{"id":33370,"date":"2020-05-18T03:06:00","date_gmt":"2020-05-18T07:06:00","guid":{"rendered":"http:\/\/blog.cybercon1.com\/?p=33370"},"modified":"2020-05-18T03:06:00","modified_gmt":"2020-05-18T07:06:00","slug":"so-you-want-to-use-rpa-to-automate-your-process","status":"publish","type":"post","link":"https:\/\/blog.cyberconservices.com\/index.php\/2020\/05\/18\/so-you-want-to-use-rpa-to-automate-your-process\/","title":{"rendered":"So you want to use RPA to automate your process."},"content":{"rendered":"\n<p>Introducing <strong>RPA i<\/strong>nto your environment to automate business processes is a great step forward.  The next question is will you identify the steps and tasks in the process in order to automate it correctly?  Enter <strong>Process Mining.<\/strong><\/p>\n\n\n\n<div class=\"wp-block-image is-style-default\"><figure class=\"alignleft size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/cdn.pixabay.com\/photo\/2015\/06\/13\/16\/55\/silhouettes-808153__340.jpg\" alt=\"\" width=\"299\" height=\"455\"\/><\/figure><\/div>\n\n\n\n<p>The following article provides some definition to Process Mining and lists some applications built to assist in the analysis.<\/p>\n\n\n\n<p>By <a href=\"https:\/\/www.process.st\/author\/adamh\/\">Adam Henshall<\/a> &#8211; In short: Using software to look at what the people in your company do, and having the software describe those actions to you in the form of processes.<\/p>\n\n\n\n<p>Slightly more technical: <strong>Process mining<\/strong> is a family of approaches which look at data from event logs to see what people are doing. From looking at the steps someone takes to complete a task, a process can be automatically constructed. By continuing to gather this data over time you can start to see where\u00a0<a href=\"https:\/\/www.process.st\/business-bottlenecks\/\">bottlenecks<\/a>\u00a0occur or where inefficiencies lie within the process.<\/p>\n\n\n\n<p>Automated Business Process Discovery is the technical term for what people commonly refer to as process mining. However, with process mining as a concept having been used for a range of different use cases, Automated Business Process Discovery has kind of taken on a role as a sub section of process mining.<\/p>\n\n\n\n<div class=\"wp-block-image is-style-default\"><figure class=\"alignright size-large\"><img decoding=\"async\" src=\"https:\/\/cdn.pixabay.com\/photo\/2015\/11\/06\/15\/54\/bill-1029278__340.jpg\" alt=\"\"\/><\/figure><\/div>\n\n\n\n<p>In short, ABPD is about tracking event logs to discover what people are doing and then defining a process around those actions.<\/p>\n\n\n\n<p>For example, a lot of the software I\u2019m going to mention integrates with Salesforce. Salesforce records everything the users do in the app. ABPD would look at all that and then write it down for you automatically in the form of a process.  <a rel=\"noreferrer noopener\" href=\"https:\/\/www.process.st\/process-mining\/\" target=\"_blank\">Read On:<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Introducing RPA into your environment to automate business processes is a great step forward. The next question is will you identify the steps and tasks in the process in order to automate it correctly? Enter Process Mining. The following article <span class=\"excerpt-dots\">&hellip;<\/span> <a class=\"more-link\" href=\"https:\/\/blog.cyberconservices.com\/index.php\/2020\/05\/18\/so-you-want-to-use-rpa-to-automate-your-process\/\"><span class=\"more-msg\">Continue reading &rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[695,628],"tags":[696,629],"class_list":["post-33370","post","type-post","status-publish","format-standard","hentry","category-process-mining","category-rpa","tag-process-mining","tag-rpa"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack-related-posts":[],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts\/33370","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/comments?post=33370"}],"version-history":[{"count":0,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts\/33370\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/media?parent=33370"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/categories?post=33370"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/tags?post=33370"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}