The Kum Bai Ya of Event Processing
Kindred spirit Marc Adler mentions being a bit ”turned off” by the sniping back-and-forth in the CEP/EP blog-o-sphere. This was exactly how I felt in early 2006 when folks were sniping back and forth about SQL standards and event stream processing (ESP). A group of vendors had created some stream processing engines and all were in “power positioning” mode with the acronyms “ESP” and ”CEP”, hoping to ride what they perceived as a future event processing gravy train.
My goal at that time was to show everyone that there was a very mature (functional) reference architecture with decades of maturity that applies to (complex) event processing, adapted from the JDL model for information fusion. Kum Bai Ya.
There is plenty of room for everyone in this model. Kum Bai Ya.
The model is inclusine not exclusive. Kum Bai Ya.
The JDL model is based on years of operational maturity. Kum Bai Ya.
The model is functionally and technically accurate. Kum Bai Ya.
Everyone at the first event processing symposium (March 2006) seemed to agree with this model, at least publicly, because there was no “push back” at the symposium. Kum Bai Ya.
Professor David Luckham did not discuss architecture in his book, The Power of Events. Kum Bai Ya.
David’s research at Stanford, some CEP related, was funded by DARPA, who also support the JDL information fusion model. Kum Bai Ya.
TIBCO Software adopted the JDL model (Note: I worked for TIBCO the time.) Kum Bai Ya.
We built a functional reference architecture around this mature model. Kum Bai Ya.
We did not claim we invented it. Kum Bai Ya.
We did not patent the model, only shared it. Kum Bai Ya.
The model is free and open for everyone to use. Kum Bai Ya.
The folks in the military and government totally agree with this model for CEP/EP. Kum Bai Ya.
Complex operational problems are addressed every day with this model. Kum Bai Ya.
Air traffic control uses this model. Kum Bai Ya.
Missile defense uses this model to protect us from harm everyday. Kum Bai Ya.
Intrusion detection and network management now use this model (Note: I published an ACM paper on adapting this model for cybersecurity 10 years ago). Kum Bai Ya.
Oh, blog-o-sphere. Kum Bai Ya.