Key Indicators (KIs) Versus Key Performance Indicators (KPIs)


 
Thread Tools Search this Thread
Special Forums News, Links, Events and Announcements Complex Event Processing RSS News Key Indicators (KIs) Versus Key Performance Indicators (KPIs)
# 1  
Old 01-31-2008
Key Indicators (KIs) Versus Key Performance Indicators (KPIs)

Tim Bass
Thu, 31 Jan 2008 08:54:15 +0000

SL’s new web page, Solutions for CEP Engine Users,*discusses how CEP is a*“technology that is used to help companies detect both opportunities and threats in real-time with minimal coding and reusable key performance indicators (KPIs) and business models.”
I agree with SL, but would like to suggest*my friends at SL*expand*the notion of KPIs in CEP to include the idea of KIs.* In my opinion, the SL phrase should*read,**“technology that is used to help companies detect both opportunities and threats in real-time with minimal coding and reusable key indicators (KIs) and business models.”**
The reason for my suggestion is that KPIs*are a subset of*KIs.** KIs designate, in my mind, more than just performance.**
CEP is used to both detect opportunities and threats in real-time which may, or may not*be, performance related.* For example, when a CEP engine detects evidence of fraudulent behavior, this is a KI.* The knowledge, or pattern, used to estimate this situation is a KI not a KPI, per se.** Also, when a CEP application*is processing market data and indicates that it is the right time to purchase an equity and enter the market,* the knowledge used in this decision support application is a KI, not a KPI.
Therefore, I recommend when*folks*think about the notion of* “key performance indicators” (KPIs) in CEP and BAM, they should also think in terms*of “key indicators”*(KIs).***Detecting opportunities and threats in real-time are much broader than the traditional notion of KPIs.*
Image Image Image Image Image Image Image Image


Source...
Login or Register to Ask a Question

Previous Thread | Next Thread

8 More Discussions You Might Find Interesting

1. Shell Programming and Scripting

Shell Script @ Find a key word and If the key word matches then replace next 7 lines only

Hi All, I have a XML file which is looks like as below. <<please see the attachment >> <?xml version="1.0" encoding="UTF-8"?> <esites> <esite> <name>XXX.com</name> <storeId>10001</storeId> <module> ... (4 Replies)
Discussion started by: Rajeev_hbk
4 Replies

2. AIX

Performance metrics between Dual Storage IOA versus other drive configurations

Greetings! We ordered a bunch of P7s as part of a hardware upgrade and I was made aware of the Dual Storage IOA configuration. This is something we hadn't fully considered and I was wondering if anyone had done any performance tests using this setup. All our IBM rep told us was "it's slower" and... (1 Reply)
Discussion started by: Mike Brendan
1 Replies

3. Solaris

Solaris 8 ssh public key authentication issue - Server refused our key

Hi, I've used the following way to set ssh public key authentication and it is working fine on Solaris 10, RedHat Linux and SuSE Linux servers without any problem. But I got error 'Server refused our key' on Solaris 8 system. Solaris 8 uses SSH2 too. Why? Please help. Thanks. ... (1 Reply)
Discussion started by: aixlover
1 Replies

4. Linux

no key id

Hi All, I got this message: # rpm -Uvh perl-suidperl-5.8.5-36.el4_6.3.x86_64.rpm perl-5.8.5-36.el4_6.3.x86_64.rpm warning: perl-suidperl-5.8.5-36.el4_6.3.x86_64.rpm: V3 DSA signature: NOKEY, key ID db42a60e Preparing... ########################################### 1:perl ... (1 Reply)
Discussion started by: itik
1 Replies

5. UNIX for Advanced & Expert Users

some key are not key

I found that my unix box can't use ctrl-C to break the process ( stopping a running process from the terminal--e.g. a long document being read with "more".) , the TERM setting is vt220 now , can advise how to fix it ? thx (4 Replies)
Discussion started by: ust
4 Replies

6. UNIX for Dummies Questions & Answers

Pressing backspace key simulates enter key

Hi, Whenever i press the backspace key, a new line appears, i.e. it works like a enter key. :confused: Thanks (2 Replies)
Discussion started by: vibhor_agarwali
2 Replies

7. Cybersecurity

SSH key code versus server key code

Hi, When logging in using SSH access (to a remotely hosted account), I received a prompt to accept a server's key fingerprint. Wrote that string of code down for comparision. Already emailed my host for their listing of the string of code for the server's key fingerprint (for comparison,... (1 Reply)
Discussion started by: Texan
1 Replies

8. UNIX for Dummies Questions & Answers

F1 key

Hello. I have a question. I need to activate the F1 key for an application, because when i enter by doing "telnet ..." my F1 key doesn't do anything. Any idea? (2 Replies)
Discussion started by: Elrond
2 Replies
Login or Register to Ask a Question