Browse Definitions :
Definition

event sourcing

Contributor(s): Laura Fitzgibbons

Event sourcing is a coding practice used by computer programmers to model a system as a sequence of events in order to identify the changes made over time. Instead of using the traditional method of creating a program entity out of the application's current state, event sourcing stores business objects as a string of state-changing events. Whenever an object changes, a new event is appended to the event stream.

Event sourcing helps developers maintain consistency and integrity of an application. Having a complete history of object states allows for mistakes to easily be corrected, information loss to be reconstructed and code to be easily debugged. Stored events include state-altering actions such as mouse clicks, electronic inputs and key strikes.

Benefits of event sourcing

Event sourcing is a useful tool when a programmer wants to recreate a specific occurrence identically and persist it to various destinations within a network. Benefits of event sourcing include:

  • The ability to completely discard and rebuild an application by running the event stream on an empty application state.
  • Event log capabilities such as replaying, reversing and changing the order.
  • Convenience with modeling or predicting various behaviors and outcomes of an application.
  • Ensures better system reliability.
  • The ability to simply implement temporal queries.
  • Organizes system updates and patches.
  • Enables more accurate audit logging.

Applications of event sourcing

Event sourcing can be applied whenever a system would normally capture the state of a specific event. It is generally applied as part of a local use, such as a network or computer that is part of a single system. However, it is also possible to perpetuate information about events that are gathered from external systems.

A common example of an event sourcing application is a version control system. This type of system relies on frequent temporal queries and the ability to completely rebuild repository files.

The event replay capability of event sourcing is often used to remedy events that were received in the wrong order, a common issue with asynchronous messaging.

This was last updated in January 2019

Continue Reading About event sourcing

Join the conversation

1 comment

Send me notifications when other members comment.

Please create a username to comment.

How has event sourcing helped you to make your workflows more efficient?
Cancel

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • compliance audit

    A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

SearchSecurity

  • reverse brute-force attack

    A reverse brute-force attack is a type of brute-force attack in which an attacker uses a common password against multiple ...

  • orphan account

    An orphan account, also referred to as an orphaned account, is a user account that can provide access to corporate systems, ...

  • voice squatting (skill squatting)

    Voice squatting is an attack vector for voice user interfaces (VUIs) that exploits homonyms (words that sound the same but are ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity policy

    Business continuity policy is the set of standards and guidelines an organization enforces to ensure resilience and proper risk ...

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • warm site

    A warm site is a type of facility an organization uses to recover its technology infrastructure when its primary data center goes...

SearchStorage

  • cache memory

    Cache memory, also called CPU memory, is high-speed static random access memory (SRAM) that a computer microprocessor can access ...

  • disk array

    A disk array, also called a storage array, is a data storage system used for block-based storage, file-based storage or object ...

  • enterprise storage

    Enterprise storage is a centralized repository for business information that provides common data management, protection and data...

Close