Upload
nathaniel-palmer
View
7.127
Download
1
Embed Size (px)
DESCRIPTION
Citation preview
Welcome Jason Adolf
Principal – Advanced ProgramsSRA International, Inc.
SessionTitle:The Future of BPM: Six Trends Shaping
Process Management
April 21-23, 2008
Renaissance Washington, DC
Buzz Word Page
• Synergy, _____ Centric, Cycles, Anti-Bodies, Benchmarking, Enterprise, Solution, Proactive, Rightsizing, signal to noise, life cycle, ipod, web 2.0, web 3.0, Facebook, Sidekick, Mashup, Steve Jobs, digg, ginormous, Youtube, Bear Stearns, Global Economy, Automagic, Darfur, Hannah Montana
2
April 21-23, 2008
Renaissance Washington, DC
Advanced programs @ SRA
• Enterprise Information Management• Geospatial Technology Systems (Virtual Earth,
Virtual Worlds, Autonomous Systems)• Advanced Wireless • Business Transformation Services (BPMS)• Business Intelligence• Knowledge Management• Identity Management • Advanced Infrastructure Management
April 21-23, 2008
Renaissance Washington, DC
From Evolution to Revolution
4
April 21-23, 2008
Renaissance Washington, DC
BPM and Web 2.0?
Technology• AJAX• MySQL• Apache
Applicability• Forms• Database Backend• Web Server
5
WikiWiki
Social Networking
Social Networking
Instant Messenger
Instant Messenger
Help DeskHelp Desk
Expertise LocationExpertise Location
Instant Access and PresenceInstant Access and Presence
April 21-23, 2008
Renaissance Washington, DC
Will “Free” be a Disruptor?
• Do we need to worry about tools like StarOffice, Google Docs, and Microsoft Live?
• Given that standards are permeating throughout the industry, do we need to worry about Open-Source?
6
Linux OS/MySQL DatabaseLinux OS/MySQL Database
PHP/AJAX FormsPHP/AJAX Forms
LifeRay Portal (JSR168)LifeRay Portal (JSR168)
Colosa Process Maker/Intalio Open Source
Colosa Process Maker/Intalio Open Source
OpenOffice.orgOpenOffice.org
Sun Report BuilderSun Report Builder
April 21-23, 2008
Renaissance Washington, DC
The Trends
7
April 21-23, 2008
Renaissance Washington, DC
MANAGEMENT STYLES
8
April 21-23, 2008
Renaissance Washington, DC
Transparency
Workers Managers
9
April 21-23, 2008
Renaissance Washington, DC10
Open Book Management
• Open-book management is a management technique originated by Jack Stack and his team at SRC Holdings and popularized in 1995 by John Case. The technique is to give employees all relevant financial information about the company so they can make better decisions as workers. This information includes, but is not limited to, revenue, profit, cost of goods, cash flow and expenses. (source:WikiPedia)
April 21-23, 2008
Renaissance Washington, DC
Open Book Management
11
@#&!
?!
April 21-23, 2008
Renaissance Washington, DC
Open Book Management
• Most employees find out the organization is not doing well when it is too late to actually do something about it.
• How can an employee measure his/her performance against their peers if they can’t see the level their peers are performing at.
• When group goals are set and individual employees can see the deficiency in meeting those goals, they can pick up the slack.
• Underperforming resources will be brought in line because they do not want to be “in last place”
12
April 21-23, 2008
Renaissance Washington, DC
Open Book Management
• Some Caveats• This can unlock certain sensitivities amongst
workers. If the situation is dire, this could lead to defection.
• Certainly sensitive data must somehow be redacted or not shown at all.
13
April 21-23, 2008
Renaissance Washington, DC
DELIVERY METHODS
14
April 21-23, 2008
Renaissance Washington, DC
Unified Communications
•Unified Communications (UC) is a commonly used term for the integration of disparate communications systems, media, devices and applications. This potentially includes the integration of fixed and mobile voice, e-mail, instant messaging, desktop and advanced business applications, Internet Protocol (IP)-PBX, voice over IP (VoIP), presence, voice-mail, fax, audio video and web conferencing, unified messaging, unified voicemail, and whiteboarding into a single environment offering the user a more complete but simpler and more effective experience. (source:WikiPedia)
•Gartner states "The largest single value of UC is its ability to reduce "human latency" in business processes."
15
Source:VoIP Buzz
April 21-23, 2008
Renaissance Washington, DC
What’s driving BPMS Anywhere?
16
Executive LeadershipExecutive Leadership
SalesforceSalesforce
YouthYouth
Non-Traditional Work Environments
Non-Traditional Work Environments
I mean when are these guys ever at their desk?
I mean when are these guys ever at their desk?
The sales force is constantly on the go. They need instant access to close deals,
process expenses, and transact other business.
The sales force is constantly on the go. They need instant access to close deals,
process expenses, and transact other business.
Instant Messenger was first widely used in 1996, over 12 years ago. It is now a
ubiquitous communication tool amongst a younger generation of workers. Why
force them away from that?
Instant Messenger was first widely used in 1996, over 12 years ago. It is now a
ubiquitous communication tool amongst a younger generation of workers. Why
force them away from that?
As BPMS systems move towards more mission based applications and away
from backoffice, they need to adapt to front line applications.
As BPMS systems move towards more mission based applications and away
from backoffice, they need to adapt to front line applications.
April 21-23, 2008
Renaissance Washington, DC
Unified Communications
• One of our principal goals in BPM is to deliver the right information to the right people at the right time.• As long as they are at their desk…
• Many BPMS suites have Blackberry or PDA views but have yet to build a fully integrated BPM client for these devices.
• We are constantly under pressure to get things done faster.
17
April 21-23, 2008
Renaissance Washington, DC
Getting it Done Faster
18
System could use Instant Messenger Presence to determine if you were at your desk. Notices could be sent right to your IM window for instant response.
System could use Instant Messenger Presence to determine if you were at your desk. Notices could be sent right to your IM window for instant response.
E-mails can be converted into actionable items through the use of native apps for Smartphone/PDA type devices. Online/Offline functions allow for batch uploads when back in range.
E-mails can be converted into actionable items through the use of native apps for Smartphone/PDA type devices. Online/Offline functions allow for batch uploads when back in range.
Simple Yes/No approvals could be sent via text message from the system.
Simple Yes/No approvals could be sent via text message from the system.
April 21-23, 2008
Renaissance Washington, DC
Software as a Service
Why SaaS for BPM?• Technology platforms are rapidly changing• Allows for a variety of service delivery models
targeting many different size organizations.Challenges• For most enterprises, the largest challenges will
be in security.• Because of the importance of roles and
responsibilities, keeping directory services in-sync in real time becomes critically important for large organizations.
19
April 21-23, 2008
Renaissance Washington, DC
SaaS Service Delivery Models
20
April 21-23, 2008
Renaissance Washington, DC
SaaS can Expand the Customer Base
Today’s Market• Fed, State, and Local
Government• Medium and Large
Corporations
Tomorrow’s Market• Fed, State, and Local
Government• Medium and Large
Corporations• Small Business• Event Driven• Subscription Services
21
April 21-23, 2008
Renaissance Washington, DC
MAKING THE SYSTEMSMARTER
22
April 21-23, 2008
Renaissance Washington, DC
Human Interaction Management
• Based on the work by Keith Harrison-Broninski
• In HIM, a business process requiring human knowledge, judgement and experience is divided into collaborating Roles, which are then assigned to the appropriate people via a Human Interaction Management System (HIMS). The HIMS not only co-ordinates work activities but also exchanges messages and documents automatically on behalf of the people involved, with full version control and history. A HIMS is also used to manage the work and integrate it with organizational strategy/tactics, via separation into "levels of control". Active processes can be changed on-the-fly as people agree on next steps for the work.
Where do the Intersections Occur?
23
April 21-23, 2008
Renaissance Washington, DC
Human Interaction Management
24
BPMS doesn’t typically collect information on the interactions that go into making decisions. BPMS typically collects either an output or end result.
BPMS doesn’t typically collect information on the interactions that go into making decisions. BPMS typically collects either an output or end result.
April 21-23, 2008
Renaissance Washington, DC
Human Interaction Management
25
Meta- Repository
The way users are solving problems outside of the BPMS are now being captured. The system is learning.
The way users are solving problems outside of the BPMS are now being captured. The system is learning.
April 21-23, 2008
Renaissance Washington, DC
Human Interaction Management
26
Meta- Repository
The end user can now access data on how others have solved similar problems and their methods. This shortens the cycle time thus lowering ETC.
The end user can now access data on how others have solved similar problems and their methods. This shortens the cycle time thus lowering ETC.
April 21-23, 2008
Renaissance Washington, DC
BPM That “Thinks”
Semantic Search• IBM Researchers distinguished two
major forms of search: Navigational and Research. In Research Search, the user provides the search engine with a phrase which is intended to denote an object about which the user is trying to gather/research information. There is no particular document which the user knows about that s/he is trying to get to. Rather, the user is trying to locate a number of documents which together will give him/her the information s/he is trying to find. Semantic Search lends itself well here. (Source R. Guha- IBM Almaden)
• Help provide the user search results that augment their understanding of the problem they are trying to solve.
Artificial Intelligence• Allowing the computer
to make decisions based on its past experience or predictions of the future.
27
April 21-23, 2008
Renaissance Washington, DC
Semantics for Intelligent Search
• We should be expecting advances in search capabilities within the BPMS suites. Instead of searching on specific process variables, why can’t we ask the system for some context?
• Why can’t we ask the system to simply “Show me instances that look like this one?”
28
April 21-23, 2008
Renaissance Washington, DC
Artificial Intelligence
• What if the system didn’t need business rules?• What if we were able to simply train it by
having it “watch” how we process items?• What if we create a new Feedback Loop
29
BPMSBusiness
Intelligence
April 21-23, 2008
Renaissance Washington, DC
Using AI for Intelligent Routing
30
Name Processing Time
Shelly 1.5 hours
Sue 2 Hours
James 6 Hours
John 10 Hours
April 21-23, 2008
Renaissance Washington, DC
SECURITY AND ROLES
31
April 21-23, 2008
Renaissance Washington, DC
Functions and Responsibilities
32
April 21-23, 2008
Renaissance Washington, DC
Approvals Challenge
33
April 21-23, 2008
Renaissance Washington, DC
The Business Logic of Approvals
34
CivilCivil 15657.89015657.890 ExpenseExpense
>1000>1000
We are already storing this type of logic in our BPMS tools. Except for the most mature organizations, this information is useless to other processes/groups.
~~~~~~~~~~~~~~~~~~~If project XXXXX.XXXAndIf organization = XXXAndIf Transaction Org = XXXAnd Amount < XXXX
We are already storing this type of logic in our BPMS tools. Except for the most mature organizations, this information is useless to other processes/groups.
~~~~~~~~~~~~~~~~~~~If project XXXXX.XXXAndIf organization = XXXAndIf Transaction Org = XXXAnd Amount < XXXX
John SmithJohn Smith
IF
AND
THEN
April 21-23, 2008
Renaissance Washington, DC
Defining Each Function for Every Process
35
April 21-23, 2008
Renaissance Washington, DC
Role Based Access Control
RBAC differs from access control lists (ACLs) used in traditional discretionary access control systems in that it assigns permissions to specific operations with meaning in the organization, rather than to low level data objects. For example, an access control list could be used to grant or deny write access to a particular system file, but it would not say in what ways that file could be changed. In an RBAC-based system an operation might be to create a 'credit account' transaction in a financial application or to populate a 'blood sugar level test' record in a medical application. The assignment of permission to perform a particular operation is meaningful, because the operations are fine grained and themselves have meaning within the application. (source:Wikipedia)
36
April 21-23, 2008
Renaissance Washington, DC
Where is the Shift?
• Today we are entering role information into our BPMSs and maintaining separate information in our directory services.
• For matrixed organizations, many BPMS role are too complex to store in typical LDAP stores.
37
April 21-23, 2008
Renaissance Washington, DC
Let’s define at a common source
38
Master Functions/Responsibilities Database
Master Functions/Responsibilities Database
April 21-23, 2008
Renaissance Washington, DC39
Thank You!Jason AdolfPrincipal – Advanced Programs BPMSSRA International, Inc
Contact Information:[email protected]