Home > Articles > Software Development & Management

📄 Contents

  1. New-Age Business Drivers
  2. E-Business Technology Drivers
  3. Summary

E-Business Technology Drivers

As business product cycles change more and more rapidly and each organization is required to form an individual and unique relationship with each of its customers and other stakeholders, only flexible processes and maneuverable technologies can enable knowledgeable staff to make the commitments required to continuously adapt. Technology can also provide a great opportunity for business change, perhaps one of the most important opportunities, as long as we don't deal with technology in isolation of the other factors of process, knowledge, and stakeholder relationships. figure 1.7 shows how these are related. Note that all arrows are bi-directional, requiring a two-way examination of opportunities and impacts.

figure 1.7-Interplay among critical competencies for performance improvement.

Without quality and productivity improvements made possible by strategic technologies, enterprises can fall behind competitively. Production technology improvements can take the form of new production capabilities, such as manufacturing process improvements and better production management solutions that allow ongoing feedback through real-time programmable logic controllers (PLCs) (These controllers link equipment into control rooms or virtual control rooms to monitor and automate production processes.)

In general, organizations are becoming more mature in their information technology applications and are building on their legacy. Some advanced organizations are approaching a new maturity level in the realm of Process Management ("What do I have to do?") and Data

Management ("What do I have to know to do it?"). As these organizations mature, they get closer to the business and data; process perspectives converge to the point that stakeholder relationships, business process, and knowledge are dealt with concurrently. figure 1.8 shows how this approach to IT is converging around business issues.

figure 1.8-The Burlton Data/Process Management Maturity Model.

An analysis of figures 1.7 and 1.8 led me to look at what technology can do to serve business process stakeholders better. I will look at technology potential from these points of view:

  • How technology can provide access to information that has more integrity, whenever and wherever it's needed

  • How technology can initiate, track, and automate process execution

  • How technology can help create and distribute the latest knowledge

The following sections look at the effects that these technologies can have on business—not in excruciating detail, but as examples of the types of enablers to search out.

Information Accessibility and Integrity

The availability of information that can be trusted, where and when it is required, means that new business approaches and processes can be imagined and designed without technological constraints. It's always a good starting point to gain agreement that accessibility constraints won't be factored into our thinking too soon. Let's imagine that all information will be trustworthy and available. Technologically, there's no reason not to.

The pressures of globalization and rising customer expectations means that information must be accessible by anyone, located anywhere, whenever that person chooses. This requires exploiting today's scalable information management technologies to store data, new information appliances to present it, and reliable network infrastructures to transport it.

Because information sharing is the key issue for many external stakeholders and internal staff, building a foundation of robust database management systems (DBMS) is a fundamental. Scalable relational DBMS for the transactional part of the business and object-oriented DBMS for the more complex types of data such as voice, graphics, maps, and video are now available to all organizations. These technologies are the storage mechanisms for information assets. Choose a system that can be a central coordination site across a number of applications, connecting many of their users. Other storage mechanisms are data warehouses and data marts that extract and consolidate data from a number of non-integrated data sources from inside and outside the enterprise. These mechanisms make data accessible to be manipulated and presented as if from one consistent source. The complexity of the provisioning process and infrastructure must be hidden from those gaining access.

This information can be presented through a number of different front-end technologies and user interfaces. Classical multimedia desktop computers for office workers provide a high-resolution, multiple-window environment for graphical and textual information and other rich data types such as spatial, sound, and video. Sophisticated analysis tools can also be accessed from there, to provide an online information management service. When assembled intelligently, a number of functions can be provided through one-stop shopping portals, making it easy for users to find all they need to know.

These integrated access sites are enabled by internetworked technologies for outsiders (Internet), trusted customers and suppliers (extranet), and internal staff (intranet). Delivering these technologies isn't difficult as compared to organizing the information that they must make available.

Providing information to anyone who needs it requires abundant communications bandwidth for anyone and from our sources anywhere. High bandwidth local area networks hooked to wide-area networks hooked to global networks must all be built or rented. Also, anyone and anywhere imply that the air and space become places for electronic information messages to traverse. Wireless networks using emerging standards such as digital cellular, wireless application protocol (WAP), infrared, radio, and satellites all support the use of mobile devices. These include Palm Pilots and digital telephones in our pockets, displays in our cars, and anything else that moves and can be located with digital cellular networks and global positioning devices. We can already push a lot of information through high-speed wireless networks. These will soon be faster and cheaper than they are today. They should be planned for now.

It's one thing to have enterprise information available whenever you want it. It's something else for that information to have integrity. Integrity for data management purposes means that, if information is redundant, it must be consistent. That means that it can be trusted. The simplest form of data integrity is to be able to update a single data field in a single record in a single file. By definition, there will never be any redundancy issues if this is the case. Integrity in the information that is accessible to anyone you choose, regardless of location, is key if you want to avoid different people making decisions based on information that varies but that should be the same. Integrity of information means that relationships will be managed consistently, and that the costs of wrong decisions and corrective actions will be significantly reduced.

One major trend supporting the concept of key enterprise information integrity is enterprise resource planning (ERP), as enabled by technologies such as SAP, Baan, Oracle, and PeopleSoft. This approach strives to provide a single place to store and manage information about enterprise assets. Components that handle information about financial, human resource, and fixed assets are common. This integration of asset information has significant process implications. The difficulty of making ERP work lies more in the process and business changes required than in the concept of shared data with integrity. One shortfall of most ERP implementations is the difficulty of getting the information out in meaningful ways after it's captured. Data warehouses are often used to solve this problem.

Likewise, another significant trend deals with relationship management. Integrity of customer relationship information has also been a concern for a long time. Now there are significant software offerings from vendors such as Seibold, Vantive, and I2 that provide the mechanisms for customer relationship management (CRM) solutions. Pivitol has taken it one step further by broadening its offerings to cover a range of stakeholders, not just customers. I believe that others will do the same by extending their CRM and supply-chain management software to manage the integrity of all stakeholders' information in a more balanced way.

Business Process Automation

If business must be supported from anywhere 24 hours a day, 7 days a week, processes must also be accessible and executable in the same timeframe. Technologies that help navigate entire processes are now available to support this. Embedding the business's rules and its human knowledge into the organization's executable processing software can change your way of working. figure 1.9 shows the requirements for complete business process automation—from initial business event through final business outcome.

figure 1.9-A business process view of information management.

To initiate the automated process flow, triggering events must be sensed or recognized. Some technologies that recognize triggers have been around for a while, whereas others are relatively new. Office workers have long been able to launch a workflow through their desktop computers' Enter keys or mouse clicks. The order process agent might take in a lot of information, but until the agent confirms the order, the bulk of the order process isn't initiated. Today, humans can use a handheld event recognition device to trigger process flows as part of a wireless network to do essentially the same thing.

Most of us are very used to swiping a credit or membership card in a reader to initiate self-service processes. Many airlines provide kiosks that take your frequent flyer cards and securely allow you to initiate the issuing of your seat assignment and boarding cards as well as luggage tags. Smart cards can go one step further by carrying information that might be relevant upon the triggering event.

Other devices, such as bar code scanners, also trigger automated action. When you scan your library card and the library book that you want to take out, the technology recognizes an event involving the codes, invokes the rules for that type of book and you, and tells you when the book is due back. Later, on return of the book, your record of liability is cleared, and the process instance is closed. If you don't return the book on time, other parts of the process are invoked to send you reminders and calculate penalties for lateness.

The capability of bar codes to initiate action should be examined for productivity and reliability. However, the process that follows it must be thought through to its conclusions.

The principles behind the bar-code style of triggering processes apply beyond the technology itself, whereby the reading device doesn't have to find the bar code to read it. Self-identifying tags can allow stationary sensors to identify the presence of a triggering event. These tags are essentially tiny computer chips that emit their own unique electronic message from the chip.

When the chip is in range of an energizing source, it sends out its fingerprint to initiate action. These devices have been used on personal ID tags so that, no matter where you go in the work site, you can be located. Farmers routinely use them to identify their animals at automated feeders and prevent them from overeating by dispatching just the right amount of food and water. All railcars have them to allow tracking and expediting of movement across the country. The uses are limited only by your imagination.

After it's initiated through these triggers, the complete business process flow can be automated through to process termination. This would include the movement and management of the mul-timedia information required to achieve a satisfactory outcome of value to the initiating stakeholder. Overall workflow technologies play a management role. These technologies pass inputs and control to specific applications that perform specific functions and then return outputs and control back to the transaction manager function of the workflow engine. Work is prioritized and delivered to users' in baskets for execution, or is sent to standalone applications for processing. The work products can be text, numbers, forms to be circulated and filled out, or even electronic approvals. The workflow environment is a flexible multimedia push technology requiring standards and openness across platforms and locations. It's based on a set of predefined business rules; the steps of the navigation can vary from instance to instance. The work-flow engine determines the needed sequence. It also tracks and traces and reports back status.

Traditionally, workflow capabilities were found in imaging and forms management software; today, it's the opposite. Imaging and forms are just two types of data that can navigate a networked environment with the control of a workflow engine. When well designed, this engine assembles and controls reusable software components and invokes them using navigation rules documented separately from computer logic. Business people, not technicians, do the management and modification of the navigation rules. They define them in business language, not technology constructs. Adaptability is the consequence.

Knowledge Creation and Distribution

As business cycles shrink and time-in-market opportunities diminish, those organizations that can create and exploit knowledge faster and better will succeed. Making knowledge accessible to business processes as guidance is a make-or-break process in its own right. Technology can play a key role in delivering the latest knowledge to the people doing the work or can deliver encoded knowledge that software can automatically execute.

In customer interactions, as well as internal interactions, learning never stops, and the business environment never rests. For these reasons, finding ways to improve the support of human knowledge is starting to get a lot of attention.

The concept of just-in-time (JIT) training isn't new. It recognizes that the best application of training occurs when it's provided just before it's applied. Consider what it would take to keep

training courses and reference guides up-to-date using traditional media development methods. Also think about how you would deliver the new messages quickly. It would almost be impossible. By utilizing technology available to all organizations today, this problem can be solved. Through intranets, you can widely, quickly, and inexpensively distribute the latest guidance to front-line staff members who are part of a workflow. Likewise, new knowledge can be delivered to customers. These environments are multimedia in nature and can update documents, graphics, voice messages, and video to show what business changes are occurring and how to deal better with current scenarios. This replaces training courses and procedural guides, which become the same thing in this multimedia delivery environment. In structured or transaction-oriented situations, the training can be linked to specific aspects of the workflow and available through a function key or drop-down list. Notification of new knowledge can also be prominently displayed the first time someone enters into an application after the knowledge has been posted.

For less structured work, providing access to knowledge portals can be valuable. In this situation, knowledge is structured according to some form of knowledge "yellow pages" that segments the knowledge in indexes understood by the knowledge seekers. Hierarchical and hypertext relationships of knowledge concepts are shown in the structure, as is a map of all known human sources and knowledge stewards. The map can also depict the cognitive authority (trustworthiness) of the source. These portals would include access to relevant documents and search engines to find other internal or external sources. They also contain mechanism for knowledge feedback and the use of lessons learned.

Another way to use technology to support the leverage of knowledge is to embed it in the software that runs the business applications.

As we saw with workflow software navigation, business rules can capture a subset of knowledge. Business rules–based application development engines are available in the marketplace from a number of proven vendors. These technologies separate business rules from data definitions and workflow. This ideally allows ease of updating rules, based on lessons learned and marketplace changes, because no software coding is required. Rules and business event triggers are stored in a layer between normalized databases and the workflows or applications that use them. Ideally, the rules and the knowledge that they depend on reside in a shared rule repository and are executed from a rules server.

Expert systems have been with us for some time. They are gaining attention again in domain-specific situations in which expert knowledge is required but not available in all staff members. Call centers and help desks provide typical opportunities to exploit these technologies, especially those that use case-based reasoning approaches. In these, knowledge and best practices are generalized and transformed into useful rules. The difference is that case-based approaches aren't just strict rules—they reflect and recognize patterns and then guide the service provider through a most likely path of action or questioning. New patterns arise and are inferred from new situations.

Knowledge, like all organizational assets, must be created or discovered and then acquired before it can be distributed and used. Some technologies can support the creation of new knowledge in collaborative communities, as well as its distribution to those in day-to-day work processes. Although collaborative creative work is primarily a human endeavor, communications technologies can be very helpful when it comes to iterating ideas across a wider community, either inside or outside the enterprise.

Technologies that support person-to-person, team-to-team collaboration include

  • E-mail and messaging
  • Group calendars and scheduling
  • Electronic meeting systems
  • Desktop video and real-time data conferencing
  • Group document handling
  • Groupware services to support collaboration

Groupware solutions identify and connect knowledgeable people through the mechanism of living discussion documents or reference databases. This form of technology is particularly useful when it's built on a replication mechanism, so that globally all interested members of a work group or a virtual community of practice can contribute concurrently. These varied technologies—such as Lotus Notes, Microsoft NetMeeting, and other collaborative, Internet-based applications and products—are best used when complex, fast-changing knowledge must be shared in an iterative knowledge creation cycle. For sharing lessons learned and knowledge feedback, these technologies maximize human interaction while minimizing technological interference.

InformIT Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from InformIT and its family of brands. I can unsubscribe at any time.

Overview


Pearson Education, Inc., 221 River Street, Hoboken, New Jersey 07030, (Pearson) presents this site to provide information about products and services that can be purchased through this site.

This privacy notice provides an overview of our commitment to privacy and describes how we collect, protect, use and share personal information collected through this site. Please note that other Pearson websites and online products and services have their own separate privacy policies.

Collection and Use of Information


To conduct business and deliver products and services, Pearson collects and uses personal information in several ways in connection with this site, including:

Questions and Inquiries

For inquiries and questions, we collect the inquiry or question, together with name, contact details (email address, phone number and mailing address) and any other additional information voluntarily submitted to us through a Contact Us form or an email. We use this information to address the inquiry and respond to the question.

Online Store

For orders and purchases placed through our online store on this site, we collect order details, name, institution name and address (if applicable), email address, phone number, shipping and billing addresses, credit/debit card information, shipping options and any instructions. We use this information to complete transactions, fulfill orders, communicate with individuals placing orders or visiting the online store, and for related purposes.

Surveys

Pearson may offer opportunities to provide feedback or participate in surveys, including surveys evaluating Pearson products, services or sites. Participation is voluntary. Pearson collects information requested in the survey questions and uses the information to evaluate, support, maintain and improve products, services or sites, develop new products and services, conduct educational research and for other purposes specified in the survey.

Contests and Drawings

Occasionally, we may sponsor a contest or drawing. Participation is optional. Pearson collects name, contact information and other information specified on the entry form for the contest or drawing to conduct the contest or drawing. Pearson may collect additional personal information from the winners of a contest or drawing in order to award the prize and for tax reporting purposes, as required by law.

Newsletters

If you have elected to receive email newsletters or promotional mailings and special offers but want to unsubscribe, simply email information@informit.com.

Service Announcements

On rare occasions it is necessary to send out a strictly service related announcement. For instance, if our service is temporarily suspended for maintenance we might send users an email. Generally, users may not opt-out of these communications, though they can deactivate their account information. However, these communications are not promotional in nature.

Customer Service

We communicate with users on a regular basis to provide requested services and in regard to issues relating to their account we reply via email or phone in accordance with the users' wishes when a user submits their information through our Contact Us form.

Other Collection and Use of Information


Application and System Logs

Pearson automatically collects log data to help ensure the delivery, availability and security of this site. Log data may include technical information about how a user or visitor connected to this site, such as browser type, type of computer/device, operating system, internet service provider and IP address. We use this information for support purposes and to monitor the health of the site, identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents and appropriately scale computing resources.

Web Analytics

Pearson may use third party web trend analytical services, including Google Analytics, to collect visitor information, such as IP addresses, browser types, referring pages, pages visited and time spent on a particular site. While these analytical services collect and report information on an anonymous basis, they may use cookies to gather web trend information. The information gathered may enable Pearson (but not the third party web trend services) to link information with application and system log data. Pearson uses this information for system administration and to identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents, appropriately scale computing resources and otherwise support and deliver this site and its services.

Cookies and Related Technologies

This site uses cookies and similar technologies to personalize content, measure traffic patterns, control security, track use and access of information on this site, and provide interest-based messages and advertising. Users can manage and block the use of cookies through their browser. Disabling or blocking certain cookies may limit the functionality of this site.

Do Not Track

This site currently does not respond to Do Not Track signals.

Security


Pearson uses appropriate physical, administrative and technical security measures to protect personal information from unauthorized access, use and disclosure.

Children


This site is not directed to children under the age of 13.

Marketing


Pearson may send or direct marketing communications to users, provided that

  • Pearson will not use personal information collected or processed as a K-12 school service provider for the purpose of directed or targeted advertising.
  • Such marketing is consistent with applicable law and Pearson's legal obligations.
  • Pearson will not knowingly direct or send marketing communications to an individual who has expressed a preference not to receive marketing.
  • Where required by applicable law, express or implied consent to marketing exists and has not been withdrawn.

Pearson may provide personal information to a third party service provider on a restricted basis to provide marketing solely on behalf of Pearson or an affiliate or customer for whom Pearson is a service provider. Marketing preferences may be changed at any time.

Correcting/Updating Personal Information


If a user's personally identifiable information changes (such as your postal address or email address), we provide a way to correct or update that user's personal data provided to us. This can be done on the Account page. If a user no longer desires our service and desires to delete his or her account, please contact us at customer-service@informit.com and we will process the deletion of a user's account.

Choice/Opt-out


Users can always make an informed choice as to whether they should proceed with certain services offered by InformIT. If you choose to remove yourself from our mailing list(s) simply visit the following page and uncheck any communication you no longer want to receive: www.informit.com/u.aspx.

Sale of Personal Information


Pearson does not rent or sell personal information in exchange for any payment of money.

While Pearson does not sell personal information, as defined in Nevada law, Nevada residents may email a request for no sale of their personal information to NevadaDesignatedRequest@pearson.com.

Supplemental Privacy Statement for California Residents


California residents should read our Supplemental privacy statement for California residents in conjunction with this Privacy Notice. The Supplemental privacy statement for California residents explains Pearson's commitment to comply with California law and applies to personal information of California residents collected in connection with this site and the Services.

Sharing and Disclosure


Pearson may disclose personal information, as follows:

  • As required by law.
  • With the consent of the individual (or their parent, if the individual is a minor)
  • In response to a subpoena, court order or legal process, to the extent permitted or required by law
  • To protect the security and safety of individuals, data, assets and systems, consistent with applicable law
  • In connection the sale, joint venture or other transfer of some or all of its company or assets, subject to the provisions of this Privacy Notice
  • To investigate or address actual or suspected fraud or other illegal activities
  • To exercise its legal rights, including enforcement of the Terms of Use for this site or another contract
  • To affiliated Pearson companies and other companies and organizations who perform work for Pearson and are obligated to protect the privacy of personal information consistent with this Privacy Notice
  • To a school, organization, company or government agency, where Pearson collects or processes the personal information in a school setting or on behalf of such organization, company or government agency.

Links


This web site contains links to other sites. Please be aware that we are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of each and every web site that collects Personal Information. This privacy statement applies solely to information collected by this web site.

Requests and Contact


Please contact us about this Privacy Notice or if you have any requests or questions relating to the privacy of your personal information.

Changes to this Privacy Notice


We may revise this Privacy Notice through an updated posting. We will identify the effective date of the revision in the posting. Often, updates are made to provide greater clarity or to comply with changes in regulatory requirements. If the updates involve material changes to the collection, protection, use or disclosure of Personal Information, Pearson will provide notice of the change through a conspicuous notice on this site or other appropriate way. Continued use of the site after the effective date of a posted revision evidences acceptance. Please contact us if you have questions or concerns about the Privacy Notice or any objection to any revisions.

Last Update: November 17, 2020