Business Guide
simplicable technology guide   »  technology definitions   »  bpm

BPM Software in 90 Seconds

        posted by , February 04, 2011

Business Process Management Suites(BPMS) is software used to automate business processes.

bpms software

Design Environment

Design tools allow business users to model processes and simulate various scenarios. The output is complete business process models.

Development Environment

Developers take the business process models and make them executable. This involves building data flows between steps, integration with enterprise systems and data sources and building user interfaces for tasks. The output is executable business process models.

Runtime Environment

The runtime environment is powered by engines which orchestrate the business process, execute business rules and interface with users through workflow tasks.

Tools for process monitoring, administration and user collaboration are often included.

What's the point?

BPMS are critical tools used to automate, control, monitor, measure and optimize business processes. Since, we only have 90 seconds we will leave it at that. If you would like to know more consider reading about Business Process Management.

3 Shares Google Twitter Facebook

Related Articles

Enterprise Architecture
How to architect an organization.

Understand the threats to your organization.

CxO level executives are demanding metrics for EA — can you deliver?

Explaining complex business and technical concepts in layman's terms.

A large collection of enterprise architecture tools.

Recently on Simplicable

Business Capability Map

posted by Anna Mar
The most important diagram in all of business architecture — without it your EA efforts are in vain.

101 Principles of Enterprise Architecture

posted by Anna Mar
This is the way to prove to your stakeholders that your recommendations are not just whims.

20 Easy to Use ITIL Metrics

posted by John Spacey
The exciting world of ITIL metrics.

The Big List of Information Security Vulnerabilities

posted by John Spacey
Understanding your vulnerabilities is the first step to managing risk.


about     contact     sitemap     privacy     terms of service     copyright