Browse Definitions :
Definition

event-driven computing

Contributor(s): Ivy Wigmore

Event-driven computing is a computing model in which programs perform work in response to identifiable occurrences that have significance for system hardware or software. Event-driven programs are often used to automate systems and deliver services in machine-to-machine (M2M) environments.

The two integral components of an event-driven architecture (EDA) are event creators and event consumers. Creators initiate events and consumers receive information about events and may be involved with processing related to them. In the Internet of Things (IoT), huge numbers of creators and consumers typically exchange status and response information in near-real time.

Event consumers typically subscribe to some type of middleware event manager. When the manager receives notification of an event from a creator, it forwards that event to all registered consumers. The benefit of an event-driven architecture is that it enables large numbers of creators and consumers to exchange status and response information in near real-time.

Event-driven applications are designed to detect events that have particular significance to the environment they serve. Most event-driven computing is based on event-condition-action rules (ECA rules) which specify what code to execute (what action to take) when a particular event occurs and the stipulated conditions exist. Event-driven systems may use context awareness to guide responses to events, based on variable environmental conditions.

If This Then That (IFTTT, pronounced to rhyme with "gift") is a popular online service that automates Web-based tasks so that when user-specified events occur, follow-up tasks are triggered and handled. IFTTT breaks tasks into "Do recipes," which are single actions such as "dim the lights" initiated by a smartphone tap, and "If recipes," which allow users to create chains of simple conditional statements, which are triggered based on changes to other web services.

This was last updated in February 2018

Continue Reading About event-driven computing

Join the conversation

1 comment

Send me notifications when other members comment.

Please create a username to comment.

"Computer languages of the future will be more concerned with goals and less with procedures specified by the programmer." ~Marvin Minsky

Expanding on the quote. If responses to actions were somewhat teachable and transferable that would be a breakthrough beyond reusable code libraries.
Cancel

-ADS BY GOOGLE

File Extensions and File Formats

SearchCompliance

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

  • privacy compliance

    Privacy compliance is a company's accordance with established personal information protection guidelines, specifications or ...

  • data governance policy

    A data governance policy is a documented set of guidelines for ensuring that an organization's data and information assets are ...

SearchSecurity

  • asymmetric cryptography (public key cryptography)

    Asymmetric cryptography, also known as public-key cryptography, is a process that uses a pair of related keys -- one public key ...

  • Evil Corp

    Evil Corp is an international cybercrime network that uses malicious software to steal money from its victims' bank accounts.

  • Plundervolt

    Plundervolt is a method of hacking that involves depriving an Intel chip of power so that processing errors occur.

SearchHealthIT

  • telemedicine (telehealth)

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

  • Project Nightingale

    Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United ...

  • medical practice management (MPM) software

    Medical practice management (MPM) software is a collection of computerized services used by healthcare professionals and ...

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification written for internally mounted storage...

  • RAID (redundant array of independent disks)

    RAID (redundant array of independent disks) is a way of storing the same data in different places on multiple hard disks or ...

  • cache memory

    Cache memory, also called CPU memory, is high-speed static random access memory (SRAM) that a computer microprocessor can access ...

Close