Event-Driven Architecture: How SOA Enables the Real-Time Enterprise, 1st edition

Published by Addison-Wesley Professional (February 17, 2009) © 2009

  • Hugh Taylor
  • Angela Yochem
  • Les Phillips
  • Frank Martinez
Products list

Details

  • A print text
  • Free shipping
  • Also available for purchase as an ebook from all major ebook resellers, including InformIT.com

This product is expected to ship within 3-6 business days for US and 5-10 business days for Canadian customers.

This edition of Robert Sedgewick and Kevin Wayne's Algorithms is one of the most popular textbooks on algorithms today and is widely used in colleges and universities worldwide. The algorithms in this book — including 50 algorithms every programmer should know — represent a body of knowledge developed over the last 50 years that has become indispensable, not just for professional programmers and computer science students but for any student with interests in science, mathematics, and engineering and for students who use computation in the liberal arts. In this edition, new Java implementations are written in an accessible modular programming style, where all of the code is exposed to the reader and ready to use.
THE LECTURE SERIES: There are 24 lecture videos that will be streamed on the Informit.com site; each lecture is approximately 60 to 75 minutes in length and focuses on a specific topic related to the Algorithms book. The lecture videos introduce viewers to fundamental data types, algorithms, and data structures, with emphasis on applications and scientific performance analysis of Java implementations. They also cover graph-processing algorithms, including minimum spanning tree and shortest paths algorithms, and string processing algorithms, including string sorts, tries, substring search, regular expressions, and data compression, and concludes with an overview placing the contents of the course in a larger context.
The first 12 lecture videos cover elementary data structures, sorting, and searching. Topics covered in these videos include union-find, binary search, stacks, queues, bags, insertion sort, selection sort, shellsort, quicksort, 3-way quicksort, mergesort, heapsort, binary heaps, binary search trees, red-black trees, separate chaining and linear probing hash tables, Graham scan, and id-trees. Lecture videos 13 through 24 focus on graph and string-processing algorithms.

Topics covered in these lecture videos include depth-first search, breadth-first search, topological sort, Kosaraju-Sharir, Kruskal, Prim, Dijkistra, Bellman-Ford, Ford-Fulkerson, LSD radix sort, MSD radix sort, 3-way radix quicksort, multiway tries, ternary search tries, Knuth-Morris-Pratt, Boyer-Moore, Rabin-Karp, regular expression matching, run-length coding, Huffman coding, LZW compression, and the Burrows-Wheeler transform.

Foreword xi

Preface xii

Introduction 1

Event-Driven Architecture: A Working Definition 1

The “New” Era of Interoperability Dawns 6

The ETA for Your EDA 9

Endnotes 9

PART I THE THEORY OF EDA

Chapter 1 EDA: Opportunities and Obstacles 13

The Vortex 13

EDA: A Working Systemic Definition 14

The (Not So Smooth) Path to EDA 24

Defining Interoperability 26

Drivers of Interoperability 28

Application Integration: A Means to Interoperate 29

Interoperation and Business Process Management 31

Is There a Diet for All This Spaghetti? 35

How Architecture Promotes Integration 37

Management and Governance 39

Chapter Summary 43

Endnote 45

Chapter 2 SOA: The Building Blocks of EDA 47

Making You an Offer You Can’t Understand 47

SOA: The Big Picture 48

Defining Service 49

Service-Based Integration 50

Web Services 51

What Is SOA? 59

Loose Coupling in the SOA 60

Chapter Summary 61

Chapter 3 Characteristics of EDA 63

Firing Up the Corporate Neurons 63

Revisiting the Enterprise Nervous System 63

The Ideal EDA 78

BAM--A Related Concept 86

Chapter Summary 87

Endnotes 89

Chapter 4 The Potential of EDA 91

Introduction 91

EDA’s Potential in Enterprise Computing 91

EDA and Enterprise Agility 100

EDA and Society’s Computing Needs 102

EDA and Compliance 107

Chapter Summary 108

Chapter 5 The SOA-EDA Connection 111

Getting Real 111

Event Services 112

The Service Network 114

Implementing the SOA and Service Network 116

How to Design an SOA 122

The Real “Bottom Line” 134

Chapter Summary 137

PART II EDA IN PRACTICE

Chapter 6 Thinking EDA 141

A Novel Mind-Set 141

Reducing Central Control 142

Thinking about EDA Implementation 148

When EDA Is Not the Answer 151

An EDA Product Examined 153

Chapter Summary 157

Endnotes 158

Chapter 7 Case Study: Airline Flight Control 159

Learning Objectives 160

Business Context: Airline Crunch Time 160

The Ideal Airline Flight Control EDA 167

What FEDA Might Look Like in Real Life 176

Program Success 197

Chapter Summary 206

Endnotes 207

Chapter 8 Case Study: Anti-Money Laundering 209

Learning Objectives 210

Cracking a Trillion Dollar, Global Crime Wave 210

IT Aspects of Anti-Money Laundering 216

EDA as a Weapon in the War on Money Laundering 221

Chapter Summary 259

Endnotes 260

Chapter 9 Case Study: Event-Driven Productivity Infrastructure 261

Learning Objectives 262

The Often Inadequate Human Link in the EDA 262

Overview of Productivity Infrastructure 264

The Potential Benefits of EDA-PI Integration 267

ProdCo, an EDA-PI Integration Scenario 273

Chapter Summary 293

Endnotes 294

Need help? Get in touch