It is especially designed to automate and streamline IT services, help desk and customer support processes. Its also provides an integrated knowledge base with built-in customizable search feature for instant business intelligence features such as alerts, reports and emails.
How a Business Process Vision May Boost Innovative IdeasNathaniel Palmer
Even before fascinating promises about orchestrating organizations, BPM directly supports different and previously unexplored points of view.
While traditional/transactional systems were designed and developed to vertically support departmental needs, BPM suites take care of creating bridges to link those functional islands together, in order to map and manage the evolution of companies cross activity paths. But beyond this relevant and valuable horizontal perspective, there are very significant organizational implications strictly related to the maturity of those BPM tools in terms of level of abstraction and business approach they propose. Starting from WHAT can be managed by BPM suites, this session will focus on HOW they allow to proceed involving users and managers
totally, when adopting an implementing-analysis approach, with unpredictable benefits and new ideas.
User Interface Derivation from Business Processes: A Model-Driven Approach fo...Jean Vanderdonckt
This presentation defines a model-driven approach for organizational engineering in which user interfaces of information systems are derived from business processes. This approach consists of four steps: business process modeling in the context of organizational engineering, task model derivation from the business process model, task refinement, and user interface model derivation from the task model. Each step contributes to specify and refine map-pings between the source and the target model. In this way, each model modification could be adequately propagated in the rest of the chain. By applying this model-driven approach, the user inter-faces of the information systems are directly meeting the require-ments of the business processes and are no longer decoupled from them. This approach has been validated on a case study in a large bank-insurance company
Business modeling with UML Eriksson-Penker NotationMassimo Talia
Hans-Erik Ericsson is founder and Chairman of Open Training Magnus. Penker is CEO of Open Training. In order to keep up and be competitive, all companies and enterprises must assess the quality of their products and the efficiency of their services.
Use of free or cheap tools from SAAS and the cloud to support ITSM. There's a lot out there that can plug a hole if you can't afford the big expensive tool sets.
Presented at itSMFA August 2010.
Comprehensive solution with the functionality of ECM and Adaptive Case Management. Citeck EcoS is based on the open-source Alfresco platform with unique features and solutions built on top of it, such as Loan origination, Meetings, Contract Management etc.
Enterprise Content Management, Documentum Overview. This presentation shows what is ECM, why we need ECM, EMC History, EMC Content Management Portfolio, Documentum and Captiva Products overview
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
It is especially designed to automate and streamline IT services, help desk and customer support processes. Its also provides an integrated knowledge base with built-in customizable search feature for instant business intelligence features such as alerts, reports and emails.
How a Business Process Vision May Boost Innovative IdeasNathaniel Palmer
Even before fascinating promises about orchestrating organizations, BPM directly supports different and previously unexplored points of view.
While traditional/transactional systems were designed and developed to vertically support departmental needs, BPM suites take care of creating bridges to link those functional islands together, in order to map and manage the evolution of companies cross activity paths. But beyond this relevant and valuable horizontal perspective, there are very significant organizational implications strictly related to the maturity of those BPM tools in terms of level of abstraction and business approach they propose. Starting from WHAT can be managed by BPM suites, this session will focus on HOW they allow to proceed involving users and managers
totally, when adopting an implementing-analysis approach, with unpredictable benefits and new ideas.
User Interface Derivation from Business Processes: A Model-Driven Approach fo...Jean Vanderdonckt
This presentation defines a model-driven approach for organizational engineering in which user interfaces of information systems are derived from business processes. This approach consists of four steps: business process modeling in the context of organizational engineering, task model derivation from the business process model, task refinement, and user interface model derivation from the task model. Each step contributes to specify and refine map-pings between the source and the target model. In this way, each model modification could be adequately propagated in the rest of the chain. By applying this model-driven approach, the user inter-faces of the information systems are directly meeting the require-ments of the business processes and are no longer decoupled from them. This approach has been validated on a case study in a large bank-insurance company
Business modeling with UML Eriksson-Penker NotationMassimo Talia
Hans-Erik Ericsson is founder and Chairman of Open Training Magnus. Penker is CEO of Open Training. In order to keep up and be competitive, all companies and enterprises must assess the quality of their products and the efficiency of their services.
Use of free or cheap tools from SAAS and the cloud to support ITSM. There's a lot out there that can plug a hole if you can't afford the big expensive tool sets.
Presented at itSMFA August 2010.
Comprehensive solution with the functionality of ECM and Adaptive Case Management. Citeck EcoS is based on the open-source Alfresco platform with unique features and solutions built on top of it, such as Loan origination, Meetings, Contract Management etc.
Enterprise Content Management, Documentum Overview. This presentation shows what is ECM, why we need ECM, EMC History, EMC Content Management Portfolio, Documentum and Captiva Products overview
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
National Security Agency - NSA mobile device best practices
Adaptive Case Management (ACM)
1. Adaptive Case Management (ACM)
as an instrument of social management
of business processes within a company
Victor Senkevich
PayDox Case Management
2. What is a modern company ?
Define it in one word
The correct answer is on the next slide
What is a company?
3. A company – is people
To be more precise, it is people working together towards a common goal
These people cooperate to support the functioning of multiple business
processes within a company
In cooperating, employees of a company utilize elements of its infrastructure
(or technosphere) – machinery, computers, telephones, desks, etc.
What is a company?
7. Up to chaotic and completely unpredictable
Business Processes (social aspect)
8. Strictly defined business processes are easily
automated by traditional information systems
Social business processes, prevailing in a modern
office, are often «automated» through any means at
hand – e-mail, forums and blogs
Plugged in office workers, equipped with iPhones and
iPads, are waiting for business-applications that
provide familiar ease of use
Corporate business processes
9. Traditional systems for controlling business
processes (Business Process Management,
BPMS) support strictly defined sequences of
actions
BPMS allows for automation of structured and formalized lists of tasks
completed within an organization: processing of similar orders, standard
formalizing of business trips, repeated purchasing of equipment and materials, etc.
Corporate business processes
10. Descriptions of business processes in traditional BPMS are compiled by a
business analyst. To this end, studies of business processes within a
company are conducted.
Configuration of the BPM-system for controlling real business processes are
made by qualified programmers.
Corporate business processes
11. In other words, descriptions of business processes and configuration of a
traditional BPM-system require more time investment from qualified labour
Corporate business processes
12. Unfortunate shortcomings of traditional BPMS
After launching a traditional BPMS, it becomes apparent after a short time
that change is constant within an organization. But who would have thought
otherwise?
And so descriptions of business processes and configurations of the BPMS
already don’t reflect the real processes used. Thus we are forced to start over.
The BPMS does not have any adaptability to real life situations.
Additionally, the BPMS does not reflect any of the social management
aspects within an organization.
13. A significantly large portion of work performed by teams of employees, in
collaboration, is unstructured, requires discussion, assignment of tasks based
on analysis of the current situation, and control of time lines in completion of
tasks and assignments
Traditional BPMS are poorly, or not at all, suited to react to problems, which
arise in the performance of a business process from changing circumstances or
opinions of the participants within the business process. In BPMS, there is no
support for social functions
Unfortunate shortcomings of traditional BPMS
14. A business process management system without social functions
«constitutes one of the main traits of the bourgeois world view – its
inhumanity, endeavor to turn workers into a cogs, to replace a living,
thinking, fighting for his own interest man with a machine»
(1954, USSR’s Short Philosophical Dictionary of Cybernetics)
Unfortunate shortcomings of traditional BPMS
15. To enhance the BPMS with social functions: discussions, tasks, assignments,
groups of users
What must be done?
To create a new class of applications – Adaptive Case Management
systems (ACM), realizing principles of social management and oriented not on
the process, but on results
To integrate BPMS and ACM
Unfortunate shortcomings of traditional BPMS
16. ACM systems are intended for
organization of teamwork, tasks and
assignments, control over time
frames and execution
Adaptive Case Management (ACM)
17. Description
of tasks,
assignments,
events,
control points
Discussions
Lists of
implementers,
recipients,
participants,
controllers,
authors,
managers
Documents
and other
files
Tags and
other forms
of data
Business
rules
Cases – sequences of tasks and messages,
containing:
Adaptive Case Management (ACM)
18. Case Management Organization Chart
Manager
formulates
a task or
assignment
Implementers
complete tasks and
assignments, create
subtasks and
discussions
Manager /
Controller
manages the
performance of
tasks and
assignments
Reports
Author
creates a task
or case in the
ACM system
The case is
created manually
The case is created
from a library
of templates
An incomplete case
can be cancelled
A completed case
is closed
A request is
received from
a client
There is a demand
for goods or
services in another
business unit of
the company
19. What must an ACM system be like?
To manage not separate tasks and assignments, but cases – collections of tasks
and assignments, connected with the execution of an entire business process
Tasks, assignments, discussions
may be presented as a case –
a sequence of messages, that
may be entered in the correct
order and containing descriptions
of tasks, recipients, completion
time frames, files
20. Store all information on a business process in a virtual folder – all documents,
photographs, videos, drawings and other files
The multimedia catalogue allows for loading into
the case any number of documents and files,
opening and viewing documents in various
formats, playing video and sound files, viewing
photographs in a slide show, creating subfolders
for distribution of files to groups, creating
descriptions of the file catalogue
What must an ACM system be like?
21. Manage users within the case project team, give or revoke access to case
tasks, files and messages, inform users of the need to begin work on a new task
within the project
It is possible to allow access to all tasks and
discussions of a particular theme to only one
specific group of users, participating in the
realization of the project or case.
It is possible to define users, roles, as well as
whole subdivisions, or access groups (groups
of users, which are formed for the realization
of the project or case)
What must an ACM system be like?
22. Maintain control over rules, allowing for automatic activation of the case’s next
task once a task has been completed, send users reminders, etc.
Assignments and tasks can be given rules
for automatic status updates. This way,
varying levels of priority can be given to
tasks and assignments, basically creating
maps for completing cases
What must an ACM system be like?
23. Have a developed subsystem of filters, obtaining information on various
segments in one click – «open assignments», «overdue», «assignments for current
user», «assignments for subordinate employees», «outstanding department
assignments», etc.
One click of the mouse on a point or icon
in the left menu allows you to obtain
various lists of tasks and assignments,
meant for the current user, as well as
subordinate users or a whole department
What must an ACM system be like?
24. Keep a log of all user actions
Task authors and administrator can see a
short history of the work completed on a
task by users (who created the task, when
it was created, any edits to discussions and
changes to status)
What must an ACM system be like?
26. Support a library of templates, where you can successfully drop completed
cases in one click, so that later you can create a whole case on any topic based on
the template, already containing all tasks, all implementers, and all samples of
documents and other files
What must an ACM system be like?
27. Easy to understand and attractive – present lists of tasks in cases as
«checklists» – lists of tasks, in which checkmarks indicate completion and icons
show all current statuses of tasks and assignments
What must an ACM system be like?
28. Full functionality on desktop computers, laptops, and tablets (iPad and others)
What must an ACM system be like?
29. And the main requirement for ACM – adaptability. The system must not
require detailed inspection of business processes and programming with
configurations for new business processes. New cases are formed by users
as lists of tasks, which require completion, and are corrected and added to in the
course of performance of the process
What must an ACM system be like?
30. Important advantages of ACM
The ACM system – a tool for creation of corporate knowledge base. All
knowledge, which is created in «office» business processes, may and must be
separated from its bearers and saved for enterprise wide use to avoid creation
of narrow or «unique», «irreplaceable» employees
Adaptive Case Management (ACM) is a tool for this separation which
provides for timely and stable performance of work by employees
31. Equally important is Adaptive Case Management’s ability to accumulate
corporate knowledge for future use.
Successfully completed cases, containing valuable information on collective
work performed by employees, are stored in a library of templates, slightly
adjusted and cleaned up for universal application (all non-essential discussions
and comments are deleted, only important tasks, assignments and milestones
are kept). After this is done, a new case on the similar business process can be
created with a single click. The process is then repeated.
As a result, for each subsequent project there is a convenient template with
a list of tasks, assignments, a collection of forms, lists of implementers and
document templates. The ever increasing library of case templates composes
corporate knowledge, separated from concrete employees and stored in a
digital format for corporate use.
Important advantages of ACM
32. Use of an Adaptive Case Management system helps avoid the creation of
bottlenecks, unique or irreplaceable employees, whose vacations in the
Caribbean, prior to the implementation of the system, would result in
significant strain and work stoppages for remaining colleagues, but can now
relax in peace during their vacations – current results of their corporate
activities (tasks, contacts, documents, discussions) are stored in ACM.
Important advantages of ACM
33. «It’s impossible to automate chaos!»
«Automated chaos does not stop being chaotic!»
Common misconceptions
The adaptability and flexibility of ACM allows
a company to automate its business processes
«as is», in a fashion that is familiar to employees,
without engaging in a risky implementation
process, without stressing staff, or breaking existing
business processes to achieve a theoretically
correct condition «to be».
Possible «chaos», which in this case is automated,
becomes qualitatively different – measurable and
controlled.
After implementation of ACM, business processes
become transparent, it becomes possible to perfect
them in practice, and not on paper – easily
adjusting and improving case templates.
Important advantages of ACM
34. Advantages of ACM for business
What percentage of large companies use
BPM systems?
ACM – is it Versace jeans
or jeans from a flea-market?
And what percentage of small companies use
BPM systems?
This means there is room to grow.
5%?
In this case, «traditional» BPM systems do not
stand a chance.
0,01%?
15%?
Additionally, this means that not everything is
well with the use of these systems even in places
where there are sufficient resources.
35. «Pure» BPMS are elitist, much like Versace jeans, and small business can
never use them.
However, ACM systems, due to their ease of use and availability can be used
by 90% of small enterprises – an easy to use system for managing tasks,
where you can indicate completed work with a checkmark, is needed by
practically everyone.
Systems like ACM will, like jeans from a flea-market – be a cheap and
accessible good of mass consumption.
Advantages of ACM for business
36. Examples of ACM business processes
Processing of a car loan application
40. Conduct of a meeting
Examples of ACM business processes
41. The current world trend in the IT field
Present world trends of leading software developers can be expressed with the phrase
«Novelty replaced with complexity». When there is nothing to say, there are no new
ideas, but a new version needs to be launched to continue generating profits, the market
is flooded with software monsters.
Users are prepared to sacrifice functionality in
favor of simplicity. Progress in the IT field is
strongly tied to this – small companies with simple
applications often successfully compete with
software monsters and their products that have
consumed millions of programming hours.
A majority of users are already searching the
market for inexpensive and easy to use mobile
phones – that only support phone calls and SMS
service as well as basic corporate applications –
no more complex than email.
Trend of the new millennium: NO FRILLS NEEDED!
Simplicity is more important than functionality
42. Everything genius becomes simple only with time,
initially it seems primitive
«Grandma phone» with only one button
The current world trend in the IT field
43. «Not a single manager was fired for selecting a solution from IBM»
«A system administrator overseeing a system that never breaks is not noticed, but
a system administrator overseeing a system that breaks regularly is lauded as a
hero, who saves the company at a critical moment»
Influence of corporate psychology on IT
Expensive and complicated solutions from a
«large vendor»:
high cost of ownership (TCO)
problematic return on investment (ROI)
high risk of implementation failure
denial of failure of such an implementation
44. Sociality and simplicity – a modern trend
in the IT field. Instead of complex descriptions
of business processes, the entire Adaptive Case
Management revolves around checklists, lists of
tasks which must be completed, and checkpoints
(or milestones, control points)
For ACM, this checklist consisting of tasks
and control points – is the same as the «happy
path» in traditional BPM systems – the main
list of actions, which must be completed and
which are assumed prior to the start of the
process. However, in ACM this list is
corrected and supplemented in the carrying
out of the process, in other words it is
constantly adapted to reality.
ACM is oriented on results, a process to
achieve these results is adapted along the way
The current world trend in the IT field
45. The Occam’s razor principle
The Occam’s razor principle is hopelessly forgotten by many IT vendors
And the appearance of ACM can be treated as a return to simplicity and
fundamental principles of the monk Occam
Ease of use and social functionality – the motto of ACM!
William of Ockham
~1285—1349
Entities should not be
multiplied unnecessarily