Feeds

Do we need Bambi?

Deer oh deer

  • alert
  • submit to reddit

Secure remote control for conventional and virtual desktops

Consider Business Activity Monitoring (BAM): what does it do? The short answer is that it provides real-time information about your business activities (processes). Thus, to take a simple example, you can see that you are currently processing 5,000 invoices an hour.

Jolly good. But how useful is it to know that you are processing this number of invoices? Is 5,000 good? Is it bad? Is it typical for this day of the week? Is it normal for this time of the day? Does it meet service level requirements?

That's the problem with monitoring, whether it is BAM or any other sort of monitoring: you need to have some sort of context in which to place the results that you see. Without that context the only sensible response to these figures is: so what?

In other words, BAM is pretty much a waste of time unless there are also some sort of comparative analytics that you can do to place the results that you are getting into context. To put that another way: you need to be able to apply business intelligence (BI) techniques to the raw data that you are getting from BAM.

You can see where I am going with this, can't you? Yup, what we need is a new acronym: 'BAMBI'! And, as a matter of policy I think that all future acronyms should be based on cartoon characters (after all there is already OWL, named after the character in Winnie the Pooh) – no, just kidding.

The only problem with BAMBI is that it is a bit limiting. Why should business intelligence only be applied to BAM? Why shouldn't it be applied to other sorts of event-based data? And, in fact, there are a number of companies that can do just that. For example, SeeWhy (about which I will write more in a forthcoming article) applies BI to all sorts of streamed data, to detect such things as retail shrinkage and loyalty card fraud, or to analyse the performance of delivery companies within the supply chain.

Thus there is actually a superset of BAM to which BI can be applied, which is any set of event data that is flowing through the company that does not necessarily have any relationship to business processes per se. The conclusion is that there is no such thing as BAM as a distinct market (if you must have it, treat it purely as an extension to Business Process Management) and, unfortunately, that we do not need BAMBI either.

However, if we do not need to have a new acronym, and in the spirit of this article, I suggest EEYORE: Every Event for Your Operational Reporting Environment!

Copyright © 2005, IT-Analysis.com

The essential guide to IT transformation

More from The Register

next story
Microsoft boots 1,500 dodgy apps from the Windows Store
DEVELOPERS! DEVELOPERS! DEVELOPERS! Naughty, misleading developers!
Apple promises to lift Curse of the Drained iPhone 5 Battery
Have you tried turning it off and...? Never mind, here's a replacement
Mozilla's 'Tiles' ads debut in new Firefox nightlies
You can try turning them off and on again
Linux turns 23 and Linus Torvalds celebrates as only he can
No, not with swearing, but by controlling the release cycle
Scratched PC-dispatch patch patched, hatched in batch rematch
Windows security update fixed after triggering blue screens (and screams) of death
prev story

Whitepapers

Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.