{"id":31583,"date":"2019-05-01T03:46:20","date_gmt":"2019-05-01T07:46:20","guid":{"rendered":"http:\/\/blog.cybercon1.com\/?p=31583"},"modified":"2019-05-01T03:46:20","modified_gmt":"2019-05-01T07:46:20","slug":"what-lies-beneath-uncovering-process-complexities-before-automating","status":"publish","type":"post","link":"https:\/\/blog.cyberconservices.com\/index.php\/2019\/05\/01\/what-lies-beneath-uncovering-process-complexities-before-automating\/","title":{"rendered":"What Lies Beneath: Uncovering Process Complexities before Automating"},"content":{"rendered":"\n<p> <br>By Jack Wilson &#8211; Business Process Automation (<strong>BPA<\/strong>) is no longer a new concept. In some sectors, it has become so accepted as to be expected. Those who are not utilizing <strong>BPA<\/strong> are looked upon as lagging behind the pack, while those with <strong>BPA<\/strong> implemented throughout all layers of their organization are reaping the benefits. However, what\u00a0<em>has<\/em>\u00a0become recently apparent is that while a spectrum of robotic and automation tools exist that will assist an organization with <strong>BPA<\/strong> implementation, the missing critical piece is the organization\u2019s underlying knowledge of their own processes.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"alignright is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.cyberconservices.com\/wp-content\/uploads\/2019\/04\/gears-2020552__340.jpg\" alt=\"\" class=\"wp-image-31584\" width=\"377\" height=\"122\"\/><\/figure><\/div>\n\n\n\n<p>Sure, an organization may be able to map out their existing processes, maybe even identify bottlenecks that are keeping them from process optimization; but rather than engaging in process engineering to identify and understand all the intricacies that are keeping them from performance excellence, the organization tasks their IT department to research technological surrogates that they hope (and expect) will cure their process deficiencies.<\/p>\n\n\n\n<p>Some of these business process-related intricacies are easily identified while others are elusive. Some are easily countered whereas others seem to be unwanted organizational mainstays. A few of these intricacies are described below:  <a href=\"https:\/\/www.google.com\/url?rct=j&amp;sa=t&amp;url=https:\/\/www.automation.com\/what-lies-beneath-uncovering-process-complexities-before-automating&amp;ct=ga&amp;cd=CAEYBCoUMTY0MzYwODcyMjAxMjAyMTY0OTYyGjRhYzkyN2Y3ZGEzYjNiNWE6Y29tOmVuOlVT&amp;usg=AFQjCNH1ucViFqVtlz3WNOGH-WfCW4GW4A\">Read more: <\/a><\/p>\n\n\n\n<p><strong>RB Note: <\/strong> Live this daily, but a challenge worth the effort in pursuit of continuous improvement.  <\/p>\n","protected":false},"excerpt":{"rendered":"<p>By Jack Wilson &#8211; Business Process Automation (BPA) is no longer a new concept. In some sectors, it has become so accepted as to be expected. Those who are not utilizing BPA are looked upon as lagging behind the pack, <span class=\"excerpt-dots\">&hellip;<\/span> <a class=\"more-link\" href=\"https:\/\/blog.cyberconservices.com\/index.php\/2019\/05\/01\/what-lies-beneath-uncovering-process-complexities-before-automating\/\"><span class=\"more-msg\">Continue reading &rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[11],"tags":[392],"class_list":["post-31583","post","type-post","status-publish","format-standard","hentry","category-bpa","tag-bpa"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack-related-posts":[],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts\/31583","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/comments?post=31583"}],"version-history":[{"count":0,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts\/31583\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/media?parent=31583"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/categories?post=31583"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/tags?post=31583"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}