The document discusses using the IRIS tool to extract business rules from source code and detect duplicated rules. It outlines extracting terms and conditions from database-related code elements. Rules are extracted by identifying top-level conditional statements and associated code elements. Duplicated rules are detected by normalizing rules and comparing identifiers. Examples show rules extracted from COBOL code and duplicated rules identified. Future work includes refining detection of similar rules and removing irrelevant elements.
A Business Rule Engine with unique features. Enforces separation of IT and Business logic resulting in separation of responsibilities.
Comes with a web based rules and actions maintenance tool to create complex logic.
Runs standalone or embedded in application (also web applications), Pentaho ETL tool plugin available. Runs on a server in a virtual machine or as a container (Docker)
Open source and written in Java.
Leveraging Business Rules in TIBCO BusinessEventsTim Bass
Leveraging Business Rules in TIBCO BusinessEvents, TIBCO, TUCON 2007, Tim Bass, Principal Global Architect, Director Emerging Technologies Group TIBCO Software Inc.
Introducing a horizontally scalable, inference-based business Rules Engine fo...Cask Data
Speaker: Nitin Motgi, Cask
Big Data Applications Meetup, 09/20/2017
Palo Alto, CA
More info here: http://www.meetup.com/BigDataApps/
Link to video: https://www.youtube.com/watch?v=FnQwDaKii2U
About the talk:
Business Rules are statements that describe business policies or procedures to process data. Rules engines or inference engines execute business rules in a runtime production environment, and have become commonplace for many IT applications. Except in the world of big data, where there has been a gap for a horizontally scalable, lightweight inference-based business rules engine for big data processing.
In this session, you learn about Cask’s new business Rule Rngine built on top of CDAP, which is a sophisticated if-then-else statement interpreter that runs natively on big data systems such as Spark, Hadoop, Amazon EMR, Azure HDInsight and GCE. It provides an alternative computational model for transforming your data while empowering business users to specify and manage the transformations and policy enforcements.
In his talk, Nitin Motgi, Cask co-founder and CTO, demonstrates this new, distributed rule engine and explain how business users in big data environments can make decisions on their data, enforce policies, and be an integral part of the data ingestion and ETL process. He also shows how business users can write, manage, deploy, execute and monitor business data transformation and policy enforcements.
Check out http://bdam.io/ for more info on the Big Data Apps meetup!
A Business Rule Engine with unique features. Enforces separation of IT and Business logic resulting in separation of responsibilities.
Comes with a web based rules and actions maintenance tool to create complex logic.
Runs standalone or embedded in application (also web applications), Pentaho ETL tool plugin available. Runs on a server in a virtual machine or as a container (Docker)
Open source and written in Java.
Leveraging Business Rules in TIBCO BusinessEventsTim Bass
Leveraging Business Rules in TIBCO BusinessEvents, TIBCO, TUCON 2007, Tim Bass, Principal Global Architect, Director Emerging Technologies Group TIBCO Software Inc.
Introducing a horizontally scalable, inference-based business Rules Engine fo...Cask Data
Speaker: Nitin Motgi, Cask
Big Data Applications Meetup, 09/20/2017
Palo Alto, CA
More info here: http://www.meetup.com/BigDataApps/
Link to video: https://www.youtube.com/watch?v=FnQwDaKii2U
About the talk:
Business Rules are statements that describe business policies or procedures to process data. Rules engines or inference engines execute business rules in a runtime production environment, and have become commonplace for many IT applications. Except in the world of big data, where there has been a gap for a horizontally scalable, lightweight inference-based business rules engine for big data processing.
In this session, you learn about Cask’s new business Rule Rngine built on top of CDAP, which is a sophisticated if-then-else statement interpreter that runs natively on big data systems such as Spark, Hadoop, Amazon EMR, Azure HDInsight and GCE. It provides an alternative computational model for transforming your data while empowering business users to specify and manage the transformations and policy enforcements.
In his talk, Nitin Motgi, Cask co-founder and CTO, demonstrates this new, distributed rule engine and explain how business users in big data environments can make decisions on their data, enforce policies, and be an integral part of the data ingestion and ETL process. He also shows how business users can write, manage, deploy, execute and monitor business data transformation and policy enforcements.
Check out http://bdam.io/ for more info on the Big Data Apps meetup!
EffectiveUI Senior Developer RJ Owen and Software Architect Drew McLean explain the basics of Adobe Flex 360 Rules Engine. This presentation covers how to understand business rules processing theory and walks through a simple client-side rules processing engine written in Flex 3.0.
Obey The Rules: Implementing a Rules Engine in FlexRJ Owen
A presentation I gave with Drew McLean at 360|Flex 2010 in San Jose. The presentation covers how to develop a client-side rules engine using Adobe Flex. We discuss rules engine theory and give three sample implementations. I apologize that I cannot upload source files here - please contact us for more information.
A description of the Application Process Mapping module in X-Analysis. The module automatically extracts all business rules contained in RPG, COBOL and CA 2E (Synon) code and writes them in pseudo code or structured English.
License DSL translation in COMPAS frameworkCuddle.ai
This presentation was presented in Virtual goods conference 2010 against the paper submitted by the authors. In the paper author presented a case study in the framework of COMPAS(http://www.compas-ict.eu/), a research project focused on supporting compliance monitoring and verification in service based systems. In the paper, authors also illustrated how we translate high-level service licenses (specified in Open Digital Rights Language for Services (ODRL-S)) to low-level rules for verifying the compliance requirements at runtime. Authors have validated their approach by architecting a compliance driven service oriented system, where at runtime business processes are monitored for compliance.
A short & plain english definition of Business Rules, which are a key element in systems definition. In theory, you can express a system entirely through the constructs of Business Rules. However, in practice, there is a law of diminishing returns in this effort, which the practitioner begins to sense through experience. The need to identify business rules as early as possible in the discovery phase is increasingly driven by the possibility to feed these rules together with process maps and thereby automatically generate executable code
SCOR uma realidade em Logística. O modelo de pratica de negócio mais atualizado produzido de forma colaborativa por grandes empresas do mercado internacioal e organizado pelo SCC Supply Chain Council.
Next generation business automation with the red hat decision manager and red...Masahiko Umeno
This slide had been presented at Red Hat Tech Exchange 2018 Taiwan. Talking about 1. Our focus area, 2. Application Architecture, 3. Development Method, 4. Organizing Information, 5. Business Process, 6. Case Management. This session obtain high evaluation. (No.1 in session contents per all sessions)
EffectiveUI Senior Developer RJ Owen and Software Architect Drew McLean explain the basics of Adobe Flex 360 Rules Engine. This presentation covers how to understand business rules processing theory and walks through a simple client-side rules processing engine written in Flex 3.0.
Obey The Rules: Implementing a Rules Engine in FlexRJ Owen
A presentation I gave with Drew McLean at 360|Flex 2010 in San Jose. The presentation covers how to develop a client-side rules engine using Adobe Flex. We discuss rules engine theory and give three sample implementations. I apologize that I cannot upload source files here - please contact us for more information.
A description of the Application Process Mapping module in X-Analysis. The module automatically extracts all business rules contained in RPG, COBOL and CA 2E (Synon) code and writes them in pseudo code or structured English.
License DSL translation in COMPAS frameworkCuddle.ai
This presentation was presented in Virtual goods conference 2010 against the paper submitted by the authors. In the paper author presented a case study in the framework of COMPAS(http://www.compas-ict.eu/), a research project focused on supporting compliance monitoring and verification in service based systems. In the paper, authors also illustrated how we translate high-level service licenses (specified in Open Digital Rights Language for Services (ODRL-S)) to low-level rules for verifying the compliance requirements at runtime. Authors have validated their approach by architecting a compliance driven service oriented system, where at runtime business processes are monitored for compliance.
A short & plain english definition of Business Rules, which are a key element in systems definition. In theory, you can express a system entirely through the constructs of Business Rules. However, in practice, there is a law of diminishing returns in this effort, which the practitioner begins to sense through experience. The need to identify business rules as early as possible in the discovery phase is increasingly driven by the possibility to feed these rules together with process maps and thereby automatically generate executable code
SCOR uma realidade em Logística. O modelo de pratica de negócio mais atualizado produzido de forma colaborativa por grandes empresas do mercado internacioal e organizado pelo SCC Supply Chain Council.
Next generation business automation with the red hat decision manager and red...Masahiko Umeno
This slide had been presented at Red Hat Tech Exchange 2018 Taiwan. Talking about 1. Our focus area, 2. Application Architecture, 3. Development Method, 4. Organizing Information, 5. Business Process, 6. Case Management. This session obtain high evaluation. (No.1 in session contents per all sessions)
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
3. Business Rule
Business rules (BRs) are statements that prevent,
cause, or suggest business activities to happen.
- The GUIDE Business Rules Project
Example:
If the driver age under 25, car rent rate is $80 per
day, otherwise, it is $60 per day.
6. Business Rule
Rule: If the driver age under 25, car rent rate is
$80 per day, otherwise, it is $60 per day.
Term:
Driver age
Car rent rate
Fact:
The driver age under 25
Set car rent rate to $80
Set car rent rate to $60
7. Problem
Written by business analysts
Implemented in business systems
Documents and implementations are not well
synchronized
Actual BRs are only in the source code
No reliable way to extract them
8. Previous Works
Erik Putrycz and Anatol W. Kark, Recovering Business Rules from Legacy
Source Code, the Proceedings of The International RuleML Symposium on
Rule Interchange and Applications (RuleML-2007), 2007
Harry M. Sneed, Extracting Business Logic from existing COBOL programs
as a basis for Redevelopment, Proceedings of the 9th International Workshop
on Program Comprehension (IWPC’01), 2001
Huang et al., Business Rule Extraction from Legacy Code, COMPSAC '96
Proceedings of the 20th Conference on Computer Software and Applications,
1996
Harry M. Sneed and Katalin Erdos, Extracting Business Rules from Source
Code, WPC '96 Proceedings of the 4th International Workshop on Program
Comprehension, 1996
Softwareminingʹs BRE Toolkit,
http://www.softwaremining.com/services/Business_Rule_Extraction.jsp
9. Limitations
Not KDM based - Language specific
Not distinguish business and non-business
variable.
Need manually-identified variable-of-interest
Not handle duplication
10. Term Unit Extraction
DB Related DataElements
ColumnSet – ItemUnit
ColumnSet – InDataRelations – DataModel –
DataElements
DataModel – DataAction - DataElement
DB Related DataElements - TermUnit
11. Identify DB-related Actions
ActionElements
InReads and InWrites of DB Related DataElements
Top-level Conditions
if(no-db-realted-Data){
if(db-related-data1){
if(db-related-data2){
}
}
if(db-related-data3){
}
}
12. Identify Top-level Condition
Condition not dominated by any condition which
accesses DB-realted DataElement
To detect not-top-level conditions
Get basic-block (BB) of each condition
Get all the dominators of the BB
Get the InFlow of the first ActionElement of each dominator
If the InFlow is TrueFlow or FalseFlow and the condition of
the Flows accesses some DB related DataElement
13. RuleUnit Extraction 2-1
Create RuleUnit for the TrueFlow (FlaseFlow)
of each top-level condition
Put the condition to the implementation list of
the RuleUnit
Create a FactUnit for the condition
Create a ConceptualRole for the FactUnit and
put it to the ConceptualElement list of the Rule
Unit
14. RuleUnit Extraction 2-2
Create a FactUnit for each ActionElement in the
branch
Create a ConceptualRole for the FactUnit and put it to
the ConceptualElement list of the Rule Unit
Create a normalized ID for the RuleUnit based on all
its ConceptualRoles
If there’s another RuleUnit with the same ID, just add
the implementation list to that RuleUnit.
Otherwise, add the RuleUnit to the Conceptual Model
18. Examples
Duplicated
080306
091906
091906
080306
080306
IF HV-TXL-MST-OPEN-DATE IS LESS THAN
00862200
WORK-TAXL-UPDT-DIV-EX-DT-DB2 OR 00862300
HV-TXL-MST-OPEN-DATE IS EQUAL TO DF-NINES-DATE
00862400
PERFORM UPDATE-LIQUIDATION-PAYMENT
00862500
END-IF
00862600
IF TAXL-QTY IS NOT EQUAL TO ZERO
00862700
PERFORM FETCH-ROW-TXL-OPEN-FIFO
00862800
END-IF
080306
091906
091906
080306
080306
IF HV-TXL-MST-OPEN-DATE IS LESS THAN
00869400
WORK-TAXL-UPDT-DIV-EX-DT-DB2 OR 00869500
HV-TXL-MST-OPEN-DATE IS EQUAL TO DF-NINES-DATE
00869600
PERFORM UPDATE-LIQUIDATION-PAYMENT
00869700
END-IF
00869800
IF TAXL-QTY IS NOT EQUAL TO ZERO
00869900
PERFORM FETCH-ROW-TXL-OPEN-FIFO
00870000
END-IF
19. Examples
Data ActionElements: 2,084
Code ActionElements: 47,699
IF conditions: 2,724
DB related ActionElements: 12,195
DB related IF conditions is 621
Top-level if conditions is 591
ActionElements in BRs are 2,038
20. Ongoing Works
Compute the percentage of the ActionElements
involved in BRs
Compare with using graph matching techniques
to identify duplicated or similar BRs
21. Future Works
Get feedback from business people
Multi-objective way to detect duplicated or
similar BRs
Peephole Optimization
Remove irrelevant ActionElements
(Usedef/Defuse)
Inter-procedural analysis