Business process measurement - data mining. enn@cc.ttu.ee
|
|
- Paul Tucker
- 8 years ago
- Views:
Transcription
1 Business process measurement - data mining. enn@cc.ttu.ee
2 Business process measurement Balanced scorecard Process mining - ProM
3 Äriprotsessi konteksti perspektiiv
4
5 Clear & measurable goals Effective solutions Measurable results Goal-oriented development of organization s IS
6 Financial OCE Customer Customer oyalty On-time Delivery Business Process Process Quality Process Cycle Time earning and Growth Employees Systems
7 Mission and vision of organization Strategic goals Main tasks Customer perspective : goals and measures Financial perspective : goals and measures Process perspective :goals and measures earning and growth perspective : goals and measures
8
9
10
11
12 Example Balanced Scorecard: egional irline Mission: Dedication to the highest quality of Customer Service delivered with a sense of warmth, friendliness, individual pride, and Company Spirit. Vision: Continue building on our unique position -- the only short haul, low-fare, high-frequency, point-to-point carrier in merica.
13
14 Chapter 17 Process Mining and Simulation Moe ynn nne ozinat il van der alst rthur ter Hofstede Colin Fidge a university 2009,
15 Overview Introduction Preliminaries Process mining (with ProM) Process simulation for operational decision support Tools:, ProM & CPN Tools Conclusions 15
16 Introduction Correctness, effectiveness and efficiency of business processes are vital to an organization Significant gap between what is prescribed and what actually happens Process owners have limited info about what is actually happening Model-based (static) analysis Validation Verification (correctness of a model) Performance analysis Process Mining post-execution analysis Process Simulation what-if analysis 16
17 Preliminaries 17
18 Preliminaries: Data ogging Keeping track of execution data ctivities that have been carried out Timestamps (Start and end times of activities) esources involved Data Purposes udit trails Disaster recovery Monitoring Data Mining Process Mining Process Simulation 18
19 Preliminaries: Process Mining Event logs (recorded actual behaviors) Covers a wide-range of techniques Provide insights into control flow dependencies data usage resource involvement performance related statistics etc. Identify problems that cannot be identified by inspecting a static model alone 19
20 Preliminaries: Process Simulation Develop a simulation model at design time Carry out experiments under different assumptions Used for process reengineering decisions Data input is time-consuming and error-prone equires careful interpretation bstraction of the actual behavior Different assumptions made Inaccurate or Incomplete data input Starts from an empty initial state 20
21 More on Process Mining 21
22 Process Mining Process discovery: "hat is ly happening?" Conformance checking: "Do we do what was agreed upon?" Performance analysis: "here are the bottlenecks?" Process prediction: "ill this case be late?" Process improvement: "How to redesign this process?" Etc. 22
23 Example: mining student data Process discovery: "hat is the curriculum?" Conformance checking: "Do students meet the prerequisites?" Performance analysis: "here are the bottlenecks?" Process prediction: "ill a student complete his studies (in time)?" Process improvement: "How to redesign the curriculum?" 23
24 Process mining: inking events to models business processes people machines components organizations models analyzes supports/ controls specifies configures implements analyzes software system records events, e.g., messages, transactions, etc. process/ system model discovery conformance event logs 24
25 here to start? process control diagnosis process mining process enactment process design implementation/ configuration 25
26 Process Mining with ProM 26
27 ProM framework One of the leading approaches to Process Mining Covers a wide range of analysis approaches 250+ plug-ins Process Discovery Social Network Conformance Checking Conversion capabilities between different formalisms Petri nets, EPCs, BPMN, BPE, Mining XM (MXM) log format 27
28 Basic Performance nalysis 28
29 esource nalysis 29
30 T Checker 30
31 Performance analysis showing bottlenecks flow time from to B bottlenecks throughput time 31
32 Dotted chart analysis short cases time (relative) events case s long cases 32
33 ProM and logs workflow events and data attributes n extractor function available as a ProMImport plug-in ProM can analyze logs in MXM format Prom can transform models into Petri nets <Process id="payment_subprocess.ywl"> <ProcessInstance id="3f9dfc e7-b9f7-329b5c6f0ded"> <udittrailentry> <orkflowmodelelement>check_prepaid_shipments_10</orkflowmodelelement> <EventType>start</EventType> <Timestamp> T10:11: :00</Timestamp> <Originator>JohnsI</Originator> </udittrailentry> <udittrailentry> <Data><ttribute name="prepaidshipment">true</ttribute></data> <orkflowmodelelement>check_prepaid_shipments_10</orkflowmodelelement> <EventType>complete</EventType> <Timestamp> T10:11: :00</Timestamp> <Originator>JohnsI</Originator> </udittrailentry> </ProcessInstance> </Process> 33
34 Starting point: event logs logs or other event logs, audit trails, databases, message logs, etc. unified event log (MXM) 34
35 Process Simulation 35
36 Integrated Simulation pproach 36
37 inking process mining to simulation Gather process statistics using process mining techniques Calibrate simulation experiments with this data nalyze simulation logs in the same way as execution logs 37
38 Data sources for process characteristics Design (orkflow and Organizational Models) Control and data flow Organizational model Initial data values ole assignments Historical (Event logs) Data value range distributions Execution time distributions Case arrival rate esource availability patterns State (orkflow system) Progress state Data values for running cases Busy resources un time for cases 38
39 Tools:, ProM and CPN Tools 39
40 rchitecture II Create and execute process models Maintain organizational models Extractor functionalities for event logs, organizational models and current state of the workflow system ProM Translate and integrate all the components into a Petri nets model nalyze event logs and simulation logs CPN Tools un simulation experiments Incorporate current state of workflows Generate simulation logs 40
41 Tool: rchitecture 41
42 42
43 Tool: rchitecture Use existing models 43
44 Tool: rchitecture II Use existing models Derive parameters 44
45 Tool: rchitecture III Use existing models Derive parameters Consider current state 45
46 Tool: rchitecture IV Use existing models Derive parameters Consider current state Simulation logs in MXM 46
47 Simulation: Example Payment Start s: Supply dmin Officer payment shipment payment freight Issue Shipment Invoice s: Supply dmin Officer [else] Check Pre-paid shipments c: Finance Officer [pre-paid shipments] Check Invoice equirement s: Supply dmin Officer [Invoice required] Issue Shipment Payment Order c: Finance Officer Issue Shipment emittance dvice c: Finance Officer Produce Freight Invoice Update Shipment Payment Order c: Finance Officer pprove Shipment Payment Order c: Senior Finance Officer Complete Invoice equirement s: Supply dmin Officer s: Supply dmin Officer [s. order not approved] [s. order approved] customer notified of the payment, customer makes the payment Process Shipment Payment o: ccount Manager Process Freight Payment s: Supply dmin Officer [payment incorrect due to underpayment] [payment incorrect due to overcharge] [payment correct] issue Debit djustment o: ccount Manager Issue Credit djustment o: ccount Manager customer makes the payment account settled Finalise o: ccount Manager End s: Supply dmin Officer 47
48 Simulation: Example 13 staff members 5 `supply admin officers 3 `finance officers' 2 `senior finance officers' 3 `account managers Case arrival rate: 50 payments per week Throughput time: 5 working days on average 30% of shipments are pre-paid 50% of orders are approved first-time 20% of payments are underpaid 10% of payments are overpaid 70% of payments are correct 80% of orders require invoices 20% of orders do not require invoices ssumption: Payment process running in for some time. 48
49 Simulation: Scenario 4 weeks till the end of financial year backlog of 30 payments (some for more than a week) Goal: ll payments to be processed in 4 weeks time un simulation experiments to see if the backlog can be cleared using current resources evaluate the effect of avoiding underpayments Possible remedial action: llocate more resources 49
50 ProM screenshots 50
51 CPN Tools 51
52 Four Scenarios 1. n empty initial state ( empty ) 2. fter loading the current state file with the 30 applications currently in the system ( as is ) 3. fter loading the current state file but adding 13 extra resources ( to be ) 4. fter loading the current state file but changing the model so that underpayments are no longer possible ( to be B') 52
53 Evaluation 53
54 Simulation for operational decision support Combine the process execution log (`up to now') and the simulation log (which simulates the future `from now on') ook at the process execution in a unified manner Track both the history and the future of current cases 54
55 lpha algorithm α
56 Process log Minimal information in log: case id s and task id s. dditional information: event type, time, resources, and data. In this log there are three possible sequences: BCD case 1 : task case 2 : task case 3 : task case 3 : task B case 1 : task B case 1 : task C case 2 : task C case 4 : task case 2 : task B case 2 : task D case 5 : task E case 4 : task C case 1 : task D case 3 : task C case 3 : task D case 4 : task B case 5 : task F case 4 : task D
57 >,,,# relations Direct succession: x>y iff for some case x is directly followed by y. Causality: x y iff x>y and not y>x. Parallel: x y iff x>y and y>x Choice: x#y iff not x>y and not y>x. case 1 : task case 2 : task case 3 : task case 3 : task B case 1 : task B case 1 : task C case 2 : task C case 4 : task case 2 : task B case 2 : task D case 5 : task E case 4 : task C case 1 : task D case 3 : task C case 3 : task D case 4 : task B case 5 : task F case 4 : task D >B >C B>C B>D C>B C> D E>F B C B D C D E F B C C B
58 Basic idea (1) x y x y
59 Basic idea (2) y x z x y, x z, and y z
60 Basic idea (3) y x z x y, x z, and y#z
61 Basic idea (4) x z y x z, y z, and x y
62 Basic idea (5) x z y x z, y z, and x#y
63 It is not that simple: Basic alpha algorithm et be a workflow log over T. a() is defined as follows. 1. T = { t T $ s t s}, 2. T I = { t T $ s t = first(s) }, 3. T O = { t T $ s t = last(s) }, 4. X = { (,B) T B T " a " b B a b " a1,a2 a 1 # a 2 " b1,b2 B b 1 # b 2 }, 5. = { (,B) X " (,B ) X B B (,B) = (,B ) }, 6. P = { p (,B) (,B) } {i,o }, 7. F = { (a,p (,B) ) (,B) a } { (p (,B),b) (,B) b B } { (i,t) t T I } { (t,o ) t T O }, and 8. a() = (P,T,F ). The alpha algorithm has been proven to be correct for a large class of free-choice nets.
64 Example case 1 : task case 2 : task case 3 : task case 3 : task B case 1 : task B case 1 : task C case 2 : task C case 4 : task case 2 : task B case 2 : task D case 5 : task E case 4 : task C case 1 : task D case 3 : task C case 3 : task D case 4 : task B case 5 : task F case 4 : task D E B C F D a()
65 DEMO lpha algorithm B get review 1 get review X C M time-out 1 D time-out X K invite additional reviewer get review 2 G H I invite reviewers E time-out 2 collect reviews decide accept J 48 cases 16 performers F get review 3 G time-out 3 reject
66 ogging system Nlog Nog can process diagnostic messages emitted from any.net language (such as C# or Visual Basic), augment them with contextual information (such as date/time, severity, thread, process, environment enviroment), format them according to your preference and send them to one or more targets such as file or database.
67 Supported targets Files - single file or multiple, with automatic file naming and archival Event og - local or remote Database - store your logs in databases supported by.net Network - using TCP, UDP, SOP, MSMQ protocols Command-line console - including color coding of messages - you can receive s whenever application errors occur SP.NET trace... and many more
68 Conclusions Introduction Concise assessment of ity needed for processes Preliminaries Data logging, Process Mining, Process Simulation Process mining with ProM Understanding process characteristics Process simulation Operational decision support Utilizing log info for simulation experiments Tools:, ProM & CPN Tools Payment example Conclusion 68
Workflow Simulation for Operational Decision Support
Workflow Simulation for Operational Decision Support A. Rozinat 1, M. T. Wynn 2, W. M. P. van der Aalst 1,2, A. H. M. ter Hofstede 2, and C. J. Fidge 2 1 Information Systems Group, Eindhoven University
More informationBusiness Process Management
Business Process Management Elective in Software and Services Massimiliano de eoni DIS SPIENZ, Università di oma deleoni@dis.uniroma1.it www.dis.uniroma1.it/~deleoni a university 2009, www.yawlfoundation.org
More informationUsing Process Mining to Bridge the Gap between BI and BPM
Using Process Mining to Bridge the Gap between BI and BPM Wil van der alst Eindhoven University of Technology, The Netherlands Process mining techniques enable process-centric analytics through automated
More informationProcess Mining. ^J Springer. Discovery, Conformance and Enhancement of Business Processes. Wil M.R van der Aalst Q UNIVERS1TAT.
Wil M.R van der Aalst Process Mining Discovery, Conformance and Enhancement of Business Processes Q UNIVERS1TAT m LIECHTENSTEIN Bibliothek ^J Springer Contents 1 Introduction I 1.1 Data Explosion I 1.2
More informationModel Discovery from Motor Claim Process Using Process Mining Technique
International Journal of Scientific and Research Publications, Volume 3, Issue 1, January 2013 1 Model Discovery from Motor Claim Process Using Process Mining Technique P.V.Kumaraguru *, Dr.S.P.Rajagopalan
More informationCHAPTER 1 INTRODUCTION
CHAPTER 1 INTRODUCTION 1.1 Research Motivation In today s modern digital environment with or without our notice we are leaving our digital footprints in various data repositories through our daily activities,
More informationData Science. Research Theme: Process Mining
Data Science Research Theme: Process Mining Process mining is a relatively young research discipline that sits between computational intelligence and data mining on the one hand and process modeling and
More informationBusiness Process Management with YAWL and its Support Environment
Business Process Management with and its Support Environment lessandro usso arusso@dis.uniroma1.it based on the slides available online at http://www.yawlfoundation.org/yawlbook/downloads.html http://fundamentals-of-bpm.org/supplementary-material/lectures/
More informationProcess Modelling from Insurance Event Log
Process Modelling from Insurance Event Log P.V. Kumaraguru Research scholar, Dr.M.G.R Educational and Research Institute University Chennai- 600 095 India Dr. S.P. Rajagopalan Professor Emeritus, Dr. M.G.R
More informationProM Framework Tutorial
ProM Framework Tutorial Authors: Ana Karla Alves de Medeiros (a.k.medeiros@.tue.nl) A.J.M.M. (Ton) Weijters (a.j.m.m.weijters@tue.nl) Technische Universiteit Eindhoven Eindhoven, The Netherlands February
More informationBusiness Process Modeling
Business Process Concepts Process Mining Kelly Rosa Braghetto Instituto de Matemática e Estatística Universidade de São Paulo kellyrb@ime.usp.br January 30, 2009 1 / 41 Business Process Concepts Process
More informationDotted Chart and Control-Flow Analysis for a Loan Application Process
Dotted Chart and Control-Flow Analysis for a Loan Application Process Thomas Molka 1,2, Wasif Gilani 1 and Xiao-Jun Zeng 2 Business Intelligence Practice, SAP Research, Belfast, UK The University of Manchester,
More informationMining Process Models with Non-Free-Choice Constructs
Mining Process Models with Non-Free-hoice onstructs Lijie Wen 1, Wil M.P. van der alst 2, Jianmin Wang 1, and Jiaguang Sun 1 1 School of Software, Tsinghua University, 100084, eijing, hina wenlj00@mails.tsinghua.edu.cn,{jimwang,sunjg}@tsinghua.edu.cn
More informationProcess Mining Data Science in Action
Process Mining Data Science in Action Wil van der Aalst Scientific director of the DSC/e Dutch Data Science Summit, Eindhoven, 4-5-2014. Process Mining Data Science in Action https://www.coursera.org/course/procmin
More informationCombination of Process Mining and Simulation Techniques for Business Process Redesign: A Methodological Approach
Combination of Process Mining and Simulation Techniques for Business Process Redesign: A Methodological Approach Santiago Aguirre, Carlos Parra, and Jorge Alvarado Industrial Engineering Department, Pontificia
More informationA Software Framework for Risk-Aware Business Process Management
A Software Framework for Risk-Aware Business Management Raffaele Conforti 1, Marcello La Rosa 1,2, Arthur H.M. ter Hofstede 1,4, Giancarlo Fortino 3, Massimiliano de Leoni 4, Wil M.P. van der Aalst 4,1,
More informationChapter 12 Analyzing Spaghetti Processes
Chapter 12 Analyzing Spaghetti Processes prof.dr.ir. Wil van der Aalst www.processmining.org Overview Chapter 1 Introduction Part I: Preliminaries Chapter 2 Process Modeling and Analysis Chapter 3 Data
More informationLluis Belanche + Alfredo Vellido. Intelligent Data Analysis and Data Mining. Data Analysis and Knowledge Discovery
Lluis Belanche + Alfredo Vellido Intelligent Data Analysis and Data Mining or Data Analysis and Knowledge Discovery a.k.a. Data Mining II An insider s view Geoff Holmes: WEKA founder Process Mining
More informationFeature. Applications of Business Process Analytics and Mining for Internal Control. World
Feature Filip Caron is a doctoral researcher in the Department of Decision Sciences and Information Management, Information Systems Group, at the Katholieke Universiteit Leuven (Flanders, Belgium). Jan
More informationSupporting the BPM lifecycle with FileNet
Supporting the BPM lifecycle with FileNet Mariska Netjes Hajo A. Reijers Wil. M.P. van der Aalst Outline Introduction Evaluation approach Evaluation of FileNet Conclusions Business Process Management Supporting
More informationTowards a Software Framework for Automatic Business Process Redesign Marwa M.Essam 1, Selma Limam Mansar 2 1
ACEEE Int. J. on Communication, Vol. 02, No. 03, Nov 2011 Towards a Software Framework for Automatic Business Process Redesign Marwa M.Essam 1, Selma Limam Mansar 2 1 Faculty of Information and Computer
More informationDept. of IT in Vel Tech Dr. RR & Dr. SR Technical University, INDIA. Dept. of Computer Science, Rashtriya Sanskrit Vidyapeetha, INDIA
ISSN : 2229-4333(Print) ISSN : 0976-8491(Online) Analysis of Workflow and Process Mining in Dyeing Processing System 1 Saravanan. M.S, 2 Dr Rama Sree.R.J 1 Dept. of IT in Vel Tech Dr. RR & Dr. SR Technical
More informationProcess Mining: Making Knowledge Discovery Process Centric
Process Mining: Making Knowledge Discovery Process Centric Wil van der alst Department of Mathematics and Computer Science Eindhoven University of Technology PO Box 513, 5600 MB, Eindhoven, The Netherlands
More informationData Science Betere processen en producten dankzij (Big) data. Wil van der Aalst www.vdaalst.com @wvdaalst www.processmining.org
Data Science Betere processen en producten dankzij (Big) data Wil van der Aalst www.vdaalst.com @wvdaalst www.processmining.org Data Science Center Eindhoven http://www.tue.nl/dsce/ DSC/e: Competences
More informationBusiness Process Modeling Information Systems in Industry (372-1-4207 )
Business Process Modeling Information Systems in Industry (372-1-4207 ) Arnon Sturm The material of this presentation is adopted from various people including:, Pnina Soffer, Iris Reinhartz-Berger 1 Outline
More informationDecision Mining in Business Processes
Decision Mining in Business Processes A. Rozinat and W.M.P. van der Aalst Department of Technology Management, Eindhoven University of Technology P.O. Box 513, NL-5600 MB, Eindhoven, The Netherlands {a.rozinat,w.m.p.v.d.aalst}@tm.tue.nl
More informationMercy Health System. St. Louis, MO. Process Mining of Clinical Workflows for Quality and Process Improvement
Mercy Health System St. Louis, MO Process Mining of Clinical Workflows for Quality and Process Improvement Paul Helmering, Executive Director, Enterprise Architecture Pete Harrison, Data Analyst, Mercy
More informationSummary and Outlook. Business Process Intelligence Course Lecture 8. prof.dr.ir. Wil van der Aalst. www.processmining.org
Business Process Intelligence Course Lecture 8 Summary and Outlook prof.dr.ir. Wil van der Aalst www.processmining.org Overview Chapter 1 Introduction Part I: Preliminaries Chapter 2 Process Modeling and
More informationOverview of EAM Services. A Fully Integrated Global EAM Service Provider
A Fully Integrated Global EAM Service Provider Table of Contents Strategy & Process Services Overview... p. 3 Asset Reliability Services Overview... p. 4 Systems & Technology Services Overview... p. 7
More informationEventifier: Extracting Process Execution Logs from Operational Databases
Eventifier: Extracting Process Execution Logs from Operational Databases Carlos Rodríguez 1, Robert Engel 2, Galena Kostoska 1, Florian Daniel 1, Fabio Casati 1, and Marco Aimar 3 1 University of Trento,
More informationProcess simulation. Enn Õunapuu enn.ounapuu@ttu.ee
Process simulation Enn Õunapuu enn.ounapuu@ttu.ee Content Problem How? Example Simulation Definition Modeling and simulation functionality allows for preexecution what-if modeling and simulation. Postexecution
More informationProcess Mining: Using CPN Tools to Create Test Logs for Mining Algorithms
Mining: Using CPN Tools to Create Test Logs for Mining Algorithms Ana Karla Alves de Medeiros and Christian W. Günther 2 Outline Introduction Mining The need for synthetic logs MXML format Using the Logging
More informationProcess Mining Tools: A Comparative Analysis
EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science Process Mining Tools: A Comparative Analysis Irina-Maria Ailenei in partial fulfillment of the requirements for the degree
More informationAnalysis of Service Level Agreements using Process Mining techniques
Analysis of Service Level Agreements using Process Mining techniques CHRISTIAN MAGER University of Applied Sciences Wuerzburg-Schweinfurt Process Mining offers powerful methods to extract knowledge from
More informationTowards Cross-Organizational Process Mining in Collections of Process Models and their Executions
Towards Cross-Organizational Process Mining in Collections of Process Models and their Executions J.C.A.M. Buijs, B.F. van Dongen, W.M.P. van der Aalst Department of Mathematics and Computer Science, Eindhoven
More informationProM 6 Exercises. J.C.A.M. (Joos) Buijs and J.J.C.L. (Jan) Vogelaar {j.c.a.m.buijs,j.j.c.l.vogelaar}@tue.nl. August 2010
ProM 6 Exercises J.C.A.M. (Joos) Buijs and J.J.C.L. (Jan) Vogelaar {j.c.a.m.buijs,j.j.c.l.vogelaar}@tue.nl August 2010 The exercises provided in this section are meant to become more familiar with ProM
More informationThe Infrastructure Audit Trail and Part 11
The Infrastructure Audit Trail and Part 11 Pamela Campbell Senior Consultant, Validation DataCeutics, Inc. campbelp@dataceutics.com February 28, 2003 DataCeutics, Inc. 2003 Why am I Qualified to Make this
More informationProcess Mining and Network Analysis
Towards Comprehensive Support for Organizational Mining Minseok Song and Wil M.P. van der Aalst Eindhoven University of Technology P.O.Box 513, NL-5600 MB, Eindhoven, The Netherlands. {m.s.song, w.m.p.v.d.aalst}@tue.nl
More informationExamination SUBJECT. Version:
SUBJET Version: 1 Which of the following statements best describes Business nalysis? Business nalysis provides the reasoning for initiating a project. Business nalysis is the strategic part of the project
More informationIntroduction to Workflow
Introduction to Workflow SISTEMI INFORMATICI SUPPORTO ALLE DECISIONI AA 2006-2007 Libro di testo: Wil van der Aalst and Kees van Hee. Workflow Management: Models, Methods, and Systems. The MIT Press, paperback
More informationWorkflow Solutions Data Collection, Data Review and Data Management
Data Collection, Data Review and Data Management Workflow Finding more efficient ways to support patient needs begins with better workflow management. MGC Diagnostics has developed a complete workflow
More informationTest Suite Generation for Services
Test Suite Generation for Services Kathrin Kaschner and Niels Lohmann WESOA 2008 Sydney 1 December 2008 http://service technology.org/wesoa2008 UNIVERSITÄT ROSTOCK Testing Services: What's new? classical
More informationMOC 10964C: Cloud and Datacenter Monitoring with System Center Operations Manager
MOC 10964C: Cloud and Datacenter Monitoring with System Center Operations Manager Course Overview This course provides students with the knowledge and skills to deploy and configure System Center 2012
More informationProM 6 Tutorial. H.M.W. (Eric) Verbeek mailto:h.m.w.verbeek@tue.nl R. P. Jagadeesh Chandra Bose mailto:j.c.b.rantham.prabhakara@tue.
ProM 6 Tutorial H.M.W. (Eric) Verbeek mailto:h.m.w.verbeek@tue.nl R. P. Jagadeesh Chandra Bose mailto:j.c.b.rantham.prabhakara@tue.nl August 2010 1 Introduction This document shows how to use ProM 6 to
More informationAn Oracle White Paper September 2013. Advanced Java Diagnostics and Monitoring Without Performance Overhead
An Oracle White Paper September 2013 Advanced Java Diagnostics and Monitoring Without Performance Overhead Introduction... 1 Non-Intrusive Profiling and Diagnostics... 2 JMX Console... 2 Java Flight Recorder...
More informationIT Service Continuity Management PinkVERIFY
-11-G-001 General Criteria Does the tool use ITIL 2011 Edition process terms and align to ITIL 2011 Edition workflows and process integrations? -11-G-002 Does the tool have security controls in place to
More informationNr.: Fakultät für Informatik Otto-von-Guericke-Universität Magdeburg
Nr.: Fakultät für Informatik Otto-von-Guericke-Universität Magdeburg Nr.: Fakultät für Informatik Otto-von-Guericke-Universität Magdeburg Impressum ( 5 TMG) Herausgeber: Otto-von-Guericke-Universität Magdeburg
More informationProcess Mining and Monitoring Processes and Services: Workshop Report
Process Mining and Monitoring Processes and Services: Workshop Report Wil van der Aalst (editor) Eindhoven University of Technology, P.O.Box 513, NL-5600 MB, Eindhoven, The Netherlands. w.m.p.v.d.aalst@tm.tue.nl
More informationConfiguration Management - The Big Picture
Configuration Management - The Big Picture Consists of: 1. Product s aligned to system development life cycle comprised of hardware and software configuration items described by specifications, design
More informationITPS AG. Aplication overview. DIGITAL RESEARCH & DEVELOPMENT SQL Informational Management System. SQL Informational Management System 1
ITPS AG DIGITAL RESEARCH & DEVELOPMENT SQL Informational Management System Aplication overview SQL Informational Management System 1 Contents 1 Introduction 3 Modules 3 Aplication Inventory 4 Backup Control
More informationProcess Mining The influence of big data (and the internet of things) on the supply chain
September 16, 2015 Process Mining The influence of big data (and the internet of things) on the supply chain Wil van der Aalst www.vdaalst.com @wvdaalst www.processmining.org http://www.engineersjournal.ie/factory-of-thefuture-will-see-merging-of-virtual-and-real-worlds/
More informationMonitor and Manage Your MicroStrategy BI Environment Using Enterprise Manager and Health Center
Monitor and Manage Your MicroStrategy BI Environment Using Enterprise Manager and Health Center Presented by: Dennis Liao Sales Engineer Zach Rea Sales Engineer January 27 th, 2015 Session 4 This Session
More informationLife-Cycle Support for Staff Assignment Rules in Process-Aware Information Systems
Life-Cycle Support for Staff Assignment Rules in Process-Aware Information Systems Stefanie Rinderle-Ma 1,2 and Wil M.P. van der Aalst 2 1 Department Databases and Information Systems, Faculty of Engineering
More informationBusiness Process Discovery
Sandeep Jadhav Introduction Well defined, organized, implemented, and managed Business Processes are very critical to the success of any organization that wants to operate efficiently. Business Process
More informationMONITORING A WEBCENTER CONTENT DEPLOYMENT WITH ENTERPRISE MANAGER
MONITORING A WEBCENTER CONTENT DEPLOYMENT WITH ENTERPRISE MANAGER Andrew Bennett, TEAM Informatics, Inc. Why We Monitor During any software implementation there comes a time where a question is raised
More informationChapter 4 Getting the Data
Chapter 4 Getting the Data prof.dr.ir. Wil van der Aalst www.processmining.org Overview Chapter 1 Introduction Part I: Preliminaries Chapter 2 Process Modeling and Analysis Chapter 3 Data Mining Part II:
More information4 5 6 7 8 9 10 11 What is a character acte set? Definition Usage A character encoding or character set (sometimes referred to as code page) consists of a code that pairs a sequence of characters from a
More informationMagento module Documentation
Table of contents 1 General... 4 1.1 Languages... 4 2 Installation... 4 2.1 Search module... 4 2.2 Installation in Magento... 6 2.3 Installation as a local package... 7 2.4 Uninstalling the module... 8
More informationSupporting the Workflow Management System Development Process with YAWL
Supporting the Workflow Management System Development Process with YAWL R.S. Mans 1, W.M.P. van der Aalst 1 Department of Mathematics and Computer Science, Eindhoven University of Technology, P.O. ox 513,
More informationHospital Pneumatic Tube System Buyer s Guide Evaluating material transport partners that fit your needs
Hospital Pneumatic Tube System Buyer s Guide Evaluating material transport partners that fit your needs Improving the Patient Experience With hospitals more focused on the patient experience than ever
More informationTable of Contents. Cisco Using the Cisco IOS Firewall to Allow Java Applets From Known Sites while Denying Others
Cisco IOS Firewall to Allow Java Applets From Known Sites w Table of Contents Using the Cisco IOS Firewall to Allow Java Applets From Known Sites while Denying Others...1 Introduction...1 To Deny Java
More informationSupporting the BPM life-cycle with FileNet
Supporting the BPM life-cycle with FileNet Mariska Netjes, Hajo A. Reijers, Wil M.P. van der Aalst Eindhoven University of Technology, Department of Technology Management, PO Box 513, NL-5600 MB Eindhoven,
More informationInternal Control Deliverables. For. System Development Projects
DIVISION OF AUDIT SERVICES Internal Control Deliverables For System Development Projects Table of Contents Introduction... 3 Process Flow... 3 Controls Objectives... 4 Environmental and General IT Controls...
More informationFileNet s BPM life-cycle support
FileNet s BPM life-cycle support Mariska Netjes, Hajo A. Reijers, Wil M.P. van der Aalst Eindhoven University of Technology, Department of Technology Management, PO Box 513, NL-5600 MB Eindhoven, The Netherlands
More informationProcess Mining. Data science in action
Process Mining. Data science in action Julia Rudnitckaia Brno, University of Technology, Faculty of Information Technology, irudnickaia@fit.vutbr.cz 1 Abstract. At last decades people have to accumulate
More informationAugmented Search for Web Applications. New frontier in big log data analysis and application intelligence
Augmented Search for Web Applications New frontier in big log data analysis and application intelligence Business white paper May 2015 Web applications are the most common business applications today.
More informationCA NSM System Monitoring. Option for OpenVMS r3.2. Benefits. The CA Advantage. Overview
PRODUCT BRIEF: CA NSM SYSTEM MONITORING OPTION FOR OPENVMS Option for OpenVMS r3.2 CA NSM SYSTEM MONITORING OPTION FOR OPENVMS HELPS YOU TO PROACTIVELY DISCOVER, MONITOR AND DISPLAY THE HEALTH AND AVAILABILITY
More informationCIO-SP3 Service areas NIH Chief Information Officers-Solutions & Partners
CIO-SP3 Service areas NIH Chief Information Officers-Solutions & Partners PwC Contents Page 1 IT Services for Biomedical Research and Healthcare 2 Chief Information Officer (CIO) Support 3 5 3 Imaging
More informationProcess Mining Using BPMN: Relating Event Logs and Process Models
Noname manuscript No. (will be inserted by the editor) Process Mining Using BPMN: Relating Event Logs and Process Models Anna A. Kalenkova W. M. P. van der Aalst Irina A. Lomazova Vladimir A. Rubin Received:
More informationThe Fulfillment of AS 9100 Rev C Requirements by EnterpriseIQ
The Fulfillment of AS 9100 Rev C Requirements by EnterpriseIQ Manufacturers have worked to meet the stringent requirements of AS9100 for decades; the recent introduction of Revision C has further expanded
More informationLower business risk and increase IT productivity with trusted, managed and secured file transfer
Lower business risk and increase IT productivity with trusted, managed and secured file transfer Today s dynamic business environments and economic uncertainty mean organizations must work smarter to remain
More informationBusiness Independent Model of Mobile Workforce Management
Business Independent Model of Mobile Workforce Management Volker Gruhn and Thomas Richter Chair of Applied Telematics / e-business, University of Leipzig Klostergasse 3, 04109 Leipzig, Germany {gruhn,richter}@ebus.informatik.uni-leipzig.de
More informationHandling Big(ger) Logs: Connecting ProM 6 to Apache Hadoop
Handling Big(ger) Logs: Connecting ProM 6 to Apache Hadoop Sergio Hernández 1, S.J. van Zelst 2, Joaquín Ezpeleta 1, and Wil M.P. van der Aalst 2 1 Department of Computer Science and Systems Engineering
More informationPLCS Reporter v2.8 for IBM Tivoli Storage Manager. Business intelligence for TSM
PLCS Reporter v2.8 for IBM Tivoli Storage Manager Up to date accurate enterprise reporting, alerting and trending for TSM servers Business intelligence for TSM PLCS 1999-2012 Overview: PLCS Reporter Automated
More informationEDIminer: A Toolset for Process Mining from EDI Messages
EDIminer: A Toolset for Process Mining from EDI Messages Robert Engel 1, R. P. Jagadeesh Chandra Bose 2, Christian Pichler 1, Marco Zapletal 1, and Hannes Werthner 1 1 Vienna University of Technology,
More informationVistara Lifecycle Management
Vistara Lifecycle Management Solution Brief Unify IT Operations Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid
More informationFormal Modeling and Analysis by Simulation of Data Paths in Digital Document Printers
Formal Modeling and Analysis by Simulation of Data Paths in Digital Document Printers Venkatesh Kannan, Wil M.P. van der Aalst, and Marc Voorhoeve Department of Mathematics and Computer Science, Eindhoven
More informationBusiness Process Modeling and Analysis with Savvion BusinessManager
White Paper Business Process Modeling and Analysis with Savvion BusinessManager Mar 2008 5104 Old Ironsides Drive Suite 205 Santa Clara, California 95054 408-330-3402 888-544-5511 www.savvion.com White
More informationInformation Technology Engineers Examination. Network Specialist Examination. (Level 4) Syllabus. Details of Knowledge and Skills Required for
Information Technology Engineers Examination Network Specialist Examination (Level 4) Syllabus Details of Knowledge and Skills Required for the Information Technology Engineers Examination Version 2.0
More informationBusiness Process Modeling
Business Process Modeling Organization Who? What? Function When? Process Which? Data / Service / Product 1 BPMN Stands for Business Process Management Notation Graphical notation for specifying Business
More informationUnderstand Performance Monitoring
Understand Performance Monitoring Lesson Overview In this lesson, you will learn: Performance monitoring methods Monitor specific system activities Create a Data Collector Set View diagnosis reports Task
More informationProcess Mining: A Two-Step Approach using Transition Systems and Regions
Process Mining: Two-Step pproach using Transition Systems and Regions Wil M.P. van der alst 1, V. Rubin 2,1,.F. van ongen 1,. Kindler 2, and.w. Günther 1 1 indhoven University of Technology, indhoven,
More informationDigipass Plug-In for IAS. IAS Plug-In IAS. Microsoft's Internet Authentication Service. Getting Started
Digipass Plug-In for IAS IAS Plug-In IAS Microsoft's Internet Authentication Service Getting Started Disclaimer of Warranties and Limitations of Liabilities Disclaimer of Warranties and Limitations of
More informationInfasme Support. Incident Management Process. [Version 1.0]
Infasme Support Incident Management Process [Version 1.0] Table of Contents About this document... 1 Who should use this document?... 1 Summary of changes... 1 Chapter 1. Incident Process... 3 1.1. Primary
More informationDistribution Training Guide. D110 Sales Order Management: Basic
Distribution Training Guide D110 Sales Order Management: Basic Certification Course Prerequisites The combined D110 Sales Order Management certification course consists of a hands- on guide that will walk
More informationGeneration of a Set of Event Logs with Noise
Generation of a Set of Event Logs with Noise Ivan Shugurov International Laboratory of Process-Aware Information Systems National Research University Higher School of Economics 33 Kirpichnaya Str., Moscow,
More informationConfiguring IBM WebSphere Monitor for Process Mining
Configuring IBM WebSphere Monitor for Process Mining H.M.W. Verbeek and W.M.P. van der Aalst Technische Universiteit Eindhoven Department of Mathematics and Computer Science P.O. Box 513, 5600 MB Eindhoven,
More informationBaker s Dozen: 13 Ways Process Intelligence Drives Supply Chain Value
Baker s Dozen: 13 Ways Process Intelligence Drives Supply Chain Value Anthony Aming Enterprise Business and Applications Architect / Baker Hughes Anthony Aming, Baker Hughes Dave Brooks, Software AG Dave
More informationUsing WebLOAD to Monitor Your Production Environment
Using WebLOAD to Monitor Your Production Environment Your pre launch performance test scripts can be reused for post launch monitoring to verify application performance. This reuse can save time, money
More informationTranslating Message Sequence Charts to other Process Languages using Process Mining
Translating Message Sequence Charts to other Process Languages using Process Mining Kristian Bisgaard Lassen 1, Boudewijn F. van Dongen 2, and Wil M.P. van der Aalst 2 1 Department of Computer Science,
More informationISUPPLIER PORTAL USER HANDBOOK
TTWEER PETROLEUM HRIN FIELD DEVELOPMENT COMPNY W.L.L ( TTWEER ) ISUPPLIER PORTL USER HNDOOK pplicable to the operations of Tatweer in: The Kingdom of ahrain IMPORTNT: Processes, applications and business
More information4.0 Receiving Process
4.0 Receiving Process Delivery of requested products or services marks a transition in the Purchase-to-Pay process from a purchasing activity to a payables activity. All purchases must be received to release
More informationUsing Trace Clustering for Configurable Process Discovery Explained by Event Log Data
Master of Business Information Systems, Department of Mathematics and Computer Science Using Trace Clustering for Configurable Process Discovery Explained by Event Log Data Master Thesis Author: ing. Y.P.J.M.
More information642 523 Securing Networks with PIX and ASA
642 523 Securing Networks with PIX and ASA Course Number: 642 523 Length: 1 Day(s) Course Overview This course is part of the training for the Cisco Certified Security Professional and the Cisco Firewall
More informationWhat is a life cycle model?
What is a life cycle model? Framework under which a software product is going to be developed. Defines the phases that the product under development will go through. Identifies activities involved in each
More informationResponsibility charting (RACI)
esponsibility charting () What s? esponsibility harting s a technique for identifying functional areas, key activities, and decision points where ambiguities exist; differences can be brought into the
More informationDr. Jana Koehler IBM Zurich Research Laboratory
Precise Modeling of Business Processes with the Business Process Modeling Notation BPMN 2.0 Dr. Jana Koehler IBM Zurich Research Laboratory ZRL BIT at a Glance Computer Science at ZRL: Security/Cryptography
More informationFollowing the spirit of the current reform initiatives undertaken in. the United Nations system, a reform of the Education (ED) Sector of
Overview on the Education Sector Reform Process Following the spirit of the current reform initiatives undertaken in the United Nations system, a reform of the Education (ED) Sector of UNESCO was initiated
More informationWindows Firewall Configuration with Group Policy for SyAM System Client Installation
with Group Policy for SyAM System Client Installation SyAM System Client can be deployed to systems on your network using SyAM Management Utilities. If Windows Firewall is enabled on target systems, it
More informationBusiness-Driven Software Engineering Lecture 3 Foundations of Processes
Business-Driven Software Engineering Lecture 3 Foundations of Processes Jochen Küster jku@zurich.ibm.com Agenda Introduction and Background Process Modeling Foundations Activities and Process Models Summary
More information