SlideShare a Scribd company logo
1 of 30
Leveraging Business Rules in TIBCO BusinessEvents ™ Tim Bass  Principal Global Architect, Director Emerging Technologies Group TIBCO Software Inc.
TUCON Session Information ,[object Object],[object Object],[object Object]
Our Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object]
PredictiveBusiness TM
PredictiveBusiness TM  & Complex Event Processing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]," Events in several forms, from simple events to complex events, will become very widely used in business applications during 2004 through 2008 "  --- Gartner July 2003 Graphic Sources:  TIBCO Software Inc & IBM CEP Situation Manager Event Streams Historical Data Real-time Detection  and Prediction
TIBCO’S Event-Decision Reference Architecture
Complex Decisioning Taxonomy Complex Decisioning ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Solving a Broad Class of Complex Problems Detection Prediction Scheduling
Cross Taxonomy Decisioning Requirements Source: IntelligentEnterprise.com Survey 2007, n=200
Complex Decisioning Alternatives ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Business Rules Have Been “Mainstreamed” Source: IntelligentEnterprise.com Survey 2007, n=200
Our Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object]
What are Business Rules? ,[object Object],If an applicant’s credit score is greater than 700 Then mark the application as approved with an interest rate of 6.5% If a shipment’s content is marked as hazardous Then indicate that the package cannot be shipped by ‘air’ When the stock price for ‘XYZ’ drops by 5% Then execute ‘buy’ order a2583b2
What are Business Rules? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Where are Business Rules Found?  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Data acquisition Data processing Workflow Business logic
How are Business Rules Captured? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
How are Business Rules Executed? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Rete Engine Business Rules Evaluation/Execution Cycle Working Memory Accounts Listings Orders Events Alerts Rule Agenda (Conflict Resolution) A2 A5 A3 A1 Execution Engine A0 Pick and execute the first agenda item from the rule agenda. Rule Base RuleSet A RuleSet B RuleSet X RuleSet Y Pattern Matcher Match Construct Serve Update
Business Rule System (BRS) Ecosystem ,[object Object]
Business Rule Value Proposition ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Our Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object]
BusinessEvents Ecosystem Enterprise Metadata (Concepts, Properties, State Models, XML Schemas, Business Rules) BusinessEvents  Workbench (Designtime) BusinessEvents  Engine (Runtime) Business User Interface Business User Language Decision Tables Runtime Viewer Management Server
BusinessEvents Engine Engine Inference Engine ,[object Object],[object Object],[object Object],[object Object],Models ,[object Object],[object Object],[object Object],Monitor and Management Channels Embedded DB
BusinessEvents Rules Implementation Value Proposition ,[object Object],[object Object],[object Object],[object Object],[object Object]
Our Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object]
The Need for Standards… ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Relevant Standards Organizations common  community Java Community  Process JSR-94 Rule Engine API PRR PRR RFP SBVR BSBR RFP RIF JSR-94 RuleML.org BMM RuleML.org Organizations Standards 2007 2006 2005 2004 2003 2002 2001 2000 W3C RIF WG OMG Business Rules Working Group Business Modeling and Integration BMI
Business Rules Relevant Standards  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OMG MDA / Business Rules Standards Mapping Code / Execution Model Driven Architecture (MDA) Semantics for Business  Vocabulary and Rules (SBVR) Production Rule Representation (PRR) Rule Interchange Format (RIF) JSR-94 Platform Specific Models (PSM) UML Models - platform specific Computation Independent Models (CIM) Business Models Platform Independent Models (PIM) UML Models XML  Metadata Interchange (XMI) transformation
Q & A ,[object Object],? ? ? ? ?
Thank You!  John Cribbs Principal Architect / Manager Emerging Technologies Group TIBCO Software Inc.

More Related Content

What's hot

HGConcept-CMDB-Service Design
HGConcept-CMDB-Service DesignHGConcept-CMDB-Service Design
HGConcept-CMDB-Service DesignHGConcept Inc.
 
Extensible Authorization for SAP Applications Webinar
Extensible Authorization for SAP Applications WebinarExtensible Authorization for SAP Applications Webinar
Extensible Authorization for SAP Applications WebinarNextLabs, Inc.
 
Making your CMDB social
Making your CMDB socialMaking your CMDB social
Making your CMDB socialAspediens
 
Asset Management vs. Configuration Management: Who's Winning?
Asset Management vs. Configuration Management: Who's Winning?Asset Management vs. Configuration Management: Who's Winning?
Asset Management vs. Configuration Management: Who's Winning?Cireson
 
SMB240: Tips and Tricks: Get the most out of Ivanti Service Manager
SMB240: Tips and Tricks: Get the most out of Ivanti Service ManagerSMB240: Tips and Tricks: Get the most out of Ivanti Service Manager
SMB240: Tips and Tricks: Get the most out of Ivanti Service ManagerIvanti
 
Understanding ITIL CMDB
Understanding ITIL CMDBUnderstanding ITIL CMDB
Understanding ITIL CMDBManageEngine
 
SMB230: Optimizing your CMDB and Change Management in Ivanti Service Desk
SMB230: Optimizing your CMDB and Change Management in Ivanti Service DeskSMB230: Optimizing your CMDB and Change Management in Ivanti Service Desk
SMB230: Optimizing your CMDB and Change Management in Ivanti Service DeskIvanti
 
ICT Industry standards overview
ICT Industry standardsoverviewICT Industry standardsoverview
ICT Industry standards overviewanandbajaj
 
IEEE-SCCPresentation.290214544
IEEE-SCCPresentation.290214544IEEE-SCCPresentation.290214544
IEEE-SCCPresentation.290214544ypai
 
Flexera Software Tools Day 2015
Flexera Software Tools Day 2015Flexera Software Tools Day 2015
Flexera Software Tools Day 2015Martin Thompson
 
What is tibco. Look at an introduction to tibco software
What is tibco. Look at an  introduction to tibco softwareWhat is tibco. Look at an  introduction to tibco software
What is tibco. Look at an introduction to tibco softwareCblsolutions.com
 
Enterprise Architecture - Information Security
Enterprise Architecture - Information SecurityEnterprise Architecture - Information Security
Enterprise Architecture - Information SecurityAjay Kumar Uppal
 
Asset Management: Extending Configuration Manager with Cireson
Asset Management: Extending Configuration Manager with CiresonAsset Management: Extending Configuration Manager with Cireson
Asset Management: Extending Configuration Manager with CiresonCireson
 
SaaS Business Architecture
SaaS Business ArchitectureSaaS Business Architecture
SaaS Business ArchitectureLincoln Murphy
 
Insurance application modernisation
Insurance application modernisationInsurance application modernisation
Insurance application modernisationBrian Maguire
 
SharePoint Business Track Part 1 of 2
SharePoint Business Track Part 1 of 2SharePoint Business Track Part 1 of 2
SharePoint Business Track Part 1 of 2NextLabs, Inc.
 
Integrating Salesforce.com and Oracle ERP Using IBM WebSphere Cast Iron
Integrating Salesforce.com and Oracle ERP Using IBM WebSphere Cast IronIntegrating Salesforce.com and Oracle ERP Using IBM WebSphere Cast Iron
Integrating Salesforce.com and Oracle ERP Using IBM WebSphere Cast IronProlifics
 

What's hot (20)

Telecom OSS/BSS - Automation
Telecom OSS/BSS - Automation Telecom OSS/BSS - Automation
Telecom OSS/BSS - Automation
 
Tibco Amx Bpm
Tibco Amx BpmTibco Amx Bpm
Tibco Amx Bpm
 
HGConcept-CMDB-Service Design
HGConcept-CMDB-Service DesignHGConcept-CMDB-Service Design
HGConcept-CMDB-Service Design
 
Extensible Authorization for SAP Applications Webinar
Extensible Authorization for SAP Applications WebinarExtensible Authorization for SAP Applications Webinar
Extensible Authorization for SAP Applications Webinar
 
Making your CMDB social
Making your CMDB socialMaking your CMDB social
Making your CMDB social
 
Asset Management vs. Configuration Management: Who's Winning?
Asset Management vs. Configuration Management: Who's Winning?Asset Management vs. Configuration Management: Who's Winning?
Asset Management vs. Configuration Management: Who's Winning?
 
SMB240: Tips and Tricks: Get the most out of Ivanti Service Manager
SMB240: Tips and Tricks: Get the most out of Ivanti Service ManagerSMB240: Tips and Tricks: Get the most out of Ivanti Service Manager
SMB240: Tips and Tricks: Get the most out of Ivanti Service Manager
 
Understanding ITIL CMDB
Understanding ITIL CMDBUnderstanding ITIL CMDB
Understanding ITIL CMDB
 
SMB230: Optimizing your CMDB and Change Management in Ivanti Service Desk
SMB230: Optimizing your CMDB and Change Management in Ivanti Service DeskSMB230: Optimizing your CMDB and Change Management in Ivanti Service Desk
SMB230: Optimizing your CMDB and Change Management in Ivanti Service Desk
 
ICT Industry standards overview
ICT Industry standardsoverviewICT Industry standardsoverview
ICT Industry standards overview
 
IEEE-SCCPresentation.290214544
IEEE-SCCPresentation.290214544IEEE-SCCPresentation.290214544
IEEE-SCCPresentation.290214544
 
Flexera Software Tools Day 2015
Flexera Software Tools Day 2015Flexera Software Tools Day 2015
Flexera Software Tools Day 2015
 
What is tibco. Look at an introduction to tibco software
What is tibco. Look at an  introduction to tibco softwareWhat is tibco. Look at an  introduction to tibco software
What is tibco. Look at an introduction to tibco software
 
Enterprise Architecture - Information Security
Enterprise Architecture - Information SecurityEnterprise Architecture - Information Security
Enterprise Architecture - Information Security
 
Asset Management: Extending Configuration Manager with Cireson
Asset Management: Extending Configuration Manager with CiresonAsset Management: Extending Configuration Manager with Cireson
Asset Management: Extending Configuration Manager with Cireson
 
SaaS Business Architecture
SaaS Business ArchitectureSaaS Business Architecture
SaaS Business Architecture
 
Insurance application modernisation
Insurance application modernisationInsurance application modernisation
Insurance application modernisation
 
SharePoint Business Track Part 1 of 2
SharePoint Business Track Part 1 of 2SharePoint Business Track Part 1 of 2
SharePoint Business Track Part 1 of 2
 
Integrating Salesforce.com and Oracle ERP Using IBM WebSphere Cast Iron
Integrating Salesforce.com and Oracle ERP Using IBM WebSphere Cast IronIntegrating Salesforce.com and Oracle ERP Using IBM WebSphere Cast Iron
Integrating Salesforce.com and Oracle ERP Using IBM WebSphere Cast Iron
 
SAP Disclosure Management by Tony Wright
SAP Disclosure Management by Tony WrightSAP Disclosure Management by Tony Wright
SAP Disclosure Management by Tony Wright
 

Viewers also liked

TIBCO Latest Interview Questions with Answers by Garuda Trainings
TIBCO Latest Interview Questions with Answers by Garuda TrainingsTIBCO Latest Interview Questions with Answers by Garuda Trainings
TIBCO Latest Interview Questions with Answers by Garuda TrainingsGaruda Trainings
 
Learn about Tibco Designer
Learn about Tibco Designer Learn about Tibco Designer
Learn about Tibco Designer Cblsolutions.com
 
How to Choose the Right Technology, Framework or Tool to Build Microservices
How to Choose the Right Technology, Framework or Tool to Build MicroservicesHow to Choose the Right Technology, Framework or Tool to Build Microservices
How to Choose the Right Technology, Framework or Tool to Build MicroservicesKai Wähner
 
A detailed Tibco EMS presentation
A detailed Tibco EMS presentationA detailed Tibco EMS presentation
A detailed Tibco EMS presentationCblsolutions.com
 
2012 indonesia
2012 indonesia2012 indonesia
2012 indonesiaIra Tobing
 
Research Method to Optimize Logger for a Telecom Application Running on Embed...
Research Method to Optimize Logger for a Telecom Application Running on Embed...Research Method to Optimize Logger for a Telecom Application Running on Embed...
Research Method to Optimize Logger for a Telecom Application Running on Embed...IJERD Editor
 
Catatan nusantara
Catatan nusantaraCatatan nusantara
Catatan nusantaraGus Andy
 
Media Indonesia 27 Februari 2014
Media Indonesia 27 Februari 2014Media Indonesia 27 Februari 2014
Media Indonesia 27 Februari 2014hastapurnama
 
Epaper Surya 16 Agustus 2013
Epaper Surya 16 Agustus 2013Epaper Surya 16 Agustus 2013
Epaper Surya 16 Agustus 2013Portal Surya
 
45 kasus korupsi kelas kakap indonesia
45 kasus korupsi kelas kakap indonesia45 kasus korupsi kelas kakap indonesia
45 kasus korupsi kelas kakap indonesiaFreddy Then
 
Newspaper cutting - marine and aviation insurance mh370
Newspaper cutting - marine and aviation insurance mh370Newspaper cutting - marine and aviation insurance mh370
Newspaper cutting - marine and aviation insurance mh370hasyimah ismail
 
Bank Century
Bank CenturyBank Century
Bank Centuryrossmcle
 
Suara Merdeka 26 Februari 2014
Suara Merdeka 26 Februari 2014Suara Merdeka 26 Februari 2014
Suara Merdeka 26 Februari 2014hastapurnama
 
Sách Trẻ Thơ Trong Gia Đình - Maria Montessori
Sách Trẻ Thơ Trong Gia Đình - Maria MontessoriSách Trẻ Thơ Trong Gia Đình - Maria Montessori
Sách Trẻ Thơ Trong Gia Đình - Maria MontessoriNhân Nguyễn Sỹ
 
Reconstructing Third World Elite Rotation Events from Newspapers
Reconstructing Third World Elite Rotation Events from NewspapersReconstructing Third World Elite Rotation Events from Newspapers
Reconstructing Third World Elite Rotation Events from NewspapersVincent Traag
 
Mencegah Fraud dalam Bisnis or Prevent Fraud in Business by I Gede Auditta
Mencegah Fraud dalam Bisnis or Prevent Fraud in Business by I Gede AudittaMencegah Fraud dalam Bisnis or Prevent Fraud in Business by I Gede Auditta
Mencegah Fraud dalam Bisnis or Prevent Fraud in Business by I Gede AudittaI Gede Auditta
 
Media Indonesia 5 Maret 2014
Media Indonesia 5 Maret 2014Media Indonesia 5 Maret 2014
Media Indonesia 5 Maret 2014hastapurnama
 
Paper hendra saputra 1201112514 matakuliah administrasi perpajakan dan prakti...
Paper hendra saputra 1201112514 matakuliah administrasi perpajakan dan prakti...Paper hendra saputra 1201112514 matakuliah administrasi perpajakan dan prakti...
Paper hendra saputra 1201112514 matakuliah administrasi perpajakan dan prakti...sailendrahendra
 

Viewers also liked (20)

TIBCO Latest Interview Questions with Answers by Garuda Trainings
TIBCO Latest Interview Questions with Answers by Garuda TrainingsTIBCO Latest Interview Questions with Answers by Garuda Trainings
TIBCO Latest Interview Questions with Answers by Garuda Trainings
 
Learn about Tibco Designer
Learn about Tibco Designer Learn about Tibco Designer
Learn about Tibco Designer
 
How to Choose the Right Technology, Framework or Tool to Build Microservices
How to Choose the Right Technology, Framework or Tool to Build MicroservicesHow to Choose the Right Technology, Framework or Tool to Build Microservices
How to Choose the Right Technology, Framework or Tool to Build Microservices
 
Tibco business works
Tibco business worksTibco business works
Tibco business works
 
A detailed Tibco EMS presentation
A detailed Tibco EMS presentationA detailed Tibco EMS presentation
A detailed Tibco EMS presentation
 
2012 indonesia
2012 indonesia2012 indonesia
2012 indonesia
 
2014_indonesia
2014_indonesia2014_indonesia
2014_indonesia
 
Research Method to Optimize Logger for a Telecom Application Running on Embed...
Research Method to Optimize Logger for a Telecom Application Running on Embed...Research Method to Optimize Logger for a Telecom Application Running on Embed...
Research Method to Optimize Logger for a Telecom Application Running on Embed...
 
Catatan nusantara
Catatan nusantaraCatatan nusantara
Catatan nusantara
 
Media Indonesia 27 Februari 2014
Media Indonesia 27 Februari 2014Media Indonesia 27 Februari 2014
Media Indonesia 27 Februari 2014
 
Epaper Surya 16 Agustus 2013
Epaper Surya 16 Agustus 2013Epaper Surya 16 Agustus 2013
Epaper Surya 16 Agustus 2013
 
45 kasus korupsi kelas kakap indonesia
45 kasus korupsi kelas kakap indonesia45 kasus korupsi kelas kakap indonesia
45 kasus korupsi kelas kakap indonesia
 
Newspaper cutting - marine and aviation insurance mh370
Newspaper cutting - marine and aviation insurance mh370Newspaper cutting - marine and aviation insurance mh370
Newspaper cutting - marine and aviation insurance mh370
 
Bank Century
Bank CenturyBank Century
Bank Century
 
Suara Merdeka 26 Februari 2014
Suara Merdeka 26 Februari 2014Suara Merdeka 26 Februari 2014
Suara Merdeka 26 Februari 2014
 
Sách Trẻ Thơ Trong Gia Đình - Maria Montessori
Sách Trẻ Thơ Trong Gia Đình - Maria MontessoriSách Trẻ Thơ Trong Gia Đình - Maria Montessori
Sách Trẻ Thơ Trong Gia Đình - Maria Montessori
 
Reconstructing Third World Elite Rotation Events from Newspapers
Reconstructing Third World Elite Rotation Events from NewspapersReconstructing Third World Elite Rotation Events from Newspapers
Reconstructing Third World Elite Rotation Events from Newspapers
 
Mencegah Fraud dalam Bisnis or Prevent Fraud in Business by I Gede Auditta
Mencegah Fraud dalam Bisnis or Prevent Fraud in Business by I Gede AudittaMencegah Fraud dalam Bisnis or Prevent Fraud in Business by I Gede Auditta
Mencegah Fraud dalam Bisnis or Prevent Fraud in Business by I Gede Auditta
 
Media Indonesia 5 Maret 2014
Media Indonesia 5 Maret 2014Media Indonesia 5 Maret 2014
Media Indonesia 5 Maret 2014
 
Paper hendra saputra 1201112514 matakuliah administrasi perpajakan dan prakti...
Paper hendra saputra 1201112514 matakuliah administrasi perpajakan dan prakti...Paper hendra saputra 1201112514 matakuliah administrasi perpajakan dan prakti...
Paper hendra saputra 1201112514 matakuliah administrasi perpajakan dan prakti...
 

Similar to Leveraging Business Rules in TIBCO BusinessEvents

Biz Talk Demo slideshare
Biz Talk Demo slideshareBiz Talk Demo slideshare
Biz Talk Demo slideshareerios
 
CEP and SOA: An Open Event-Driven Architecture for Risk Management
CEP and SOA: An Open Event-Driven Architecture for Risk ManagementCEP and SOA: An Open Event-Driven Architecture for Risk Management
CEP and SOA: An Open Event-Driven Architecture for Risk ManagementTim Bass
 
Overview of Dynaflow Solution
Overview of Dynaflow Solution Overview of Dynaflow Solution
Overview of Dynaflow Solution bpmgeek09
 
Enabling The Service-Oriented Enterprise
Enabling The Service-Oriented EnterpriseEnabling The Service-Oriented Enterprise
Enabling The Service-Oriented EnterpriseNathaniel Palmer
 
Graphical Business Rules Management
Graphical Business Rules ManagementGraphical Business Rules Management
Graphical Business Rules Managementguest5a591
 
Graphical Business Rules Management
Graphical Business Rules ManagementGraphical Business Rules Management
Graphical Business Rules Managementguest5a591
 
Event Driven Architecture (EDA), November 2, 2006
Event Driven Architecture (EDA), November 2, 2006Event Driven Architecture (EDA), November 2, 2006
Event Driven Architecture (EDA), November 2, 2006Tim Bass
 
Microsoft SQL Server 2008 R2 and BizTalk Server Presentation
Microsoft SQL Server 2008 R2 and BizTalk Server PresentationMicrosoft SQL Server 2008 R2 and BizTalk Server Presentation
Microsoft SQL Server 2008 R2 and BizTalk Server PresentationMicrosoft Private Cloud
 
Managing IT Infrastructure And Applications Proactively For Performance And U...
Managing IT Infrastructure And Applications Proactively For Performance And U...Managing IT Infrastructure And Applications Proactively For Performance And U...
Managing IT Infrastructure And Applications Proactively For Performance And U...Vyom Labs
 
Right Time Solutions
Right Time SolutionsRight Time Solutions
Right Time SolutionsTushar Kale
 
Ws Soa V6 Theory And Practice
Ws Soa V6 Theory And PracticeWs Soa V6 Theory And Practice
Ws Soa V6 Theory And PracticePini Cohen
 
Next generation business automation with the red hat decision manager and red...
Next generation business automation with the red hat decision manager and red...Next generation business automation with the red hat decision manager and red...
Next generation business automation with the red hat decision manager and red...Masahiko Umeno
 
Business Process Modeling & Automation: Where are we?
Business Process Modeling & Automation: Where are we?Business Process Modeling & Automation: Where are we?
Business Process Modeling & Automation: Where are we?Denis Gagné
 
Analytics on z Systems Focus on Real Time - Hélène Lyon
Analytics on z Systems Focus on Real Time - Hélène LyonAnalytics on z Systems Focus on Real Time - Hélène Lyon
Analytics on z Systems Focus on Real Time - Hélène LyonNRB
 

Similar to Leveraging Business Rules in TIBCO BusinessEvents (20)

Biz Talk Demo slideshare
Biz Talk Demo slideshareBiz Talk Demo slideshare
Biz Talk Demo slideshare
 
CEP and SOA: An Open Event-Driven Architecture for Risk Management
CEP and SOA: An Open Event-Driven Architecture for Risk ManagementCEP and SOA: An Open Event-Driven Architecture for Risk Management
CEP and SOA: An Open Event-Driven Architecture for Risk Management
 
Overview of Dynaflow Solution
Overview of Dynaflow Solution Overview of Dynaflow Solution
Overview of Dynaflow Solution
 
Enabling The Service-Oriented Enterprise
Enabling The Service-Oriented EnterpriseEnabling The Service-Oriented Enterprise
Enabling The Service-Oriented Enterprise
 
Graphical Business Rules Management
Graphical Business Rules ManagementGraphical Business Rules Management
Graphical Business Rules Management
 
Graphical Business Rules Management
Graphical Business Rules ManagementGraphical Business Rules Management
Graphical Business Rules Management
 
Event Driven Architecture (EDA), November 2, 2006
Event Driven Architecture (EDA), November 2, 2006Event Driven Architecture (EDA), November 2, 2006
Event Driven Architecture (EDA), November 2, 2006
 
ERP
ERPERP
ERP
 
Microsoft SQL Server 2008 R2 and BizTalk Server Presentation
Microsoft SQL Server 2008 R2 and BizTalk Server PresentationMicrosoft SQL Server 2008 R2 and BizTalk Server Presentation
Microsoft SQL Server 2008 R2 and BizTalk Server Presentation
 
Erp
ErpErp
Erp
 
What is ERP
What is ERPWhat is ERP
What is ERP
 
Erp
ErpErp
Erp
 
ERP Implementation
ERP ImplementationERP Implementation
ERP Implementation
 
Managing IT Infrastructure And Applications Proactively For Performance And U...
Managing IT Infrastructure And Applications Proactively For Performance And U...Managing IT Infrastructure And Applications Proactively For Performance And U...
Managing IT Infrastructure And Applications Proactively For Performance And U...
 
SOA and M&A
SOA and M&ASOA and M&A
SOA and M&A
 
Right Time Solutions
Right Time SolutionsRight Time Solutions
Right Time Solutions
 
Ws Soa V6 Theory And Practice
Ws Soa V6 Theory And PracticeWs Soa V6 Theory And Practice
Ws Soa V6 Theory And Practice
 
Next generation business automation with the red hat decision manager and red...
Next generation business automation with the red hat decision manager and red...Next generation business automation with the red hat decision manager and red...
Next generation business automation with the red hat decision manager and red...
 
Business Process Modeling & Automation: Where are we?
Business Process Modeling & Automation: Where are we?Business Process Modeling & Automation: Where are we?
Business Process Modeling & Automation: Where are we?
 
Analytics on z Systems Focus on Real Time - Hélène Lyon
Analytics on z Systems Focus on Real Time - Hélène LyonAnalytics on z Systems Focus on Real Time - Hélène Lyon
Analytics on z Systems Focus on Real Time - Hélène Lyon
 

More from Tim Bass

A High Level Blackboard Architecture for Cyber SA
A High Level Blackboard Architecture for Cyber SAA High Level Blackboard Architecture for Cyber SA
A High Level Blackboard Architecture for Cyber SATim Bass
 
A Journey Into Cyberspace
A Journey Into CyberspaceA Journey Into Cyberspace
A Journey Into CyberspaceTim Bass
 
Mythbusters: Event Stream Processing v. Complex Event Processing
Mythbusters: Event Stream Processing v. Complex Event ProcessingMythbusters: Event Stream Processing v. Complex Event Processing
Mythbusters: Event Stream Processing v. Complex Event ProcessingTim Bass
 
Event Processing Technical Society Event Processing Reference Architecture W...
Event Processing Technical SocietyEvent Processing Reference Architecture W...Event Processing Technical SocietyEvent Processing Reference Architecture W...
Event Processing Technical Society Event Processing Reference Architecture W...Tim Bass
 
Combating Fraud and Intrusion Threats with Event Processing
Combating Fraud and Intrusion Threats with Event ProcessingCombating Fraud and Intrusion Threats with Event Processing
Combating Fraud and Intrusion Threats with Event ProcessingTim Bass
 
Optimizing Your SOA with Event Processing
Optimizing Your SOA with Event ProcessingOptimizing Your SOA with Event Processing
Optimizing Your SOA with Event ProcessingTim Bass
 
Complex Event Processing (CEP) for Next-Generation Security Event Management,...
Complex Event Processing (CEP) for Next-Generation Security Event Management,...Complex Event Processing (CEP) for Next-Generation Security Event Management,...
Complex Event Processing (CEP) for Next-Generation Security Event Management,...Tim Bass
 
Detecting Opportunities and Threats with Complex Event Processing: Case St...
Detecting Opportunities and Threats with Complex Event Processing: Case St...Detecting Opportunities and Threats with Complex Event Processing: Case St...
Detecting Opportunities and Threats with Complex Event Processing: Case St...Tim Bass
 
Next-Generation IDS: A CEP Use Case in 10 Minutes
Next-Generation IDS: A CEP Use Case in 10 MinutesNext-Generation IDS: A CEP Use Case in 10 Minutes
Next-Generation IDS: A CEP Use Case in 10 MinutesTim Bass
 
A Survey of Event Processing Languages (EPLs), October 7, 2006
A Survey of Event Processing Languages (EPLs), October 7, 2006A Survey of Event Processing Languages (EPLs), October 7, 2006
A Survey of Event Processing Languages (EPLs), October 7, 2006Tim Bass
 
Proposed Event Processing Definitions ,September 20, 2006
Proposed Event Processing Definitions,September 20, 2006Proposed Event Processing Definitions,September 20, 2006
Proposed Event Processing Definitions ,September 20, 2006Tim Bass
 
Event Processing Reference Architecture, March 2006
Event Processing Reference Architecture, March 2006Event Processing Reference Architecture, March 2006
Event Processing Reference Architecture, March 2006Tim Bass
 
CEP: Event-Decision Architecture for PredictiveBusiness, July 2006
CEP: Event-Decision Architecture for PredictiveBusiness, July 2006CEP: Event-Decision Architecture for PredictiveBusiness, July 2006
CEP: Event-Decision Architecture for PredictiveBusiness, July 2006Tim Bass
 
Using Event Processing to Enable Enterprise Security
Using Event Processing to Enable Enterprise SecurityUsing Event Processing to Enable Enterprise Security
Using Event Processing to Enable Enterprise SecurityTim Bass
 
Using Event Processing to Enable Enterprise Security
Using Event Processing to Enable Enterprise SecurityUsing Event Processing to Enable Enterprise Security
Using Event Processing to Enable Enterprise SecurityTim Bass
 
Processing Patterns for PredictiveBusiness
Processing Patterns for PredictiveBusinessProcessing Patterns for PredictiveBusiness
Processing Patterns for PredictiveBusinessTim Bass
 
Adding Rules to Improve Flexibility and Effectively Manage Complex Events
Adding Rules to Improve Flexibility and Effectively Manage Complex EventsAdding Rules to Improve Flexibility and Effectively Manage Complex Events
Adding Rules to Improve Flexibility and Effectively Manage Complex EventsTim Bass
 
Processing Patterns for Predictive Business
Processing Patterns for Predictive BusinessProcessing Patterns for Predictive Business
Processing Patterns for Predictive BusinessTim Bass
 

More from Tim Bass (18)

A High Level Blackboard Architecture for Cyber SA
A High Level Blackboard Architecture for Cyber SAA High Level Blackboard Architecture for Cyber SA
A High Level Blackboard Architecture for Cyber SA
 
A Journey Into Cyberspace
A Journey Into CyberspaceA Journey Into Cyberspace
A Journey Into Cyberspace
 
Mythbusters: Event Stream Processing v. Complex Event Processing
Mythbusters: Event Stream Processing v. Complex Event ProcessingMythbusters: Event Stream Processing v. Complex Event Processing
Mythbusters: Event Stream Processing v. Complex Event Processing
 
Event Processing Technical Society Event Processing Reference Architecture W...
Event Processing Technical SocietyEvent Processing Reference Architecture W...Event Processing Technical SocietyEvent Processing Reference Architecture W...
Event Processing Technical Society Event Processing Reference Architecture W...
 
Combating Fraud and Intrusion Threats with Event Processing
Combating Fraud and Intrusion Threats with Event ProcessingCombating Fraud and Intrusion Threats with Event Processing
Combating Fraud and Intrusion Threats with Event Processing
 
Optimizing Your SOA with Event Processing
Optimizing Your SOA with Event ProcessingOptimizing Your SOA with Event Processing
Optimizing Your SOA with Event Processing
 
Complex Event Processing (CEP) for Next-Generation Security Event Management,...
Complex Event Processing (CEP) for Next-Generation Security Event Management,...Complex Event Processing (CEP) for Next-Generation Security Event Management,...
Complex Event Processing (CEP) for Next-Generation Security Event Management,...
 
Detecting Opportunities and Threats with Complex Event Processing: Case St...
Detecting Opportunities and Threats with Complex Event Processing: Case St...Detecting Opportunities and Threats with Complex Event Processing: Case St...
Detecting Opportunities and Threats with Complex Event Processing: Case St...
 
Next-Generation IDS: A CEP Use Case in 10 Minutes
Next-Generation IDS: A CEP Use Case in 10 MinutesNext-Generation IDS: A CEP Use Case in 10 Minutes
Next-Generation IDS: A CEP Use Case in 10 Minutes
 
A Survey of Event Processing Languages (EPLs), October 7, 2006
A Survey of Event Processing Languages (EPLs), October 7, 2006A Survey of Event Processing Languages (EPLs), October 7, 2006
A Survey of Event Processing Languages (EPLs), October 7, 2006
 
Proposed Event Processing Definitions ,September 20, 2006
Proposed Event Processing Definitions,September 20, 2006Proposed Event Processing Definitions,September 20, 2006
Proposed Event Processing Definitions ,September 20, 2006
 
Event Processing Reference Architecture, March 2006
Event Processing Reference Architecture, March 2006Event Processing Reference Architecture, March 2006
Event Processing Reference Architecture, March 2006
 
CEP: Event-Decision Architecture for PredictiveBusiness, July 2006
CEP: Event-Decision Architecture for PredictiveBusiness, July 2006CEP: Event-Decision Architecture for PredictiveBusiness, July 2006
CEP: Event-Decision Architecture for PredictiveBusiness, July 2006
 
Using Event Processing to Enable Enterprise Security
Using Event Processing to Enable Enterprise SecurityUsing Event Processing to Enable Enterprise Security
Using Event Processing to Enable Enterprise Security
 
Using Event Processing to Enable Enterprise Security
Using Event Processing to Enable Enterprise SecurityUsing Event Processing to Enable Enterprise Security
Using Event Processing to Enable Enterprise Security
 
Processing Patterns for PredictiveBusiness
Processing Patterns for PredictiveBusinessProcessing Patterns for PredictiveBusiness
Processing Patterns for PredictiveBusiness
 
Adding Rules to Improve Flexibility and Effectively Manage Complex Events
Adding Rules to Improve Flexibility and Effectively Manage Complex EventsAdding Rules to Improve Flexibility and Effectively Manage Complex Events
Adding Rules to Improve Flexibility and Effectively Manage Complex Events
 
Processing Patterns for Predictive Business
Processing Patterns for Predictive BusinessProcessing Patterns for Predictive Business
Processing Patterns for Predictive Business
 

Recently uploaded

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 

Recently uploaded (20)

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 

Leveraging Business Rules in TIBCO BusinessEvents

  • 1. Leveraging Business Rules in TIBCO BusinessEvents ™ Tim Bass Principal Global Architect, Director Emerging Technologies Group TIBCO Software Inc.
  • 2.
  • 3.
  • 5.
  • 7.
  • 8. Cross Taxonomy Decisioning Requirements Source: IntelligentEnterprise.com Survey 2007, n=200
  • 9.
  • 10. Business Rules Have Been “Mainstreamed” Source: IntelligentEnterprise.com Survey 2007, n=200
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17. Rete Engine Business Rules Evaluation/Execution Cycle Working Memory Accounts Listings Orders Events Alerts Rule Agenda (Conflict Resolution) A2 A5 A3 A1 Execution Engine A0 Pick and execute the first agenda item from the rule agenda. Rule Base RuleSet A RuleSet B RuleSet X RuleSet Y Pattern Matcher Match Construct Serve Update
  • 18.
  • 19.
  • 20.
  • 21. BusinessEvents Ecosystem Enterprise Metadata (Concepts, Properties, State Models, XML Schemas, Business Rules) BusinessEvents Workbench (Designtime) BusinessEvents Engine (Runtime) Business User Interface Business User Language Decision Tables Runtime Viewer Management Server
  • 22.
  • 23.
  • 24.
  • 25.
  • 26. Relevant Standards Organizations common community Java Community Process JSR-94 Rule Engine API PRR PRR RFP SBVR BSBR RFP RIF JSR-94 RuleML.org BMM RuleML.org Organizations Standards 2007 2006 2005 2004 2003 2002 2001 2000 W3C RIF WG OMG Business Rules Working Group Business Modeling and Integration BMI
  • 27.
  • 28. OMG MDA / Business Rules Standards Mapping Code / Execution Model Driven Architecture (MDA) Semantics for Business Vocabulary and Rules (SBVR) Production Rule Representation (PRR) Rule Interchange Format (RIF) JSR-94 Platform Specific Models (PSM) UML Models - platform specific Computation Independent Models (CIM) Business Models Platform Independent Models (PIM) UML Models XML Metadata Interchange (XMI) transformation
  • 29.
  • 30. Thank You! John Cribbs Principal Architect / Manager Emerging Technologies Group TIBCO Software Inc.