Browse Definitions :
Definition

event-condition-action rule (ECA rule)

Contributor(s): Ivy Wigmore

An event-condition-action rule (ECA rule) is the method underlying event-driven computing, in which actions are triggered by events, given the existence of specific conditions.

Events with significance to the system are identified within an event-driven program. An event could be some user action, a transmission of sensor data or a message from some other program or system, among an almost infinite number of other possibilities.  The ECA rule specifies how events drive the desired program responses. When an event with significance for the system occurs, the conditions are checked for or evaluated; if the conditions exist or meet pre-established criteria, the appropriate action is executed.

ECA rules originated in active databases and have since been used in areas including personalization, big data management and business process automation. The model is being explored for M2M (machine-to-machine) networking, Internet of Things (IoT), cognitive computing and the semantic web.

See an introduction to event-driven fundamentals from Linux Academy's Lambda Deep Dive course:

This was last updated in May 2016

Continue Reading About event-condition-action rule (ECA rule)

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance framework

    A compliance framework is a structured set of guidelines that details an organization's processes for maintaining accordance with...

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

SearchSecurity

  • DNS over HTTPS (DoH)

    DNS over HTTPS (DoH) is a relatively new protocol that encrypts domain name system traffic by passing DNS queries through a ...

  • integrated risk management (IRM)

    Integrated risk management (IRM) is an approach to risk management that uses a set of practices and processes to improve an ...

  • MITRE ATT&CK framework

    The MITRE ATT&CK (pronounced 'miter attack') framework is a free, globally accessible service that provides comprehensive and ...

SearchHealthIT

  • telemedicine (telehealth)

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

  • Project Nightingale

    Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United ...

  • medical practice management (MPM) software

    Medical practice management (MPM) software is a collection of computerized services used by healthcare professionals and ...

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification and is used in internally mounted ...

  • kilobyte (KB or Kbyte)

    A kilobyte (KB or Kbyte) is a unit of measurement for computer memory or data storage used by mathematics and computer science ...

  • virtual memory

    Virtual memory is a memory management capability of an operating system (OS) that uses hardware and software to allow a computer ...

Close