Feeds

Do we need Bambi?

Deer oh deer

  • alert
  • submit to reddit

Secure remote control for conventional and virtual desktops

Consider Business Activity Monitoring (BAM): what does it do? The short answer is that it provides real-time information about your business activities (processes). Thus, to take a simple example, you can see that you are currently processing 5,000 invoices an hour.

Jolly good. But how useful is it to know that you are processing this number of invoices? Is 5,000 good? Is it bad? Is it typical for this day of the week? Is it normal for this time of the day? Does it meet service level requirements?

That's the problem with monitoring, whether it is BAM or any other sort of monitoring: you need to have some sort of context in which to place the results that you see. Without that context the only sensible response to these figures is: so what?

In other words, BAM is pretty much a waste of time unless there are also some sort of comparative analytics that you can do to place the results that you are getting into context. To put that another way: you need to be able to apply business intelligence (BI) techniques to the raw data that you are getting from BAM.

You can see where I am going with this, can't you? Yup, what we need is a new acronym: 'BAMBI'! And, as a matter of policy I think that all future acronyms should be based on cartoon characters (after all there is already OWL, named after the character in Winnie the Pooh) – no, just kidding.

The only problem with BAMBI is that it is a bit limiting. Why should business intelligence only be applied to BAM? Why shouldn't it be applied to other sorts of event-based data? And, in fact, there are a number of companies that can do just that. For example, SeeWhy (about which I will write more in a forthcoming article) applies BI to all sorts of streamed data, to detect such things as retail shrinkage and loyalty card fraud, or to analyse the performance of delivery companies within the supply chain.

Thus there is actually a superset of BAM to which BI can be applied, which is any set of event data that is flowing through the company that does not necessarily have any relationship to business processes per se. The conclusion is that there is no such thing as BAM as a distinct market (if you must have it, treat it purely as an extension to Business Process Management) and, unfortunately, that we do not need BAMBI either.

However, if we do not need to have a new acronym, and in the spirit of this article, I suggest EEYORE: Every Event for Your Operational Reporting Environment!

Copyright © 2005, IT-Analysis.com

Security for virtualized datacentres

More from The Register

next story
Microsoft WINDOWS 10: Seven ATE Nine. Or Eight did really
Windows NEIN skipped, tech preview due out on Wednesday
Business is back, baby! Hasta la VISTA, Win 8... Oh, yeah, Windows 9
Forget touchscreen millennials, Microsoft goes for mouse crowd
Apple: SO sorry for the iOS 8.0.1 UPDATE BUNGLE HORROR
Apple kills 'upgrade'. Hey, Microsoft. You sure you want to be like these guys?
ARM gives Internet of Things a piece of its mind – the Cortex-M7
32-bit core packs some DSP for VIP IoT CPU LOL
Microsoft on the Threshold of a new name for Windows next week
Rebranded OS reportedly set to be flung open by Redmond
Lotus Notes inventor Ozzie invents app to talk to people on your phone
Imagine that. Startup floats with voice collab app for Win iPhone
'Google is NOT the gatekeeper to the web, as some claim'
Plus: 'Pretty sure iOS 8.0.2 will just turn the iPhone into a fax machine'
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.