bpm_project implementation methodology
TRANSCRIPT
-
7/27/2019 BPM_Project Implementation Methodology
1/10
Business Process Management:
Business Process Managementis the organizational activity that incorporates:
Planning Designing Building Operating Maintaining
and improving the business processes and their enabling capabilities forever and for everyone.
Many Process Commander Applications provide business process management and automation
through six functional capabilities, informally known as the Six R's:
ReceivingAccepting and capturing the essential data describing work from multiplesources in multiple media and formats, from keyboards, scanners, and external systems.
Routingusing characteristics of the work and knowledge about the workforce tomake intelligent matches and assignments.
Reportingproviding real-time visibility of work in progress, work completed,productivity, bottlenecks, and quality.
RespondingCommunicating status, requests for information, and progress to thework originator and to other people involved in the work, by email, fax, written mail, and
other means.
ResearchingAccessing external systems and databases through connectors to supportanalysis and decisionmaking.
Resolvingthrough automated processing and automated support of users, completingthe work and updating downstream systems promptly.
-
7/27/2019 BPM_Project Implementation Methodology
2/10
Project Implementation Methodology:
DCO:Direct Capture of Objectivesor DCO is an umbrella term for the set of application
development tools and wizards designed to capture and tie business and project goals, objectives,
processes, use cases and requirements to actual implementations.
Direct Capture facilities include:
Application Profiler Application Accelerator DCO Application Enablement wizard Application Use Cases Application Requirements Document wizard
-
7/27/2019 BPM_Project Implementation Methodology
3/10
Application Profile
An Application Profileis a collection of information that specifies business flows for work
types, use cases, requirements, and other processing elements like reports, correspondence, and
interfaces for a project implementation. It also provides implementation time frames and sizing
estimates. Information is captured by the Application Profiler that produces a printable project
document and integrates with the Application Accelerator to create or extend an application or
framework.
Creating a profile is part of the suite of implementation tools supported by Direct Capture of
Objectives (DCO).
-
7/27/2019 BPM_Project Implementation Methodology
4/10
Application Accelerator
The Application Acceleratoris a guided wizard that integrates with an Application Profile to
launch an automated, best practice process that jump-starts the creation of new application and
the extension of existing applications and frameworks.
The accelerator is part of the suite of application implementation tools designed for the Direct
Capture of Objectives (DCO).
Application Documentation
The Document wizardis a component of the Direct Capture of Objectives facility that supports
the generation of Microsoft Word documents describing the as-built application, including use
cases, requirements, and actors.
You can choose which flows of the application to include or exclude. Optionally, you can
include live links within the application document that open the corresponding rules.
Because this documentation can be generated directly from the rules at any time, it can be up-to-
date and "in sync" with the actual implementation.
Use Cases
A use caserepresents a small processing unit performed by one or more actors for a given work
type within an application. A single use case implementation may correspond to an entire flow, a
-
7/27/2019 BPM_Project Implementation Methodology
5/10
single flow action, a screen flow, an activity with the May Start? option enabled or the New
harness of a flow.
Typically, use cases are entered in an Application Profile, created by the Application
Accelerator, and made available for update as instances of Rule-Application-UseCase rules as a
project evolves.
Guadrails
Pegasystems promotes a set of best practices for design and implementation of Process
Commander applications.This provides guidance on team composition, design approach, the
sequence in which the application is developed, and so on.
This approach also includes guardrails; guidelines that help the developers realize project
success, good performance, reuse, and maintainability.
1. Adopt an Iterative Approach
Define an initial project scope that can be delivered and provide business benefit within60-90 days from design to implementation.
Document five concrete use case scenarios up front and evaluate them at the end tocalibrate benefits.
Use your scenarios as story boards and ensure that each delivers a measurable businessbenefit.
2. Establish a Robust Foundation
Design your class structure complying with the recommended class pattern. It should be understandable, be easy to extend, and utilize the standard work and data
classes appropriately.
Use your organization entities as a starting pattern, and then proceed with class groups. Lead with work objects. Create the class structure and completed work objects early. Position rules correctly by class and/or RuleSet. Actively use inheritance to prevent rule redundancy.
3. Do Nothing That is Hard
Use out of the box functionality as much as possible, especially in the initial projectrelease.
-
7/27/2019 BPM_Project Implementation Methodology
6/10
Avoid creating custom HTML screens or adding buttons. Always use the Auto Generated HTML feature for harness sections and flow actions. Always use the standard rules, objects, and properties. Reporting, Urgency, Work Status,
and other built-in behaviors rely on standard properties.
Never add a property to control typical work or for managing the status or timing ofwork.
4. Limit Custom Java
Avoid Java steps in activities when standard Process Commander rule types, libraryfunctions, or activity methods are available.
Reserve your valuable time and Java skills for implementing things that do not alreadyexist.
5. Build for Change
Identify and define 10-100 specific rules that business users own and will maintain. Activities should not be on this list. Use other rule types for business-maintained logic.
-
7/27/2019 BPM_Project Implementation Methodology
7/10
6. Design Intent-driven Processes
Your application control structure must consist of flows and declarative rules, callingactivities only as needed.
Use flow actions to prompt a user for input. Present fewer than five connector flow actions for any individual assignment. If you need
more than that, you need to redesign the process.
Create activity rules that implement only a single purpose to maximize reuse.
7. Create Easy-to-Read Flows
Your flows must fit on one page and must not contain more than 15 SmartShapes(excluding Routers, Notify shapes and Connectors) per page.
If a flow has more than 15 SmartShapes:o Create a subflow.
-
7/27/2019 BPM_Project Implementation Methodology
8/10
o Use parallel flows to perform additional functions
8. Monitor Performance Regularly
Evaluate and tune application performance at least weekly using Performance Analyzer(PAL) to check rule and activity efficiency.
Use PAL early to establish benchmarks. Compare these readings to follow on readings;correct application as required.
9. Calculate and Edit Declaratively, Not Procedurally
Whenever the value of a property is calculated or validated, you must use declarativerules wherever appropriate.
Create a Declare Expressions rule instead of using a Property-Set method in an activity.
-
7/27/2019 BPM_Project Implementation Methodology
9/10
Use a Declare Constraints rule instead of a Validation rule.
10. Keep Security Object-Oriented, Too
Your security design must be rule-based and role-driven based on who should haveaccess to each type of work.
Never code security controls in an activity. Use the standard access roles that ship with Process Commander only as a starting point. Use RuleSets to segment related work for the purpose of introducing rule changes to the
business, not as a security measure.
Work Party:
A work party is a person, organization, or other actor identified in a work object, who can be the
recipient of email or other forms of correspondence.
Five standard data classes derived from Data-Party are available for capturing information about
work parties:
Data-Party-ComFor business organizations Data-Party-GovFor government organizations Data-Party-OperatorFor Process Commander users (who each have a Data-Admin-
Operator ID instance)
Data-Party-OrgFor nonprofit organizations
-
7/27/2019 BPM_Project Implementation Methodology
10/10
Data-Party-PersonFor people who may not be Process Commander users withOperator IDs