Feeds

Do we need Bambi?

Deer oh deer

  • alert
  • submit to reddit

Security for virtualized datacentres

Consider Business Activity Monitoring (BAM): what does it do? The short answer is that it provides real-time information about your business activities (processes). Thus, to take a simple example, you can see that you are currently processing 5,000 invoices an hour.

Jolly good. But how useful is it to know that you are processing this number of invoices? Is 5,000 good? Is it bad? Is it typical for this day of the week? Is it normal for this time of the day? Does it meet service level requirements?

That's the problem with monitoring, whether it is BAM or any other sort of monitoring: you need to have some sort of context in which to place the results that you see. Without that context the only sensible response to these figures is: so what?

In other words, BAM is pretty much a waste of time unless there are also some sort of comparative analytics that you can do to place the results that you are getting into context. To put that another way: you need to be able to apply business intelligence (BI) techniques to the raw data that you are getting from BAM.

You can see where I am going with this, can't you? Yup, what we need is a new acronym: 'BAMBI'! And, as a matter of policy I think that all future acronyms should be based on cartoon characters (after all there is already OWL, named after the character in Winnie the Pooh) – no, just kidding.

The only problem with BAMBI is that it is a bit limiting. Why should business intelligence only be applied to BAM? Why shouldn't it be applied to other sorts of event-based data? And, in fact, there are a number of companies that can do just that. For example, SeeWhy (about which I will write more in a forthcoming article) applies BI to all sorts of streamed data, to detect such things as retail shrinkage and loyalty card fraud, or to analyse the performance of delivery companies within the supply chain.

Thus there is actually a superset of BAM to which BI can be applied, which is any set of event data that is flowing through the company that does not necessarily have any relationship to business processes per se. The conclusion is that there is no such thing as BAM as a distinct market (if you must have it, treat it purely as an extension to Business Process Management) and, unfortunately, that we do not need BAMBI either.

However, if we do not need to have a new acronym, and in the spirit of this article, I suggest EEYORE: Every Event for Your Operational Reporting Environment!

Copyright © 2005, IT-Analysis.com

Secure remote control for conventional and virtual desktops

More from The Register

next story
Not appy with your Chromebook? Well now it can run Android apps
Google offers beta of tricky OS-inside-OS tech
Keep that consumer browser tat away from our software says Oracle
Big Red decides it will only support Firefox's Extended Support Releases
Greater dev access to iOS 8 will put us AT RISK from HACKERS
Knocking holes in Apple's walled garden could backfire, says securo-chap
NHS grows a NoSQL backbone and rips out its Oracle Spine
Open source? In the government? Ha ha! What, wait ...?
Google extends app refund window to two hours
You now have 120 minutes to finish that game instead of 15
Intel: Hey, enterprises, drop everything and DO HADOOP
Big Data analytics projected to run on more servers than any other app
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.