/** **/ The Complex Event Processing Blog | Use Cases

Category: Use Cases

The EPTS Use Case Study

Posted on 11/28/10 7 Comments

Frankly speaking, I don’t consider myself a “contrarian” regarding CEP and EPTS.  I am simply not a corporate marketing person, living by quarterly earnings reports, and can live by principles, not by corporate greed.  I am sad to say that I don’t support the EPTS use case study because of how it is “mismanaged” (in […]

Read more

Orwellian Event Processing

Posted on 02/28/10 16 Comments

Recently we completed the installation and training of an open source Bayesian classifier to replace a rule-based approach to manage forum spam.  In a nutshell, we found the rule-based approach was highly prone to both false positives and false negatives; however, a statistical approach using a Bayesian approach has turned out to be far superior. […]

Read more

What’s Really Happening in the World of CEP

Posted on 12/15/09 6 Comments

There is quite a lot is happening in the world of complex event processing.  Interestingly enough, the people and the companies advancing processing complex events are not calling what they are doing “CEP the Buzzword” we read about in the press or that a handful of “pioneers” claim make them modern-day CEP “experts”. The companies […]

Read more

Web 3.0 and the Holy Grail – Universal Language Translation (Part 1)

Posted on 11/27/09 No Comments

Bookstores everywhere in the world are full of dictionaries, language courses and common phrase guides for foreign travel. I don’t have the estimates in front of me, but language translation goods and services – books, electronic gadgets, human translators, interpreters and more, must be a multi-billion dollar global business. Companies like Google are rapidly positioning […]

Read more

GeoIP and Geo-Targeting

Posted on 09/08/09 No Comments

Lately I have been busy with a web-based geo-targeting project.   For those of you not familiar with geo-targeting, the deeper you get into geo-targeting, the more you realize how important and interesting it is. Geo-targeting is used for fraud detection, personalization, ad-targeting, content-delivery, and more.   In addition, the same basic concept is used […]

Read more

U.S. Cyber Command – Air Force Stumbles

Posted on 07/06/09 No Comments

Great and powerful organizations can be handicapped by their own greatness.   The shear magnificence, power and strength of the USAF also can be it’s own weakness at times.  This is certainly true in the area of communications, air power and cyberspace. The communications mission of the Air Force is highly interconnected with it’s core […]

Read more

Only Just Beginning: Twitter message could be cyber criminal at work

Posted on 07/05/09 No Comments

I have blogged (here and on the (ISC)2 blog) about potential security issues in the rising use and hyper marketing of Twitter, so I found this CNN story (which only scratches the surface of the risks) of interest, Twitter message could be cyber criminal at work. “Cyber criminals have been targeting Twitter users by creating […]

Read more

U.S. Cyber Command (USCYBERCOMM)

Posted on 06/25/09 No Comments

As someone who, as a consultant, proposed a Cyber Command for the USAF over a decade ago, it is good to see the DOD moving in that direction with the proposed US Cyber Command.    Cyberspace is a critical operational dimension. I first referred to this in a 1997 MILCOM paper co-authored with Lt. Col. […]

Read more

A Hidden Danger in Cloud Computing

Posted on 06/23/09 No Comments

Back in the days when I was happily spending time on the operations floor in computing centers, we always observed that the greatest security threats to our systems were well-intended operators who make simple mistakes.  No hacker or criminal ever brought down a network like the bored network guy on the late shift who decided […]

Read more

Processing Complex Events at the Large Hadron Collider (LHC)

Posted on 06/10/09 4 Comments

Here is an excellent Google TechTalk by Dr. Majorie Shapiro (LBL & LHC ATLAS), June 18, 2007, on processing complex events at the LHC called, Supersymmetry, Extra Dimensions and the Origin of Mass: Exploring the Nature of the Universe Using PetaScale Data Analysis. This is really what I would call “real-time CEP.”  Bean collisions at […]

Read more
Page 1 of 1212345»10...Last »