Copyright © TIBCO Software Inc. All Rights Reserved
Copyright © TIBCO Software Inc. All Rights Reserved


Chapter 2 Project Design Tutorial : General Runtime Flow

General Runtime Flow
The section The Fraud Detection Scenario explains the general tutorial scenario, the fraud detection criteria, and how a customer account can become Suspended. This section explains in more technical terms what happens at runtime given an example debit that triggers the fraud detection rules. (You will learn more details about the terms shown in italics below, as you complete the tutorial steps):
1.
A message arriving through a TIBCO BusinessEvents channel is transformed into an event. (At design time you create an event type for this purpose, with the appropriate properties.) The event instance is then asserted into the Rete network, an in-memory network of objects based on the Rete algorithm, which enables fast matching of facts with rule dependencies.
2.
The presence of this new event in the Rete network causes the inference engine to check for rules that are designed to be triggered when this event is asserted.
3.
Event lifespan  It is important to consume events when they are no longer needed so that they do not trigger rules to fire erroneously. On the other hand, it is also important to use a long enough time-to-live (TTL) setting for an event, so that it exists long enough to perform all work needed, for example, to trigger rules that correlate multiple events and take appropriate actions.
 

Copyright © TIBCO Software Inc. All Rights Reserved
Copyright © TIBCO Software Inc. All Rights Reserved