managers have to figure out from the event logs and statistical views of the event traffic exactly what is happening. ● They are faced daily with the following kinds of issues. ○ The network event logs can become very large and difficult to handle in real-time. ○ Tools to aid in picking out sets of related events are needed. ○ Causal tracking is needed ○ Predictive monitoring is beyond the state of the art
  • 6. 3.2 An Example of Causal Tracking ● Our example applies causal tracking to monitoring a simple transaction protocol ● Many transaction systems, particularly those dealing with database entries, use a two-phase commit protocol to terminate multistep transactions. ○ A polling phase ○ A commit phase
  • 7. 3.3 Information Gaps 1/2 ● Different people engaged in the operations of an enterprise need different kinds of information. This leads to information gaps between the kind of information people need to do their jobs effectively and easily, and the information they actually get. Business and Operation Corporate Management Application Middleware and Network Supervisor IT Manager Enterprise IT Layer Monitoring and Analysis
  • 8. 3.3 Information Gaps 2/2 ● An information gap generally has two dimensions: ○ A vertical dimension, which is the difference between the level of the enterprise at which events and other data are monitored and the level at which the user is operating within the enterprise. ○ A horizontal dimension, which is the amount of analysis needed to render the monitored information in a userful form for the user's tasks.
  • 9. 3.4 Problem-Relevant Information ● To bridge information gaps we need a technology for constructing problem-relevant information from whatever events we can monitor. ● How to get problem-relevant information 1. Relevance to the problem of immediate interest 2. Ease of understandability 3. Ease of analysis 4. Ease with which multiple views can be coordinated
  • 10. 3.5 Viewing Enterprise System 1/2 ● A view of a system is a selection of information about what the system is doing currently or did in the past that is processed to abstract or extract those aspects relevant to a problem of interest. ● How to get problem-relevant information 1. Relevance to the problem of immediate interest 2. Ease of understandability 3. Ease of analysis 4. Ease with which multiple views can be coordinated
  • 11. 3.5 Viewing Enterprise System 2/2 ● Each of these examples of a view has the following elements ○ Each view has a problem of interest. ○ Each view is event driven. ○ The view are provided in humanly understandable forms using graphics. ○ Each view provides relevant events that can be used to drive automated decision making processes. ○ Most important, a view must be easy to modify, on the fly, to incorporate new types of events, change the aggregation technique.
  • 12. 3.6 Creating and Coordinating Multiple Views ● Different people need different views. ● Simply, this is because different users are interested in different kinds of information about the system. ● Not only do we need multiple views of a system, but each user needs to be able to customize their own view.
  • 13. 3.7 Hierarchical Viewing 1/2 ● A powerful technique to help in understanding a complex enterprise system is to seperate the system's activities, and the operations that implement those activities, into layers-called levels. ● This is called an abstraction hierarchy. ● Viewing a system's behavior at different level is called hierarhchical viewing.
  • 14. 3.7 Hierarchical Viewing 2/2 ● To build hierarchical views we must first define an abstracttion hierarchy. ○ Operational description: There must be general agreement on what the activities and operations of the enterprse are. ○ Hierarchical structuring: The levels must be ordered, top down, and the events signifying operations at any level must be defined as sets of sequence of events at the lower levels. ● Hierarchical structuring is a foundation for building mulitple views.
  • 15. 3.7.1 An Example of Hierarchical Viewing Financial Trade Level Abstarction Drill Down Transaction Protocol Level