Super User

Super User

 Business Process Reengineering

Business Process Re-engineering (BPR) Definition

Business process re-engineering (BPR) is the "fundamental rethinking and radical redesign of business processes aimed at achieving radical improvements in essential contemporary measures of performance, such as cost, quality, service and speed" (Hammer and Champy, 1993).




 References :

1.0  Reengineering the Corporation: Hammar and Champy

2.0 Competitive Advantage- Porter

3.0 Competitive Strategy- Porter

4.0 Business Process Modeling- Article Link

5.0 Business value of Managed Service- Article Link

  Vertualization on Win7  and  Server


Virtualization: Running VirtualBox on a Windows 7 laptop – Windows 2008 R2 Server guest

Filed under: HW, Network, Virtual — rasor @ 6:46 pm

Using VirtualBox as hypervisor on a laptop eases usage of WLAN and USB on the guest OS.

This post is based on using VirtualBox 3.1.6 on Windows 7 (64 bit) with Windows 2008 R2 server, 64 bit, Standard edition.

Out of the box Windows 7 installed drivers for the WLAN in my laptop (with CPU i7 720) and for the full HD resolution video card. Nice.

Business Process Modeling with UML

Business Process Modeling with UML



Traditionally, the UML has been associated more with software engineering and systems design than with analysis and modeling of business processes. However, standard UML 2.x provides a rich set of behavioral models which are very useful in modeling the processes, activities, people and information critical to every business. Beyond the standard UML notation, two well respected and proven UML “extensions” exist which further enhance the capturing of business process and related constructs. The first is Business Process Modeling Notation (BPMN), which has gained enormous popularity and is rapidly becoming a new standard for modeling and designing business processes. The second is the Ericsson-Penker profile which has less popularity, but still provides a unique and powerful means of visualizing and communicating business processes and the necessary flow of information within an organization. This paper provides a very high-level introduction to both of these “extensions”, showing how they can be used in Enterprise Architect and some of the common modeling constructs they use.


 Detailed Article


The value of  Managed Service is not easy to understand. The following presentation  explains the business value of Managed service. The intended audience is CEO, CFO and CIO.


 Please contact us for Further Explanation



1.0  Managed Service Value Proposition- Managed Service Slideshow

2.0 IDC WhitePaper - IDC PDF

3.0 Nagios Conference Presentation- Presentation Slides


Business Development Website-  Analysis and Design Process

We have worked over the years in various aspects of business development using IT. We are currently expanding our business in software development areas like web portal development and E-commerce solutions.Websites and E-commerce are areas where a large number of businesses can benefit from quality marketing and sales assistance.

 IT Solutions Delivery Process and Procedure


IT Solutions Delivery Process and Procedure


Disciplined agile delivery (DAD) is a process decision framework that enables simplified process decisions around incremental and iterative solution delivery. DAD builds on the many practices espoused by advocates of agile software development, including Scrumagile modelinglean software development, and others.

The primary reference for disciplined agile delivery is the book[1] of same name, written by Scott Ambler and Mark Lines.

In particular, DAD has been identified as a means of moving beyond Scrum.[2] According to Cutter Senior Consultant Bhuvan Unhelkar, "The DAD framework provides a carefully constructed mechanism that not only streamlines IT work, but more importantly, enables scaling.".[3] Paul Gorans and Philippe Kruchten call for more discipline in implementation of agile approaches and indicate that DAD, as an example framework, is "a hybrid agile approach to enterprise IT solution delivery that provides a solid foundation from which to scale."


Key Aspects




The Disciplined Agile Delivery framework identifies that "People, and the way they interact with each other, are the primary determinant of success for a solution delivery project."


DAD specifies a robust set of primary and secondary roles, outlined in the 'Roles' section below.



The DAD process framework promotes the ideas that team members should collaborate closely and learn from each other, that the team should invest effort to learn from their experiences and evolve their approach, and that individuals should do so as well.[11]



DAD adopts and tailors proven strategies from existing methods such as Scrum, Extreme Programming (XP), Agile Modeling (AM), Unified Process (UP), Kanban, Outside-in software development, and Agile Data (AD). Rather than taking the time to adapt one of these existing frameworks, with DAD all of the effort of combining relevant pieces of each technique has already been done.


Full delivery lifecycle

Unlike first generation agile methods that typically focus on the construction aspects of the lifecycle, the DAD lifecycle addresses the entire project from the point of initiation all the way to production and post-delivery production activities.


Process goal driven

The DAD framework approach is goal-driven rather than prescriptive. Compared to Scrum, which prescribes that all work is managed via a product backlog queue, DAD suggests choosing a work-prioritization strategy based on whatever factors are most important to project stakeholders.


In a DAD approach, strategies could be driven by several factors: business value, risk, due date, dependencies, or any combination thereof. DAD describes the tradeoffs associated with each strategy and discusses the viability of each.


Solution focused

Disciplined Agile Development matures focus from simply producing software to providing consumable solutions that provide real business value to stakeholders. While software is clearly an important part of the deliverable, being solution focused means taking a holistic view of the overall problem. This can lead to suggested updates in hardware, business/organizational processes, and overall organizational structures.


Risk-value lifecycle

The DAD lifecycle is risk and value driven. It extends Scrum's value-driven lifecycle which produces potentially shippable software each sprint/iteration so that it explicitly includes light-weight milestones such as ensuring stakeholder consensus as to the scope of the project early in the lifecycle, proving the architecture with working code early in the lifecycle, ensuring sufficient functionality exists before transition, and ensuring production readiness before actual release of the solution.


Enterprise aware

Enterprise awareness is a crucial philosophy of the DAD framework. DAD teams work within an organization's enterprise ecosystem just like any other team. Ideally a DAD team will leverage existing resources in order to reduce overall delivery time and cost, and can work in parallel to other teams in the organization. An important aspect of enterprise awareness is that DAD has explicit DevOps [12] practices and strategies built right into the framework.



Please contact us for details. One of our engineers will be happy to discuss your requirements.

Risk Reduction in IT Solutions


Risk management is the identification, assessment, and prioritization of risks (defined in ISO 31000 as the effect of uncertainty on objectives) followed by coordinated and economical application of resources to minimize, monitor, and control the probability and/or impact of unfortunate events[1] or to maximize the realization of opportunities. Risk management’s objective is to assure uncertainty does not deviate the endeavor from the business goals.[2]

Risks can come from different ways e.g. uncertainty in financial markets, threats from project failures (at any phase in design, development, production, or sustainment life-cycles), legal liabilities, credit risk, accidents,natural causes and disasters as well as deliberate attack from an adversary, or events of uncertain or unpredictable root-cause. There are two types of events i.e. negative events can be classified as risks while positive events are classified as opportunities. Several risk management standards have been developed including the Project Management Institute, the National Institute of Standards and Technology, actuarial societies, and ISO standards.[3][4] Methods, definitions and goals vary widely according to whether the risk management method is in the context of project management, security, engineeringindustrial processes, financial portfolios, actuarial assessments, or public health and safety.


Risk sources are more often identified and located not only in infrastructural or technological assets and tangible variables, but in Human Factor variables, Mental States and Decision Making. The interaction between Human Factors and tangible aspects of risk, highlights the need to focus closely into Human Factor as one of the main drivers for Risk Management, a "Change Driver" that comes first of all from the need to know how humans perform in challenging environments and in face of risks (Trevisani, 2007). As the author describes, «it is an extremely hard task to be able to apply an objective and systematic self-observation, and to make a clear and decisive step from the level of the mere "sensation" that something is going wrong, to the clear understanding of how, when and where to act. The truth of a problem or risk is often obfuscated by wrong or incomplete analyses, fake targets, perceptual illusions, unclear focusing, altered mental states, and lack of good communication and confrontation of risk management solutions with reliable partners. This makes the Human Factor aspect of Risk Management sometimes heavier than its tangible and technological counterpart»[5]

The strategies to manage threats (uncertainties with negative consequences) typically include transferring the threat to another party, avoiding the threat, reducing the negative effect or probability of the threat, or even accepting some or all of the potential or actual consequences of a particular threat, and the opposites for opportunities (uncertain future states with benefits).


Certain aspects of many of the risk management standards have come under criticism for having no measurable improvement on risk, whether the confidence in estimates and decisions seem to increase.[1] For example, it has been shown that one in six IT projects experience cost overruns of 200% on average, and schedule overruns of 70%.[6]





Please contact us for details. One of our engineers will be happy to discuss your requirements.



Microwave Link


A microwave link is a communications system that uses a beam of radio waves in the microwave frequency range to transmit information between two fixed locations on the earth. They are crucial to many forms of communication and impact a broad range of industries. Broadcasters use microwave links to send programs from the studio to the transmitter location, which might be miles away. Microwave links carry cellular telephone calls between cell sites. Wireless Internet service providers use microwave links to provide their clients with high-speed Internet access without the need for cable connections. Telephone companies transmit calls between switching centers over microwave links, although fairly recently they have been largely supplanted by fiber-optic cables. Companies and government agencies use them to provide communications networks between nearby facilities within an organization, such as a company with several buildings within a city.


One of the reasons microwave links are so adaptable is that they are broadband. That means they can move large amounts of information at high speeds. Another important quality of microwave links is that they require no equipment or facilities between the two terminal points, so installing a microwave link is often faster and less costly than a cable connection. Finally, they can be used almost anywhere, as long as the distance to be spanned is within the operating range of the equipment and there is clear path (that is, no solid obstacles) between the locations. Microwaves are also able to penetrate rain, fog, and snow, which means bad weather doesn’t disrupt transmission.


Satellite Internet access is Internet access provided through communications satellites. Modern satellite Internet service is typically provided to users through geostationary satellites that can offer high data speeds,[2] with newer satellites using Ka band to achieve downstream data speeds up to 50 Mbps.[3]



Satellite Internet generally relies on three primary components: a satellite in geostationary orbit (sometimes referred to as a geosynchronous Earth orbit, or GEO), a number of ground stations known as gateways that relay Internet data to and from the satellite via radio waves (microwave), and a VSAT (very-small-aperture terminal) dish antenna with a transceiver, located at the subscriber's premises. Other components of a satellite Internet system include a modem at the user end which links the user's network with the transceiver, and a centralized network operations center (NOC) for monitoring the entire system. Working in concert with a broadband gateway, the satellite operates a Star network topology where all network communication passes through the network's hub processor, which is at the center of the star. With this configuration, the number of remote VSATs that can be connected to the hub is virtually limitless.


Please contact us for details. One of our engineers will be happy to discuss your requirements.

Content Management Systems



content management system (CMS) is a computer application that allows publishing, editing and modifying content, organizing, deleting as well as maintenance from a central interface.Such systems of content management provide procedures to manage workflow in a collaborative environment.[5] These procedures can be manual steps or an automated cascade. CMSs have been available since the late 1990s.

CMSs are often used to run websites containing blogs, news, and shopping. Many corporate and marketing websites use CMSs. CMSs typically aim to avoid the need for hand coding, but may support it for specific elements or entire pages.


The function and use of content management systems is to store and organize files, and provide version-controlled access to their data. CMS features vary widely. Simple systems showcase a handful of features, while other releases, notably enterprise systems, offer more complex and powerful functions. Most CMS include Web-based publishing, format management, revision control (version control), indexing, search, and retrieval. The CMS increments the version number when new updates are added to an already-existing file. Some content management systems also support the separation of content and presentation.

A CMS may serve as a central repository containing documents, movies, pictures, phone numbers, scientific data. CMSs can be used for storing, controlling, revising, semantically enriching and publishing documentation..

Distinguishing between the basic concepts of user and content. The content management system (CMS) has two elements:


  • Content management application (CMA) is the front-end user interface that allows a user, even with limited expertise, to add, modify and remove content from a Web site without the intervention of a Webmaster.
  • Content delivery application (CDA) compiles that information and updates the Web site.


A content management system[6] (Web CMS) is a bundled or stand-alone application to create, deploy, manage and store content on Web pages. Web content includes text and embedded graphics, photos, video, audio, and code (e.g., for applications) that displays content or interacts with the user. Content Managementhas many roles in today's market place and is an important base for any website blogging, articles, news, description of products etc.[A Web CMS may catalog and index content, select or assemble content at runtime, or deliver content to specific visitors in a requested way, such as other languages. Web CMSs usually allow client control over HTML-based content, files, documents, and Web hosting plans based on the system depth and the niche it serves.


 Please contact us for details. One of our engineers will be happy to discuss your requirements.

Enterprise Architecture as StrategyEnterprise Architecture as Strategy

Enterprise Architecture as a Strategy- Creating Foundation for Execution




Does it seem you've formulated a rock-solid strategy, yet your firm still can't get ahead? If so, construct a solid foundation for business execution--an IT infrastructure and digitized business processes to automate your company's core capabilities. In "Enterprise Architecture as Strategy: Creating a Foundation for Business Execution," authors Jeanne W. Ross, Peter Weill, and David C. Robertson show you how. The key? Make tough decisions about which processes you must execute well, then implement the IT systems needed to digitize those processes.


 The right enterprise architecture enhances profitability and time to market, improves strategy execution, and even lowers IT costs. Through a clear, engaging explanation, they demonstrate how to define your operating model--your vision of how your firm will survive and grow--and implement it through your enterprise architecture. Their counterintuitive but vital message: When it comes to executing your strategy, your enterprise architecture may matter far more than your strategy itself.


 Talk to one of our consulting engineers to discuss your requirements. We will be happy to accommodate your needs and wants.





Page 9 of 22
Go to top