SlideShare a Scribd company logo
Agile Approach is a software development methodology, where the development teams work
collaboratively and iteratively to develop software solutions on an incremental basis. Agile is generally
an alternative to traditional methodologies like the sequential approach and waterfall models. It is
generally used in situations where the requirements are changing on a more or less continuous basis
and there is more unpredictability.
Scrum is one of the popular agile approaches, which is used effectively by companies for software
delivery.
Instead of developing software using a sequential and rigidly defined approach, agile was developed
where software could be developed in a more collaborative and flexible manner, with the help of cross
functional teams. It is not always easy to get all requirements of the software while working using the
waterfall approach, since software is a field that s dynamic and ever changing.
Agile is characterised by the following:
- Customer collaboration
- Changing requirements
- Cross functional teams for development
- Simplicity
- Rapid response to change
- Continuous attention to great design and technicality
- Face to face conversation
Example:
For a database driven web product, duration of four weeks was set up, where there were teams
performing functions across (cross functional). Since all requirements were not known from the
beginning, this approach was preferred, because new methodologies and better design could be
created during development.
/////////////////////////////////
An Agile Organization is one that is quick in responding to changes in the marketplace or environment.
The ‘agile organization’ is also known as ‘the entrepreneurial organization’ and ‘the resilient
organization’ and this kind of organization focuses on the customer which calls for customized rather
than standardised offerings. A highly agile organization reacts successfully to the emergence of new
competitors, rapid advancements in technology and sudden shifts in overall market conditions. Agile
enterprises thrive in non-hierarchical organizations without a single point of control.
Characteristics of Agile Organizations:
 They are made up of self-aware individuals whose actions affect the organization as a whole
 They adapt a catalyst style of leadership by inspiring others without losing the cohesion within the entire
system
 Their organization is based on continuous learning from experiments
 They foster an open communication style facilitating collaboration and sharing
 Their governance is based upon long-term business value and adaptation
 Their members seek mastery in their respective skills
Dell is an agile software development corporation that embraces the concept of customized agile
response. The production line adapts according to the customer’s needs.
///////////////////////////////////////////
Ajax stands for Asynchronous JavaScript & XML. It is based on a group of web technologies like
HTML, CSS, XML, DOM and Java Script which updates the elements on a web page without requiring
to re-load the entire web page.
The technology works this way. When a user attempts to update a certain part of a web page (like
clicking a button or a link), the JavaScript connects with the server and requests for the data. The
server then processes the data requested for and sends back the response in XML format typically.
The JavaScript then receives an ‘asynchronous’ notification which is then processed and displayed
accordingly.
Among the technologies that are used in this regard, CSS (Cascading Style Sheets) is used for
presentation, XHTML (Extensible Hyper Text Markup Language) is used for content and DOM
(Document Object Model) is used to dynamic data display.
The advantage of using an Ajax application is that the communication with the server and
dataprocessing happens in the background because of which the entire web page is not re-
reloaded. This enables the user to work on other parts in the web page.
Since the time Ajax has come into use, a lot of developments have taken place like the data from the
server is not required to be in an XML format.
///////////////////////////////////////////////////
Application Programming interface (API) is a source code which acts as an interface between different
software to communicate with each other. It gives the protocol on any kind of communication that
happens from and to software from any other software, web or computer software. It is a library of
specifications regarding data structures, object classes and variables. Hence it can be compiled when
an application is built, unlike application binary interface.
It should not be confused with user interface, which is how a user interacts with the software. API
runs behind the user’s visual interface and has the sole function of acting as software-to-software
interface. For example, while paying phone bill through online portal, the user enters his phone
number and credit card details. The API of the telecommunication company sends the details entered
by the user to the credit card bank. There the details are verified and the response is sent back to the
telecommunication website, again through its API.
An API has resemblance with SaaS (Software as A Service), since a software can use API to link to
some second software to access facilities provided by that second software. This makes the first
software to avoid codes for the service provided by the second software. This is why a software
company makes its API public, so that other software developers could make their software
compatible.
////////////////////////////////////
Application tracking system is a software application designed to manage the recruitment within a
company. ATS is primarily used to provide a one point solution as well as central repository of
recruitment related data for a company.Some of the functions of ATS are posting job openings on the
company’s website, acquiring and managing data from the resumes, screening resume based on job-
person fit, sending interview emails to the shortlisted candidates, etc. This application saves a lot of
time of the individuals in managing the huge database, entering the data into the database, sorting,
matching profiles, etc further reducing the time required for hiring an individual by the company.
Reduction in time leads to reduction hiring costs. Other benefits include streamlining the entire hiring
process, paperless process, automating the entire process, creating a database for future recruitment
needs. These days a lot of small and medium size companies are using this ATS software. They are
also known as Talent Management System.
Eg – Zoho Recruit is an example of ATS software used by companies like Suite-Apps, Workforce
Manpower, etc
//////////////////////
Audit Trail is a record of the operations performed by a user on a system for the purpose of detecting
security violations, performance problems and flaws in applications. It is a documented log of
computer events, about an operating system, an application, or user activities. There can be several
audit trails each for a particular activity. Auditing is a process of reviewing and analyzing operational
and technical controls. These trails are used to support regular system operations so that
administrators can ensure that the security of the system is not harmed. They help accomplish several
security-related objectives including individual accountability, intrusion detection and problem
analysis.
Example: Audit Trails can be used to record the ‘before’ and ‘after’ versions of the records so that
actual changes by a user can be compared with the expected changes and the user can be made
accountable of his actions in case of any discrepancies.
A practical use can be in accounting, where the documentation of the detailed transactions can be
corresponding to ledger entries. This will ensure proper error-free accounting.
Such trails are highly permission intensive and strictly controlled by the administrators and cannot be
accessed by other users.
/////////////////
Authentication normally refers to the act of confirming the veracity of an attribute, data or identity.
In systems, authentication normally means verifying the identity of a person through his username
and password. Although sometimes used synonymously, authentication & authorization are different.
Authorization is the process of granting access to system objects to individuals based on their identity
& hence must follow authentication.
Authentication is simply to verify that the person is the one that he or she claims to be. It does not
say anything about the access rights & privileges that the person enjoys. Normally, authentication
precedes authorization although they seem to be combined sometimes. The process of authentication
makes use of digital signature involving primary and secondary keys. There are basically three
different techniques for authentication. The first type accepts proof of identity from a credible person
who has the evidence of the proof. The second type of authentication compares the attributes of the
object with the known attributes of objects of similar origin. The third type of authentication accepts
documentation or other known external affirmations.
Authentication can also be a two-factor authentication when elements with two factors are required for
authentication. For example, an authentication may need a user pin and password. Authentication
may also happen of a product using a secure key storage device. Authentication of information
content can also happen in terms of factual verification and video authentication.
/////////////////////////////////
Brute Force is a problem solving mechanism that takes into account all the possible solutions to the
existing problem and then finalizing the most efficient problem.
It does not take into account any special algorithm which can eliminate a few options tactfully. No
shortcuts are taken to reach to the optimal solution.
Example:
In case of travelling sales man problem, the brute force programming will find the distance travelled
through all the possible paths.
After doing so it will then display the one with least distance. It will not use additional programs to cut
short a few paths which do not come into the shortest paths.
//////////////////////////////
BULLETIN BOARD SYSTEM
The BBS is a communication tool primarily used in corporate world and is similar to intranet which
facilitates the messing, mail and a platform for online discussion forum as an individual and also a
group function. It is computer system running software through which a user can log in and access the
main system through terminal software and can also use it for uploading or downloading files/software
apart from networking functions. BBS is generally an email and conferencing based system and is
open to all community legal centres (CLCs) and its employees and is provided by National Association
of Community Legal Centres (NACLC).
Example:
NACLC provides each of the employees with a free BBS account in order to access individual folder or
conference, mailbox and serves a forum to post important discussions and notices to a large group of
people. It is usually monitored by a BBS administrator and has variety of enhanced features like group
calendar etc.
/////////////////////
BUSINESS PROCESS MANAGEMENT
Business was previously considered as constituted of distinct elements of Process Modelling, Workflow,
Simulation, EAI and finally business integration. However BPM is a holistic process of management of
all these distinct units in a systematic manner through constant closed looping of all the feedbacks
generated in order to deliver the desired value to the customer.
Business Process Management is the systematic approach to continuously improve the company’s
business processes increase business effectiveness and efficiency while striving for innovation,
flexibility and integration by alignment with strategic goals, operations and end-to-end processes that
companies perform to create value for customers. BPM should not be confused with Business Process
Reengineering which requires a complete redevelopment of processes in a company whereas BPM
develops on existing processes and through constant feedback and refining results in better processes.
While practicing BPM, Business Process Initiative (BPI) methods can be employed for specific
improvement. Hence, just the use of BPI methodologies does not mean that the organization is
practicing BPM. The main steps followed in a BPM are illustrated in the following diagram:
After the Business Processes and strategy is laid out, the analysis yields various improvements in the
existing processes and design of new process for betterment of the organization.
For example: BPM helps Customer Relationship Management personals to solve problems more
efficiently as they are provided with most up to date information. The BPM solution integrates
marketing, sales and support systems of the company and organizes and automates activities like new
customer acquisition, service call management, complaint resolution, fraud assessment , credit
approvals etc.

More Related Content

PPT
Axsys Technologies Software Offerings
DOCX
Quality Attributes of Web Software Applications ∗
PPTX
PART I of III: Advanced Authorization for SAP Global Deployments: September ...
PDF
CSI Authorization Auditor 2014 Brochure
DOC
Internet applications unit1
DOC
Bug Tracking Java Project
PDF
M phil-computer-science-server-computing-projects
PDF
M.Phil Computer Science Server Computing Projects
Axsys Technologies Software Offerings
Quality Attributes of Web Software Applications ∗
PART I of III: Advanced Authorization for SAP Global Deployments: September ...
CSI Authorization Auditor 2014 Brochure
Internet applications unit1
Bug Tracking Java Project
M phil-computer-science-server-computing-projects
M.Phil Computer Science Server Computing Projects

What's hot (20)

PDF
ColbyBackesPortfolio_HighRes
PDF
M.E Computer Science Server Computing Projects
PPTX
Role Discovery and RBAC Design: A Case Study with IBM Role and Policy Modeler
PDF
IRJET - Application Development Approach to Transform Traditional Web Applica...
PPTX
IDM Introduction
DOC
Surya_CV
PDF
SIF IDM Profile Introduction
DOCX
V labs-assignment-1-sepm
PPT
2004 10 21 Rbac At Mazda Horst Walther
PDF
Attribute based access control
PPTX
Abac and the evolution of access control
PDF
Id m what-why-how presentationv2.0
PPTX
Role-Based Access Control
DOC
Manjunatha Resume 7+ years Experience
DOCX
Venkataraman Raghunathan
PPTX
Unit 3-SOA Technologies
PDF
SIF IDM Profile Usage Guide - Presentation at the 2014 annual conference
PDF
Large Scale User Provisioning with Hitachi ID Identity Manager
PPTX
Identity Manager OpenSource OpenIDM - introduction
PPTX
Unit 4-SOA governance
ColbyBackesPortfolio_HighRes
M.E Computer Science Server Computing Projects
Role Discovery and RBAC Design: A Case Study with IBM Role and Policy Modeler
IRJET - Application Development Approach to Transform Traditional Web Applica...
IDM Introduction
Surya_CV
SIF IDM Profile Introduction
V labs-assignment-1-sepm
2004 10 21 Rbac At Mazda Horst Walther
Attribute based access control
Abac and the evolution of access control
Id m what-why-how presentationv2.0
Role-Based Access Control
Manjunatha Resume 7+ years Experience
Venkataraman Raghunathan
Unit 3-SOA Technologies
SIF IDM Profile Usage Guide - Presentation at the 2014 annual conference
Large Scale User Provisioning with Hitachi ID Identity Manager
Identity Manager OpenSource OpenIDM - introduction
Unit 4-SOA governance
Ad

Viewers also liked (11)

PDF
Survey 1
PDF
UVL ценовое предложение
PDF
Mastering the Dark Art of Fluid Layout
PPT
Jasig rubyon rails
PPTX
Time management training
PPTX
G+£+çl+£ work safety summer launch 12
PPT
Jasig rubyon rails
PPTX
Leyes gestalt
PDF
Manipulating files with the file system task using SSIS
PDF
Teaching seminar on pornography - RCCG Royal Generation Parish , Lekki, Lagos...
PPTX
Managing behavioural conflict workers training
Survey 1
UVL ценовое предложение
Mastering the Dark Art of Fluid Layout
Jasig rubyon rails
Time management training
G+£+çl+£ work safety summer launch 12
Jasig rubyon rails
Leyes gestalt
Manipulating files with the file system task using SSIS
Teaching seminar on pornography - RCCG Royal Generation Parish , Lekki, Lagos...
Managing behavioural conflict workers training
Ad

Similar to project on Agile approach (20)

PPTX
ISTQB Agile Tester - Agile Test Tools
PDF
Open iam technicalarchitecture-v3-a
PDF
Abstraction and Automation: A Software Design Approach for Developing Secure ...
PDF
J017325660
DOCX
Middleware – Its Types, Architecture, and Benefits.docx
PDF
Top 8 Trends in Performance Engineering
DOC
term paper for cbd models
PDF
Test automation: Are Enterprises ready to bite the bullet?
PPTX
PDF
3 Approaches for Integrated ALM - A Case for ALM Platform - Whitepaper
DOC
Session3
PDF
Selecting an App Security Testing Partner: An eGuide
PDF
Procuring an Application Security Testing Partner
PPTX
JEE Technology Concepts in Details for web development.pptx
DOCX
BA Resume
DOCX
Fareeha Resume
PDF
The Significant role of event driven apps in software development
PDF
3 Approaches to Integrated ALM, A case for ALM Platform
PDF
Best Practices for Full-Stack Development: A Comprehensive Guide
PDF
Best Practices for Full-Stack Development_ A Comprehensive Guide.pdf
ISTQB Agile Tester - Agile Test Tools
Open iam technicalarchitecture-v3-a
Abstraction and Automation: A Software Design Approach for Developing Secure ...
J017325660
Middleware – Its Types, Architecture, and Benefits.docx
Top 8 Trends in Performance Engineering
term paper for cbd models
Test automation: Are Enterprises ready to bite the bullet?
3 Approaches for Integrated ALM - A Case for ALM Platform - Whitepaper
Session3
Selecting an App Security Testing Partner: An eGuide
Procuring an Application Security Testing Partner
JEE Technology Concepts in Details for web development.pptx
BA Resume
Fareeha Resume
The Significant role of event driven apps in software development
3 Approaches to Integrated ALM, A case for ALM Platform
Best Practices for Full-Stack Development: A Comprehensive Guide
Best Practices for Full-Stack Development_ A Comprehensive Guide.pdf

Recently uploaded (20)

PDF
01-Introduction-to-Information-Management.pdf
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
Anesthesia in Laparoscopic Surgery in India
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
Business Ethics Teaching Materials for college
PPTX
master seminar digital applications in india
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PDF
RMMM.pdf make it easy to upload and study
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PPTX
PPH.pptx obstetrics and gynecology in nursing
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PPTX
Pharma ospi slides which help in ospi learning
PDF
Classroom Observation Tools for Teachers
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
01-Introduction-to-Information-Management.pdf
FourierSeries-QuestionsWithAnswers(Part-A).pdf
Anesthesia in Laparoscopic Surgery in India
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
2.FourierTransform-ShortQuestionswithAnswers.pdf
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Business Ethics Teaching Materials for college
master seminar digital applications in india
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
RMMM.pdf make it easy to upload and study
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PPH.pptx obstetrics and gynecology in nursing
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
STATICS OF THE RIGID BODIES Hibbelers.pdf
Renaissance Architecture: A Journey from Faith to Humanism
Pharma ospi slides which help in ospi learning
Classroom Observation Tools for Teachers
Microbial diseases, their pathogenesis and prophylaxis
human mycosis Human fungal infections are called human mycosis..pptx

project on Agile approach

  • 1. Agile Approach is a software development methodology, where the development teams work collaboratively and iteratively to develop software solutions on an incremental basis. Agile is generally an alternative to traditional methodologies like the sequential approach and waterfall models. It is generally used in situations where the requirements are changing on a more or less continuous basis and there is more unpredictability. Scrum is one of the popular agile approaches, which is used effectively by companies for software delivery. Instead of developing software using a sequential and rigidly defined approach, agile was developed where software could be developed in a more collaborative and flexible manner, with the help of cross functional teams. It is not always easy to get all requirements of the software while working using the waterfall approach, since software is a field that s dynamic and ever changing. Agile is characterised by the following: - Customer collaboration - Changing requirements - Cross functional teams for development - Simplicity - Rapid response to change - Continuous attention to great design and technicality - Face to face conversation Example: For a database driven web product, duration of four weeks was set up, where there were teams performing functions across (cross functional). Since all requirements were not known from the beginning, this approach was preferred, because new methodologies and better design could be created during development. ///////////////////////////////// An Agile Organization is one that is quick in responding to changes in the marketplace or environment. The ‘agile organization’ is also known as ‘the entrepreneurial organization’ and ‘the resilient organization’ and this kind of organization focuses on the customer which calls for customized rather than standardised offerings. A highly agile organization reacts successfully to the emergence of new competitors, rapid advancements in technology and sudden shifts in overall market conditions. Agile enterprises thrive in non-hierarchical organizations without a single point of control. Characteristics of Agile Organizations:
  • 2.  They are made up of self-aware individuals whose actions affect the organization as a whole  They adapt a catalyst style of leadership by inspiring others without losing the cohesion within the entire system  Their organization is based on continuous learning from experiments  They foster an open communication style facilitating collaboration and sharing  Their governance is based upon long-term business value and adaptation  Their members seek mastery in their respective skills Dell is an agile software development corporation that embraces the concept of customized agile response. The production line adapts according to the customer’s needs. /////////////////////////////////////////// Ajax stands for Asynchronous JavaScript & XML. It is based on a group of web technologies like HTML, CSS, XML, DOM and Java Script which updates the elements on a web page without requiring to re-load the entire web page. The technology works this way. When a user attempts to update a certain part of a web page (like clicking a button or a link), the JavaScript connects with the server and requests for the data. The server then processes the data requested for and sends back the response in XML format typically. The JavaScript then receives an ‘asynchronous’ notification which is then processed and displayed accordingly. Among the technologies that are used in this regard, CSS (Cascading Style Sheets) is used for presentation, XHTML (Extensible Hyper Text Markup Language) is used for content and DOM (Document Object Model) is used to dynamic data display. The advantage of using an Ajax application is that the communication with the server and dataprocessing happens in the background because of which the entire web page is not re- reloaded. This enables the user to work on other parts in the web page. Since the time Ajax has come into use, a lot of developments have taken place like the data from the server is not required to be in an XML format. /////////////////////////////////////////////////// Application Programming interface (API) is a source code which acts as an interface between different software to communicate with each other. It gives the protocol on any kind of communication that happens from and to software from any other software, web or computer software. It is a library of
  • 3. specifications regarding data structures, object classes and variables. Hence it can be compiled when an application is built, unlike application binary interface. It should not be confused with user interface, which is how a user interacts with the software. API runs behind the user’s visual interface and has the sole function of acting as software-to-software interface. For example, while paying phone bill through online portal, the user enters his phone number and credit card details. The API of the telecommunication company sends the details entered by the user to the credit card bank. There the details are verified and the response is sent back to the telecommunication website, again through its API. An API has resemblance with SaaS (Software as A Service), since a software can use API to link to some second software to access facilities provided by that second software. This makes the first software to avoid codes for the service provided by the second software. This is why a software company makes its API public, so that other software developers could make their software compatible. //////////////////////////////////// Application tracking system is a software application designed to manage the recruitment within a company. ATS is primarily used to provide a one point solution as well as central repository of recruitment related data for a company.Some of the functions of ATS are posting job openings on the company’s website, acquiring and managing data from the resumes, screening resume based on job- person fit, sending interview emails to the shortlisted candidates, etc. This application saves a lot of time of the individuals in managing the huge database, entering the data into the database, sorting, matching profiles, etc further reducing the time required for hiring an individual by the company. Reduction in time leads to reduction hiring costs. Other benefits include streamlining the entire hiring process, paperless process, automating the entire process, creating a database for future recruitment needs. These days a lot of small and medium size companies are using this ATS software. They are also known as Talent Management System. Eg – Zoho Recruit is an example of ATS software used by companies like Suite-Apps, Workforce Manpower, etc ////////////////////// Audit Trail is a record of the operations performed by a user on a system for the purpose of detecting security violations, performance problems and flaws in applications. It is a documented log of computer events, about an operating system, an application, or user activities. There can be several audit trails each for a particular activity. Auditing is a process of reviewing and analyzing operational and technical controls. These trails are used to support regular system operations so that administrators can ensure that the security of the system is not harmed. They help accomplish several security-related objectives including individual accountability, intrusion detection and problem analysis.
  • 4. Example: Audit Trails can be used to record the ‘before’ and ‘after’ versions of the records so that actual changes by a user can be compared with the expected changes and the user can be made accountable of his actions in case of any discrepancies. A practical use can be in accounting, where the documentation of the detailed transactions can be corresponding to ledger entries. This will ensure proper error-free accounting. Such trails are highly permission intensive and strictly controlled by the administrators and cannot be accessed by other users. ///////////////// Authentication normally refers to the act of confirming the veracity of an attribute, data or identity. In systems, authentication normally means verifying the identity of a person through his username and password. Although sometimes used synonymously, authentication & authorization are different. Authorization is the process of granting access to system objects to individuals based on their identity & hence must follow authentication. Authentication is simply to verify that the person is the one that he or she claims to be. It does not say anything about the access rights & privileges that the person enjoys. Normally, authentication precedes authorization although they seem to be combined sometimes. The process of authentication makes use of digital signature involving primary and secondary keys. There are basically three different techniques for authentication. The first type accepts proof of identity from a credible person who has the evidence of the proof. The second type of authentication compares the attributes of the object with the known attributes of objects of similar origin. The third type of authentication accepts documentation or other known external affirmations. Authentication can also be a two-factor authentication when elements with two factors are required for authentication. For example, an authentication may need a user pin and password. Authentication may also happen of a product using a secure key storage device. Authentication of information content can also happen in terms of factual verification and video authentication. ///////////////////////////////// Brute Force is a problem solving mechanism that takes into account all the possible solutions to the existing problem and then finalizing the most efficient problem. It does not take into account any special algorithm which can eliminate a few options tactfully. No shortcuts are taken to reach to the optimal solution. Example: In case of travelling sales man problem, the brute force programming will find the distance travelled through all the possible paths.
  • 5. After doing so it will then display the one with least distance. It will not use additional programs to cut short a few paths which do not come into the shortest paths. ////////////////////////////// BULLETIN BOARD SYSTEM The BBS is a communication tool primarily used in corporate world and is similar to intranet which facilitates the messing, mail and a platform for online discussion forum as an individual and also a group function. It is computer system running software through which a user can log in and access the main system through terminal software and can also use it for uploading or downloading files/software apart from networking functions. BBS is generally an email and conferencing based system and is open to all community legal centres (CLCs) and its employees and is provided by National Association of Community Legal Centres (NACLC). Example: NACLC provides each of the employees with a free BBS account in order to access individual folder or conference, mailbox and serves a forum to post important discussions and notices to a large group of people. It is usually monitored by a BBS administrator and has variety of enhanced features like group calendar etc. ///////////////////// BUSINESS PROCESS MANAGEMENT Business was previously considered as constituted of distinct elements of Process Modelling, Workflow, Simulation, EAI and finally business integration. However BPM is a holistic process of management of all these distinct units in a systematic manner through constant closed looping of all the feedbacks generated in order to deliver the desired value to the customer. Business Process Management is the systematic approach to continuously improve the company’s business processes increase business effectiveness and efficiency while striving for innovation, flexibility and integration by alignment with strategic goals, operations and end-to-end processes that companies perform to create value for customers. BPM should not be confused with Business Process Reengineering which requires a complete redevelopment of processes in a company whereas BPM develops on existing processes and through constant feedback and refining results in better processes. While practicing BPM, Business Process Initiative (BPI) methods can be employed for specific improvement. Hence, just the use of BPI methodologies does not mean that the organization is practicing BPM. The main steps followed in a BPM are illustrated in the following diagram:
  • 6. After the Business Processes and strategy is laid out, the analysis yields various improvements in the existing processes and design of new process for betterment of the organization. For example: BPM helps Customer Relationship Management personals to solve problems more efficiently as they are provided with most up to date information. The BPM solution integrates marketing, sales and support systems of the company and organizes and automates activities like new customer acquisition, service call management, complaint resolution, fraud assessment , credit approvals etc.