Simplifying the Complex

These days, everywhere you look there’s more and more information bombarding us. Our email inboxes are flooding over, blogs, websites and RSS feeds provide a constant stream of updates, and new social networking sites such as twitter.com even allow your friends and family to track every movement you make – from running out to Starbucks to kicking back and watching the latest thriller on DVD. No matter how you slice it, the general public is exposed to a whole lot more information today than they were ten or twenty years ago.
Of course, it’s the same for businesses – only it’s worse. As I’ve explored in previous columns, today’s businesses are consuming, generating and repurposing huge amounts of data these days. And it’s not just coming from traditional order entry-type applications or individual users. Today, organizations have to deal with a wide range of data sources that are constantly delivering new information. The range is almost endless-it could be financial market data, network events, application data, RFID or sensor events, Web/click events or just about anything else. The effect is the same-many organizations need a proactive way to analyze, process, and act upon this ever-expanding volume of information flowing through the company from a myriad of (potentially time-critical) sources.

Share

Application Management: Consider the End User

Over the years, the view of what IT was (and is) has expanded. Initially IT was a mainframe computer, a few programmers, and batch programs that generated reports for a limited number of internal employees. Then it was mainframes and terminals, with applications that handled the most mission-critical (or at least computationally-critical) portions of a company’s business process. These were used by even more employees. Then, over time, IT evolved to mini-computers with many users, personal computers for all employees and now Web- or Intranet-based solutions intended to be used by employees, partners, customers and just about anyone else.
At the same time that this expansion has been happening, there’s been an expansion of the notion of the role of applications, as well as an expansion of the importance of application management. For example, initially, applications were managed centrally, but over time organizations have either stopping managing them (remember client/server?) or invested in IT-oriented solutions that can now package, deploy, and manage applications across a wide range of systems and users.

Share

A Look Back at 2007: Cutting Complexity Out of the Agile Organization

Sometimes people can look at something and come to completely different conclusions. Take my ten-year-old son. To him, if he has to do something (or if he’s required to do something) it’s not worth doing. He can always think of something else that’s more interesting or more worthwhile.
However (perhaps just because I’m a parent) I believe the opposite. That just because you have to do something doesn’t mean that it’s not worth doing. In many cases, the things that we’re required to do can end up being very beneficial for us. It’s just that it’s not always obvious how they’re beneficial.
I believe that the same thing principle operates when it comes to compliance, IT compliance and auditing. By now everyone’s aware of the impact that regulatory and industry requirements have had on just about all sizes of organizations. And while the majority of regulations and compliance requirements apply to public companies, in many cases even private companies have been swept along on the compliance tide. Over the past few years, all types of organizations have had to implement a wide variety of compliance-oriented tasks, steps and processes to help them define, document and manage data and processes.

Share

SOA and IT/Business Alignment

One potential benefit of creating an SOA solution can be a focus on greater governance and serve to facilitate a more effective bridge between business and IT. By combining SOA with BPM and business rules, an IT organization can create a solution that allows business analysts to use model processes and use business rules and policies to ensure that what IT delivers in line with the business strategy and that it meets that service level agreements required. Doing so probably requires more governance than traditional solutions, but the benefits can help create more efficient IT organization, a reduction of duplicate functionality in IT projects.

Share

How Do You Do QA for Perfomance Management?

Doing performance management correctly is like trying to get my kids to wash their hands. Sure, I can create a process or rule for it: When our hands are dirty, we wash them. Then I can ensure that the components of the process are available and responsive: There’s soap by the sink and the hot and cold water turn on easily. But even when I’ve set everything up, and have the metrics established (we need to wash our hands daily!), how can I be sure that they’ll be achieved? And if they are achieved, are they being achieved correctly?
For example, it’s pretty easy to identify when my older son isn’t meeting our performance goals: His hands are clearly filthy. But it’s a bit tougher with my younger son: He did wash his hands. But did he use hot water? Did he use soap? Did he actually scrub for a reasonable period of time (or did he simply pass them under the water)? It can be hard to tell. I’ve also discovered that there’s usually no adequate feedback mechanism to help me identify when there are user or system problems. For example, we can be out of soap for days in their bathroom and I’ll never hear about it. Or they may decide on their own to use one of those liquid hand sanitizers instead of actually washing their hands. It’s hard to know sometimes.
The point is, even with the right process (or application) and tools, the effectiveness of the result really depends on actions of the users. If there are user failures (like failing to report missing soap, using cold water, etc.), then the resulting process is going to be ineffective.
As I will explore in my next column, it’s the same with enterprise performance management and an organization’s applications. When enterprise applications like SAP, Oracle or Seibel aren’t being used effectively and efficiently by users, the business results will suffer.
One solution to this problem is putting solutions in place that can collect and manage information not only on your applications, but on the user experience of the users using those applications. Let’s look at what that means.
Of course, you’d want to start by collecting traditional application management-related information like response time and availability. You’d also want to know the transactional response times-for example, how long does it take the application to respond after the “enter” key is pressed? But-and here’s where it starts to go beyond traditional management solutions-you’d also want to know how long it takes for users to navigate through the application screens.
Are they spending too much time on difficult to navigate or complete screens? Of course, you’d also want to collect information on which applications (and transactions) what people are using. It would also be helpful to collect information about quality of the users’ experience and any errors in the infrastructure or application, whether they’re cause by the user or by something in the IT environment. For example, perhaps users are getting errors trying to connect to certain applications or databases, but such errors aren’t getting reported.

Share

Metastorm Seeks to Grow European Presence with Acquisition

Metastorm Corp. announced its second acquisition of the year on Wednesday, revealing its intention to purchase a European services organization. The acquisition of Process Competence, a European consulting firm specializing in helping organizations design and optimize customer-oriented business processes, follows Metastorm’s acquisition this past summer of Proforma Corporation, a vendor of enterprise modeling and business process analysis solutions. No financial details were released for this latest acquisition, but Metastorm stated it would be completed November 19th. Process Competence was already a certified Metastorm partner and a licensed distributor for the Metastorm ProVision modeling suite, one of the products that Metastorm acquired through Provision.

In a message sent to the media and analyst community, Metastorm identified a number of reasons behind its acquisition of Process Competence, including the fact that it provides an extension of Metastorm’s presence in Europe, adds best practice expertise in process modeling and optimization, and brings many leading European companies into the Metastorm customer portfolio. The company will retain all Process Competence employees as well as two of the three European offices.

The Upside Uptake
This acquisition adds several important aspects to Metastorm’s position. It provides instant expert knowledge of the Proforma products that Metastorm has been folding into its BPM ecosphere, enabling Metastorm to more easily transition into a company that espouses enterprise architectures and process models alongside business process management. The acquisition also provides Metastorm a stronger entry into some of the leading European companies that are already using process modeling tools and may be interested in expanding into a business process management platform. And, the acquisition of Process Competence also immediately builds Metastorm’s footprint in Europe, a market that the company has identified as a strategic geography.

As we mentioned in a previous Upside Update, the Proforma acquisition enables Metastorm to differentiate itself from some of the other original, pure-play BPM vendors. While other BPM vendors have developed partnerships with enterprise architecture and modeling solutions, Metastorm’s acquisition of Proforma is a solid statement of their vision of the breadth of solution required for real, strategic business process management. The acquisition helps move Metastorm closer to competing against some of the infrastructure-oriented enterprise software vendors (i.e. IBM, Oracle, and EMC) that have made BPM their focus over the past year or two.

In our previous article, we also mentioned how Metastorm was facing a challenge with its purchase of Proforma, because it challenges Metastorm to re-align its sales force to make the enterprise sale that is required for enterprise architecture. The combination of enterprise architecture, business process analysis, and BPM is not necessarily an intuitive one, and therefore Metastorm faces a certain level of education in the market to convince its installed base and prospects that the three go hand in hand. The acquisition of Process Competence makes this task easier in the European market, because the seasoned sales and services staff at Process Competence can easily hold the conversations at the highest levels within the enterprises they service. This enables Metastorm to more quickly gain a foothold into these European enterprises and bring the entire EA – BPA – BPM combination to fruition.

We believe that this acquisition by Metastorm is yet another indication of the need for BPM vendors to be thinking of the broader picture when crafting their BPM product strategies. At the same time, it’s also an indication to organizations that their BPM strategies should extend beyond simply automating, managing and optimizing individual processes. When done right, BPM can provide strategic value to organizations across the entire enterprise.

Share

2008 Trend for SMBs – Round the Clock Support

I believe that independent 24-hour tech support is a growing market segment for small and medium businesses, as well as individual consumers.

Even with significant investments in ease of use, our computers, networks, home entertainment options and digital devices are getting more complex. Also, it’s still harder to connect and network all the devices, computers, and hard drives found in a typical home or small business—especially while trying to ensure the security and reliability of the your data and information.

From our research, we’ve seen a significant trend toward small and medium businesses using “outsourced??? technical support services—for everything from security or virus management to handling routine technical support calls or network configuration issues.

However, there are still many cases when it’s still a good idea to have in-person technical support available. For example, network configuration and network security issues are two areas where personalized, on-site technical support can be more efficient and effective than remote support.

For example, in my own organization, I’ve had a networking problem with one of my Windows XP Pro laptops, where it can’t see the other computers on the network, even though they can see each other. I’ve tried two remote support organizations and neither one was able to diagnose or solve what should be a relatively easy problem.

Share

2008 Notebook Trends

We’re going to see more notebooks with displays that are optimized and sized for high definition viewing. For example, wide aspect notebook displays typically have a 16:10 width to height ratio, while we’ll see a crop of newer notebooks coming out with 16:9 ratios (for example 1366*768) that are optimized for viewing HD movies, TV shows or videos on your notebook.

– Of course, standard hard drive sizes will continue to increase

– We’ll also see more laptops optimized for entertainment uses, such as gaming, watching widescreen HD movies, and connecting with stereo systems.

– Although it’s still happening slowly, we’ll see more notebook PCs bundled with integrated mobile internet access offered by wireless phone providers. Wi-Fi is great for many users, but some users want built-in wireless roaming connectivity and now with the cell phone providers building out their 3G networks, it’s more feasible than ever before.

Share

MEGA Modeling Suite

Founded in 1991 in Paris, MEGA International has grown to be an enterprise architecture solutions provider with a business process modeling perspective.
MEGA International’s new version of its MEGA Modeling Suite has added a new component, MEGA Advisor, to the comprehensive set of tools that enable enterprise architecture (EA) and business process analysis (BPA). MEGA Advisor is an on-demand, web-based reporting application intended for users that need access to essential business process modeling information. The tool adapts to the viewer’s perspective and filters through all of the information in the EA repository to present the relevant information via a web portal to the user. The latest version of MEGA Modeling Suite also includes interfaces to third-party complementary toolsets for EA and BPA. With a customer base of more than 1,800, including large enterprises such as Michelin and Philip Morris USA and more recently many government agencies, MEGA is an established player in the enterprise architecture market.

Download the full MEGA Modeling Suite Upside Research Product Brief.

Share

How to Save a Wet Cell Phone

Okay, it hasn’t happened to me lately, but I know it will happen. It’s probably happened to you. When you do dunk your cell phone in the water, what should you do? Here’s the rescue plan:

– It’s important to get the phone out of the water as fast as possible. You’ve got a much better chance of having a working cell phone if it’s only been in the water a few seconds.

– You have to remove the battery as soon as possible. It should go without saying that you do not want to turn the phone on after its been dunked in the water. The best chance for keeping your cell phone working comes from having it turned off when you drop it in the water, or being able to remove the battery quickly.

– Once you’ve got the batter out, take out your SIM card. That’s a small electronic chip/card that slides in the back of the phone (usually under or near the battery) and stores all your personal information and the telephone’s phone number.

– It’s critical that you give the phone time to dry—a long time. It’s best to wait up to three days for the entire phone and its insides to dry before trying to turn it back on.

– There are alternative ways to dry the phone out, including some that involve dunking the phone in alcohol (but not a beer!—denatured alcohol) or shoving into a can of dry, uncooked rice. Check out the internet for more details.

Share