Business Process Innovation and Cloud Computing

Business Process Management

Subscribe to Business Process Management: eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get Business Process Management: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories

Download Slide Deck: ▸ Here Download Slide Deck: ▸ Here Scaling Massive Enterprise Content Stores in the Cloud Using new techniques of information modeling, indexing, and processing, new cloud-based systems can support cloud-based workloads previously not possible for high-throughput insurance, banking, and case-based applications. In his session at 18th Cloud Expo, John Newton, CTO, Founder and Chairman of Alfresco, described how to scale cloud-based content management repositories to store, manage, and retrieve billions of documents and related information with fast and linear scalability. Download Slide Deck: ▸ Here He addressed the challenges of scaling document repositories to this level; architectural approaches for coordinating data; search and storage technologies, Solr, and Amazon storage and database technologies; the breadth of use cases that modern co... (more)

Is On-Premise BPM Still Relevant? | @CloudExpo #BPM #Cloud #DataCenter

Is On-Premise BPM Still Relevant? By Manish Nepal Cloud-based BPM platforms are taking the application development market by storm. But does that mean on-premise software is becoming obsolete? Like the daily newspaper that many thought would be dead by now, on-premise business process management tools are probably here to stay for the foreseeable future because a lot of enterprise IT directors are not convinced that their enterprise data is ready to transition to the cloud. Many enterprises prefer on-premise BPM software because it is tangible, visible, and exists within the enterprise boundaries. IT leadership feels that they have to have datacenters within their ‘jurisdiction' in order to keep their corporate data safe. On-premise vs. Cloud-based Offerings A shipping company, with a team strength of 500 people, is looking for a BPM solution to manage their custome... (more)

How Bon-Ton Stores Align Business Goals with IT Requirements

Two or three times a year, Bon-Ton Stores products are featured on Jill's "Steals and Deals" segment on the "Today Show." The products are promoted with huge discounts. As soon as the segment first airs on the East Coast, the "Steals and Deals" site displays the featured products, with links to Bon-Ton's site, usually directly to the deal itself with a special promotion or coupon code. The questions that come up for the business owners are: How successful are these campaigns? What is impacting campaign success? How do we ensure better alignment with IT for future promotions? How successful are my marketing campaigns? Bon-Ton uses its APM solution to analyze statistics of these special promotions. The following graph shows the number of requests hitting the promoted deal on Bon-Ton's site after it airs on the "Today Show." As customers rush to their site to bag the de... (more)

Linux in the Mainstream: Growing Deployment of Business-Critical Workloads

Click Here to Download This Whitepaper Now! This IDC whitepaper takes a look at the growth of Linux as a server operating system and how deployment form factors have changed over time. Today, commercial Linux has become a key platform across many workloads. This paper considers both workload data and the ecosystem that has grown up to support the opportunity for Linux deployments, including application software, application development and deployment software, and infrastructure software. Click Here to Download This Whitepaper Now! ... (more)

GT Software and Cordys Partner For SOA Development

GT Software provider of mainframe integration solutions, and Cordys, a provider of next generation SOA technology, announced a global partnership. The companies will work together to deliver development solutions that fully integrate the mainframe into Cordys SOA initiatives for their respective worldwide audiences. “We are very pleased to partner with Cordys in making the mainframe an active participant in SOA initiatives,” said Wilson Rains, vice president of alliances at GT Software. “Our companies share a philosophy and track record of delivering intuitive, easy-to-use solutions that eliminate the need for coding, producing highly effective and sophisticated results with minimal effort.” “Partnering with GT Software enables Cordys to add best-of-breed mainframe integration technologies to our SOA solution,” said Reint Jan Holterman, Director Technology Alliances... (more)

Cloud Computing as a Competitive Advantage: Change at the Speed of Business

SYS-CON Events announced today that more than 40 Cloud technology providers, as well as Virtualization and SOA companies will exhibit at the upcoming 1st International Cloud Computing Conference & Expo (www.CloudComputingExpo.com), November 19-21, in San Jose, California. The conference will be colocated with SYS-CON's 4th International Virtualization Conference & Expo (www.VirtualizationConference.com) 1st International Cloud Computing Conference & Expo will take place on November 19-21, 2008, at the Fairmont Hotel, downtown San Jose, CA The pace of change in modern business is breathtaking. Successful companies are embracing change by innovating aggressively, mastering operational efficiency, and leveraging new regional and global business opportunities. This session addresses key ways that Cloud Computing, in the form of the Business Operations Platform (unifying... (more)

Cordys Is Leading a Set of Emerging Vendors in Cloud Orchestration

Cordys has announced that independent research company Forrester reports that Cordys has a leading position among the emerging vendors providing cloud orchestration. The Cordys Business Operations Platform enables organisations to continuously improve their business operations and increase the speed of change. The unique combination of BPMS and cloud technology in the Cordys platform complements existing enterprise software but at the same time it adds agility to business operations. According to the independent report, "Market Overview: The Middleware Software Market, 2009, "The middleware software market went through a sequence of paradigm changes in the past three decade. An overview of the middleware software market must look beyond the various subcategories of middleware such as complex event processing (CEP) or business process management (BPM)". "Cloud orc... (more)

Case Study: Open Source + Business Intelligence

Data-driven businesses are facing some tough challenges in today's rapidly changing information landscape. As decision cycles continue to shrink, companies need to act on information within hours and minutes rather than weeks and days. At the same time, the volume of data that needs to be analyzed is growing exponentially. Business intelligence (BI) approaches that might have made sense a decade or even five years ago may no longer be the best fit for organizations that must quickly and affordably make sense of terabytes of incoming data that shows no sign of slowing down. For my company, MX Force, speedy data analysis is not simply a "nice to have," it's critical to our business. As a cloud-based provider of email security for organizations of all sizes, we need to identify the origins of spam, viruses and other potential threats for our clients, fast. But as our ... (more)

Information Security from a Business Perspective

As enterprises struggle to remain profitable in an ever-changing risk environment, the current economic crisis has elevated the need for effective business risk management. Information security is a key parameter that affects business risk. The academic definition of information security is the "preservation of confidentiality, integrity and availability of information." [1] Confidentiality is the preservation of secrecy of information (e.g., business reports, technical designs or financial projections) by ensuring that viewing is conducted solely by authorized people. Integrity is ensuring that information is accurate and consistent and has not been manipulated. Availability ensures that information is accessible to authorized people when needed. Historically, information security has been addressed primarily as a technical issue. Preventive controls, such as fire... (more)

Steps for Improving Capacity Management in the Age of Cloud Computing

When you wake up in the morning and flip on a light switch, you don't think about whether the local power company has enough electricity available to power the light. Likewise, when you switch on the coffee pot or turn on your stove to make breakfast, you don't wonder about the available capacity of your local power grid. Similarly, cloud computing is rapidly making the delivery of business services second nature to business users. They are able to access the services they need, when they need them, because the dynamic nature of the cloud offers unprecedented, highly elastic computing capacity. Is your business able to fully exploit this flexibility? Cloud computing certainly brings with it new challenges for IT infrastructure management, particularly for capacity management. To get the most value from the cloud, you must continually balance capacity utilization, co... (more)

Great Solutions for Big Problems…

Managed Services Providers face a variety of challenges. They struggle trying to sell an intangible and invisible service. Quoting Harry Beckwith, author of the book “Selling the Invisible”: ‘You can’t see them – so how do you sell them? That’s the problem with services.’  However some services can be transformed into something tangible, PR services can be touched and sensed in the publications for instance, telephone services are sensed when making a call; but the IT managed services are never sensed, these services just are there. The computer works, the antivirus is updated, the printer prints, they are supposed to do so, isn’t it? It is their purpose. But behind all this normally expected performance are the IT Managed Services, intangible and invisible to users, but a key activity for the devices’ deploy and performance. IT Managed Services are turning into an... (more)