Contributed by: Tom Dwyer, Editorial Director and current Faculty Member, BPMInstitute.org
By: Tom Dwyer, Research Director, The Yankee Group
By: Janet Wall, President, Knowledge Partners, Inc.
More and more corporations are realizing the benefits of separating and externalizing their business rules from code, documents and even people’s heads. Fortunately, there are business rule harvesting methods (such as KPI STEP™) and BRE technology that is in place today that assist corporations in documenting, analyzing and implementing business rules in a separate technology. One critical issue to address is where an organization will store the business rules aimed at the business audience. What tools should they use for their source rule repository?
Business Rules Engines (BREs) have been getting more attention over the last few years. Seen as a way to increase the visibility and accessibility of a business’ core policies as they exist in applications and ensure a stronger alignment of business priorities and application systems, these engines are being used to automate a company’s business rules in a consistent and cost-effective manner.
In today's global economy, the pressure to deliver short-term business results is intense. The key to producing these performance results lies in your enterprise processes. Organizations must continuously manage and optimize their internal and external business processes to deliver targeted results in real time.
Emerging as the next-generation of business process management (BPM) technology, BPM suites are specifically suited to enable continuous BPM and facilitate organizational agility.
Integrating human-to-system and system-to-system touch points are major drivers for business innovation. In speaking with our customers, we understand the critical process-related challenges organizations face every day like meeting customer demands, increasing operational efficiencies and meeting policy and compliance mandates. Join us to discover how Adobe PDF and Intelligent Documents can streamline document-centric processes and integrate them with existing enterprise systems leveraging workflows, business rules, Web services and BAM.
Contributed by: Janelle Hill, VP & Distinguished Analyst, BPM Research, Gartner Inc.
By: Janelle B. Hill, Vice President, Gartner
By: Barbara von Halle, Founder, Knowledge Partners, Inc.
Business rules, whether they are stated explicitly or implicitly, contain all of your organization's business knowledge. Expressing and defining your business rules will allow the most benefit from a BPM initiative.
Barbara von Halle is the founder of Knowledge Partners, a company specializing in business rules services. Her most recent book, "Business Rules Applied" is the first book to contain a systematic approach for delivering business rules systems.
Business Exceptions are created as processes break down, as new ways of doing business replace old, and as partners change their processes. If not well managed, exceptions will reduce operational profitability and impede growth. The annual direct labor cost of exception management exceeds $10 billion. However, the indirect impact of exceptions - including indirect costs, lost revenue, dissatisfied customers, and lost agility - is much greater.
Imposing services-oriented architecture on a legacy application environment cannot be achieved simply by wrapping online transactions. Poorly aligned data structures and applications limit data accessibility and functional flexibility. Underlying fragmentation, redundancy and batch structures are the antithesis of SOA. To truly achieve SOA, organizations must develop a phased approach to redesigning and redeploying data structures and modernizing applications.
This session will provide an overview of SOA security approaches, frameworks, and threats, and examine the intersection between enterprise security architecture and SOA. This session will also cover the emerging WS-* security standards that will enable more complex SOA networks, including WS-Security, WS-Policy, WS-Trust, WS-SecureConversation, and WS-Federation. Finally, we will recommend tactics for securing SOA today and strategies for bringing security standards into existing deployments.