1) The document discusses social patterns, which are ways that social networks can be utilized in businesses. It provides examples of social patterns like using social media to handle customer issues or track internal issues.
2) Social patterns are implemented using social business process management (Social BPM). The document describes how ProcessCODI, a Social BPM tool, can integrate social networks and business processes to enable "smart work."
3) ProcessCODI aims to provide workers with the right resources at the right time through integrating technologies and methodologies, creating a platform for smart and efficient work.
In Finland, Enterprise 2.0 is currently at the early (but accelerating) adoption stage, where competitive advantages will come to those who embrace the new tools and business models. In today's economic climate, that can mean the difference between survival and failure for many companies.
Enterprises and organizations in Finland have found Web 2.0 tools to be effective in reducing costs, however, Finnish organizations and businesses are still early adopters when it comes to the use of Enterprise 2.0 and web 2.0 for revenue growth and innovation.
At its essence, enterprise social computing is the connection of people to people, data to data and people to data within a corporate environment. The discovery, connection and collaboration occurring among employees through social interaction promote the collection of ideas and the encouragement of transparent information sharing, as well as eliminate tacit information loss through long-term employee attrition.
Leveraging social technologies and particularly social workflow is a core part of how organizations today can manage the transition to a new way of working or usher in a more holistic cultural change.
Enterprises always look for ways to help employees collaborate with each other more effectively that leads to faster and higher-quality work, which, in turn, drives increased productivity. Though most enterprises keep employee collaboration on top of their corporate agenda, they still lag behind to drive that force to its optimum level! Using traditional approaches for attaining high productivity and innovation among employees are no more beneficial and effective in fast-technology pace and people oriented work space environments.
Leveraging social media across the organizationHermes F
In today’s socially driven digital landscape, the enterprise must adapt to leverage the social capitol and knowledge of its employees. Change is not instant and companies will need to deploy various solutions to meet its employees’ businesses needs. The true power of social media lies within unifying the various communication platforms to create and grow their knowledge base.
Leveraging
In Finland, Enterprise 2.0 is currently at the early (but accelerating) adoption stage, where competitive advantages will come to those who embrace the new tools and business models. In today's economic climate, that can mean the difference between survival and failure for many companies.
Enterprises and organizations in Finland have found Web 2.0 tools to be effective in reducing costs, however, Finnish organizations and businesses are still early adopters when it comes to the use of Enterprise 2.0 and web 2.0 for revenue growth and innovation.
At its essence, enterprise social computing is the connection of people to people, data to data and people to data within a corporate environment. The discovery, connection and collaboration occurring among employees through social interaction promote the collection of ideas and the encouragement of transparent information sharing, as well as eliminate tacit information loss through long-term employee attrition.
Leveraging social technologies and particularly social workflow is a core part of how organizations today can manage the transition to a new way of working or usher in a more holistic cultural change.
Enterprises always look for ways to help employees collaborate with each other more effectively that leads to faster and higher-quality work, which, in turn, drives increased productivity. Though most enterprises keep employee collaboration on top of their corporate agenda, they still lag behind to drive that force to its optimum level! Using traditional approaches for attaining high productivity and innovation among employees are no more beneficial and effective in fast-technology pace and people oriented work space environments.
Leveraging social media across the organizationHermes F
In today’s socially driven digital landscape, the enterprise must adapt to leverage the social capitol and knowledge of its employees. Change is not instant and companies will need to deploy various solutions to meet its employees’ businesses needs. The true power of social media lies within unifying the various communication platforms to create and grow their knowledge base.
Leveraging
Communication and collaboration in the Enterprise 2.0 worldHuddleHQ
This white paper examines what Enterprise 2.0 is, how it impacts organizations across the globe and why IT departments and business users should gain an understanding of it to help better enable business collaboration. As well as providing real-world examples of how businesses use Enterprise 2.0 collaboration tools and services, this white paper provides advice on how to make the leap and introduce a new stream of work methodologies and cloud collaboration into your organization.
Get a detailed comparison and analysis of available solutions
Social Messaging is the exchange of information in real time by staff and executives. It makes status updates by staff available to the whole network (except if it has been limited to partial networks), which helps colleagues learn from each other, share what they are working on, important events, or relevant information.
Download this summary as a prelude to purchasing the full report at www.aiim.org/reports
How can companies use their internal communities of practice to collaborate, innovate and grow?
This paper explores the elements of internal on-line community success, and provides examples of how Schneider-Electric addresses this challenge.
Social Media in the Workplace - Are We Nearly There?Infor HCM
Since Facebook was invented a decade ago, it has attracted a billion users worldwide. Twitter now reports 200 million users who send 400 million tweets every day. Compounded by record IPO valuations well into the billions, there is little doubt that the social media way of life is here to stay.
Dette notat samler op på en række analyser og anbefalinger omkring begrebet Social Business. Formålet er at give et hurtigt overblik over, hvordan anerkendte konsulenthuse m.fl. ser på betydning og brug af Social
Business.
Notatet er primært en sammenstykning af diverse uddrag og figurer uden en egentlig sammenbindende tekst.
This roadmap is a tool to help organizations effectively develop social business processes and to help identify and address potential issues before they become real problems.
The roadmap is designed as a framework – that is, it addresses a wide variety of issues and challenges, not all of which will be applicable to every organization. Organizations are encouraged to use this roadmap as a starting point, but to customize it to their particular circumstances including their regulatory environment, organizational culture, level of familiarity with different tools, and of course their overall strategic goals and objectives.
Organizations that follow this roadmap will move from tactical, ad hoc, and suboptimal approaches to social business technologies to a more strategic and systematic implementation.
Improving employee engagement and performance through social analytics sada...N. Sadat Shami
The use of social media in the workplace is growing. One anticipates this trend to continue as more and more individuals comfortable with social media join the workforce. Social media provides an opportunity for organizations to obtain a real-time understanding of various aspects of the employee experience. For organizations to truly benefit from this aspect of social media, there is a need to build tools that allow an organization to make sense of the large scale unstructured data generated by social media. In this talk, I will first introduce a tool named Social Pulse that enables an organization to understand the social media chatter and sentiment of its employees. Social Pulse provides text and sentiment analysis, search and filtering, and several visualization features while respecting employee data privacy. I will then discuss how the data generated through Social Pulse can lead to insights that can improve outcomes of interest to an organization, such as employee engagement and performance.
The ESN meets a more abstract set of business requirements, selected to address a list of
long- standing functional challenges, e.g. increasing employee engagement, enhancing collaboration, better access to knowledge, reducing travel costs, speeding up business processes, or enabling the future of work.
Communication and collaboration in the Enterprise 2.0 worldHuddleHQ
This white paper examines what Enterprise 2.0 is, how it impacts organizations across the globe and why IT departments and business users should gain an understanding of it to help better enable business collaboration. As well as providing real-world examples of how businesses use Enterprise 2.0 collaboration tools and services, this white paper provides advice on how to make the leap and introduce a new stream of work methodologies and cloud collaboration into your organization.
Get a detailed comparison and analysis of available solutions
Social Messaging is the exchange of information in real time by staff and executives. It makes status updates by staff available to the whole network (except if it has been limited to partial networks), which helps colleagues learn from each other, share what they are working on, important events, or relevant information.
Download this summary as a prelude to purchasing the full report at www.aiim.org/reports
How can companies use their internal communities of practice to collaborate, innovate and grow?
This paper explores the elements of internal on-line community success, and provides examples of how Schneider-Electric addresses this challenge.
Social Media in the Workplace - Are We Nearly There?Infor HCM
Since Facebook was invented a decade ago, it has attracted a billion users worldwide. Twitter now reports 200 million users who send 400 million tweets every day. Compounded by record IPO valuations well into the billions, there is little doubt that the social media way of life is here to stay.
Dette notat samler op på en række analyser og anbefalinger omkring begrebet Social Business. Formålet er at give et hurtigt overblik over, hvordan anerkendte konsulenthuse m.fl. ser på betydning og brug af Social
Business.
Notatet er primært en sammenstykning af diverse uddrag og figurer uden en egentlig sammenbindende tekst.
This roadmap is a tool to help organizations effectively develop social business processes and to help identify and address potential issues before they become real problems.
The roadmap is designed as a framework – that is, it addresses a wide variety of issues and challenges, not all of which will be applicable to every organization. Organizations are encouraged to use this roadmap as a starting point, but to customize it to their particular circumstances including their regulatory environment, organizational culture, level of familiarity with different tools, and of course their overall strategic goals and objectives.
Organizations that follow this roadmap will move from tactical, ad hoc, and suboptimal approaches to social business technologies to a more strategic and systematic implementation.
Improving employee engagement and performance through social analytics sada...N. Sadat Shami
The use of social media in the workplace is growing. One anticipates this trend to continue as more and more individuals comfortable with social media join the workforce. Social media provides an opportunity for organizations to obtain a real-time understanding of various aspects of the employee experience. For organizations to truly benefit from this aspect of social media, there is a need to build tools that allow an organization to make sense of the large scale unstructured data generated by social media. In this talk, I will first introduce a tool named Social Pulse that enables an organization to understand the social media chatter and sentiment of its employees. Social Pulse provides text and sentiment analysis, search and filtering, and several visualization features while respecting employee data privacy. I will then discuss how the data generated through Social Pulse can lead to insights that can improve outcomes of interest to an organization, such as employee engagement and performance.
The ESN meets a more abstract set of business requirements, selected to address a list of
long- standing functional challenges, e.g. increasing employee engagement, enhancing collaboration, better access to knowledge, reducing travel costs, speeding up business processes, or enabling the future of work.
Social tools are now being offered by a number of collaboration vendors. Many organizations are unsure of how to integrate social tools with existing team workflows. Managers must embrace, rather than hinder, integration of social collaboration tools. This storyboard, along with its accompanying tools, will help you:
* Understand social collaboration and how it builds team effectiveness.
* Develop a strategy for enabling social collaboration patterns with technology.
* Understand the major vendors and feature sets for social tools.
* Foster a culture that encourages the use of social collaboration tools.
Managers must recognize that social tools are powerful enablers of knowledge-sharing and productivity in the age of the team.
BLOOM Social Media: Navigating the Social Technology LandscapeDifferent Spin
Report author: Miranda Man, Social Business Strategist at BLOOM. Are you confused by social technology? Do you know your social media listening tools from your engagement tools? What is the difference between Yammer and Jive? How can I use these tools in my business?
To help, we are pleased to announce that we have written a report that provides an overview of a number of social tools. In this report, we have outlined use cases, case studies and key functionality. We will be looking at technology in the context of Social Business Intelligence (the progression from Social Media Marketing) and Enterprise 2.0.
This roadmap is a tool to help organizations effectively develop social business processes and to help identify and address potential issues before they become real problems.
Social software lets employees connect and share in new ways, and can dramatically improve the effectiveness of your organization. But social technologies like microblogging, social networking, automated activity feeds, social spreadsheets, wikis, etc. are new to most organizations, and most IT departments don’t have experience with how to successfully implement them.
Success with social software involves a lot more than simply finding the product that best fits your needs. It involves framing the problem appropriately in the first place, defining your business goals, and choosing a rollout methodology designed to meet those goals. It involves selling your CFO, changing behavior across your organization, and more.
This paper is designed to help you learn from the mistakes of others before you, so you can avoid the common pitfalls of social software, and get fast business value.
Chapter 2 is all about defining social business strategy. Essentially, I condense the entire content of my first book, Smart Business, Social Business, into one chapter and introduce new thinking, implementation strategies and new models.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
ProcessCODI - A SmartWork Platform based on Social Patterns
1. uEngine.org
White paper
ProcessCODI – A SmartWork Platform based on Social Patterns
JaeHoon Lee, Ph.D
uEngineSolutions, Senior research engineer
June/2011
1. Why social pattern?
It is the AGE of Social Network! We see exploding social network articles, conferences, services, and
experts everywhere. As usual, media and newsmakers are forcing companies to have interest in social network.
Will the social network be the final goldmine of business or disappear as another fad?
Before having tools of social network services (SNS), we already have used social network naturally in our
daily life. We make relationships with people, communicate and interact with them, share useful information.
Although modern business processes in companies are specialized and standardized, it is always required to
utilize the resources and information existing outside organizations. Now they are visualized and digitalized by
the social tools, and our interest is how to utilize them in business effectively.
Figure 1 Role of ProcessCODI for smart works
Technically, there are two views on utilizing social networks. One is “How to raise the value of a company
through social networks” and the other is “How to reduce and prevent potential problems from use of social
networks”. Using social networks is undoubtedly promising, but need to be managed at the same time. To
2. manage them, they should be “discovered”, “visualized”, “standardized”, “defined”, “planned”, and finally
“improved”. Interestingly, these concepts are closed to those of BPM methodology. Moreover, because social
networks are bigger structure than an enterprise, the patterns of social business processes may be much more
complicated. In this article, we call them as “Social Patterns”.
Social patterns make an important role in decision-making when a business unit tries to utilize social
networks. According to the types of social patterns that a company has, their management can either create
values or cause losses. For example, use of social networks for managing customers is a great trend for recent
on-line B2C companies. On the other hands, companies that have severe security policies have to be prudent
when to adopt social networks. In the previous paper, we figured a social pattern named “Smart worker’s
business process”. As shown in Figure 1, business environment consists of the inside of an organization which
has hierarchical structure, formal data and tasks, enterprise systems, and the outside which has horizontal
networks, informal data, and distributed systems.
One of the biggest obstacles of smart works is that these two areas are separated by the firewall of an
organizational boundary. ProcessCodi makes pipelines into this wall so that smart workers can retrieve
information through them. In addition, ProcessCodi controls the issues on the outer flow which is related to
security and the inner flow which is related to information quality or copyright. As a consequence, social
patterns refer to the flow of value in using social networks by companies.
2. How social patterns are created and used
Social patterns are categorized by the target to be mainly utilized by a business unit. They can be human
networks or opened information outside a company. Human networks are used to encourage participation of
domain experts or promote a product or a service to potential customers. Patterns using opened information are
to capitalize open contents as knowledge of a company through mash-ups. Let’s see examples.
Issue tracking through collective intelligence
Figure 2 Issue tracking through collective intelligence
The pattern shown in Figure 2 can be used in an IT service company or a consulting firm. 1) An employee
who encounters a trouble will raise an issue by updating “My status” on a SNS. 2) Experts who have interest in
the topic may respond to it and suggest their opinions. 3) After verification of the suggestions by related
departments, 4) the issue will be finished.
3. Claim handling process based on SNS
Figure 3 Claim handling process based on SNS
This pattern can be utilized in manufacturing or sales industries. Also, this is one of the improved types of
business process in brand marketing. 1) If a customer complaint in SNS appears, 2) a CS department may detect
and analyze it, and 3) raise an issue to the related departments. 4) These cases are stored in the database, and 5)
the results be notified not only to the customer 6) but also to SNS to prevent similar claims.
Product image analysis
Figure 4 Product image analysis
This pattern is for a company which uses open contents frequently. 1) To analyze the image of a product, 2) a
company searches the related slides from Slideshare, 3) blogs, 4) movie clips from Youtube, 5) and makes a
report by mash-ups to make as an asset of the company.
4. Document management in open source project
Figure 5 Collaborative document management in open source project
This pattern may be used in a SW company or community based on open source. 1) After starting a project,
the PM group opens the project documents to Wikipedia. 2) These documents may be supplemented by
participants and 3) open content mash-ups. 4)5) When they have matured quality, they will be published
officially by PM groups.
3. How Social BPM implements social patterns
Social patterns span over organizations, users, and systems in wide area, thus they have to be implemented
by integration of SNS, e-mail, knowledge management, BPM. Social BPM is a powerful tool to provide these
integrated functions. Let’s see examples through ProcessCODI - the Social BPM tool.
Integration of SNS and business processes
Figure 6 Integration of SNS and business processes
5. The basic function of Social BPM is to get external workers involve into the internal business processes. To
do so, the organizational chart of BPM should include information of SNS users. Figure 8 shows a contact list of
ProcessCODI which can include potential users for a task. If you have an expert about your job among
Facebook friends, he/she can be involved into the task. At this time, ProcessCODI can control security problems
by forcing the participants to get steps of approval.
Communication and seamless business processes
Figure 7 Communication and seamless business processes
Business tasks are often to start from a time point when he/she gets an email. ProcessCODI provides an
integrated work list including workitems, emails, chatting, and SNS communication. A business process can be
triggered at the point of taking a workitem. In this point, participants for the process can be added flexibly, and
the whole contents are stored and managed as process instances.
Figure 8 Strategy mind-map and knowledge mash-up
The core knowledge of a company is an enterprise strategy. A mind-map enables smart workers to
6. implement, understand, and share a strategy. The practical method to connect a strategy to business in
ProcessCODI is to connect processes from a node of a mind-map. Also, key nodes of a mind-map can be
transformed as a strategy map so that they can view in a Navigator, which allows managing knowledge and
processes in an integrated environment.
4. The goal of ProcessCODI: Smartwork
Figure 9 ProcessCODI as a smartwork platform
Social patterns are a way to SMART USE of resources and information in both the inside and outside of an
organization. And ProcessCODI is an integrated approach and tool for smart work. ProcessCODI provides a
smart worker right resources at right time so that he/she can concentrate his/her own value added jobs.
Consequently, ProcessCODI aims at integration of technologies and methodologies, and finally a total platform
for smart works.
About the author
JaeHoon Lee, Ph.D
Dr. JH Lee has spent almost five years in the area of BPM in both theory and application. He has the records
of academic research papers for BPM in various industries such as medical, quality engineering, and applied
statistics. Recently, Dr. Lee has been working with uEngine.org, which is one of the world famous open-source
BPM projects.