Fundamental building blocks of event processing There are seven fundamental building blocks of event processing. Some building blocks contain references to others. The event producer represents an application entity that emits events into the event processing networks (EPN) The event consumer is an application entity that receives events, Simply it consumes an event The event processing agent building block represents a piece of intermediary event processing ...

Switching Activities in Android (tutorial 03) New activity when the user clicks the button. Here I will improve last sample code 1. Create a new activity 2. You can see new UI for 2nd activity and then we change string value as below 3. In MainActivity.java we can added below line to switch activity. (there are few ways to achieve it, this only one way) 1 ...

Android Applications Development in 15min  (tutorial 02) Last Post (tutorial 01) was on Android Software Stack and Terminology[1]. This post will for beginner on Android applications, This post will teach you fast mobile application development from Android Developer Tools (ADT) are based on the Eclipse IDE. 1. Start ADT and then go file—> new –> Android Applications Project 2. Follow the wizard with give project name (other ...

Android Software Stack and Terminology (tutorial 01) Android system software full stack Android system software stack is typically divided into the four areas as following graphic Terminology Android Software Development Kit (Android SDK) contains the necessary tools to create, compile and package Android applications Android debug bridge (adb), which is a tool that allows you to connect to a virtual or real Android device Google provides two ...

Anomaly Detection : A Survey This post is summary of the “Anomaly Detection : A Survey”. Anomaly detection refers to the problem of finding patterns in data that do not conform to expected behavior. These non-conforming patterns are often referred to as anomalies, outliers, discordant observations, exceptions, aberrations, surprises, peculiarities or contaminants in different application domains. Anomalies are patterns in data that do not conform ...

Using Hardware Devices to Run Android App from IDE in Windows 8 Post describes how to set up your development environment and Android-powered device for testing and debugging on the device. I am using windows 8 for this post and device is GT-S7582 1. Enable USB debugging on your device.On Android 3.2 or older, you can find the option under Settings > Applications > DevelopmentOn Android 4.0 and newer, it's in Settings ...

Event-based programming This post look on how applications components typically interact. Event-based programming, also called event-driven architecture (EDA) is an architectural style in which one or more components in a software system execute in response to receiving one or more event notifications. 1. Request-response interactions Client formulate a request, It is sent across the internet to a web server. Client wait while ...

Today we can find number of styles of event processing languages in used. Rule-oriented languages that use production rules Rule-oriented languages that use active rules Rule-oriented languages that use logic rules Imperative programming languages Stream-oriented languages that are extensions of SQL Other stream-oriented languages Now we will categorized existing CEP products or engines in to above list Language style Language ...

Weka with Associations 1. Open data file (supermarket) 2. In our data we can find 217 attribute and 4,627 Instance means transactions. 3. Here I am investigate data with Weka view There is no much mean of department attribute since we looking items that is purchased. As you can see, it is big data set; 4627 * 217 = It is big data ...

Introduction to event processing Last week post was on 'Major Areas of Event Processing' and this post will continue which was there. This post describe the concepts be hide event processing and it can be consider as entry point for event processing concepts. Event What is event? An event is an occurrence within a particular system or domain; it is something that has happened, ...

WSO2 CEP  - Samples Download wso2 CEP version that you need to try out. http://wso2.com/more-downloads/complex-event-processor/Here I will be using wso2cep-3.1.0 CEP sample one 0001 This sample demonstrates how to filter incoming event attributes and add them to another stream using simple pass-through with WSO2Event adaptor. There is no Siddhi query. It is simple pass through. 1. Start CEP with sample by command of ‘wso2cep-samples.bat ...

Markov Models and Hidden Markov Models In this post will give introduction to Markov models and Hidden Markov models as mathematical abstractions, with some examples. In probability theory, a Markov model is a stochastic model that assumes the Markov property. A stochastic model models a process where the state depends on previous states in a non-deterministic way. A stochastic process has the Markov property if the ...

This post will look on how event processing was changing over the time. In there we can find four major areas of event processing. 'Event' concepts can be found in old operating systems of the late 1950’s. But not the event processing Here is four major area[4] Discrete event simulation Computer networks Active databases Middleware Discrete event Event Processing began ...

The Hype Cycle The Hype Cycle is a branded graphical representation tool [1] developed and used by IT research and advisory firm Gartner for representing the maturity, adoption and social application of specific technologies and how they are potentially relevant to solving real business problems and exploiting new opportunities. It gives a view of how a technology or application will evolve over time. ...

City of Babel and Complex Event Processing City of Babel is recorded in Genesis[1], Everyone on earth spoke the same language. As people migrated from the east, they settled in the land of Shinar(Mesopotamia). People there attempt to make bricks and build a city and a tower with its top in the sky, so that they not be scattered over the world. God came down to ...

Machine learning is sub set of artificial intelligence and it is study of systems that can learn from data. A machine learning system could be trained. Core of machine learning deals with representation and generalization. Machine learning is a "Field of study that gives computers the ability to learn without being explicitly programmed". A core objective of a learner is ...

WSO2 greg/product with IBM DB2 Here I am connecting IBM DB2 database Looking our privileges. Filtering user/group level Via our client [NOTE] Following statement retrieves all authorization names with privileges.SELECT DISTINCT GRANTEE, GRANTEETYPE, 'DATABASE' FROM SYSCAT.DBAUTH UNION SELECT DISTINCT GRANTEE, GRANTEETYPE, 'TABLE ' FROM SYSCAT.TABAUTH UNION SELECT DISTINCT GRANTEE, GRANTEETYPE, 'PACKAGE ' FROM SYSCAT.PACKAGEAUTH UNION SELECT DISTINCT GRANTEE, GRANTEETYPE, 'INDEX ' FROM SYSCAT.INDEXAUTH UNION SELECT ...

DB2 database and User Privileges IBM DB2 is a family of database server products developed by IBM. Here I was connecting DB2 and WSO2 products. Here I am show creating user and granting privilages for DB2 user. Here I have two user one is 'madhuka' and and second user is 'db2test1'. Madhuka have all the right (admin). db2test1 is standard user. I have db2 database ...

Real time event tracking in Gmail This really powerful feature and it work properly and nicely in Gmail As some one try to access my gamil account and gmail event track notice it as unusual activity and block it. And it send me sms same time It is realy time event monitor and it have block that use by accessing my my gmail Then I login ...

Previous Page