Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

The Future Of Bpm Six Trends Shaping Process Management


Published on

Published in: Business, Education
  • Be the first to comment

The Future Of Bpm Six Trends Shaping Process Management

  1. 1. Jason Adolf Principal – Advanced Programs SRA International, Inc. SessionTitle: The Future of BPM: Six Trends Shaping Process Management
  2. 2. Buzz Word Page <ul><li>Synergy, _____ Centric, Cycles, Anti-Bodies, Benchmarking, Enterprise, Solution, Proactive, Rightsizing, signal to noise, life cycle, ipod, web 2.0, web 3.0, Facebook, Sidekick, Mashup, Steve Jobs, digg, ginormous, Youtube, Bear Stearns, Global Economy, Automagic, Darfur, Hannah Montana </li></ul>
  3. 3. Advanced programs @ SRA <ul><li>Enterprise Information Management </li></ul><ul><li>Geospatial Technology Systems (Virtual Earth, Virtual Worlds, Autonomous Systems) </li></ul><ul><li>Advanced Wireless </li></ul><ul><li>Business Transformation Services (BPMS) </li></ul><ul><li>Business Intelligence </li></ul><ul><li>Knowledge Management </li></ul><ul><li>Identity Management </li></ul><ul><li>Advanced Infrastructure Management </li></ul>
  4. 4. From Evolution to Revolution
  5. 5. BPM and Web 2.0? <ul><li>Technology </li></ul><ul><li>AJAX </li></ul><ul><li>MySQL </li></ul><ul><li>Apache </li></ul><ul><li>Applicability </li></ul><ul><li>Forms </li></ul><ul><li>Database Backend </li></ul><ul><li>Web Server </li></ul> Wiki Social Networking Instant Messenger Help Desk Expertise Location Instant Access and Presence
  6. 6. Will “Free” be a Disruptor? <ul><li>Do we need to worry about tools like StarOffice, Google Docs, and Microsoft Live? </li></ul><ul><li>Given that standards are permeating throughout the industry, do we need to worry about Open-Source? </li></ul> Linux OS/MySQL Database PHP/AJAX Forms LifeRay Portal (JSR168) Colosa Process Maker/Intalio Open Source Sun Report Builder
  7. 7. The Trends
  9. 9. Transparency <ul><li>Workers </li></ul><ul><li>Managers </li></ul>
  10. 10. Open Book Management <ul><li>Open-book management is a management technique originated by Jack Stack and his team at SRC Holdings and popularized in 1995 by John Case. The technique is to give employees all relevant financial information about the company so they can make better decisions as workers. This information includes, but is not limited to, revenue, profit, cost of goods, cash flow and expenses. (source:WikiPedia) </li></ul>
  11. 11. Open Book Management @#&! ?!
  12. 12. Open Book Management <ul><li>Most employees find out the organization is not doing well when it is too late to actually do something about it. </li></ul><ul><li>How can an employee measure his/her performance against their peers if they can’t see the level their peers are performing at. </li></ul><ul><li>When group goals are set and individual employees can see the deficiency in meeting those goals, they can pick up the slack. </li></ul><ul><li>Underperforming resources will be brought in line because they do not want to be “in last place” </li></ul>
  13. 13. Open Book Management <ul><li>Some Caveats </li></ul><ul><ul><li>This can unlock certain sensitivities amongst workers. If the situation is dire, this could lead to defection. </li></ul></ul><ul><ul><li>Certainly sensitive data must somehow be redacted or not shown at all. </li></ul></ul>
  15. 15. Unified Communications <ul><li>Unified Communications (UC) is a commonly used term for the integration of disparate communications systems, media, devices and applications. This potentially includes the integration of fixed and mobile voice, e-mail, instant messaging, desktop and advanced business applications, Internet Protocol (IP)-PBX, voice over IP (VoIP), presence, voice-mail, fax, audio video and web conferencing, unified messaging, unified voicemail, and whiteboarding into a single environment offering the user a more complete but simpler and more effective experience. (source:WikiPedia) </li></ul><ul><li>Gartner states &quot;The largest single value of UC is its ability to reduce &quot;human latency&quot; in business processes.&quot; </li></ul> Source:VoIP Buzz
  16. 16. What’s driving BPMS Anywhere? Executive Leadership Salesforce Youth Non-Traditional Work Environments I mean when are these guys ever at their desk? The sales force is constantly on the go. They need instant access to close deals, process expenses, and transact other business. Instant Messenger was first widely used in 1996, over 12 years ago. It is now a ubiquitous communication tool amongst a younger generation of workers. Why force them away from that? As BPMS systems move towards more mission based applications and away from backoffice, they need to adapt to front line applications.
  17. 17. Unified Communications <ul><li>One of our principal goals in BPM is to deliver the right information to the right people at the right time. </li></ul><ul><ul><li>As long as they are at their desk… </li></ul></ul><ul><li>Many BPMS suites have Blackberry or PDA views but have yet to build a fully integrated BPM client for these devices. </li></ul><ul><li>We are constantly under pressure to get things done faster. </li></ul>
  18. 18. Getting it Done Faster System could use Instant Messenger Presence to determine if you were at your desk. Notices could be sent right to your IM window for instant response. E-mails can be converted into actionable items through the use of native apps for Smartphone/PDA type devices. Online/Offline functions allow for batch uploads when back in range. Simple Yes/No approvals could be sent via text message from the system.
  19. 19. Software as a Service <ul><li>Why SaaS for BPM? </li></ul><ul><li>Technology platforms are rapidly changing </li></ul><ul><li>Allows for a variety of service delivery models targeting many different size organizations. </li></ul><ul><li>Challenges </li></ul><ul><li>For most enterprises, the largest challenges will be in security. </li></ul><ul><ul><li>Because of the importance of roles and responsibilities, keeping directory services in-sync in real time becomes critically important for large organizations. </li></ul></ul>
  20. 20. SaaS Service Delivery Models
  21. 21. SaaS can Expand the Customer Base <ul><li>Today’s Market </li></ul><ul><li>Fed, State, and Local Government </li></ul><ul><li>Medium and Large Corporations </li></ul><ul><li>Tomorrow’s Market </li></ul><ul><li>Fed, State, and Local Government </li></ul><ul><li>Medium and Large Corporations </li></ul><ul><li>Small Business </li></ul><ul><li>Event Driven </li></ul><ul><li>Subscription Services </li></ul>
  23. 23. Human Interaction Management <ul><li>Based on the work by Keith Harrison-Broninski </li></ul><ul><li>In HIM, a business process requiring human knowledge, judgement and experience is divided into collaborating Roles, which are then assigned to the appropriate people via a Human Interaction Management System (HIMS).  The HIMS not only co-ordinates work activities but also exchanges messages and documents automatically on behalf of the people involved, with full version control and history.  A HIMS is also used to manage the work and integrate it with organizational strategy/tactics, via separation into &quot;levels of control&quot;.  Active processes can be changed on-the-fly as people agree on next steps for the work. </li></ul><ul><li>Where do the Intersections Occur? </li></ul>
  24. 24. Human Interaction Management BPMS doesn’t typically collect information on the interactions that go into making decisions. BPMS typically collects either an output or end result.
  25. 25. Human Interaction Management Meta- Repository The way users are solving problems outside of the BPMS are now being captured. The system is learning.
  26. 26. Human Interaction Management Meta- Repository The end user can now access data on how others have solved similar problems and their methods. This shortens the cycle time thus lowering ETC.
  27. 27. BPM That “Thinks” <ul><li>Semantic Search </li></ul><ul><li>IBM Researchers distinguished two major forms of search: Navigational and Research. In Research Search, the user provides the search engine with a phrase which is intended to denote an object about which the user is trying to gather/research information. There is no particular document which the user knows about that s/he is trying to get to. Rather, the user is trying to locate a number of documents which together will give him/her the information s/he is trying to find. Semantic Search lends itself well here. (Source R. Guha- IBM Almaden) </li></ul><ul><li>Help provide the user search results that augment their understanding of the problem they are trying to solve. </li></ul><ul><li>Artificial Intelligence </li></ul><ul><li>Allowing the computer to make decisions based on its past experience or predictions of the future. </li></ul>
  28. 28. Semantics for Intelligent Search <ul><li>We should be expecting advances in search capabilities within the BPMS suites. Instead of searching on specific process variables, why can’t we ask the system for some context? </li></ul><ul><li>Why can’t we ask the system to simply “Show me instances that look like this one?” </li></ul>
  29. 29. Artificial Intelligence <ul><li>What if the system didn’t need business rules? </li></ul><ul><li>What if we were able to simply train it by having it “watch” how we process items? </li></ul><ul><li>What if we create a new Feedback Loop </li></ul> BPMS Business Intelligence
  30. 30. Using AI for Intelligent Routing Name Processing Time Shelly 1.5 hours Sue 2 Hours James 6 Hours John 10 Hours
  32. 32. Functions and Responsibilities
  33. 33. Approvals Challenge
  34. 34. The Business Logic of Approvals Civil 15657.890 Expense >1000 We are already storing this type of logic in our BPMS tools. Except for the most mature organizations, this information is useless to other processes/groups. ~~~~~~~~~~~~~~~~~~~ If project XXXXX.XXX And If organization = XXX And If Transaction Org = XXX And Amount < XXXX John Smith IF AND THEN
  35. 35. Defining Each Function for Every Process
  36. 36. Role Based Access Control <ul><li>RBAC differs from access control lists (ACLs) used in traditional discretionary access control systems in that it assigns permissions to specific operations with meaning in the organization, rather than to low level data objects. For example, an access control list could be used to grant or deny write access to a particular system file, but it would not say in what ways that file could be changed. In an RBAC-based system an operation might be to create a 'credit account' transaction in a financial application or to populate a 'blood sugar level test' record in a medical application. The assignment of permission to perform a particular operation is meaningful, because the operations are fine grained and themselves have meaning within the application. (source:Wikipedia) </li></ul>
  37. 37. Where is the Shift? <ul><li>Today we are entering role information into our BPMSs and maintaining separate information in our directory services. </li></ul><ul><li>For matrixed organizations, many BPMS role are too complex to store in typical LDAP stores. </li></ul>
  38. 38. Let’s define at a common source Master Functions/Responsibilities Database
  39. 39. Thank You! <ul><li>Jason Adolf </li></ul><ul><li>Principal – Advanced Programs BPMS </li></ul><ul><li>SRA International, Inc </li></ul><ul><li>Contact Information: </li></ul><ul><li>703-284-6166 </li></ul><ul><li>[email_address] </li></ul>