Blog Posts Process Management

BPM Conference Portugal 2016

Blog: End to End BPM

This is the transcript of my opening act as Chair of the conference. In this edition, the event attracted on average 200 attendees, a breakthrough and important milestone.

This years edition theme is about Digital Transformation. I am not here to bring definitions about what Digital Transformation is. Definitions are, by definition, pretty useless, incomplete and valueless, hence, let me bring you real world examples what digital transformation is all about.

Let’s start by the banking industry

Some banks, there are some good examples just on the other side of the border, are leveraging on the power of Fintechs to expand the value chain. Fintechs are tech startups that are bridging the gaps, for example in trading operations and loan provisioning.

Today some banks are offering real end to end transactions, starting from the manufacturer that wants to collect the money as soon as possible, the transport companies and the manufacturer’s customer that wants to chase and track,
in order to prevent disruption in the supply chain. Today it is possible to share all the documents involved in transaction, that will determine if payment can be processed, broadcast merchandise tracking and predict delivery.

In loans the market is experiencing the loom of new business models like hybrid lending. Imagine your company needs equity and the bank does not to be exposed to risk. The bank can provide you, let’s say, 60% of the required equity and the company trough a network of venture capitalists, or equity firms can get the remaining 40%.

There is also Blockchain. Blockchain is changing the way we execute transactions in a way we do not need banks anymore. You can just wire money to other person. No one needs to have a bank account. Just Imagine the possibilities on how easy it is to process payments.

Let’s shift industry sector, like Oil and Gas or Utilities.

For reasons that I do not understand (I assume it is related with lack of industry knowledge) we constantly read articles in reference magazines about the power of digital business in retail leveraged on big data. Well, let me tell you are being deceived. The real power of big data is in manufacturing, utilities and oil and gas. Let me put you into perspective. People say Portugal have a population of 11 million. In Lagos, in Nigeria, live 25 million people, it fits twice the size of Portugal and some change. Now imagine in countries that produce oil, the thousands and thousands of kilometers of pipelines with thousands and thousands of pumps and other equipment and on each pump you can
control in real time the temperature, the pressure, the velocity, whatever. Now imagine you can predict based on operating conditions when the pump it is going to fail and you can prevent expensive repair cost (just think that most of this equipment is made to order and when it fails, it fails in the middle of nowhere) and the cost of non productive time.

This is what digital business is all about. This drives us to insurgency spot and asset  protection. Oil & Gas companies are very keen on militia do not blow up their pipelines.

Cyber-security

This leads to the development and implementation a new IT capability, context-awareness, by the realization of a Context Awareness System, a sophisticated surveillance technology solution that aggregates and analyses public safety data in real time, providing security investigators and analysts with a comprehensive view of potential threats and criminal activity.

To put you on perspective, I need to borrow this quote from Frances Stonor Saunders at a London Review of Books talk.

On the evening of 3rd of October of 2013 a boat carrying more than 500 Eritreans and Somalis founded out the tiny island of Lampedusa, in the darkness, locals mistook the desperate cries for help from the sounds of seagulls, the boat sunk within minutes, survivors were in the water for five hours, some of them close the bodies of the dead
companions at float. Many of 368 people who drowned never made off the capsizing boat and were drowned to the sea floor still on board. Among of the 108 people trapped inside the bow was an Eritrean woman thought to have 20 years old were, as she given birth as she drowned, her waters have been broken in the water, rescue drivers found the dead infant still attached by the umbilical cord

We are facing a dilemma on how cyber-security should be used for. On one hand these systems are used to fight and eliminate terror, protecting innocent lives to be taken, to protect company assets from being attacked and looted by contemporary pirates. We cannot make a so selfish decision about abandon and condemning thousands of refugees to death, because the same kind of Context Awareness System cannot be used in preventing people to die. The political discussion about where the refugees should be steered to Europe of send back to their failed state countries, it not an argument about the responsibility of protecting human life only in the case where terror is being perpetrated, except when people are escaping and running away from the same terror source.

Privacy

Once upon a time autonomy and anonymity were part of our self.

It is very interesting to analyze from a societal point of view, is how some people are deeply concerned with personal data access from 3rd parties, when such concern does not exist about how a bank account manager can understand our lifestyle just looking to the bank statement entries. Even so, many people are not particularly bothered by what faceless corporations or even governments can learn about them from our own data exhale. However, there is not a black or white resolution because today there are two kinds of people: the ones that have two selfs and the one that have three selfs. The first self is related with our personality, who we are, our outer self is our attitude that changes according to the behavior with whom we interact and our virtual self is a a wishful thinking what we want to be normally expressed in social networks which most of these faceless companies invest every bit of information we broadcast. Still, the lines start to blur when the virtual self blends with our attitude and we start to expose parts of our real behavior and thoughts. And still, you think you are protected, do you? By those smartphones with bio-metric authentication, like the San Bernardino phone John Macfee (from Mcafee anti virus) told he would break the phone for free and would last long. Well, you known how the story ended, the FBI handed over the device to an Israeli company that broke it.

This poses the challenge which is privacy by design. Is this new digital world how do you balance the trade off between learn from what your customers do and how do you protect their privacy. Do we own your data? Our we will give up our privacy and become transparent?

Filed under: BPM, Conferences, cybersecurity, Enterprise Architecture

Leave a Comment

Get the BPI Web Feed

Using the HTML code below, you can display this Business Process Incubator page content with the current filter and sorting inside your web site for FREE.

Copy/Paste this code in your website html code:

<iframe src="https://www.businessprocessincubator.com/content/bpm-conference-portugal-2016/?feed=html" frameborder="0" scrolling="auto" width="100%" height="700">

Customizing your BPI Web Feed

You can click on the Get the BPI Web Feed link on any of our page to create the best possible feed for your site. Here are a few tips to customize your BPI Web Feed.

Customizing the Content Filter
On any page, you can add filter criteria using the MORE FILTERS interface:

Customizing the Content Filter

Customizing the Content Sorting
Clicking on the sorting options will also change the way your BPI Web Feed will be ordered on your site:

Get the BPI Web Feed

Some integration examples

BPMN.org

XPDL.org

×