SlideShare ist ein Scribd-Unternehmen logo
1 von 6
UNIVERSITY OF BALOCHISTAN
DEPARTMENT OF COMPUTER SCIENCE
 Subject: NETWORK MANAGEMENT AND SECURITY
 Class: MCS Evening
 Session: 2013-15
 Semester: 4th
TOPICS
ROSE AND CCR
MIDDLEWARE
e-TOM
BPM
Sumitted to Dr.ATIQ AHMED
ASSIGNMENT PREPARED BY: Ghazi Khan Gola
Subisstiomn Date :- 03 JUN 2015
What is e-TOM?
e-TOMisthe EnhancedTelecomsOperationsmapandpart of Frameworks,asuite of standardsfromthe
TM Forum that provide the blueprint for efficient business operations.
The business process framework is a multi-level hierarchy of business processes required to run a
service-focused business.
Frameworks also include an Information Framework (SID), Application Framework (TAM) and an
integration framework.
Why e-TOM?
e-TOM (Business Process Framework) is a guidebook that defines the most widely used and accepted
standard for business processes in the telecommunications industry.
Some of the benefits that e-TOMprovides:
Standardization:-
e-TOM provides a standard structure, terminology and classification scheme for describing business
processesandtheirconstituentparts.Itsuppliesafoundationforapplyingenterprise-wide discipline to
the development of business processes.
Flexibility:-
The BusinessProcess Framework’slayered,flexibleapproachallowsmapping and modeling for all sizes
of projects and all types of organization.
Consistency:-
Enablescreationof consistentandhigh qualityend-to-endprocessflows withopportunitiesfor cost and
performance improvement and for re-use of existing processes and systems.
How e-TOM ?
Reference Model from Orbus Software:-
OrbusSoftware’se-TOMReferenceModel providesacomplete implementationof the Business Process
Framework, stored as a number of Vision diagrams in the central repository.
Core benefits of the e-TOM Reference Model:-
1. Provides a fast start for Telecoms project teams working on process improvement.
2. Helps organizations to adhere to the e-TOMindustry standard, and to see how they align/compare.
The e-TOM Reference Model consists of a number of features:-
1 Pr-configured e-TOM Repository, configured in line with the e-TOM process levels – this is used to
organize / classify business processes in line with the standard.
2 e-TOM Process Framework, provided as a series of Vision diagrams in the repository for a quick
reference. These provide a quick start to process mapping.
3 A Reference library of (Microsoft Word) documentation, to help ensure adherence to the standard.
4 When used in combination with the iServer Portal, the e-TOMrepository can be published on line,
allowingthe restof the businesstobrowse andcommenton e-TOMprocess models. The iServer Portal
provides easy navigation from the framework down to the lowest level of live process models and
documentation.
What is CCR?
Clustercontinuousreplication(CCR) isahighavailabilityfeature of Microsoft Exchange Server 2007 that
combines the asynchronous log shipping and replay technology built into Exchange 2007 with the
failover and management features provided by the Cluster service.
Why CCR?
Cluster continuous replication (CCR) provides automatic management of redundancy in addition to
application-level data replication. CCR can be deployed without exposing a single point of failure in a
single data center or between two data centers. Transaction log replication is used to copy the
databases and maintain the concurrency of the data among cluster nodes. CCR is designed to ensure
that all log data on the active node is successfully copied to the passive node. Therefore, scheduled
outages do not result in data loss, even though replication occurs asynchronously.
How CCR?
WithCCR, youcreate a two-node WindowsServer2003 or WindowsServer2008 clusterandthe passive
node runs Exchange with its own copy of the database, without any client connections or offered
services.Youhave twocopiesof the data, one foreach node,sothisis a shared-nothingmodel with the
data not beingasingle point of failure. The initial copy of the database is generated through a process
called seeding, where the existing database is copied from the active node to the passive node on
passive node storage.Thisinitial copycantake a significantamountof time dependingonthe size of the
database.Once the database isin place,the passive node pullsthe transaction logsfromthe active node
viaa hidden,securedfile share. Once the transaction logs are closed, the passive node copies them to
an inspectorfolder,inspectsthe logs,andthenplaysthe logsintoitscopyof the mailbox database, thus
keeping its database up-to-date.
What is ROSE?
In computing, a multi-way tree or rose tree is a tree data structure with a variable and unbounded
number of branches per node.
Why ROSE?
Alternatively, it may be represented in what appears to be a totally different structure.
Data Rose a = Rose a [Rose a]
In this case, the example tree would be:
Retiree = Rose 5 [Rose 3 [Rose 1 [], Rose 4[]], Rose 7 []]
The differences between the two are that the (empty) binary search tree Tip
is not representable as a Rose
tree, and a Rose tree can have an arbitrary and internally varying branching factor (0,1,2, or more).
How ROSE?
Rose trees, partitions and mixtures
The starting point of our approach is Bayesian hierarchical clustering (BHC) (Heller and
Ghahramani,2005), a probabilistic approach to hierarchical clustering. In BHC a tree is associated
with a set of tree-consistent partitions, and interpretedasamixture model, where each component
of the mixture is represented by a subset of tree nodes, and corresponds to a partition of the data.
We start by giving proper dentitions of rose trees, partitions, and our interpretation of rose trees as
mixtures over partitions. A rose tree is denied recursively: T is a rose tree if either T={x} for some
data point x or T ={T 1........Tn} .
Where
Ti's are rose trees over disjoint sets of data points. In the latter case each
Ti is a child of T and T has n T children. Let leaves (T)
be the set of data points at the leaves of T .
What Middleware?
Software thatacts as a bridge between anoperatingsystemordatabase and applications especially on
a network.
Why Middleware?
Middleware is computersoftware thatprovidesservicestosoftware applicationsbeyondthose available
from the operating system. It can be described as "software glue".
Middleware makes it easier for software developers to perform communication and input/output, so
they can focus on the specific purpose of their application. Middleware is the software that connects
software components or enterprise applications.
Middleware isthe software layer that lies between the operating system and the applications on each
side of a distributed computer network. Typically, it supports complex, distributed business software
applications.
How Middleware?
Middleware services provide a more functional set of application programming interfaces to allow an
application to:
Locate transparentlyacrossthe network,thusprovidinginteraction with another service or application
Filterdatato make themfriendlyusableorpublicviaanonymizationprocess for privacy protection (for
example)
 Be independent from network services
 Be reliable and always available
 Add complementary attributes like semantics
What BPM?
Business Process Management (BPM) is a field in operations management that focuses on improving
corporate performance bymanagingandoptimizingacompany'sbusinessprocesses.Itcan thereforebe
described as a "process optimization process".
Why BPM?
Processesplayacritical role inhelping companiesachievetheirbusiness strategy by aligning resources,
technology and supporting structures toward the achievement of desired business outcomes and/or
driving a competitive advantage.
Business Process Management (BPM) is a management approach and methodology leveraged to
addressstrategicbusinessissues by allowing businesses to grow or operate in a cost effective manner
with desired visibility, flexibility and speed.
The BPM approach and supporting technologies (Business Process Management Solutions, or BPMS)
enable benefits across multiple business facets:
How BPM?
Here'sanotherexample of howenterprisescantake control of theirdataand processestogainbusiness
advantages.Forgenerations,what'snow knownasbusinessprocessmanagement(BPM) wasexpensive
and basically consisted of specialists, many meetings, a glut of spreadsheets, paper work flow charts,
calendarsandzillionsof emails.Itusedtobe usedexclusivelytocreate efficient work flows for internal
and external value chains. With the emergence of cloud services in the past 10 years, the way BPMis
administeredhaschanged—andforthe better.Menus of BPMprocesses are now available on demand
for anysize business,andaccesstothe controlsof the processesnow canbe made usingmobile devices.
As a result, BPM is experiencing a rebirth with market leaders that include IBM, Sales force, Oracle,
Tieback, SAP, Appian, Bonita Soft (an open-source-based provider), Pega Systems and others. In
addition,enterprisesare becomingincreasinglycreative withhow they use BPMsoftware and services.
And why not? It adds a ton of value to a company's IT when one type of software can do extra duty in
multiple functions. Here are some examples of creative ways traditional BPMis now being used.

Weitere ähnliche Inhalte

Was ist angesagt?

9 madderi sivalingamsaravanan_106-110
9 madderi sivalingamsaravanan_106-1109 madderi sivalingamsaravanan_106-110
9 madderi sivalingamsaravanan_106-110Alexander Decker
 
Efficient Cost Minimization for Big Data Processing
Efficient Cost Minimization for Big Data ProcessingEfficient Cost Minimization for Big Data Processing
Efficient Cost Minimization for Big Data ProcessingIRJET Journal
 
Should ETL Become Obsolete
Should ETL Become ObsoleteShould ETL Become Obsolete
Should ETL Become ObsoleteJerald Burget
 
Module 02 teradata basics
Module 02 teradata basicsModule 02 teradata basics
Module 02 teradata basicsMd. Noor Alam
 
Data Integration: the Beginner's Guide
Data Integration: the Beginner's GuideData Integration: the Beginner's Guide
Data Integration: the Beginner's GuideLisa Falcone
 

Was ist angesagt? (8)

1 ieee98
1 ieee981 ieee98
1 ieee98
 
9 madderi sivalingamsaravanan_106-110
9 madderi sivalingamsaravanan_106-1109 madderi sivalingamsaravanan_106-110
9 madderi sivalingamsaravanan_106-110
 
Efficient Cost Minimization for Big Data Processing
Efficient Cost Minimization for Big Data ProcessingEfficient Cost Minimization for Big Data Processing
Efficient Cost Minimization for Big Data Processing
 
Ch1
Ch1Ch1
Ch1
 
Should ETL Become Obsolete
Should ETL Become ObsoleteShould ETL Become Obsolete
Should ETL Become Obsolete
 
Module 02 teradata basics
Module 02 teradata basicsModule 02 teradata basics
Module 02 teradata basics
 
Data Integration: the Beginner's Guide
Data Integration: the Beginner's GuideData Integration: the Beginner's Guide
Data Integration: the Beginner's Guide
 
GFGC CHIKKABASUR ( DBMS )
GFGC CHIKKABASUR ( DBMS )GFGC CHIKKABASUR ( DBMS )
GFGC CHIKKABASUR ( DBMS )
 

Andere mochten auch

An intel architecture, which is a cisc 2
An intel architecture, which is a cisc 2An intel architecture, which is a cisc 2
An intel architecture, which is a cisc 2Azhar Abbas
 
RISC - Reduced Instruction Set Computing
RISC - Reduced Instruction Set ComputingRISC - Reduced Instruction Set Computing
RISC - Reduced Instruction Set ComputingTushar Swami
 
Reduced instruction set computers
Reduced instruction set computersReduced instruction set computers
Reduced instruction set computersSanjivani Sontakke
 
Base des systèmes à microprocesseur
Base des systèmes à microprocesseurBase des systèmes à microprocesseur
Base des systèmes à microprocesseurPeronnin Eric
 
Arm système embarqué
Arm système embarquéArm système embarqué
Arm système embarquéHoussem Rouini
 
CISC vs RISC Processor Architecture
CISC vs RISC Processor ArchitectureCISC vs RISC Processor Architecture
CISC vs RISC Processor ArchitectureKaushik Patra
 
LinkedIn SlideShare: Knowledge, Well-Presented
LinkedIn SlideShare: Knowledge, Well-PresentedLinkedIn SlideShare: Knowledge, Well-Presented
LinkedIn SlideShare: Knowledge, Well-PresentedSlideShare
 

Andere mochten auch (11)

An intel architecture, which is a cisc 2
An intel architecture, which is a cisc 2An intel architecture, which is a cisc 2
An intel architecture, which is a cisc 2
 
Risc and cisc
Risc and ciscRisc and cisc
Risc and cisc
 
Risc and cisc
Risc and ciscRisc and cisc
Risc and cisc
 
ITFT_Risc
ITFT_RiscITFT_Risc
ITFT_Risc
 
RISC - Reduced Instruction Set Computing
RISC - Reduced Instruction Set ComputingRISC - Reduced Instruction Set Computing
RISC - Reduced Instruction Set Computing
 
Reduced instruction set computers
Reduced instruction set computersReduced instruction set computers
Reduced instruction set computers
 
Base des systèmes à microprocesseur
Base des systèmes à microprocesseurBase des systèmes à microprocesseur
Base des systèmes à microprocesseur
 
Arm système embarqué
Arm système embarquéArm système embarqué
Arm système embarqué
 
RISC AND CISC PROCESSOR
RISC AND CISC PROCESSORRISC AND CISC PROCESSOR
RISC AND CISC PROCESSOR
 
CISC vs RISC Processor Architecture
CISC vs RISC Processor ArchitectureCISC vs RISC Processor Architecture
CISC vs RISC Processor Architecture
 
LinkedIn SlideShare: Knowledge, Well-Presented
LinkedIn SlideShare: Knowledge, Well-PresentedLinkedIn SlideShare: Knowledge, Well-Presented
LinkedIn SlideShare: Knowledge, Well-Presented
 

Ähnlich wie Nmas ass

Lecture1 Introduction to SAP and Finance ReviewFIN419 .docx
Lecture1 Introduction to SAP and Finance ReviewFIN419 .docxLecture1 Introduction to SAP and Finance ReviewFIN419 .docx
Lecture1 Introduction to SAP and Finance ReviewFIN419 .docxsmile790243
 
SW Architecture Monolithic to SOA
SW Architecture Monolithic to SOASW Architecture Monolithic to SOA
SW Architecture Monolithic to SOARaman Kannan
 
MIS 17 Cross-Functional Enterprise Systems
MIS 17 Cross-Functional Enterprise SystemsMIS 17 Cross-Functional Enterprise Systems
MIS 17 Cross-Functional Enterprise SystemsTushar B Kute
 
Information management
Information managementInformation management
Information managementDavid Champeau
 
Sap Interview Questions - Part 1
Sap Interview Questions - Part 1Sap Interview Questions - Part 1
Sap Interview Questions - Part 1ReKruiTIn.com
 
Informatica and datawarehouse Material
Informatica and datawarehouse MaterialInformatica and datawarehouse Material
Informatica and datawarehouse Materialobieefans
 
Chapter 2 - Enterprise Application Integration.pdf
Chapter 2 - Enterprise Application Integration.pdfChapter 2 - Enterprise Application Integration.pdf
Chapter 2 - Enterprise Application Integration.pdfKhairul Anwar Sedek
 
Data Orchestration Solution: An Integral Part of DataOps
Data Orchestration Solution: An Integral Part of DataOpsData Orchestration Solution: An Integral Part of DataOps
Data Orchestration Solution: An Integral Part of DataOpsEnov8
 
Data warehouse concepts
Data warehouse conceptsData warehouse concepts
Data warehouse conceptsobieefans
 
Tools of noc
Tools of nocTools of noc
Tools of nocmunawarul
 
Case4 lego embracing change by combining bi with flexible information system 2
Case4  lego embracing change by combining bi with flexible  information system 2Case4  lego embracing change by combining bi with flexible  information system 2
Case4 lego embracing change by combining bi with flexible information system 2dyadelm
 
DATAWAREHOUSE MAIn under data mining for
DATAWAREHOUSE MAIn under data mining forDATAWAREHOUSE MAIn under data mining for
DATAWAREHOUSE MAIn under data mining forAyushMeraki1
 
Data center-terminology photostory-
Data center-terminology photostory-Data center-terminology photostory-
Data center-terminology photostory-VenkatRamana242
 

Ähnlich wie Nmas ass (20)

Lecture1 Introduction to SAP and Finance ReviewFIN419 .docx
Lecture1 Introduction to SAP and Finance ReviewFIN419 .docxLecture1 Introduction to SAP and Finance ReviewFIN419 .docx
Lecture1 Introduction to SAP and Finance ReviewFIN419 .docx
 
0071496165_chap01.pdf
0071496165_chap01.pdf0071496165_chap01.pdf
0071496165_chap01.pdf
 
SW Architecture Monolithic to SOA
SW Architecture Monolithic to SOASW Architecture Monolithic to SOA
SW Architecture Monolithic to SOA
 
MIS 17 Cross-Functional Enterprise Systems
MIS 17 Cross-Functional Enterprise SystemsMIS 17 Cross-Functional Enterprise Systems
MIS 17 Cross-Functional Enterprise Systems
 
GetSet ERP Brochure
GetSet ERP BrochureGetSet ERP Brochure
GetSet ERP Brochure
 
Information management
Information managementInformation management
Information management
 
Sap Interview Questions - Part 1
Sap Interview Questions - Part 1Sap Interview Questions - Part 1
Sap Interview Questions - Part 1
 
Informatica and datawarehouse Material
Informatica and datawarehouse MaterialInformatica and datawarehouse Material
Informatica and datawarehouse Material
 
Chapter 2 - Enterprise Application Integration.pdf
Chapter 2 - Enterprise Application Integration.pdfChapter 2 - Enterprise Application Integration.pdf
Chapter 2 - Enterprise Application Integration.pdf
 
Data Orchestration Solution: An Integral Part of DataOps
Data Orchestration Solution: An Integral Part of DataOpsData Orchestration Solution: An Integral Part of DataOps
Data Orchestration Solution: An Integral Part of DataOps
 
Data warehouse concepts
Data warehouse conceptsData warehouse concepts
Data warehouse concepts
 
Tools of noc
Tools of nocTools of noc
Tools of noc
 
Database System.pptx
Database System.pptxDatabase System.pptx
Database System.pptx
 
Copy of sec d (2)
Copy of sec d (2)Copy of sec d (2)
Copy of sec d (2)
 
Copy of sec d (2)
Copy of sec d (2)Copy of sec d (2)
Copy of sec d (2)
 
Case4 lego embracing change by combining bi with flexible information system 2
Case4  lego embracing change by combining bi with flexible  information system 2Case4  lego embracing change by combining bi with flexible  information system 2
Case4 lego embracing change by combining bi with flexible information system 2
 
DATAWAREHOUSE MAIn under data mining for
DATAWAREHOUSE MAIn under data mining forDATAWAREHOUSE MAIn under data mining for
DATAWAREHOUSE MAIn under data mining for
 
Sap
SapSap
Sap
 
Data center-terminology photostory-
Data center-terminology photostory-Data center-terminology photostory-
Data center-terminology photostory-
 
Data center terminology photostory
Data center terminology photostoryData center terminology photostory
Data center terminology photostory
 

Nmas ass

  • 1. UNIVERSITY OF BALOCHISTAN DEPARTMENT OF COMPUTER SCIENCE  Subject: NETWORK MANAGEMENT AND SECURITY  Class: MCS Evening  Session: 2013-15  Semester: 4th TOPICS ROSE AND CCR MIDDLEWARE e-TOM BPM Sumitted to Dr.ATIQ AHMED ASSIGNMENT PREPARED BY: Ghazi Khan Gola Subisstiomn Date :- 03 JUN 2015
  • 2. What is e-TOM? e-TOMisthe EnhancedTelecomsOperationsmapandpart of Frameworks,asuite of standardsfromthe TM Forum that provide the blueprint for efficient business operations. The business process framework is a multi-level hierarchy of business processes required to run a service-focused business. Frameworks also include an Information Framework (SID), Application Framework (TAM) and an integration framework. Why e-TOM? e-TOM (Business Process Framework) is a guidebook that defines the most widely used and accepted standard for business processes in the telecommunications industry. Some of the benefits that e-TOMprovides: Standardization:- e-TOM provides a standard structure, terminology and classification scheme for describing business processesandtheirconstituentparts.Itsuppliesafoundationforapplyingenterprise-wide discipline to the development of business processes. Flexibility:- The BusinessProcess Framework’slayered,flexibleapproachallowsmapping and modeling for all sizes of projects and all types of organization. Consistency:- Enablescreationof consistentandhigh qualityend-to-endprocessflows withopportunitiesfor cost and performance improvement and for re-use of existing processes and systems. How e-TOM ? Reference Model from Orbus Software:- OrbusSoftware’se-TOMReferenceModel providesacomplete implementationof the Business Process Framework, stored as a number of Vision diagrams in the central repository. Core benefits of the e-TOM Reference Model:- 1. Provides a fast start for Telecoms project teams working on process improvement.
  • 3. 2. Helps organizations to adhere to the e-TOMindustry standard, and to see how they align/compare. The e-TOM Reference Model consists of a number of features:- 1 Pr-configured e-TOM Repository, configured in line with the e-TOM process levels – this is used to organize / classify business processes in line with the standard. 2 e-TOM Process Framework, provided as a series of Vision diagrams in the repository for a quick reference. These provide a quick start to process mapping. 3 A Reference library of (Microsoft Word) documentation, to help ensure adherence to the standard. 4 When used in combination with the iServer Portal, the e-TOMrepository can be published on line, allowingthe restof the businesstobrowse andcommenton e-TOMprocess models. The iServer Portal provides easy navigation from the framework down to the lowest level of live process models and documentation. What is CCR? Clustercontinuousreplication(CCR) isahighavailabilityfeature of Microsoft Exchange Server 2007 that combines the asynchronous log shipping and replay technology built into Exchange 2007 with the failover and management features provided by the Cluster service. Why CCR? Cluster continuous replication (CCR) provides automatic management of redundancy in addition to application-level data replication. CCR can be deployed without exposing a single point of failure in a single data center or between two data centers. Transaction log replication is used to copy the databases and maintain the concurrency of the data among cluster nodes. CCR is designed to ensure that all log data on the active node is successfully copied to the passive node. Therefore, scheduled outages do not result in data loss, even though replication occurs asynchronously. How CCR? WithCCR, youcreate a two-node WindowsServer2003 or WindowsServer2008 clusterandthe passive node runs Exchange with its own copy of the database, without any client connections or offered services.Youhave twocopiesof the data, one foreach node,sothisis a shared-nothingmodel with the data not beingasingle point of failure. The initial copy of the database is generated through a process called seeding, where the existing database is copied from the active node to the passive node on passive node storage.Thisinitial copycantake a significantamountof time dependingonthe size of the database.Once the database isin place,the passive node pullsthe transaction logsfromthe active node viaa hidden,securedfile share. Once the transaction logs are closed, the passive node copies them to an inspectorfolder,inspectsthe logs,andthenplaysthe logsintoitscopyof the mailbox database, thus keeping its database up-to-date.
  • 4. What is ROSE? In computing, a multi-way tree or rose tree is a tree data structure with a variable and unbounded number of branches per node. Why ROSE? Alternatively, it may be represented in what appears to be a totally different structure. Data Rose a = Rose a [Rose a] In this case, the example tree would be: Retiree = Rose 5 [Rose 3 [Rose 1 [], Rose 4[]], Rose 7 []] The differences between the two are that the (empty) binary search tree Tip is not representable as a Rose tree, and a Rose tree can have an arbitrary and internally varying branching factor (0,1,2, or more). How ROSE? Rose trees, partitions and mixtures The starting point of our approach is Bayesian hierarchical clustering (BHC) (Heller and Ghahramani,2005), a probabilistic approach to hierarchical clustering. In BHC a tree is associated with a set of tree-consistent partitions, and interpretedasamixture model, where each component of the mixture is represented by a subset of tree nodes, and corresponds to a partition of the data. We start by giving proper dentitions of rose trees, partitions, and our interpretation of rose trees as mixtures over partitions. A rose tree is denied recursively: T is a rose tree if either T={x} for some data point x or T ={T 1........Tn} . Where Ti's are rose trees over disjoint sets of data points. In the latter case each Ti is a child of T and T has n T children. Let leaves (T) be the set of data points at the leaves of T .
  • 5. What Middleware? Software thatacts as a bridge between anoperatingsystemordatabase and applications especially on a network. Why Middleware? Middleware is computersoftware thatprovidesservicestosoftware applicationsbeyondthose available from the operating system. It can be described as "software glue". Middleware makes it easier for software developers to perform communication and input/output, so they can focus on the specific purpose of their application. Middleware is the software that connects software components or enterprise applications. Middleware isthe software layer that lies between the operating system and the applications on each side of a distributed computer network. Typically, it supports complex, distributed business software applications. How Middleware? Middleware services provide a more functional set of application programming interfaces to allow an application to: Locate transparentlyacrossthe network,thusprovidinginteraction with another service or application Filterdatato make themfriendlyusableorpublicviaanonymizationprocess for privacy protection (for example)  Be independent from network services  Be reliable and always available  Add complementary attributes like semantics
  • 6. What BPM? Business Process Management (BPM) is a field in operations management that focuses on improving corporate performance bymanagingandoptimizingacompany'sbusinessprocesses.Itcan thereforebe described as a "process optimization process". Why BPM? Processesplayacritical role inhelping companiesachievetheirbusiness strategy by aligning resources, technology and supporting structures toward the achievement of desired business outcomes and/or driving a competitive advantage. Business Process Management (BPM) is a management approach and methodology leveraged to addressstrategicbusinessissues by allowing businesses to grow or operate in a cost effective manner with desired visibility, flexibility and speed. The BPM approach and supporting technologies (Business Process Management Solutions, or BPMS) enable benefits across multiple business facets: How BPM? Here'sanotherexample of howenterprisescantake control of theirdataand processestogainbusiness advantages.Forgenerations,what'snow knownasbusinessprocessmanagement(BPM) wasexpensive and basically consisted of specialists, many meetings, a glut of spreadsheets, paper work flow charts, calendarsandzillionsof emails.Itusedtobe usedexclusivelytocreate efficient work flows for internal and external value chains. With the emergence of cloud services in the past 10 years, the way BPMis administeredhaschanged—andforthe better.Menus of BPMprocesses are now available on demand for anysize business,andaccesstothe controlsof the processesnow canbe made usingmobile devices. As a result, BPM is experiencing a rebirth with market leaders that include IBM, Sales force, Oracle, Tieback, SAP, Appian, Bonita Soft (an open-source-based provider), Pega Systems and others. In addition,enterprisesare becomingincreasinglycreative withhow they use BPMsoftware and services. And why not? It adds a ton of value to a company's IT when one type of software can do extra duty in multiple functions. Here are some examples of creative ways traditional BPMis now being used.