SlideShare a Scribd company logo
1 of 15
Download to read offline
Chapter 3
Viewing the Electronic EnterpriseKeeping the Human in Control
jwj0831@gmail.com
Topics covered in this Chapter
● Event monitoring - the standard technology today
● Enterprise viewing - a step beyond monitoring
● Recognizing sets of events from the global event cloud a key to personalized viewing
● Information gaps
● Enterprise structure and abstraction hierarchies
● Hierarchical viewing - the key to human control of the
enterprise
3.1 Today’s Event Monitoring Is Too
Primitive
● Why is it difficult to get events that are relavant to the
decisions we are trying to make?
● Part of the answer lies in the historical progression of
problems that have arisen in running an IT-based
enterprise, from the low-level network problems of
yesterday, ascending to the high-level problems of
today.
3.1.1 System Monitoring Focuses on
the Network Layer
● Major headaches happen when the performance of the
communication layer deteriorates, or parts of it fail
altogether. This class of problems is generally lumped
together under one category, network management.
● The bulk of the considerable commercial effort that has
been put into enterprise system monitoring until now
has been concentrated largely on the low-level IT
layers.
3.1.2 Network-Level Monitoring Doesn’t
Even Solve Network Problems
● Network managers have to figure out from the event
logs and statistical views of the event traffic exactly
what is happening.
● They are faced daily with the following kinds of issues.
○ The network event logs can become very large and
difficult to handle in real-time.
○ Tools to aid in picking out sets of related events are
needed.
○ Causal tracking is needed
○ Predictive monitoring is beyond the state of the art
3.2 An Example of Causal Tracking
● Our example applies causal tracking to monitoring a
simple transaction protocol
● Many transaction systems, particularly those dealing
with database entries, use a two-phase commit
protocol to terminate multistep transactions.
○ A polling phase
○ A commit phase
3.3 Information Gaps 1/2
● Different people engaged in the operations of an
enterprise need different kinds of information. This leads
to information gaps between the kind of information
people need to do their jobs effectively and easily, and
the information they actually get.
Business and
Operation
Corporate
Management

Application
Middleware and
Network

Supervisor
IT Manager
Enterprise IT Layer Monitoring and Analysis
3.3 Information Gaps 2/2
● An information gap generally has two dimensions:
○ A vertical dimension, which is the difference
between the level of the enterprise at which events
and other data are monitored and the level at which
the user is operating within the enterprise.
○ A horizontal dimension, which is the amount of
analysis needed to render the monitored information
in a userful form for the user's tasks.
3.4 Problem-Relevant Information
● To bridge information gaps we need a technology for
constructing problem-relevant information from
whatever events we can monitor.
● How to get problem-relevant information
1. Relevance to the problem of immediate interest
2. Ease of understandability
3. Ease of analysis
4. Ease with which multiple views can be coordinated
3.5 Viewing Enterprise System 1/2
● A view of a system is a selection of information
about what the system is doing currently or did in the
past that is processed to abstract or extract those
aspects relevant to a problem of interest.
● How to get problem-relevant information
1. Relevance to the problem of immediate interest
2. Ease of understandability
3. Ease of analysis
4. Ease with which multiple views can be coordinated
3.5 Viewing Enterprise System 2/2
● Each of these examples of a view has the following
elements
○ Each view has a problem of interest.
○ Each view is event driven.
○ The view are provided in humanly understandable forms using
graphics.
○ Each view provides relevant events that can be used to drive
automated decision making processes.
○ Most important, a view must be easy to modify, on the fly, to
incorporate new types of events, change the aggregation
technique.
3.6 Creating and Coordinating
Multiple Views
● Different people need different views.
● Simply, this is because different users are interested in
different kinds of information about the system.
● Not only do we need multiple views of a system, but
each user needs to be able to customize their own view.
3.7 Hierarchical Viewing 1/2
● A powerful technique to help in understanding a
complex enterprise system is to seperate the system's
activities, and the operations that implement those
activities, into layers-called levels.
● This is called an abstraction hierarchy.
● Viewing a system's behavior at different level is called
hierarhchical viewing.
3.7 Hierarchical Viewing 2/2
● To build hierarchical views we must first define an
abstracttion hierarchy.
○ Operational description: There must be general agreement on
what the activities and operations of the enterprse are.
○ Hierarchical structuring: The levels must be ordered, top down,
and the events signifying operations at any level must be
defined as sets of sequence of events at the lower levels.

● Hierarchical structuring is a foundation for building
mulitple views.
3.7.1 An Example of Hierarchical
Viewing
Financial Trade
Level

Abstarction
Drill Down

Transaction
Protocol
Level

More Related Content

Similar to The Power Of Event Chapter 3

Development of Intelligence Process Tracking System for Job Seekers
Development of Intelligence Process Tracking System for Job SeekersDevelopment of Intelligence Process Tracking System for Job Seekers
Development of Intelligence Process Tracking System for Job SeekersIJMIT JOURNAL
 
How much does it cost to be Secure?
How much does it cost to be Secure?How much does it cost to be Secure?
How much does it cost to be Secure?mbmobile
 
2. INFORMATION GATHERING.pptx Computer Applications in Pharmacy
2. INFORMATION GATHERING.pptx Computer Applications in Pharmacy2. INFORMATION GATHERING.pptx Computer Applications in Pharmacy
2. INFORMATION GATHERING.pptx Computer Applications in PharmacyVedika Narvekar
 
Sharda_dss11_im_01.docChapter 1An Overview of Analy.docx
Sharda_dss11_im_01.docChapter 1An Overview of Analy.docxSharda_dss11_im_01.docChapter 1An Overview of Analy.docx
Sharda_dss11_im_01.docChapter 1An Overview of Analy.docxklinda1
 
Sharda_dss11_im_01.docChapter 1An Overview of Analy.docx
Sharda_dss11_im_01.docChapter 1An Overview of Analy.docxSharda_dss11_im_01.docChapter 1An Overview of Analy.docx
Sharda_dss11_im_01.docChapter 1An Overview of Analy.docxlesleyryder69361
 
ThinkDox implementation whitepaper for ECM
ThinkDox implementation whitepaper for ECMThinkDox implementation whitepaper for ECM
ThinkDox implementation whitepaper for ECMChristopher Wynder
 
Chapter_1_INTRODUCTION.pdf
Chapter_1_INTRODUCTION.pdfChapter_1_INTRODUCTION.pdf
Chapter_1_INTRODUCTION.pdfKamal Acharya
 
Chapter_1_INTRODUCTION.pdf
Chapter_1_INTRODUCTION.pdfChapter_1_INTRODUCTION.pdf
Chapter_1_INTRODUCTION.pdfKamal Acharya
 
Introdunction to Network Management Protocols - SNMP & TR-069
Introdunction to Network Management Protocols - SNMP & TR-069Introdunction to Network Management Protocols - SNMP & TR-069
Introdunction to Network Management Protocols - SNMP & TR-069William Lee
 
Behavior modeling of soft real time system using stereotyped extension mechan...
Behavior modeling of soft real time system using stereotyped extension mechan...Behavior modeling of soft real time system using stereotyped extension mechan...
Behavior modeling of soft real time system using stereotyped extension mechan...eSAT Publishing House
 
Observability at Scale
Observability at Scale Observability at Scale
Observability at Scale Knoldus Inc.
 
Observability in highly distributed systems
Observability in highly distributed systemsObservability in highly distributed systems
Observability in highly distributed systemsDevOps Indonesia
 
Enterprise Asset Management- Mobility Readiness Checklist
Enterprise Asset Management- Mobility Readiness ChecklistEnterprise Asset Management- Mobility Readiness Checklist
Enterprise Asset Management- Mobility Readiness ChecklistUnvired Inc.
 
2 System development life cycle has six stages of creating a sys.docx
2 System development life cycle has six stages of creating a sys.docx2 System development life cycle has six stages of creating a sys.docx
2 System development life cycle has six stages of creating a sys.docxtamicawaysmith
 
Hotel management
Hotel managementHotel management
Hotel managementArman Ahmed
 
School management System
School management SystemSchool management System
School management SystemHATIM Bhagat
 
Cyber Rangers S1 E2
Cyber Rangers S1 E2Cyber Rangers S1 E2
Cyber Rangers S1 E2JudyEvans8
 

Similar to The Power Of Event Chapter 3 (20)

Development of Intelligence Process Tracking System for Job Seekers
Development of Intelligence Process Tracking System for Job SeekersDevelopment of Intelligence Process Tracking System for Job Seekers
Development of Intelligence Process Tracking System for Job Seekers
 
How much does it cost to be Secure?
How much does it cost to be Secure?How much does it cost to be Secure?
How much does it cost to be Secure?
 
Building cbis, mis, csvtu
Building cbis, mis, csvtuBuilding cbis, mis, csvtu
Building cbis, mis, csvtu
 
2. INFORMATION GATHERING.pptx Computer Applications in Pharmacy
2. INFORMATION GATHERING.pptx Computer Applications in Pharmacy2. INFORMATION GATHERING.pptx Computer Applications in Pharmacy
2. INFORMATION GATHERING.pptx Computer Applications in Pharmacy
 
Sharda_dss11_im_01.docChapter 1An Overview of Analy.docx
Sharda_dss11_im_01.docChapter 1An Overview of Analy.docxSharda_dss11_im_01.docChapter 1An Overview of Analy.docx
Sharda_dss11_im_01.docChapter 1An Overview of Analy.docx
 
Sharda_dss11_im_01.docChapter 1An Overview of Analy.docx
Sharda_dss11_im_01.docChapter 1An Overview of Analy.docxSharda_dss11_im_01.docChapter 1An Overview of Analy.docx
Sharda_dss11_im_01.docChapter 1An Overview of Analy.docx
 
Hms project report
Hms project reportHms project report
Hms project report
 
ThinkDox implementation whitepaper for ECM
ThinkDox implementation whitepaper for ECMThinkDox implementation whitepaper for ECM
ThinkDox implementation whitepaper for ECM
 
Presentation2
Presentation2Presentation2
Presentation2
 
Chapter_1_INTRODUCTION.pdf
Chapter_1_INTRODUCTION.pdfChapter_1_INTRODUCTION.pdf
Chapter_1_INTRODUCTION.pdf
 
Chapter_1_INTRODUCTION.pdf
Chapter_1_INTRODUCTION.pdfChapter_1_INTRODUCTION.pdf
Chapter_1_INTRODUCTION.pdf
 
Introdunction to Network Management Protocols - SNMP & TR-069
Introdunction to Network Management Protocols - SNMP & TR-069Introdunction to Network Management Protocols - SNMP & TR-069
Introdunction to Network Management Protocols - SNMP & TR-069
 
Behavior modeling of soft real time system using stereotyped extension mechan...
Behavior modeling of soft real time system using stereotyped extension mechan...Behavior modeling of soft real time system using stereotyped extension mechan...
Behavior modeling of soft real time system using stereotyped extension mechan...
 
Observability at Scale
Observability at Scale Observability at Scale
Observability at Scale
 
Observability in highly distributed systems
Observability in highly distributed systemsObservability in highly distributed systems
Observability in highly distributed systems
 
Enterprise Asset Management- Mobility Readiness Checklist
Enterprise Asset Management- Mobility Readiness ChecklistEnterprise Asset Management- Mobility Readiness Checklist
Enterprise Asset Management- Mobility Readiness Checklist
 
2 System development life cycle has six stages of creating a sys.docx
2 System development life cycle has six stages of creating a sys.docx2 System development life cycle has six stages of creating a sys.docx
2 System development life cycle has six stages of creating a sys.docx
 
Hotel management
Hotel managementHotel management
Hotel management
 
School management System
School management SystemSchool management System
School management System
 
Cyber Rangers S1 E2
Cyber Rangers S1 E2Cyber Rangers S1 E2
Cyber Rangers S1 E2
 

More from Woojin Joe

Angular Seminar [한빛미디어 리얼타임 세미나]
Angular Seminar [한빛미디어 리얼타임 세미나]Angular Seminar [한빛미디어 리얼타임 세미나]
Angular Seminar [한빛미디어 리얼타임 세미나]Woojin Joe
 
자바 네트워크 소녀 Netty 리뷰
자바 네트워크 소녀 Netty 리뷰자바 네트워크 소녀 Netty 리뷰
자바 네트워크 소녀 Netty 리뷰Woojin Joe
 
The Power Of Event Chapter 7
The Power Of Event Chapter 7The Power Of Event Chapter 7
The Power Of Event Chapter 7Woojin Joe
 
The Power Of Event Chapter 6
The Power Of Event Chapter 6The Power Of Event Chapter 6
The Power Of Event Chapter 6Woojin Joe
 
The Power Of Event Chapter 5
The Power Of Event Chapter 5The Power Of Event Chapter 5
The Power Of Event Chapter 5Woojin Joe
 
Fusion prj-proposal for 10 2 class
Fusion prj-proposal for 10 2 classFusion prj-proposal for 10 2 class
Fusion prj-proposal for 10 2 classWoojin Joe
 
신학과 사회에 대한 성경의 가르침
신학과 사회에 대한 성경의 가르침신학과 사회에 대한 성경의 가르침
신학과 사회에 대한 성경의 가르침Woojin Joe
 
ITBC Orientation
ITBC OrientationITBC Orientation
ITBC OrientationWoojin Joe
 
2010년 여름 신입부원 프로젝트 제안서(수정)
2010년 여름 신입부원 프로젝트 제안서(수정)2010년 여름 신입부원 프로젝트 제안서(수정)
2010년 여름 신입부원 프로젝트 제안서(수정)Woojin Joe
 

More from Woojin Joe (9)

Angular Seminar [한빛미디어 리얼타임 세미나]
Angular Seminar [한빛미디어 리얼타임 세미나]Angular Seminar [한빛미디어 리얼타임 세미나]
Angular Seminar [한빛미디어 리얼타임 세미나]
 
자바 네트워크 소녀 Netty 리뷰
자바 네트워크 소녀 Netty 리뷰자바 네트워크 소녀 Netty 리뷰
자바 네트워크 소녀 Netty 리뷰
 
The Power Of Event Chapter 7
The Power Of Event Chapter 7The Power Of Event Chapter 7
The Power Of Event Chapter 7
 
The Power Of Event Chapter 6
The Power Of Event Chapter 6The Power Of Event Chapter 6
The Power Of Event Chapter 6
 
The Power Of Event Chapter 5
The Power Of Event Chapter 5The Power Of Event Chapter 5
The Power Of Event Chapter 5
 
Fusion prj-proposal for 10 2 class
Fusion prj-proposal for 10 2 classFusion prj-proposal for 10 2 class
Fusion prj-proposal for 10 2 class
 
신학과 사회에 대한 성경의 가르침
신학과 사회에 대한 성경의 가르침신학과 사회에 대한 성경의 가르침
신학과 사회에 대한 성경의 가르침
 
ITBC Orientation
ITBC OrientationITBC Orientation
ITBC Orientation
 
2010년 여름 신입부원 프로젝트 제안서(수정)
2010년 여름 신입부원 프로젝트 제안서(수정)2010년 여름 신입부원 프로젝트 제안서(수정)
2010년 여름 신입부원 프로젝트 제안서(수정)
 

Recently uploaded

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 

Recently uploaded (20)

DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 

The Power Of Event Chapter 3

  • 1. Chapter 3 Viewing the Electronic EnterpriseKeeping the Human in Control jwj0831@gmail.com
  • 2. Topics covered in this Chapter ● Event monitoring - the standard technology today ● Enterprise viewing - a step beyond monitoring ● Recognizing sets of events from the global event cloud a key to personalized viewing ● Information gaps ● Enterprise structure and abstraction hierarchies ● Hierarchical viewing - the key to human control of the enterprise
  • 3. 3.1 Today’s Event Monitoring Is Too Primitive ● Why is it difficult to get events that are relavant to the decisions we are trying to make? ● Part of the answer lies in the historical progression of problems that have arisen in running an IT-based enterprise, from the low-level network problems of yesterday, ascending to the high-level problems of today.
  • 4. 3.1.1 System Monitoring Focuses on the Network Layer ● Major headaches happen when the performance of the communication layer deteriorates, or parts of it fail altogether. This class of problems is generally lumped together under one category, network management. ● The bulk of the considerable commercial effort that has been put into enterprise system monitoring until now has been concentrated largely on the low-level IT layers.
  • 5. 3.1.2 Network-Level Monitoring Doesn’t Even Solve Network Problems ● Network managers have to figure out from the event logs and statistical views of the event traffic exactly what is happening. ● They are faced daily with the following kinds of issues. ○ The network event logs can become very large and difficult to handle in real-time. ○ Tools to aid in picking out sets of related events are needed. ○ Causal tracking is needed ○ Predictive monitoring is beyond the state of the art
  • 6. 3.2 An Example of Causal Tracking ● Our example applies causal tracking to monitoring a simple transaction protocol ● Many transaction systems, particularly those dealing with database entries, use a two-phase commit protocol to terminate multistep transactions. ○ A polling phase ○ A commit phase
  • 7. 3.3 Information Gaps 1/2 ● Different people engaged in the operations of an enterprise need different kinds of information. This leads to information gaps between the kind of information people need to do their jobs effectively and easily, and the information they actually get. Business and Operation Corporate Management Application Middleware and Network Supervisor IT Manager Enterprise IT Layer Monitoring and Analysis
  • 8. 3.3 Information Gaps 2/2 ● An information gap generally has two dimensions: ○ A vertical dimension, which is the difference between the level of the enterprise at which events and other data are monitored and the level at which the user is operating within the enterprise. ○ A horizontal dimension, which is the amount of analysis needed to render the monitored information in a userful form for the user's tasks.
  • 9. 3.4 Problem-Relevant Information ● To bridge information gaps we need a technology for constructing problem-relevant information from whatever events we can monitor. ● How to get problem-relevant information 1. Relevance to the problem of immediate interest 2. Ease of understandability 3. Ease of analysis 4. Ease with which multiple views can be coordinated
  • 10. 3.5 Viewing Enterprise System 1/2 ● A view of a system is a selection of information about what the system is doing currently or did in the past that is processed to abstract or extract those aspects relevant to a problem of interest. ● How to get problem-relevant information 1. Relevance to the problem of immediate interest 2. Ease of understandability 3. Ease of analysis 4. Ease with which multiple views can be coordinated
  • 11. 3.5 Viewing Enterprise System 2/2 ● Each of these examples of a view has the following elements ○ Each view has a problem of interest. ○ Each view is event driven. ○ The view are provided in humanly understandable forms using graphics. ○ Each view provides relevant events that can be used to drive automated decision making processes. ○ Most important, a view must be easy to modify, on the fly, to incorporate new types of events, change the aggregation technique.
  • 12. 3.6 Creating and Coordinating Multiple Views ● Different people need different views. ● Simply, this is because different users are interested in different kinds of information about the system. ● Not only do we need multiple views of a system, but each user needs to be able to customize their own view.
  • 13. 3.7 Hierarchical Viewing 1/2 ● A powerful technique to help in understanding a complex enterprise system is to seperate the system's activities, and the operations that implement those activities, into layers-called levels. ● This is called an abstraction hierarchy. ● Viewing a system's behavior at different level is called hierarhchical viewing.
  • 14. 3.7 Hierarchical Viewing 2/2 ● To build hierarchical views we must first define an abstracttion hierarchy. ○ Operational description: There must be general agreement on what the activities and operations of the enterprse are. ○ Hierarchical structuring: The levels must be ordered, top down, and the events signifying operations at any level must be defined as sets of sequence of events at the lower levels. ● Hierarchical structuring is a foundation for building mulitple views.
  • 15. 3.7.1 An Example of Hierarchical Viewing Financial Trade Level Abstarction Drill Down Transaction Protocol Level