Professional Documents
Culture Documents
N.Vivekananthamoorthy
Department of Information
Technology
KCG College of Technology
nvivekanand@gmail.com
Slide 1
Introduction
Slide 2
An Institutionally Secure Integrated Data Environment
What is BPR?
Slide 3
An Institutionally Secure Integrated Data Environment
FORD EXAMPLE
Slide 5
An Institutionally Secure Integrated Data Environment
Phase –I Begin Organizational Change
Slide 6
An Institutionally Secure Integrated Data Environment
Phase -2 Build the Re-engineering
Organization
■ Activities
■ Establish a BPR organizational structure
■ Establish the roles for performing BPR
■ Choose the personnel who will reengineer
Slide 7
An Institutionally Secure Integrated Data Environment
Phase3 –Identify BPR Opportunities
■ Activities
■
-Identify the core/high-level processes
■ - Recognize potential change enablers
■ - Gather performance metrics within industry
■ - Gather performance metrics outside industry
■ - Select processes that should be reengineered
■ - Prioritize selected processes
■ - Evaluate pre-existing business strategies
■ - Consult with customers for their desires --- Quality,Delivery
■ - Determine customer's actual needs ---- Sequential Delivery
■ - Formulate new process performance objectives
■ - Establish key process characteristics
Slide 8
An Institutionally Secure Integrated Data Environment
Phase4 – Understand the existing process
■ Activities
■ Understand why the current steps are performed
■ - Model the current process
■ - Understand how technology is currently used – COBOL – Unix
based system
■ - Understand how information is currently used – batch system
– non interactive – text based terminals(NO GUI)
■ - Understand the current organizational structure(slow to
react to customer needs)
■ - Compare current process with the new objectives – cycle
time reduction – fast in reacting to customer needs –
compettetive in market
Slide 9
An Institutionally Secure Integrated Data Environment
Phase5 – Re-engineer the process
■ Activities
■ - Ensure the diversity of the reengineering team – Top
management,User Group,Developers Group)
■ - Question current operating assumptions
■ - Brainstorm using change levers – Selecting the correct
technology within Budget
■ - Brainstorm using BPR principles
■ - Evaluate the impact of new technologies – Competetive
Advantage,Cycle time reduction,Work life enrichment
■ - Consider the perspectives of stakeholders – Faith in the
information system
■ - Use customer value as the focal point – Quality and Delivery
Slide 10
An Institutionally Secure Integrated Data Environment
BPR Principles
Slide 11
An Institutionally Secure Integrated Data Environment
Phase 7 Perform the Transformation
■ Activities
■
-Develop a migration strategy – A project plan
■ - Create a migration action plan – PERT network with
important milestones
■ - Develop metrics for measuring performance during
implementation
■ - Involve the impacted staff – Consult Users who are going to
use the system
■ - Implement in an iterative fashion - Building proto types
■ - Establish the new organizational structures
■ - Assess current skills and capabilities of workforce
■ - Map new tasks and skill requirements to staff
■ - Re-allocate workforce
■ - Develop a training curriculum
Slide 12
An Institutionally Secure Integrated Data Environment
Phase 6 Blueprint the new Business
System
■ Activities
■ - Define the new flow of work
■ - Model the new process steps
■ - Model the new information requirements
■ - Document the new organizational structure
■ - Describe the new technology specifications
■ - Record the new personnel management
systems
■ - Describe the new values and culture required
Slide 13
An Institutionally Secure Integrated Data Environment
CASE STUDY
Ancilliary Development Computer System –
BHEL(Trichy)
■ Hardware set up
■ First decentralized computer system (PDP11) established in 1986
■ Unix based Multiprocessor system introduced in 1990 – HCL Magnum
■ Problems faced
■ Existence of information islands with fragmented systems
■ Cobol based systems was huge and difficult to maintain
■ User has access to lot of data but he is not getting the information he
wants.
■ Integration exists only in paper.
■ Usage of variety of software packages in a module
■ Accountability down the line is poor.
■ Currency of data is poor.
■ Difficult to get adhoc reports and to answer queries
Slide 14
An Institutionally Secure Integrated Data Environment
CASE STUDY
Ancilliary Development Computer System –
BHEL(Trichy)
■ Hardware set up
■ Client server Technology with RDBMS introduced in
1997 with HP 9000 unix server
■ The Solution
■ Try Business process reengineering
■ Exploit new software capabilities
■ Upgrade the computer system to Client Server
Technology with RDBMS Oracle
■ Improve data integration
■ Empower working staff
Slide 15
An Institutionally Secure Integrated Data Environment
CASE STUDY
Ancilliary Development Computer System –
BHEL(Trichy)
■ BPR Objectives
■ Cost Reduction ( Mainly operating cost can be
drastically cut by reducing cycle time of processes and
by eliminating unwanted steps)
■ Time and space shrinkage (Cutting processing time
from weeks to days and eliminating unwanted
intermediate outputs)
■ Quality enhancement(By eliminating errors,exercizing
various controls which becomes amenable due to BPR)
■ Work Life enrichment(By eliminating monotonous steps
in jobs by introducing creativity and by introducing new
things to learn)
■ Profit improvement
Slide 16
An Institutionally Secure Integrated Data Environment
CASE STUDY
Ancilliary Development Computer System –
BHEL(Trichy)
■ Steps in BPR
■ Develop Business Vision and Process
objectives
■ Identify processes to be reengineered
■ Understand and measure existing process
Slide 17
An Institutionally Secure Integrated Data Environment
CASE STUDY
Ancilliary Development Computer System –
BHEL(Trichy)
■ Strategy
■ Study the existing system(Around 500 COBOL programs
and Job Modules with no systematic documentation)
■ Evolve the sytem design from first principles(Then only
we can expect dramatic results).
■ Development of Data Model(ER Diagram) after Business
Data Analysis(Mapping from Flat file System to
Relational Data Model).
■ Identification of entities,attributes and relationships
and Integrity Constraints.
■ Batch to online conversion(COBOL to ORACLE)
■ Eliminate many steps in the existing system which are
unnecessary(Merging tables dealing with same entity
etc)
Slide 18
An Institutionally Secure Integrated Data Environment
CASE STUDY
Ancilliary Development Computer System –
BHEL(Trichy)
■ Development of Interactive
forms
■ Study For data capture at source and populating and
changing the database content(Using front end tool –
Developer 2000 – Many cobol programs map into a
single form- The program logic is converted as triggers
and PL/SQL Procedures)
■ Incorporation of Business Rules
■ Eg Income tax and recovery calculation in
Bills(Database triggers and PL/SQL procedures)
Slide 19
An Institutionally Secure Integrated Data Environment
CASE STUDY
Ancilliary Development Computer System –
BHEL(Trichy)
■ Trial Assembly
Slide 21
An Institutionally Secure Integrated Data Environment
CASE STUDY
Ancilliary Development Computer System –
BHEL(Trichy)
Slide 22
An Institutionally Secure Integrated Data Environment
Ancilliary Development
Computer System –
BHEL(Trichy)
Slide 23
An Institutionally Secure Integrated Data Environment
CASE STUDY
Ancilliary Development Computer System –
BHEL(Trichy)
Slide 24
An Institutionally Secure Integrated Data Environment
CASE STUDY
Ancilliary Development Computer System –
BHEL(Trichy)
■ Development of Interactive
forms
Slide 25
An Institutionally Secure Integrated Data Environment
CASE STUDY
Ancilliary Development Computer System –
BHEL(Trichy)
■ Development of Interactive
forms
Slide 26
An Institutionally Secure Integrated Data Environment
CASE STUDY
Ancilliary Development Computer System –
BHEL(Trichy)
■ SYSTEM SIMPLIFICATION
✦ Monitoring of critical DUs simplified due to exception reports in different sorting order
✦ DCN incorporation system simplified due to online implementation of IOM system
✦ Integrated hold up with non match tonnage statement has helped to identify critical items by clearing
which maximum matching can be obtained.
✦ Many user friendly enquiries have been developed which provides integrated information.
Slide 27
An Institutionally Secure Integrated Data Environment
CASE STUDY
Ancilliary Development Computer System –
BHEL(Trichy)
Slide 28
An Institutionally Secure Integrated Data Environment
CASE STUDY
Ancilliary Development Computer System –
BHEL(Trichy)
Slide 29
An Institutionally Secure Integrated Data Environment
CASE STUDY
Ancilliary Development Computer System –
BHEL(Trichy)
Slide 30
An Institutionally Secure Integrated Data Environment
CASE STUDY
Ancilliary Development Computer System –
BHEL(Trichy)
■ Conclusion
■ The computer system successfully migrated from
COBOL to ORACLE using BPR strategy.
■ Information islands bridged(Eg DBLINK facilty and
distributed database approach)
■ Online System introduced due to which the information
has become current and the same is easily accessible by
all users.
■ People are empowered and life style changed with job
enrichment.
■ (Other examples of BPR are computerized Railway
reservation and Banking operations – say easy
passbook entry any time)
■ We can cope up with the shock due to technology
change.
Slide 31
An Institutionally Secure Integrated Data Environment
CASE STUDY
Ancilliary Development Computer System –
BHEL(Trichy)
■ References
■ Andrews, Dorine C. and Susan K. Stalick, Business Reengineering: the
Survival Guide, Yourdon Press, 1994.
■ Davenport, Thomas H., Process Innovation, Boston, MA: Harvard
Business School Press, 1993.
■ Hall, Gene and Jim Rosenthal and Judy Wade, How to Make
Reengineering Really Work, Harvard Business Review, November-
December 1993.
■ Hammer, Michael, Reengineering Work: Don’t Automate, Obliterate,
Harvard Business Review, July-August 1990.
■ Hammer, Michael and James Champy, Reengineering the Corporation,
NY: Harper Business, 1993.
■ Harvard Business School Report, Business Process Reengineering: IT-
Enabled Radical Change, June 1993
■ Petrozzo, Daniel P. and John C. Stepper, Successful Reengineering,
Van Nostrand Reinhold, 1994.
Slide 32
An Institutionally Secure Integrated Data Environment