Real-time business event analysis and monitoring

ABSTRACT

Techniques for managing real-time business event analysis and monitoring are provided. In some examples, a logical request may be received at a business intelligence server configured with a continuous query service. Additionally, the continuous query service may be configured to translate the logical request into a physical request. Further, business intelligence information may be provided based at least in part on querying against an event data stream with a continuous query configured based at least in part on the physical request translated by the continuous query service.

CROSS REFERENCES TO RELATED APPLICATIONS

The present application is a non-provisional of and claims the benefit and priority under 35 U.S.C. 119(e) of U.S. Provisional Application No. 61/707,641 filed Sep. 28, 2012 entitled REAL-TIME BUSINESS EVENT ANALYSIS AND MONITORING, the entire contents of which are incorporated herein by reference for all purposes. This application is also related to application Ser. No. ______, filed on the same day herewith, Attorney Docket No. 88325-859815 entitled “MANAGING RISK WITH CONTINUOUS QUERIES,” the entire contents of which is hereby incorporated by reference as if fully set forth herein, under 35 U.S.C. §120.

BACKGROUND

In traditional database systems, data is stored in one or more databases usually in the form of tables. The stored data is then queried and manipulated using a data management language such as a structured query language (SQL). For example, a SQL query may be defined and executed to identify relevant data from the data stored in the database. A SQL query is thus executed on a finite set of data stored in the database. Further, when a SQL query is executed, it is executed once on the finite data set and produces a finite static result. Databases are thus best equipped to run queries over finite stored data sets.

A number of modern applications and systems however generate data in the form of continuous data or event streams instead of a finite data set. Examples of such applications include but are not limited to sensor data applications, financial tickers, network performance measuring tools (e.g. network monitoring and traffic management applications), clickstream analysis tools, automobile traffic monitoring, and the like. Such applications have given rise to a need for a new breed of applications that can process the data streams. For example, a temperature sensor may be configured to send out temperature readings.

Managing and processing data for these types of event stream-based applications involves building data management and querying capabilities with a strong temporal focus. A different kind of querying mechanism is needed that comprises long-running queries over continuous unbounded sets of data. While some vendors now offer product suites geared towards event streams processing, these product offerings still lack the processing flexibility required for handling today's events processing needs.

BRIEF SUMMARY

Methods and systems associated with real-time business event analysis and monitoring may be provided. In some examples, a system may be provided, the system may include memory storing instructions and/or processors configured to access the memory and execute the instructions to at least receive, at a business intelligence server configured with a continuous query service, a logical request. The system may also execute the instructions to translate, by the continuous query service, the logical request into a physical request. Additionally, in some examples, the system may execute the instructions to provide business intelligence information based at least in part querying against an event data stream with a continuous query configured based at least in part on the physical request translated by the continuous query service. Further, the system may also be configured to execute the instructions to implement a continuous query engine as part of the continuous query service. In some aspects, the continuous query engine may be configured to receive data of the event data stream from the business intelligence server. The continuous query engine may also be configured to provide results to an event sink associated with the business intelligence server.

Additionally, in some examples, the business intelligence server may be configured to manage business intelligence data associated with one or more users. The business intelligence information may include at least one of a result of the continuous query or an alert configured to identify the result of the continuous query. Further, in some examples, the business intelligence information may be provided to the one or more users via a graphical user interface. In some aspects, the logical request may include at least a tactical query generated based at least in part on a request from a user for the business intelligence information. Additionally, the tactical query may be received by the continuous query service from a logical business model of the business intelligence server. Further, in some examples, the translation of the physical request may include generation of at least the continuous query.

Additionally, in some examples, a computer-readable memory may be provided. The memory may be configured to store instructions that cause one or more processors to receive, by a continuous query service, a tactical query from a business intelligence server, the tactical query configured based at least in part on a logical request for event data. The instructions may also cause the processors to generate, by the continuous query service, a continuous query configured to query against a stream of the event data, the continuous query based at least in part on the tactical query. Additionally, in some examples, the instructions may cause the processors to query the stream of event data with the continuous query. In some aspects, the instructions may also cause the processors to provide results of the continuous query to an event sink of the business intelligence server. Further, in some examples, the instructions may cause the one or more processors to provide information of the event sink to a dashboard for visualization of the event data based at least in part on the logical request. The logical request may be received by the business intelligence server as a logical statement configured to identify the events. The instructions may also cause the one or more processors to enable output of the continuous query to be stored in an output table, wherein an alert is provided based at least in part on the output table. In some aspects, the plurality of instructions may also include instructions that cause the one or more processors to provide a signal to the dashboard that the output of the continuous query has accumulated in the output table and/or enable the dashboard to perform a tactical query to refresh the dashboard with the output accumulated in the output table. Further, in some aspects, the plurality of instructions may also include instructions that cause the one or more processors to push contents of the event sink to the dashboard and/or enable the dashboard to incrementally update a view of the dashboard based at least in part on the pushed contents of the event sink.

Further, in some examples, a computer-implemented method may be provided. The method may be configured to implement, by a business intelligence server, a continuous query service. Additionally, the method may be configured to receive, by the continuous query service, a tactical query from the business intelligence server, the tactical query configured based at least in part on a logical request of a user. The method may also be configured to generate, by the continuous query service, a continuous query configured to query against a stream of event data associated with the user based at least in part on the tactical query. Additionally, in some aspects, the method may be configured to implement at least one event sink configured to receive results of the continuous query. The method may also be configured to implement a continuous query engine configured to process the event data by utilizing the continuous query. The method may also be configured to enable the continuous query engine to push output of the continuous query to the at least one event sink. The method may also be configured to provide an alert to the user based at least in part on the output of the continuous query. Additionally, in some aspects, the method may also be configured to enable the output of the continuous query to be stored in an output table, wherein the alert is provided to the user based at least in part on the output table. The output table may be configured to accumulate at least one of an insert or a delete output received from the continuous query service. The method may also be configured to provide a signal to a dashboard of the user that the output has accumulated in the output table and/or enable the dashboard to perform a tactical query to refresh the dashboard with the output accumulated in the output table. Further, the method may be configured to push contents of the at least one event sink to a dashboard of the user and/or enable the dashboard of the user to incrementally update a view of the dashboard based at least in part on the pushed contents of the at least one event sink.

The foregoing, together with other features and embodiments, will become more apparent upon referring to the following specification, claims, and accompanying drawings.

BRIEF DESCRIPTION OF THE DRAWINGS

The detailed description is set forth with reference to the accompanying figures. In the figures, the left-most digit(s) of a reference number identifies the FIG. in which the reference number first appears. The use of the same reference numbers in different FIGS. indicates similar or identical items.

FIG. 1 is a simplified block diagram illustrating an example architecture for implementing techniques for managing real-time business event analysis and monitoring and/or techniques for managing risk with continuous queries, according to at least one example.

FIG. 2 is a simplified block diagram illustrating at least some features of the techniques for managing real-time business event analysis and monitoring described herein, according to at least one example.

FIG. 3 is another simplified block diagram illustrating at least some features of the techniques for managing real-time business event analysis and monitoring described herein, according to at least one example.

FIG. 4 is a simplified block diagram illustrating at least some features of the techniques for managing risk with continuous queries described herein, according to at least one example.

FIG. 5 is a simplified process flow illustrating at least some features of the management of real-time business event analysis and monitoring techniques described herein, according to at least one example.

FIG. 6 is another simplified process flow illustrating at least some features of the management of real-time business event analysis and monitoring techniques described herein, according to at least one example.

FIG. 7 is a simplified process flow illustrating at least some features of the techniques for managing risk with continuous queries described herein, according to at least one example.

FIG. 8 is another simplified process flow illustrating at least some features of the techniques for managing risk with continuous queries described herein, according to at least one example.

FIG. 9 is another simplified process flow illustrating at least some features of the techniques for managing risk with continuous queries described herein, according to at least one example.

FIG. 10 is a simplified block diagram illustrating components of a system environment that may be used in accordance with an embodiment of the techniques for managing real-time business event analysis and monitoring and/or techniques for managing risk with continuous queries described herein, according to at least one example.

FIG. 11 is a simplified block diagram illustrating a computer system that may be used in accordance with embodiments of the techniques for managing real-time business event analysis and monitoring and/or techniques for managing risk with continuous queries described herein, according to at least one example.

DETAILED DESCRIPTION

In the following description, various embodiments will be described. For purposes of explanation, specific configurations and details are set forth in order to provide a thorough understanding of the embodiments. However, it will also be apparent to one skilled in the art that the embodiments may be practiced without the specific details. Furthermore, well-known features may be omitted or simplified in order not to obscure the embodiment being described.

In some examples, mechanisms to support a continuous query service (CQ Service) for implementing continuous query language (CQL) queries (also referred to as “query statements”) within a Business Intelligence (BI) server or other server configured to manage historical data and/or tactical queries may be provided. For example, in some scenarios, a complex event processor (CEP) may manage BI data of a user via a BI server. However, in order to manage and/or analyze real-time event streams, a CQ Service may be utilized. The CQ Service may then delegate some real-time services to a CQ engine or other software module capable of processing in-flight data. In some aspects, the BI server may receive requests from users in logical form and may be configured to translate those logical requests into physical requests. Additionally, in some examples, mechanisms to support analyzing and/or visualizing key performance indicators (KPIs) and associated risk indicators, in real-time, may be provided. For example, a KPI dashboard may include real-time KPI data obtained via one or more CQL queries and may also include real-time risk indicators that allow for visualization of real-time changes in the data that may affect the KPIs in the future. The risk indicators may be provided by users and/or generated automatically based at least in part on the KPI information.

A continuous data stream (also referred to as an event stream) may include a stream of data or events that may be continuous or unbounded in nature with no explicit end. Logically, an event or data stream may be a sequence of data elements (also referred to as events), each data element having an associated timestamp. A continuous event stream may be logically represented as a bag or set of elements (s, T), where “s” represents the data portion, and “T” is in the time domain. The “s” portion is generally referred to as a tuple or event. An event stream may thus be a sequence of time-stamped tuples or events.

In some aspects, the timestamps associated with events in a stream may equate to a clock time. In other examples, however, the time associated with events in an event stream may be defined by the application domain and may not correspond to clock time but may, for example, be represented by sequence numbers instead. Accordingly, the time information associated with an event in an event stream may be represented by a number, a timestamp, or any other information that represents a notion of time. For a system receiving an input event stream, the events arrive at the system in the order of increasing timestamps. There could be more than one event with the same timestamp.

In some examples, an event in an event stream may represent an occurrence of some worldly event (e.g., when a temperature sensor changed value to a new value, when the price of a stock symbol changed) and the time information associated with the event may indicate when the worldly event represented by the data stream event occurred.

For events received via an event stream, the time information associated with an event may be used to ensure that the events in the event stream arrive in the order of increasing timestamp values. This may enable events received in the event stream to be ordered based upon their associated time information. In order to enable this ordering, timestamps may be associated with events in an event stream in a non-decreasing manner such that a later-generated event has a later timestamp than an earlier-generated event. As another example, if sequence numbers are being used as time information, then the sequence number associated with a later-generated event may be greater than the sequence number associated with an earlier-generated event. In some examples, multiple events may be associated with the same timestamp or sequence number, for example, when the worldly events represented by the data stream events occur at the same time. Events belonging to the same event stream may generally be processed in the order imposed on the events by the associated time information, with earlier events being processed prior to later events.

The time information (e.g., timestamps) associated with an event in an event stream may be set by the source of the stream or alternatively may be set by the system receiving the stream. For example, in certain embodiments, a heartbeat may be maintained on a system receiving an event stream, and the time associated with an event may be based upon a time of arrival of the event at the system as measured by the heartbeat. It is possible for two events in an event stream to have the same time information. It is to be noted that while timestamp ordering requirement is specific to one event stream, events of different streams could be arbitrarily interleaved.

An event stream has an associated schema “S,” the schema comprising time information and a set of one or more named attributes. All events that belong to a particular event stream conform to the schema associated with that particular event stream. Accordingly, for an event stream (s, T), the event stream may have a schema ‘S’ as (<time_stamp>, <attribute(s)>), where <attributes> represents the data portion of the schema and can comprise one or more attributes. For example, the schema for a stock ticker event stream may comprise attributes <stock symbol>, and <stock price>. Each event received via such a stream will have a time stamp and the two attributes. For example, the stock ticker event stream may receive the following events and associated timestamps:

... (<timestamp_N>, <NVDA,4>) (<timestamp_N+1>, <ORCL,62>) (<timestamp_N+2>, <PCAR,38>) (<timestamp_N+3>, <SPOT,53>) (<timestamp_N+4>, <PDCO,44>) (<timestamp_N+5>, <PTEN,50>) ... In the above stream, for stream element (<timestamp_N+1>, <ORCL,62>), the event is <ORCL,62> with attributes “stock_symbol” and “stock_value.” The timestamp associated with the stream element is “timestamp_N+1”. A continuous event stream is thus a flow of events, each event having the same series of attributes.

As noted above, a stream may be the principle source of data that CQL queries may act on. Additionally, as noted, a stream S may be a bag (also referred to as a “multi-set”) of elements (s, T), where “s” is in the schema of S and “T” is in the time domain. Additionally, stream elements may be tuple-timestamp pairs, which can be represented as a sequence of timestamped tuple insertions. In other words, a stream may be a sequence of timestamped tuples. In some cases, there may be more than one tuple with the same timestamp. And, the tuples of an input stream may be requested to arrive at the system in order of increasing timestamps. Alternatively, a relation (also referred to as a “time varying relation,” and not to be confused with “relational data,” which may include data from a relational database) may be a mapping from the time domain to an unbounded bag of tuples of the schema R. In some examples, a relation may be an unordered, time-varying bag of tuples (i.e., an instantaneous relation). In some cases, at each instance of time, a relation may be a bounded set. It can also be represented as a sequence of timestamped tuples that may include insertions, deletes, and/or updates to capture the changing state of the relation. Similar to streams, a relation may have a fixed schema to which each tuple of the relation may conform. Further, as used herein, a continuous query may generally be capable of processing data of (i.e., queried against) a stream and/or a relation. Additionally, the relation may reference data of the stream.

In some examples, BI may help drive and optimize business operations at particular intervals (e.g., on a daily basis in some cases). This type of BI is usually called operational business intelligence, real-time business intelligence, or operational intelligence (OI). Operational Intelligence, in some examples, blurs the line between BI and business activity monitoring (BAM). For example, BI may be focused on periodic queries of historic data. As such, it may have a backward-looking focus. However, BI may also be placed into operational applications, and it may therefor expand from a mere strategic analytical tool into the front lines in business operations. As such, BI systems may also be configured to analyze event streams and compute aggregates in real time.

In some examples, a continuous query language service CQ Service may be configured to extend a BI analytics server to handle continuous queries and enable real-time alerts. The CQ Service, in some aspects, may provide integration with a BI analytics server and a CQL engine. By way of example only, a BI analytics server may delegate continuous queries to the CQ Service and the CQ Service may also act as a logical database (DB) gateway for a CQL engine. In this way, the CQL engine may be able to leverage the BI analytics server for its analytics capabilities and semantic modeling.

In some examples, the CQ Service may provide, among other things, the following functionalities:

-   -   Remoting service for BI Analytics Server as CQL engine Gateway;     -   Event source/sink adapter;     -   Generate data definition languages (DDLs) from logical SQL plus         CQL extensions;     -   Provide unified model for all types of continuous queries and         implementation selections;     -   Maintain metadata and support restartability; and     -   High availability and scalability support.

Additionally, in some examples, OI is a form of real-time dynamic, business analytics that can deliver visibility and insight into business operations. OI is often linked to or compared with BI or real-time BI, in the sense that both help make sense out of large amounts of information. But there are some basic differences: OI may be primarily activity-centric, whereas BI may be primarily data-centric. Additionally, OI may be more appropriate for detecting and responding to a developing situation (e.g., trend and pattern), unlike BI which may traditionally be used as an after-the-fact and report-based approach to identifying patterns.

In some examples, a business event analysis and monitoring (BEAM) system may include a CQL engine to process and/or receive in-flight data. For example, a CQL engine may be an in-memory database engine configured to query or otherwise process incoming real-time information (e.g., BI or OI). The CQL engine may utilize or understand temporal semantics and be configured to allow definition of a window of data to process. Utilizing a CQL engine may, in some cases, involve always running a query on incoming data.

In some aspects, the CQL engine may include a full blown query language. As such, a user may specify computations in terms of a query. Additionally, the CQL engine may be designed for optimizing memory, utilizing query language features, operator sharing, rich pattern matching, rich language constructs, etc. Additionally, in some examples, the CQL engine may process both historical data and streaming data. For example, a user can set a query to send an alert when California sales hit above a certain target. Thus, in some examples, the alert may be based at least in part on historical sales data as well as incoming live (i.e., real-time) sales data.

In some examples, the CQL engine or other features of the below described concepts may be configured to combine a historical context (i.e., warehouse data) with incoming data in a real-time fashion. Thus, in some cases, the present disclosure may describe the boundary of database stored information and in-flight information. Both the database stored information and the inflight information may include BI data. As such, the database may, in some examples, be a BI server or it may be any type of database. Further, in some examples, the features of the present disclosure may enable the implementation of the above features without users knowing how to program or otherwise write code. In other words, the features may be provided in a feature-rich user interface (UI) or other manner that allows non-developers to implement the combination of historical data with real-time data.

Additionally, in some examples, the present disclosure may describe dashboard customization and/or personalization. A CEP engine may be configured to include advanced, continuous analysis of real-time information and historical data. Business process models (BPMs) may include performing model-driven execution of policies and processes defined as BPM notation (BPMN) models. Key result indicators (KRI) may be utilized to tell a user how they have done in a perspective or critical success factor (CSF). For example, it may provide results for many actions, it may cover a longer period of time than key performance indicators (KPIs), and/or it may be reviewed on monthly or quarterly periods. Result indicators (RIs) may be utilized to tell a user what they have done. For example, it may summarize activity, and financial performance measure and/or it may update daily, weekly, or monthly. Further, in some aspects, performance indicators (PIs) may be utilized to inform a user what actions to take or at least make recommendations. Additionally, it may include non-financial information and may, in some cases, complement the KPI.

In some aspects, PI may be reviewed 24/7, daily, weekly, or less regularly. In some cases, KPI may include a set of measures that are most critical for the current and future success of an organization. Some KPIs may be updated daily or even 24/7 while the rest of the information may be reported weekly. Examples of KPI notifications may include, but are not limited to, whether a plane or other service vehicle was delayed or whether a trailer has been sent out underweight the previous day for a distribution company (e.g., to discover better utilization of the trucks).

In some examples, embodiments for managing real-time business events may include integrating (e.g., seamlessly) business activity monitoring, complex event processing, and business intelligence to provide a complex, and real-time set of operational information. Additionally, continuous monitoring of business events may be utilized to gain real-time visibility of business processes and/or workflows. In some examples, OI may be supplemented with traditional business intelligence. As such, operational intelligence may give more insight into business operations versus BI, which, as noted above, is more data centric. For example, OI may get inside to determine how a business is doing in a real-time fashion. Whereas BI may be more akin to data warehousing (e.g., indicating information after the fact).

Examples of KPI may include real-time call processing time. For example, a user may set real time KPI to be 15 minutes, versus weeks or days. As such, users may be enabled to take actions right away. Further, by coupling historical (data centric) information from BI warehouses with current real-time data, users may be able to view how a business is running in the current state (including continuously updated, streaming data). In some examples, advanced continuous analysis of real-time information may be included in the data processing. Additionally, incremental computations may be performed and included in displays, visualizations, user interfaces (UIs), etc.

In some examples, features of the present disclosure may allow business users to design and view performance dashboards based on business data sourced from a heterogeneous environment. In some aspects, a metric may be a measurement of business activity, such as “number of calls,” “number of dropped calls,” “average call processing time.” A business goal may be a measure of the desired outcome of a business strategy. A metric that measures business activity against a goal may be called a key performance indicator (KPI).

There may be two major types of KPIs: outcome metrics and driver metrics. Outcome metrics (also referred to as “lagging indicators”) may measure the output of business activity that a strategy is designed to achieve (e.g. return rate per month). Driver metrics (also referred to as “leading indicators”) may measure business activity that influences the results of the outcome business indicators. A KPI can be used to monitor specific aspects of the business and can be designed to trigger a chain reaction of process improvements throughout the organization. In some cases, regression algorithms may be utilized to predict future outcomes based on the current level of activities so people can see if they are going to meet their goals.

Other metrics, such as activity metrics, may measure business activity related to performance indicators but may not have goals associated with them. For example, they may provide context around these performance indicators to make informed decisions (e.g. top 10 products, top 10 customers, etc.).

In some examples, a performance dashboard may display multiple attributes of a performance metric to give a user a comprehensive view of the system. In at least one performance indicator watch list, a name, trend, status (e.g. green, yellow, red with visual encoding), target value, actual value, and/or variance percentage may be provided. Further, risk indicators, unlike performance indicators, may measure the “at risk” level of a business operation. It may provide an early warning sign to identify events that may harm the existing processes. Risk indicators may also be customized and/or set by a user such that the user and/or an administrator may determine which risks should be monitored and/or analyzed. Risk indicators may also be generated automatically based at least in part on KPI information being monitored.

According to at least some features of the present disclosure, operational dashboards may be utilized to control operational activity and help ensure that processes stay within prescribed limits for productivity, quality, and/or efficiency. In some cases, operation staff may use the operational dashboards to monitor business events as they occur and the focus of operational dashboard may be to display what is happening now. The “detect-and-respond” dashboard may be common (e.g. call centers, logistics operations) and action oriented. This type of dashboard may also make heavy use of alerts to notify users about exceptions and/or conditions as they happen. Alerts can be used to send emails to one or more people but they can also show up on a dashboard via an icon next to the relevant metric. For example, an alert might detect that the number of inbound service calls for the last couple of hours has increased by 20 percent over an expected level. While sending out alerts, the system may also be able to provide a context for drilling down and correlating purposes. This functionality may be performed by a CQL server, engine, or service.

In one non-limiting example, the dashboard may display KPIs and risk indicators for call processing time (e.g., for a call center, etc.). For example a KPI may be at 100 and a target may be 200. Using these numbers, a simple comparison could indicate that the KPI is not yet close to meeting that target. However, if the trend indicates that the processing time has been increasing by 50%, 60%, etc., then it's possible that there may be a problem. Thus, the risk indicator may be a powerful tool for identifying issues before they occur. It lets one know how other business factors are likely to affect the KPI being monitored. For example, a call center may have a fixed capacity of a fixed number of employees available to take calls. But all of a sudden, on a particular day, a spike in incoming calls may occur. Thus, given your fixed resources there may to be a delay before those people can turn around and start on handling the calls. In this case, if the system notices, if a query monitors incoming calls in real-time (e.g., whether are they spiking up), a user may be able to identify that the spike in incoming calls may eventually affect call processing time.

Thus, in some examples, the system may allow users to associate these risk indicators with various KPIs. So, for a call processing time KPI, the trend of incoming calls may be monitored as the risk indicator. Further, a query could be designed to alert this KPI when spikes in incoming calls are identified. Because even though the current data may look acceptable, the real-time data (e.g., based on another indicator) may identify an issue. Other examples of risk indicators associated with KPIs may include, but are not limited to, dollar price of closed deals associated with a number of closed deals. For example, if the average dollar amount per deal is below some number or percentage, revenue goals may not be met even though the number of deals KPI does not indicate an issue.

Additionally, in some examples, business logic may be associated with each KPI. As such, the business logic may determine what is being measured, what the target value is, where the target is coming from, and/or what the risk indicators are. Additionally, as noted, each of these values may be configured by a user. The business logic and/or business event data may then be entered into a model and maintained in real-time. As such, KPI information may be lagging indicators, while the risk indicators may be leading indicators.

The techniques described above and below may be implemented in a number of ways and in a number of contexts. Several example implementations and contexts are provided with reference to the following figures, as described below in more detail. However, the following implementations and contexts are but a few of many.

FIG. 1 depicts a simplified example system or architecture 100 in which techniques for managing real-time business event analysis and monitoring and/or techniques for managing risk with continuous queries may be implemented. In architecture 100, one or more users 102 (e.g., account holders) may utilize user computing devices 104(1)-(N) (collectively, “user devices 104”) to access one or more service provider computers 106 via one or more networks 108. In some aspects, the service provider computers 106 may also be in communication with one or more streaming data source computers 110 and/or one or more databases 112 via the networks 108. For example, the users 102 may utilize the service provider computers 106 to access or otherwise manage data of the streaming data source computers 110 and/or the databases 112 (e.g., queries may be run against either or both of 110, 112). The databases 112 may be relational databases, SQL servers, or the like and may, in some examples, manage historical data, event data, relations, archived relations, or the like on behalf of the users 102. Additionally, the databases 112 may receive or otherwise store data provided by the streaming data source computers 110 (e.g., event streams). In some examples, the users 102 may utilize the user devices 104 to interact with the service provider computers 106 by providing queries (also referred to as “query statements”) or other requests (e.g., logical requests) for data (e.g., historical event data, streaming event data, etc.). Such queries or requests may then be executed by the service provider computers 106 to process data of the databases 112 and/or incoming data from the streaming data source computers 110. Further, in some examples, the streaming data source computers 110 and/or the databases 112 may be part of an integrated, distributed environment associated with the service provider computers 106.

In some examples, the networks 108 may include any one or a combination of multiple different types of networks, such as cable networks, the Internet, wireless networks, cellular networks, intranet systems, and/or other private and/or public networks. While the illustrated example represents the users 102 accessing the service provider computers 106 over the networks 108, the described techniques may equally apply in instances where the users 102 interact with one or more service provider computers 106 via the one or more user devices 104 over a landline phone, via a kiosk, or in any other manner. It is also noted that the described techniques may apply in other client/server arrangements (e.g., set-top boxes, etc.), as well as in non-client/server arrangements (e.g., locally stored applications, etc.).

The user devices 104 may be any type of computing device such as, but not limited to, a mobile phone, a smart phone, a personal digital assistant (PDA), a laptop computer, a desktop computer, a thin-client device, a tablet PC, etc. In some examples, the user devices 104 may be in communication with the service provider computers 106 via the networks 108, or via other network connections. Further, the user devices 104 may also be configured to provide one or more queries or query statements for requesting data of the databases 112 (or other data stores) to be processed.

In some aspects, the service provider computers 106 may also be any type of computing devices such as, but not limited to, mobile, desktop, thin-client, and/or cloud computing devices, such as servers. In some examples, the service provider computers 106 may be in communication with the user devices 104 via the networks 108, or via other network connections. The service provider computers 106 may include one or more servers, perhaps arranged in a cluster, as a server farm, or as individual servers not associated with one another. These servers may be configured to perform or otherwise host features described herein including, but not limited to, the techniques for managing real-time business event analysis and monitoring and/or techniques for managing risk with continuous queries described herein. Additionally, in some aspects, the service provider computers 106 may be configured as part of an integrated, distributed computing environment that includes the streaming data source computers 110 and/or the databases 112.

In one illustrative configuration, the service provider computers 106 may include at least one memory 136 and one or more processing units (or processor(s)) 138. The processor(s) 138 may be implemented as appropriate in hardware, computer-executable instructions, firmware, or combinations thereof. Computer-executable instruction or firmware implementations of the processor(s) 138 may include computer-executable or machine-executable instructions written in any suitable programming language to perform the various functions described.

The memory 136 may store program instructions that are loadable and executable on the processor(s) 138, as well as data generated during the execution of these programs. Depending on the configuration and type of service provider computers 106, the memory 136 may be volatile (such as random access memory (RAM)) and/or non-volatile (such as read-only memory (ROM), flash memory, etc.). The service provider computers 106 or servers may also include additional storage 140, which may include removable storage and/or non-removable storage. The additional storage 140 may include, but is not limited to, magnetic storage, optical disks, and/or tape storage. The disk drives and their associated computer-readable media may provide non-volatile storage of computer-readable instructions, data structures, program modules, and other data for the computing devices. In some implementations, the memory 136 may include multiple different types of memory, such as static random access memory (SRAM), dynamic random access memory (DRAM), or ROM.

The memory 136, the additional storage 140, both removable and non-removable, are all examples of computer-readable storage media. For example, computer-readable storage media may include volatile or non-volatile, removable or non-removable media implemented in any method or technology for storage of information such as computer-readable instructions, data structures, program modules, or other data. The memory 136 and the additional storage 140 are all examples of computer storage media.

The service provider computers 106 may also contain communications connection(s) 142 that allow the identity interface computers 120 to communicate with a stored database, another computing device or server, user terminals, and/or other devices on the networks 108. The service provider computers 106 may also include input/output (I/O) device(s) 144, such as a keyboard, a mouse, a pen, a voice input device, a touch input device, a display, one or more speakers, a printer, etc.

Turning to the contents of the memory 136 in more detail, the memory 136 may include an operating system 146 and one or more application programs or services for implementing the features disclosed herein including at least a CQ Service module 148 and/or a risk management module 149. As used herein, modules may refer to programming modules executed by servers or clusters of servers that are part of a service. In this particular context, the modules may be executed by the servers or clusters of servers that are part of the service provider computers 106. In some examples, the CQ Service module 148 may be configured to, receive, identify, generate, or otherwise provide one or more continuous queries within a BI server 150. In some examples, as noted above, the BI server 150 may include a CQ Service 152 configured to generate, manage, and/or implement the continuous queries via a CQL engine 154 or other event processing engine. In some instances, the CQ Service 152 may also include one or more event source adapters 156 and/or event sink adapters 158 for receiving and/or providing event data, respectively. In some examples, when historical KPI data is used, the historical BI logical query may run with a schedule and the result may get passed to the CQL engine 158 as a stream. In some cases, the continuous query may be given in a quoted string. Additionally, the query may be opaque to the CQ Service 150 so that the CQ Service 150 won't try to parse it itself.

Additionally, in some examples, the CQ Service 152 may a component for coordinating event processing components of the BI server 150 in a federated way. Also, in some cases, the CQ engine 154 may be configured to perform compensation and/or event processing components. Some event sources that may be in communication with the one or more event source adapters 156 may include, but are not limited to, service-oriented architecture (SOA) sources, business process management (BPM) sources, event detection and notification (EDN) sources, Java messaging service (JMS) sources, Java EE Connector Architecture (JCA) sources, database change data capture (CDC) sources, and/or inbound web services. Additionally, some event sinks that may be in communication with the one or more event sink adapters 158 may include, but are not limited to, Action framework, database Writebacks, CQ output tables, SOA sinks, EDN sinks, JMS sinks, JCA sinks, and/or compensation engines (e.g., another CQL engine).

Further, in some examples, some CQ Service 152 responsibilities may include, but are not limited to, translating logical requests (e.g., tactical queries) into physical requests (e.g., continuous queries) including event sources and sinks, determining function shipping/implementation based at least in part on the continuous query and capabilities of some components. Examples of capabilities to be determined may include: whether multiple event sources are involved, whether and/or how to implement compensating logic of the CQL engine 154, how to set up event sources (e.g., setting up GoldenGate through ODI-EE and then subscribing to a JMS topic and/or directly receiving change events from a persistence layer), how to set up the CQL engine 154 for or with compensating logic, whether and/or how to register appropriate DDLs, when and/or how to subscribe to output channels, event sink setup (e.g., setting up Action Framework and then a CQ output table, etc.), and/or mediating flow from an event source via processing to event sinks.

Utilizing an event model may also include having an event source/sink in a physical model that defines physical event source/sinks. For example, a data source may be an event source including the idea that event sources and/or sinks can be derived from the data source, data changes can become events, and/or change data captures may be set up. In some cases, logical event sources may define semantics, filters, and/or aggregations across streams. Presentation event sources may flatten event attributes and define which users can access and create which event sources. Additionally, semantic model mappings may include the idea that physical event models appear as streams and may define simple event streams; while logical event models may appear as views and/or queries and may define complex event streams (e.g., CQL logic). Example event models may include, but are not limited to, event attributes mapping and selection, aggregation across events, windowing, event filtering, pattern matching, etc.

Example physical events may include “call activity,” represented by CallActivity(centerID, callID, customerID, activity, time), in some examples. A physical data source may include “customer data,” represented by Customer(customerID, customerName), in some examples. For example, a logical event to physical CQL query translation may be implemented using the following statements:

-   -   CallInfoHour(centerId, Mild, customerId, customerName, time,         activity): join of CallActivity, Customer         -   Select c.centerId, c.callId, cu.customerId, cu.customerName,             c.time, c.activity from callActivity[range 1 hour] as c,             customerId         -   where c.customerId=cu.customerId     -   CallProcessingTimeHour(centerId, Mild, customerId, customerName,         long cpt): pattern         -   Select centerId, Mild, customerId, customerName,             (T.last-T.first) as cpt from callInfoHour         -   MATCH RECOGNIZE (         -   MEASURES B.time as first, E.time as last         -   PATTERN (B E)         -   DEFINE B as B.activity=‘OPEN’, E as E.activity=‘CLOSE’ or             E.activity=‘DROP’         -   as T     -   NormCallProcessingTimeDay(centerId, Mild, customerId,         customerName, long cpt): aggregation         -   Select Mild, customerId, customerName, avg(cpt) from             CallProcessingTimeDay group by centerId             Additionally, a KPI may be implemented using the following             statements:     -   AvgCallProcessingTimeHour(centerId, Mild, customerId,         customerName, long cpt): aggregation         -   Select Mild, customerId, customerName, avg(cpt) from             CallProcessingTimeHour group by centerId             And, an alert may be implemented as:     -   AlertAvgCallProcessingTimeHour(centerId, Mild, customerId,         customerName, long cpt)         -   Select a.centerId, a.callId, a.customerId, a.customerName,             a.cpt from AvgCallProcesingTimeHour as a,             NormCallProcessingTimeDay as n Where a.cpt>n.cpt

Further, in some examples, an output propagation model may include data from the CQ Service 152 being propagated up to a dashboard (e.g., a GUI) for real-time dashboard use cases. In some examples, a signal and pull model may be implemented that utilizes a CQ output table. In this example, the CQP outputs may be accumulated in the CQ output table and a signal may be provided to the dashboard (e.g., utilizing Action Framework or the like). Up receiving the signal, the dashboard may issue a one-time query to refresh its data. In some cases, the output table may accumulate insert and/or delete outputs from the CS Service 152. Alternatively, or in addition, an incremental push model (e.g., utilizing change data notifications) may be implemented. Instead of an output table, a CDN may contain the output data. This data may then be incrementally pushed to the dashboard utilizing Action Framework or the like. The dashboard may then update the view incrementally. Further, in some cases, relations may be mapped to streams and vice versa. Also, some part of a logical SQL execution plan may be delegated to the CQ Service 152 to leverage incremental aggregation or the like. Further, logic tables may also be utilized as an external relation within CQL.

Additionally, in some examples, the risk management module 149 may be configured to enable generation and/or visualization of KPI information 160 and/or risk indicator information 162 via a risk dashboard 164. For example, the risk dashboard 160 may be configured to provide static and/or active (e.g., real-time) visualizations of the KPI information 160 and/or the risk indicator information 162. As noted above, in some aspects, the risk dashboard 164, an associated CQ Engine, and/or an associated CQ Service may be configured to generate and/or implement one or more continuous queries for processing or otherwise receiving the KPI information 160. Additionally, in some aspects, the risk indicators 162 may be provided by the users 102 and/or generated automatically. Further, the risk indicator information 162 may be collected based at least in part on pre-existing queries that are applied upon request or the like.

A classification of some monitoring terms may be helpful for describing features of the risk management techniques including, “measure,” “aggregation,” “dimension,” “business indicator,” and “measurement.” In some examples, a “measure” may include, but is not limited to, an attribute which can be measured and compared and/or will be utilized to evaluate how well a business is doing (e.g., defect resolution time). An “aggregation” may define a calculation performed on the “measure” and/or used in evaluation (e.g., average, maximum, minimum, etc.). Additionally, a “dimension” may define, if an aggregation is defined, the group on which the aggregation function is evaluated (e.g., when an “aggregation” is defined as “average order amount per category,” the dimension may be “category”). In some examples, a “business indicator” may include, but is not limited to, attributes being utilized for analysis either as a “measure” or as a “dimension.” Further, a “measurement” may include, but is not limited to, the point where the analysis data is captured (i.e., a sampling point).

In at least one non-limiting “Call Center” use case there may be three regional call centers operational for a shift of eight hours. Additionally, a call center manager's (i.e., a user's 102) performance may be gauged by the processing time for the calls as well as efficiency of dealing with customer escalation. Also, in some cases, calls can be waiting in the following status: in queue, in process, escalated, awaiting approval, closed, and dropped (i.e. closed without any ownership). Further, calls may be routed to different call centers based on capacity and wait times. Once a call center employee takes ownership, they can (1) resolve the case (2) escalate it or (3) send a resolution for management approval. As such, at any time, the call center manager 102 may wish to see the following information on the risk dashboard 164: incoming calls in queue at each call center by HOUR for the last eight hours; calls broken down by PRODUCT, CUSTOMER STATUS, and/or PRIORITY; and/or calls awaiting manager approval. Accordingly, the call center manager 102 may create the following KPIs: Call Processing Time (e.g., end to end for call completion); Calls Wait Time (e.g., time taken to wait in the queue before ownership transferred to an employee); and/or Calls Dropped (e.g., calls in queue but dropped before taken ownership/or less than some short time—like 15 seconds, for example—on the call).

For the Call Processing Time KPI, a user 102 may be enabled to design a KPI to measure the average call processing time, by day or hour, and automatically alert when a discrete period is outside of the norm. Additionally, the user 102 may be enabled to filter by specific location and/or customer status for a specific timeframe (day, hour, etc.). The Call Processing Time KPI can be displayed as a Collapsed List view, Pie chart view (each pie slice representing a call processing time for a specific location or customer category) or as a time series Bar chart where each bar represents the average call processing time for a specific amount of time or the like. Further, this KPI may allow comparison against a historical timeframe.

For the Calls Wait Time KPI, a user 102 may be enabled to design a KPI to measure the average call waiting time, by day or hour, and automatically alert when a discrete period is outside of the defined threshold. Additionally, the user 102 to filter by specific location and/or customer status for a specific timeframe (day, hour, default, etc.). The Call Wait Time can be displayed as a Collapsed List view, Pie chart view (each pie slice represents a call processing time for a specific location or customer category) or as a time series Bar chart where each bar represents the average call processing time for a specific day or hour.

For the Calls Dropped KPI, a user 102 may be enabled to design a KPI to measure the count of dropped calls, by day or hour, and automatically alert when a discrete period is outside of the norm. Additionally, this KPI may allow the user 102 to filter by specific location and/or customer status for a specific timeframe (day, hour, default, etc.). Dropped Calls can be displayed as a Collapsed List view. Further, this KPI may be actionable. The user 102 can configure specific actions to be invoked when a KPI is at risk or if a KPI violation occurs. Examples of actions include sending a customized email message, invoking a BPM taskflow, sending a customized text message (e.g., via SMS or MMS), and/or alerting the user 102 in any other known way.

In some examples, the user 102 may be able to create, edit, and/or save a real-time KPI utilizing a UI and/or one or more APIs of the risk management module 149. The user 102 may be able to select a data object, a data object column, and/or measure function for the real-time KPI. The user 102 can optionally specify a rolling window and update interval parameters function for the real-time KPI. The user 102 can optionally specify a description for the KPI measure function for the real-time KPI. The user 102 may also be able to specify a constant or historical threshold. For a constant threshold, the user 102 may be able to specify a constant threshold value for the real-time KPI. The user 102 may be able to specify a Constant, Percentage, and/or Standard Deviation range function for the real-time KPI. The user 102 can optionally configure the range boundaries for High, Medium, and Low ranges and optionally configure Alert Actions for each range function for the real-time KPI. Further, the user 102 can optionally specify a description for the KPI threshold function for the real-time KPI.

Additionally, in some aspects, the user 102 can optionally set a risk indicator by selecting a qualifying and/or pre-existing CQL query function for the real-time KPI. The user 102 can optionally specify a description for the KPI risk indicator function for the real-time KPI. The user 102 may also be able to create, edit, and/or save a tactical KPI using the UI (e.g., the risk dashboard 164) and/or one or more APIs of the risk management module 149. The user 102 may be able to select a group business query and assign it to a tactical KPI. The user 102 may be able to specify a refresh schedule for the tactical KPI. The user 102 can optionally specify a description for the KPI measure function for the real-time KPI. The user 102 may also be able to specify a constant threshold. For the constant threshold, the user 102 may be able to specify a constant threshold value for the tactical KPI. The user 102 may be able to specify a Constant, Percentage, and/or Standard Deviation range function for the tactical KPI. The user 102 can optionally configure the range boundaries for High, Medium, and Low ranges and optionally configure Alert Actions for each range function for the tactical KPI. The user 102 can optionally specify a description for the KPI threshold function for the tactical KPI. The user 102 may be able to create a KPI watch list business view. Further, the user 102 may be able to add the real-time KPIs to a KPI watch list.

In some examples, the risk management module 149 will support KPI as a first-class object. Business users 102 can create KPIs using the risk dashboard 164 (or other UI) and/or one or more APIs of the risk management module 149. KPIs can be bound to visualizations of the risk management module 149 such as, but not limited to, a KPI watch list and/or the risk dashboard 164. In some cases, the risk management module 149 will support two types of KPIs:

-   -   Real-time KPIs: Real-time KPIs may be monitored in real-time.         This type of KPI may be modeled using a real-time CQL query. The         risk management module 149 may be configured to maintain and         monitor this KPI in real-time. A real-time KPI can have a Risk         Indicator associated with it to monitor the risk level of that         KPI in real-time. Examples of real-time KPIs are count of         dropped calls, average hold time for Platinum customers etc.     -   Tactical KPIs: Tactical KPIs may be monitored at scheduled         intervals which are specified by the business user (in some         examples, only at scheduled intervals). This type of KPI may be         defined using a SQL query that runs at specified intervals, e.g.         every 24 hours, once a month etc. Tactical KPIs may be used to         help users 102 track the progress of business goals. Examples of         tactical KPIs are daily count of failed BPM workflow processes,         monthly totals of completed sales deals, etc.

For a real-time KPIs, the risk management module 149 may be configured to generate and maintain the following queries:

(1) KPI Measure Query. In some examples, the KPI measure query may be generated based at least in part on a KPI data object, a selected data object column, an aggregation function, and/or sliding window parameters. For example, a business user seeking to design a KPI for monitoring average call processing times may select the measure data object, measure column, average aggregation function, and/or optional sliding window parameters. The risk management module 149 may automatically generate the following query:

SELECT     AVG(callProcessingTime) as “KPI_Measure”,     SYSTIMESTAMP as “KPI_Timestamp”,     “AVERAGE_CALL_WAITING_TIME” as “KPI_Name” FROM     call_center_fact [RANGE 30 minutes ON callClosedTime     SLIDE 10 minutes]

In some examples, each event emitted by the KPI measure query may contain a KPI name, a current KPI measure value, and/or a current timestamp. A Report Cache may register and start the KPI measure query after the KPI is bound to a visualization of the risk management module 149 (e.g., the risk dashboard).

(2) KPI Threshold Queries. In some examples, the business user 102 can classify KPI measure values into three different ranges: HIGH, MEDIUM, or LOW. This classification may be based at least in part on a comparison between the KPI measure and KPI threshold. The KPI measure may be tracked by the KPI measure query. The KPI threshold may be based at least in part on a CONSTANT VALUE and/or a HISTORICAL QUERY. Additionally, the risk management module 149 may generate a new CQL query for each threshold range by injecting a HAVING clause into the existing KPI measure query. Additionally, the comparison between the KPI measure and the KPI threshold can be based on three different types: CONSTANT, PERCENTAGE, or STANDARD DEVIATION. Further, the business user 102 can bind one or more Alert actions with each range.

For example, a business user 102 can define the HIGH threshold for the average call processing time KPI to capture call processing time measure values that exceed 120% of a specified constant value of 25 seconds (or more or less). The HIGH threshold may be modeled using a “Group Filter” as shown below:

<GroupFilter>   <Branch type=“ALL”>     <Entry type=“GT”>       <Node ID=“AVG(_callProcessingTime)_1” operation=     “AVG” type=“AGGREGATE”>_callProcessigTime</Node>       <Node type=“INTEGER”>30</Node>      </Entry>   </Branch> </GroupFilter>

Using the above group filter and user-specified KPI measure query, the risk management module 149 may be able to generate the following KPI Threshold query:

SELECT    AVG(callProcessingTime) as “KPI_Measure”,    SYSTIMESTAMP as “KPI_Timestamp”,    “AVERAGE_CALL_WAITING_TIME” as “KPI_Name”,    “HIGH” as “KPI_Range” FROM    call_center_fact HAVING    AVG(callProcessingTime) > 30

In some examples, each event emitted by the KPI threshold query may contain a KPI name, a current KPI measure value, a current timestamp, and/or a KPI range name (e.g. HIGH, MEDIUM or LOW). In some aspects, all actions associated with each KPI range may be registered with an Alert Engine of the risk management module 149 at the instant that KPI is saved. Further, the KPI threshold CQL queries will be registered and started at the instant the KPI is saved.

(3) KPI Risk Indicator Queries. In some examples, a Risk Indicator 162 may be a special type of CQL query that drives the behavior of the selected KPI. For example, a CQL query to detect a consecutive increase of 20% in the volume of incoming calls may be an appropriate risk indicator 162 for the average call processing time KPI, since there is a strong co-relation between the volume of incoming calls and the call processing time. Risk Indicator queries may be pre-defined CQL queries. Each event emitted by a risk indicator query may contains a KPI name, a current KPI measure value, a current timestamp, and/or a KPI range name (e.g. HIGH, MEDIUM or LOW). Further, the KPI risk indicator queries may be pre-existing CQL queries and/or may be selected automatically by the risk management module 149 or another module of the service provider computers 106 based at least in part on correlation and/or KPI information 160. The Report Cache will simply listen to the event output of these queries.

Additionally, in some examples, Risk indicators 162, unlike performance indicators 160, may measure the riskiness of a business operation. It may provide an early warning sign to identify events that may harm the existing processes. Additionally, operations staff (i.e., users 102) may use a risk dashboard 164 to monitor business events as they occur, and the focus of risk dashboard 164 may be to display what is happening now. A “detect-and-respond” dashboard may be utilized often (e.g. call centers, logistics operations), and is action oriented. This type of dashboard typically utilizes alerts to notify users about exception conditions as they happen, which in turn, may influence their KPIs. Alerts can be used to send emails to one or more recipients, but can also appear on a dashboard via an icon next to the relevant metric. Visualizations may include a real time KPI watch list, geo map, and/or tree map, as well as the ability to drill down and take actions.

Additional types of computer storage media (which may also be non-transitory) that may be present in the service provider computers 106 and/or user devices 104 may include, but are not limited to, programmable random access memory (PRAM), SRAM, DRAM, RAM, ROM, electrically erasable programmable read-only memory (EEPROM), flash memory or other memory technology, compact disc read-only memory (CD-ROM), digital versatile discs (DVD) or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can be accessed by the service provider computers 106 and/or user devices 104. Combinations of any of the above should also be included within the scope of computer-readable media.

Alternatively, computer-readable communication media may include computer-readable instructions, program modules, or other data transmitted within a data signal, such as a carrier wave, or other transmission. However, as used herein, computer-readable storage media does not include computer-readable communication media.

FIG. 2 depicts a simplified high level diagram of an event processing system 200 that may incorporate an embodiment of the present invention. Event processing system 200 may comprise one or more event sources (204, 206, 208), an event processing server (EPS) 202 that is configured to provide an environment for processing event streams, and one or more event sinks (210, 212). The event sources generate event streams that are received by EPS 202. EPS 202 may receive one or more event streams from one or more event sources. For example, as shown in FIG. 2, EPS 202 receives an input event stream 214 from event source 204, a second input event stream 216 from event source 206, and a third event stream 218 from event source 208. One or more event processing applications (220, 222, and 224) may be deployed on and be executed by EPS 202. An event processing application executed by EPS 202 may be configured to listen to one or more input event streams, process the events received via the one or more event streams based upon processing logic that selects one or more events from the input event streams as notable events. The notable events may then be sent to one or more event sinks (210, 212) in the form of one or more output event streams. For example, in FIG. 2, EPS 202 outputs an output event stream 226 to event sink 210, and a second output event stream 228 to event sink 212. In certain embodiments, event sources, event processing applications, and event sinks are decoupled from each other such that one can add or remove any of these components without causing changes to the other components.

In one embodiment, EPS 202 may be implemented as a Java server comprising a lightweight Java application container, such as one based upon Equinox OSGi, with shared services. In some embodiments, EPS 202 may support ultra-high throughput and microsecond latency for processing events, for example, by using JRockit Real Time. EPS 202 may also provide a development platform (e.g., a complete real time end-to-end Java Event-Driven Architecture (EDA) development platform) including tools (e.g., Oracle CEP Visualizer and Oracle CEP IDE) for developing event processing applications.

An event processing application is configured to listen to one or more input event streams, execute logic (e.g., a query) for selecting one or more notable events from the one or more input event streams, and output the selected notable events to one or more event sources via one or more output event streams. FIG. 2 provides a drilldown for one such event processing application 220. As shown in FIG. 2, event processing application 220 is configured to listen to input event stream 218, execute a query 230 comprising logic for selecting one or more notable events from input event stream 218, and output the selected notable events via output event stream 228 to event sink 212. Examples of event sources include, without limitation, an adapter (e.g., JMS, HTTP, and file), a channel, a processor, a table, a cache, and the like. Examples of event sinks include, without limitation, an adapter (e.g., JMS, HTTP, and file), a channel, a processor, a cache, and the like.

Although event processing application 220 in FIG. 2 is shown as listening to one input stream and outputting selected events via one output stream, this is not intended to be limiting. In alternative embodiments, an event processing application may be configured to listen to multiple input streams received from one or more event sources, select events from the monitored streams, and output the selected events via one or more output event streams to one or more event sinks. The same query can be associated with more than one event sink and with different types of event sinks.

Due to its unbounded nature, the amount of data that is received via an event stream is generally very large. Consequently, it is generally impractical and undesirable to store or archive all the data for querying purposes. The processing of event streams requires processing of the events in real time as the events are received by EPS 202 without having to store all the received events data. Accordingly, EPS 202 provides a special querying mechanism that enables processing of events to be performed as the events are received by EPS 202 without having to store all the received events.

Event-driven applications are rule-driven and these rules may be expressed in the form of continuous queries that are used to process input streams. A continuous query may comprise instructions (e.g., business logic) that identify the processing to be performed for received events including what events are to be selected as notable events and output as results of the query processing. Continuous queries may be persisted to a data store and used for processing input streams of events and generating output streams of events. Continuous queries typically perform filtering and aggregation functions to discover and extract notable events from the input event streams. As a result, the number of outbound events in an output event stream is generally much lower than the number of events in the input event stream from which the events are selected.

Unlike a SQL query that is run once on a finite data set, a continuous query that has been registered by an application with EPS 202 for a particular event stream may be executed each time that an event is received in that event stream. As part of the continuous query execution, EPS 202 evaluates the received event based upon instructions specified by the continuous query to determine whether one or more events are to be selected as notable events, and output as a result of the continuous query execution.

The continuous query may be programmed using different languages. In certain embodiments, continuous queries may be configured using the Continuous Query Language (CQL) provided by Oracle Corporation and used by Oracle's Complex Events Processing (CEP) product offerings. Oracle's CQL is a declarative language that can be used to program queries (referred to as CQL queries) that can be executed against event streams. In certain embodiments, CQL is based upon SQL with added constructs that support processing of streaming events data.

In one embodiment, an event processing application may be composed of the following component types:

(1) One or more adapters that interface directly to the input and output stream and relation sources and sinks Adapters are configured to understand the input and output stream protocol, and are responsible for converting the event data into a normalized form that can be queried by an application processor. Adapters may forward the normalized event data into channels or output streams and relation sinks. Event adapters may be defined for a variety of data sources and sinks. (2) One or more channels that act as event processing endpoints. Among other things, channels are responsible for queuing event data until the event processing agent can act upon it. (3) One or more application processors (or event processing agents) are configured to consume normalized event data from a channel, process it using queries to select notable events, and forward (or copy) the selected notable events to an output channel. (4) One or more beans are configured to listen to the output channel, and are triggered by the insertion of a new event into the output channel. In some embodiments, this user code is a plain-old-Java-object (POJO). The user application can make use of a set of external services, such as JMS, Web services, and file writers, to forward the generated events to external event sinks. (5) Event beans may be registered to listen to the output channel, and are triggered by the insertion of a new event into the output channel. In some embodiments, this user code may use the Oracle CEP event bean API so that the bean can be managed by Oracle CEP.

In one embodiment, an event adapter provides event data to an input channel. The input channel is connected to a CQL processor associated with one or more CQL queries that operate on the events offered by the input channel. The CQL processor is connected to an output channel to which query results are written.

In some embodiments, an assembly file may be provided for an event processing application describing the various components of the event processing application, how the components are connected together, event types processed by the application. Separate files may be provided for specifying the continuous query or business logic for selection of events.

It should be appreciated that system 200 depicted in FIG. 2 may have other components than those depicted in FIG. 2. Further, the embodiment shown in FIG. 2 is only one example of a system that may incorporate an embodiment of the invention. In some other embodiments, system 200 may have more or fewer components than shown in FIG. 2, may combine two or more components, or may have a different configuration or arrangement of components. System 200 can be of various types including a personal computer, a portable device (e.g., a mobile telephone or device), a workstation, a network computer, a mainframe, a kiosk, a server, or any other data processing system. In some other embodiments, system 200 may be configured as a distributed system where one or more components of system 200 are distributed across one or more networks in the cloud.

The one or more of the components depicted in FIG. 2 may be implemented in software, in hardware, or combinations thereof. In some embodiments, the software may be stored in memory (e.g., a non-transitory computer-readable medium), on a memory device, or some other physical memory and may be executed by one or more processing units (e.g., one or more processors, one or more processor cores, one or more GPUs, etc.).

FIG. 3 illustrates a simplified block diagram 300 with which features of the techniques for managing real-time business event analysis and monitoring may be described. As noted above, in some examples, a business intelligence server 150 may be executed by the service provider computers 106 of FIG. 1 and may include, among other things, one or more CQ Services 202 that may implement one or more CQ Engines 230 Additionally, in some examples, the BI server 150 may also include a logical business model module 302, an intelligent request generation module 304, and/or a logical request generation module 306. The some examples, the logical request generation module 306 may configured to receive, process, and/or generate one or more logical requests and/or one or more tactical queries for querying against a database 308. Further, in some examples, the BI server 150 may also be configured to include one or more adapters such as, but not limited to, one or more data source adapters 310, one or more event source adapters 312, and/or an event sink adapters 314. In some examples, the data source adapters 310 may be configured to manage communication between the logical request generation module 306 and one or more databases 308. Additionally, the event source adapters 312 may be configured to manage communication between the CQ Engine 230 and one or more event sources 204, as described with reference to FIG. 2. Further, the event sink adapters 314 may be configured to manage communication between the CQ Engine 230 and one or more event sinks 210.

In one non-limiting use case of implementing the CQ Service 202 within the BI server 150, the service provider computers 106 may receive a logical request. For example, a logical request may include a request from a user to alert them of when some event occurs (e.g., “alert me when bug 7654321 goes from 11 to 80). At this stage, the service provider computers 106 may pass this logical request to the logical business model module 302, where the logical business model module 302 may be configured to issue a logical SQL to extend to a continuous query. For example, a continuous query CQ1 may be created as:

Select BugId, LastUpdatedBy From BUGDB Where BugId=7654321 and New_value(status)=80 and Old_value(status)=11

Additionally, in some examples, based at least in part on the non-limiting use case discussed above, the logical request generation module 306 may then be configured to delegate the continuous query CQ1 to the CQ Service module 202, where the CQ Service module 202 may setup a Change Data Capture on a BUGDB table or other database associated with the event source adapters 312 in communication with the one or more event sources 204. In some aspects, CQ Service 202 may then set up event sinks 210 by setting up an alert destination and/or an alert output table associated with the event sink adapters 314. Additionally, in some examples, CQ Service 202 may then implement the CQ Engine 230 to issue CQL DDLs and/or generate a continuous query to query against an event stream. The CQ Service 202 may then receive one or more CDC events from the event source adapters 312 based at least in part on data being pushed to the event processor and/or CQ Engine 230 via the event sources 204 and through the event source adapters 312. The CQ Service 202 may then receive output events from the CQ Engine 230 as the output events are pushed to the event sinks 210 through the event sink adapters 314. As such, the event sink adapters 314 may receive the output events. Further, an output table may be utilized and/or an alert may be sent, as discussed above. A user may then receive the alert may be enable to drill down into a visualization provided via a UI or other interface.

FIG. 4 depicts a simplified block diagram 300 for illustrating at least some features of the techniques for managing risk with continuous queries, according to one example. In FIG. 4, the service provider computers 106 are again, here implementing or otherwise providing the risk dashboard 164 described with reference to FIG. 1. In addition to as described above, the risk dashboard 164 may also be configured to provide at least one KPI watch list example 402. As such KPIs can be added to one or more special visualizations (e.g., the KPI watch list examples 402). In some examples, the watch list view may allow business users to monitor the state of various KPIs (e.g., in real-time). For each KPI, the KPI watch list example 402 may display the following information: KPI Name 404, Risk Status 406, Time Interval 408, Measured Value (e.g., “Now”) 410, and/or Percentage of Target 412. The PKI Name 404 may include a unique string name provided by the user or automatically generated by the service provider computers 106. The Risk Status 406 may include a circle when a risk indicator is relevant, the circles may be of different shades, colors, or fill designs to indicate different levels of risk or concern (e.g., normal, medium, high, low, etc.). The Time Interval (i.e., “Today”) 408 may be a trend-line marked up with risk points and/or a bounded list of the latest number measure values (e.g., the last ten data points or the like). Additionally, the Now 410 column may indicate the current measure value (e.g., the latest measure value). Further, the Percentage of Target 412 column may indicate a normalized comparison of Measure and Target (e.g., the latest measure-target value pair).

In some examples, a Report Cache may maintain a snapshot of KPIs in a Coherence data table. This data table may maintain the snapshot data model for each KPI. An example of this Coherence data table is shown below:

Risk {Measure, KPI ID Status List of Measure Values Measure Target} KPI₁ HIGH {10, 20, 40, 80, 160} 160 {160, 200} KPI₂ LOW {10, 10, 15, 10, 12}  12 {12, 50} . . . . . . . . . . . . . . .

In some aspects, at Report Cache bootstrap time, each KPI may be added as a new row in the above table. The value columns for each KPI may be initially NULL. After a KPI object is bound to visualization (e.g. the KPI watch list 402 or the like):

-   -   The report Cache may register and run the KPI measure CQL.     -   The report Cache may start listening to the event output from         the KPI risk indicator CQL.     -   The CQL query event output may be captured in the KPI row in the         above Coherence data table.

This Coherence data table may serve as the data model for a KPI watch list view 402. The many-to-many association between KPIs and KPI watch lists may be captured in a map. For each KPI, there may be a list of all the KPI watch lists that it has been added to. For example, suppose there are three KPIs: KPI1, KPI2 and KPI3 and two KPI watch lists: Watchlist1 and Watchlist2. Let Watchlist1 contain KPI1 and Watchlist2 contain KPI1 and KPI2. The map between KPIs and KPI watch lists may be as follows:

Watchlist₁→KPI₁ Watchlist₂→KPI₁, KPI₂

In some aspects, each time a CQL (e.g. measure CQL, risk indicator CQLs) is associated with KPI1 generating a new event, the Report Cache will look up the map to determine which KPI watch lists are affected, and may update the row corresponding to KPI1 in the Coherence data table, and may generate a corresponding change list event for Watchlist1 and Watchlist2. Similarly, for each new event generated by the CQLs for KPI2, the Report Cache may update the row corresponding to KPI2 in the Coherence data table, and may generate a corresponding change list event for Watchlist2.

FIGS. 5 and 6 illustrate example flow diagrams showing respective processes 500 and 600 for implementing the management of real-time business event analysis and monitoring techniques described herein. These processes 500 and 600 are illustrated as logical flow diagrams, each operation of which represents a sequence of operations that can be implemented in hardware, computer instructions, or a combination thereof. In the context of computer instructions, the operations represent computer-executable instructions stored on one or more computer-readable storage media that, when executed by one or more processors, perform the recited operations. Generally, computer-executable instructions include routines, programs, objects, components, data structures and the like that perform particular functions or implement particular data types. The order in which the operations are described is not intended to be construed as a limitation, and any number of the described operations can be combined in any order and/or in parallel to implement the processes.

Additionally, some, any, or all of the processes may be performed under the control of one or more computer systems configured with executable instructions and may be implemented as code (e.g., executable instructions, one or more computer programs, or one or more applications) executing collectively on one or more processors, by hardware, or combinations thereof. As noted above, the code may be stored on a computer-readable storage medium, for example, in the form of a computer program comprising a plurality of instructions executable by one or more processors. The computer-readable storage medium may be non-transitory.

In some examples, the one or more service provider computers 106 (e.g., utilizing at least the CQ Service module 148 of FIG. 1) shown in FIGS. 1-3 may perform the process 500 of FIG. 5. The process 500 may begin by including receiving a logical request at a BI server configured with a continuous query service (i.e., CQ Service) at 502. As noted a logical request may include a request from user in a logical form (e.g., “alert me when x event occurs,” or the like) or it may be a tactical query (e.g., a SQL query). At 504, the process 500 may include translating the logical request into a physical request by the continuous query service. As noted, in some examples, the translation may include converting a tactical query to a continuous query. At 506, the process 500 may include implementing the continuous query, by the continuous query service, based at least in part on the physical request (e.g., post-translation). Further, the process 500 may end at 508, where the process 500 may include providing BI information to a user based at least in part on querying an event stream with the generated continuous query.

FIG. 6 illustrates an example flow diagram showing process 600 for implementing the management of real-time business event analysis and monitoring techniques described herein. The one or more service provider computers 106 (e.g., utilizing at least the CQ Service module 148 of FIG. 1) shown in FIGS. 1-3 may perform the process 600 of FIG. 6. The process 600 may begin at 602 by including receiving a tactical query configured based at least in part on a logical request from a BI server. In some examples, the logical request may be received by a BI server that includes a CQ service module and passed to the CQ service module, by the BI server, for processing. At 604, the process 600 may include generating a continuous query based at least in part on a tactical query. The tactical query (e.g., a SQL query) may be generated based at least in part on the logical request. At 606, the process 600 may include querying a stream with the continuous query. At 608, the process 600 may include providing results of the continuous query to an event sink of the Bi server.

Additionally, in some examples, the process 600 may include determining whether to utilize an output table (and/or whether to push or pull the event output from the continuous query) at 610. If it is determined not to utilize an output table at 610, the process 600 may end at 612 by including pushing the sink contents to a dashboard and enabling the dashboard to update (i.e., refresh) based at least in part on the pushed contents. Alternatively, if the process determined at 610 to utilize an output table, the process 600 may include storing the results in the output table at 614. At 616, the process 600 may include providing a signal to the dashboard indicating that output events have accumulated in the output table. Further, the process 600 may end at 618, where the process 600 may enable the dashboard to perform a tactical query on the output table to receive the event output data from the previously implemented continuous query.

FIGS. 7-9 illustrate example flow diagrams showing respective processes 700, 800, and 900 for implementing the techniques for managing risk with continuous queries described herein. These processes 700, 800, 900 are illustrated as logical flow diagrams, each operation of which represents a sequence of operations that can be implemented in hardware, computer instructions, or a combination thereof. In the context of computer instructions, the operations represent computer-executable instructions stored on one or more computer-readable storage media that, when executed by one or more processors, perform the recited operations. Generally, computer-executable instructions include routines, programs, objects, components, data structures and the like that perform particular functions or implement particular data types. The order in which the operations are described is not intended to be construed as a limitation, and any number of the described operations can be combined in any order and/or in parallel to implement the processes.

Additionally, some, any, or all of the processes may be performed under the control of one or more computer systems configured with executable instructions and may be implemented as code (e.g., executable instructions, one or more computer programs, or one or more applications) executing collectively on one or more processors, by hardware, or combinations thereof. As noted above, the code may be stored on a computer-readable storage medium, for example, in the form of a computer program comprising a plurality of instructions executable by one or more processors. The computer-readable storage medium may be non-transitory.

In some examples, the one or more service provider computers 106 (e.g., utilizing at least the risk management module 149 of FIG. 1) shown in at least FIG. 1 may perform the process 700 of FIG. 7. The process 700 may begin by including implementing a first query to receive a first metric at 702. At 704, the process 700 may include identifying a second metric based at least in part on the first metric. The first metric may include a KPI and the second metric may include a risk indicator associated with the KPI. At 706, the process 700 may include receiving the second metric data based at least in part on a second query. Further, the process 700 may end at 708 where the process 700 may include providing information associated with the first metric and the second metric (e.g., to a dashboard or other UI).

FIG. 8 illustrates an example flow diagram showing process 800 for implementing the techniques for managing risk with continuous queries described herein. The one or more service provider computers 106 (e.g., utilizing at least the risk management module 149 of FIG. 1) shown in at least FIG. 1 may perform the process 800 of FIG. 8. The process 800 may begin at 802 by including generating a continuous query for monitoring a first metric of a stream. As noted above with reference to process 700, the first metric may be a KPI. At 804, the process 800 may include listening to a pre-existing query that outputs a second metric of the stream. Again, the second metric may be a risk indicator associated with the KPI. Further, the process 800 may end at 806 where the process 800 may include providing a real-time visualization of the first and/or second metrics.

FIG. 9 illustrates an example flow diagram showing process 900 for implementing the techniques for managing risk with continuous queries described herein. The one or more service provider computers 106 (e.g., utilizing at least the risk management module 149 of FIG. 1) shown in at least FIG. 1 may perform the process 900 of FIG. 9. The process 900 may begin by including receiving a selection of a data object for providing real-time stream of business event data at 902. At 904, the process 900 may include generating a continuous query to monitor the real-time stream for a first metric (e.g., KPI information). At 906, the process 900 may also include identifying a risk indicator associated with a second metric that affects the first metric. At 908, the process 900 may include listening to output events of a pre-existing query for monitoring a real-time stream. Further, the process 900 may end at 910 where the process 900 may include providing a real-time visualization of the first metric and/or the second metric. The second metric may include the risk indicator or information identifying and/or quantifying the risk indicator.

Illustrative methods and systems for implementing the techniques for managing real-time business event analysis and monitoring and/or the techniques for managing risk with continuous queries are described above. Some or all of these systems and methods may, but need not, be implemented at least partially by architectures and processes such as those shown at least in FIGS. 1-9 above.

FIG. 10 is a simplified block diagram illustrating components of a system environment 1000 that may be used in accordance with an embodiment of the present disclosure. As shown, system environment 1000 includes one or more client computing devices 1002, 1004, 1006, 1008, which are configured to operate a client application such as a web browser, proprietary client (e.g., Oracle Forms), or the like over one or more networks 1010 (such as, but not limited to, networks similar to the networks 108 of FIGS. 1 and 3). In various embodiments, client computing devices 1002, 1004, 1006, and 1008 may interact with a server 1012 over the networks 1010.

Client computing devices 1002, 1004, 1006, 1008 may be general purpose personal computers (including, by way of example, personal computers and/or laptop computers running various versions of Microsoft Windows and/or Apple Macintosh operating systems), cell phones or PDAs (running software such as Microsoft Windows Mobile and being Internet, e-mail, SMS, Blackberry, or other communication protocol enabled), and/or workstation computers running any of a variety of commercially-available UNIX or UNIX-like operating systems (including without limitation the variety of GNU/Linux operating systems). Alternatively, client computing devices 1002, 1004, 1006, and 1008 may be any other electronic device, such as a thin-client computer, Internet-enabled gaming system, and/or personal messaging device, capable of communicating over a network (e.g., network 1010 described below). Although exemplary system environment 1000 is shown with four client computing devices, any number of client computing devices may be supported. Other devices such as devices with sensors, etc. may interact with server 1012.

System environment 1000 may include networks 1010. Networks 1010 may be any type of network familiar to those skilled in the art that can support data communications using any of a variety of commercially-available protocols, including without limitation TCP/IP, SNA, IPX, AppleTalk, and the like. Merely by way of example, network 1010 can be a local area network (LAN), such as an Ethernet network, a Token-Ring network and/or the like; a wide-area network; a virtual network, including without limitation a virtual private network (VPN); the Internet; an intranet; an extranet; a public switched telephone network (PSTN); an infra-red network; a wireless network (e.g., a network operating under any of the IEEE 802.11 suite of protocols, the Bluetooth protocol known in the art, and/or any other wireless protocol); and/or any combination of these and/or other networks.

System environment 1000 also includes one or more server computers 1012 which may be general purpose computers, specialized server computers (including, by way of example, PC servers, UNIX servers, mid-range servers, mainframe computers, rack-mounted servers, etc.), server farms, server clusters, or any other appropriate arrangement and/or combination. In various embodiments, server 1012 may be adapted to run one or more services or software applications described in the foregoing disclosure. For example, server 1012 may correspond to a server for performing processing described above according to an embodiment of the present disclosure.

Server 1012 may run an operating system including any of those discussed above, as well as any commercially available server operating system. Server 1012 may also run any of a variety of additional server applications and/or mid-tier applications, including HTTP servers, FTP servers, CGI servers, Java servers, database servers, and the like. Exemplary database servers include without limitation those commercially available from Oracle, Microsoft, Sybase, IBM and the like.

System environment 1000 may also include one or more databases 1014, 1016. Databases 1014, 1016 may reside in a variety of locations. By way of example, one or more of databases 1014, 1016 may reside on a non-transitory storage medium local to (and/or resident in) server 1012. Alternatively, databases 1014, 1016 may be remote from server 1012, and in communication with server 1012 via a network-based or dedicated connection. In one set of embodiments, databases 1014, 1016 may reside in a storage-area network (SAN) familiar to those skilled in the art. Similarly, any necessary files for performing the functions attributed to server 1012 may be stored locally on server 1012 and/or remotely, as appropriate. In one set of embodiments, databases 1014, 1016 may include relational databases, such as databases provided by Oracle, that are adapted to store, update, and retrieve data in response to query-language-formatted commands.

FIG. 11 is a simplified block diagram of a computer system 1100 that may be used in accordance with embodiments of the present disclosure. For example service provider computers 106 may be implemented using a system such as system 1100. Computer system 1100 is shown comprising hardware elements that may be electrically and/or communicatively coupled via a bus 1201. The hardware elements may include one or more central processing units (CPUs) 1102, one or more input devices 1104 (e.g., a mouse, a keyboard, etc.), and one or more output devices 1106 (e.g., a display device, a printer, etc.). Computer system 1100 may also include one or more storage devices 1108. By way of example, the storage device(s) 1108 may include devices such as disk drives, optical storage devices, and solid-state storage devices such as a random access memory (RAM) and/or a read-only memory (ROM), which can be programmable, flash-updateable and/or the like.

Computer system 1100 may additionally include a computer-readable storage media reader 1112, a communications subsystem 1114 (e.g., a modem, a network card (wireless or wired), an infra-red communication device, etc.), and working memory 1118, which may include RAM and ROM devices as described above. In some embodiments, computer system 1100 may also include a processing acceleration unit 1116, which can include a digital signal processor (DSP), a special-purpose processor, and/or the like.

Computer-readable storage media reader 1112 can further be connected to a computer-readable storage medium 1110, together (and, optionally, in combination with storage device(s) 1108) comprehensively representing remote, local, fixed, and/or removable storage devices plus storage media for temporarily and/or more permanently containing computer-readable information. Communications system 1114 may permit data to be exchanged with network 1112 and/or any other computer described above with respect to system environment 1100.

Computer system 1100 may also comprise software elements, shown as being currently located within working memory 1118, including an operating system 1120 and/or other code 1122, such as an application program (which may be a client application, Web browser, mid-tier application, RDBMS, etc.). In an exemplary embodiment, working memory 1118 may include executable code and associated data structures used for relying party and open authorization-related processing as described above. It should be appreciated that alternative embodiments of computer system 1100 may have numerous variations from that described above. For example, customized hardware might also be used and/or particular elements might be implemented in hardware, software (including portable software, such as applets), or both. Further, connection to other computing devices such as network input/output devices may be employed.

Storage media and computer readable media for containing code, or portions of code, can include any appropriate media known or used in the art, including storage media and communication media, such as but not limited to, volatile and non-volatile (non-transitory), removable and non-removable media implemented in any method or technology for storage and/or transmission of information such as computer readable instructions, data structures, program modules, or other data, including RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile disk (DVD) or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, data signals, data transmissions, or any other medium which can be used to store or transmit the desired information and which can be accessed by a computer.

Although specific embodiments of the disclosure have been described, various modifications, alterations, alternative constructions, and equivalents are also encompassed within the scope of the disclosure. Embodiments of the present disclosure are not restricted to operation within certain specific data processing environments, but are free to operate within a plurality of data processing environments. Additionally, although embodiments of the present disclosure have been described using a particular series of transactions and steps, it should be apparent to those skilled in the art that the scope of the present disclosure is not limited to the described series of transactions and steps.

Further, while embodiments of the present disclosure have been described using a particular combination of hardware and software, it should be recognized that other combinations of hardware and software are also within the scope of the present disclosure. Embodiments of the present disclosure may be implemented only in hardware, or only in software, or using combinations thereof.

The specification and drawings are, accordingly, to be regarded in an illustrative rather than a restrictive sense. It will, however, be evident that additions, subtractions, deletions, and other modifications and changes may be made thereunto without departing from the broader spirit and scope. Illustrative methods and systems for providing features of the present disclosure are described above. Some or all of these systems and methods may, but need not, be implemented at least partially by architectures such as those shown in FIGS. 1-12 above.

Although embodiments have been described in language specific to structural features and/or methodological acts, it is to be understood that the disclosure is not necessarily limited to the specific features or acts described. Rather, the specific features and acts are disclosed as illustrative forms of implementing the embodiments. Conditional language, such as, among others, “can,” “could,” “might,” or “may,” unless specifically stated otherwise, or otherwise understood within the context as used, is generally intended to convey that certain embodiments could include, while other embodiments do not include, certain features, elements, and/or steps. Thus, such conditional language is not generally intended to imply that features, elements, and/or steps are in any way required for one or more embodiments or that one or more embodiments necessarily include logic for deciding, with or without user input or prompting, whether these features, elements, and/or steps are included or are to be performed in any particular embodiment. 

What is claimed is:
 1. A system, comprising: a memory storing a plurality of instructions; and one or more processors configured to access the memory, wherein the one or more processors are further configured to execute the plurality of instructions to at least: receive, at a business intelligence server configured with a continuous query service, a logical request; translate, by the continuous query service, the logical request into a physical request; and provide business intelligence information based at least in part querying against an event data stream with a continuous query configured based at least in part on the physical request translated by the continuous query service.
 2. The system of claim 1, wherein the one or more processors are further configured to execute the plurality of instructions to at least implement a continuous query engine as part of the continuous query service.
 3. The system of claim 1, wherein the continuous query engine is configured to receive data of the event data stream from the business intelligence server.
 4. The system of claim 1, wherein the continuous query engine is configured to provide results to an event sink associated with the business intelligence server.
 5. The system of claim 1, wherein the business intelligence server is configured to manage business intelligence data associated with one or more users.
 6. The system of claim 5, wherein the business intelligence information includes at least one of a result of the continuous query or an alert configured to identify the result of the continuous query.
 7. The system of claim 1, wherein the business intelligence information is provided to the one or more users via a graphical user interface.
 8. The system of claim 1, wherein the logical request includes at least a tactical query generated based at least in part on a request from a user for the business intelligence information.
 9. The system of claim 1, wherein the tactical query is received by the continuous query service from a logical business model of the business intelligence server.
 10. The system of claim 1, wherein the translation of the physical request includes generation of at least the continuous query.
 11. A computer-readable memory storing a plurality of instructions executable by one or more processors, the plurality of instructions comprising: instructions that cause the one or more processors to receive, by a continuous query service, a tactical query from a business intelligence server, the tactical query configured based at least in part on a logical request for event data; instructions that cause the one or more processors to generate, by the continuous query service, a continuous query configured to query against a stream of the event data, the continuous query based at least in part on the tactical query; instructions that cause the one or more processors to query the stream of event data with the continuous query; instructions that cause the one or more processors to provide results of the continuous query to an event sink of the business intelligence server; and instructions that cause the one or more processors to provide information of the event sink to a dashboard for visualization of the event data based at least in part on the logical request.
 12. The computer-readable memory of claim 11, wherein the logical request is received by the business intelligence server as a logical statement configured to identify the events.
 13. The computer-readable memory of claim 12, wherein the plurality of instructions further comprises instructions that cause the one or more processors to enable output of the continuous query to be stored in an output table, wherein an alert is provided based at least in part on the output table.
 14. The computer-implemented method of claim 12, wherein the plurality of instructions further comprises: instructions that cause the one or more processors to provide a signal to the dashboard that the output of the continuous query has accumulated in the output table; instructions that cause the one or more processors to enable the dashboard to perform a tactical query to refresh the dashboard with the output accumulated in the output table.
 15. The computer-implemented method of claim 14, wherein the plurality of instructions further comprises: instructions that cause the one or more processors to push contents of the event sink to the dashboard; and instructions that cause the one or more processors to enable the dashboard to incrementally update a view of the dashboard based at least in part on the pushed contents of the event sink.
 16. A computer-implemented method, comprising: implementing, by a business intelligence server, a continuous query service; receiving, by the continuous query service, a tactical query from the business intelligence server, the tactical query configured based at least in part on a logical request of a user; generating, by the continuous query service, a continuous query configured to query against a stream of event data associated with the user based at least in part on the tactical query; implementing at least one event sink configured to receive results of the continuous query; implementing a continuous query engine configured to process the event data by utilizing the continuous query; enabling the continuous query engine to push output of the continuous query to the at least one event sink; and providing an alert to the user based at least in part on the output of the continuous query.
 17. The computer-implemented method of 16, further comprising enabling the output of the continuous query to be stored in an output table, wherein the alert is provided to the user based at least in part on the output table.
 18. The computer-implemented method of 17, wherein the output table is configured to accumulate at least one of an insert or a delete output received from the continuous query service.
 19. The computer-implemented method of claim 17, further comprising: providing a signal to a dashboard of the user that the output has accumulated in the output table; and enabling the dashboard to perform a tactical query to refresh the dashboard with the output accumulated in the output table.
 20. The computer-implemented method of claim 19, further comprising: pushing contents of the at least one event sink to a dashboard of the user; and enabling the dashboard of the user to incrementally update a view of the dashboard based at least in part on the pushed contents of the at least one event sink. 