How can you ensure that dyPAS is robust?
Because dyPAS has already served +6,5 million of BPM / RPA objects.
What is the hardware structure necessary to set up a development and production environment?
This aspect depends on the type of service you want, or use it as a service, or that you want the entire installation in your systems.
Is it possible to display information in forms from other databases or applications?
All the information that is shown in the forms or comes from external sources (DB, applications) or is the one that the user has to enter.
What methods can be used?
Access to external sources can be through access to BD provided access or WEB services.
Can the data of different processes be accessed between them?
Yes, for us it is a database more.
Is it possible for two users to access the same task at the same time? If possible, how is data integrity assured?
NO, two users can not access the same task. This does not mean that there may be tasks that have to be filled by more than one user, in this case the process must be correctly designed. In case there is any information that may affect another user, there are mechanisms to notify or refresh the information.
Does the tool allow the generation of reports with data of the tasks associated with the processes and their export in different formats or printing?
It has a very powerful system of analysis of the information contained in the processes, although we recommend the use of some BI system for its exploitation (eg Excel pivot tables, it is a good tool), but if you have any corporate BI the data is loaded in this BI. There are also very interesting analysis tools, for example IBM’s Watson Analytics.
Is it possible to embed the web forms of the processes in another external web application?
We should clarify this question a little more. If we talk about processes and their tasks, I do not know if it makes much sense, you would have to define a framework for action. At the level of starting a process YES. At the level of being able to use some of the forms, in our case, too, but I would like to comment on it in detail before giving a definitive answer.
How is it possible for other systems to communicate with different processes to obtain information or modify it?
At the consultation level, the process data is in BD that can be accessed for consultation. At the level of the process situation, the system has multiple APIs to consult practically any type of information.
Do you use cache? If yes, how?
The process-level cache concept can be used
How to value the savings in staff hours if I can not / do not want to lay off staff?
Applying policies of non-coverage of retirements and natural losses can be achieved naturally between 5 and 8% reduction of annual staff valued savings of hours. The remaining time can be reallocated to more value-added tasks (eg personalized attention to clients) and/or an internal OPEX group (survey, optimization, and support for testing new processes, training new users, continuous improvement of already automated processes)
Should we select and acquire a BPMS platform as a first step before starting our deployment of BPM processes?
No, neither is it necessary nor convenient (unless a corporate decision had already been made to acquire or the platform had already been acquired). It is better to take the first steps with a SaaS or Cloud service, without long-term commitment, until you are fully sure that the technology chosen adapts to your needs and even be able to test several different technologies before making a final decision. On the other hand, after a period of use of any BPMS technology there are many more elements of judgment for the correct selection of the definitive technology.
Do we need external help to define our processes and implement them technologically?
It is the most advisable. The procedural approach is a methodology that requires a lot of experience to achieve the most efficient results in the shortest time possible and without many changes. On the other hand, it does not make sense to devote very valid resources within the organization and usually scarce, to the technological tasks of implementation and connectivity, it is better to leave it in expert hands.
How can I be sure that my company's data is safe in a cloud environment?
The security of cloud environments is guaranteed by the best equipment and policies and by highly specialized professionals. Yes, despite this, it is still considered a risk, you can always set up strategies such as private access clouds only for the client or, mixed architectures, in which the applications are served from a cloud but the data remains in the LAN of the client. It would also be necessary to ask ourselves: are we really convinced of the safety of our facilities?