Tim Bass
09-01-2008 05:58 AM
Kindred spirit Marc Adler*
mentions*being a*bit*”turned off” by the*sniping back-and-forth*in the CEP/EP blog-o-sphere.**This was exactly how I felt in early 2006 when*folks were sniping back and forth about SQL standards and*event stream processing (ESP).* A group of vendors had created some stream processing engines and*all were in “power positioning” mode with the acronyms “ESP” and*”CEP”,*hoping to*ride what*they perceived as*a future event processing
gravy train.
My goal at that time was to show everyone that there was a very mature (functional) reference architecture with decades of maturity that applies to (complex) event processing, adapted from the
JDL model for information fusion.*
Kum Bai Ya.
There is plenty of room for everyone in this model.* Kum Bai Ya.
The model is inclusine not exclusive. Kum Bai Ya.
The JDL model is based on years of operational maturity.* Kum Bai Ya.
The model is functionally and technically accurate.* Kum Bai Ya.
Everyone at the first event processing symposium (March 2006)*seemed to agree with this model, at least publicly, because there was no “push back” at the symposium.* Kum Bai Ya.
Professor David Luckham did not discuss architecture*in his book,
The Power of Events. *Kum Bai Ya.
David’s*research at Stanford, some CEP related,*was funded by DARPA, who also support the JDL information fusion model.*
Kum Bai Ya.
TIBCO Software adopted the JDL model (Note: I worked for TIBCO the time.)
Kum Bai Ya.
We built a functional reference architecture around this mature model.*
Kum Bai Ya.
We did not claim we invented it.*
Kum Bai Ya.
We did not patent*the model, only shared it.*
Kum Bai Ya.
The model is free and open for everyone to use.*
Kum Bai Ya.
The folks in the military and government*totally agree with this model for CEP/EP.*
Kum Bai Ya.
Complex*operational problems*are addressed every day with this model.
Kum Bai Ya.
Air traffic control used this model for years.*
Kum Bai Ya.
Missile defense uses this model to protect us from harm everyday.*
Kum Bai Ya.
Intrusion detection and network management now use this model (Note: I*published an ACM paper on*adapting this*model*for cybersecurity*10 years ago).
Kum Bai Ya.
Oh, blog-o-sphere.*
Kum Bai Ya.
Source...