{"id":12353,"date":"2020-05-21T08:00:45","date_gmt":"2020-05-21T12:00:45","guid":{"rendered":"http:\/\/www.analystik.ca\/blogue\/?p=12353"},"modified":"2020-05-20T15:16:12","modified_gmt":"2020-05-20T19:16:12","slug":"automation-process-within-digital-transformation","status":"publish","type":"post","link":"https:\/\/analystik.ca\/blogue\/language\/en\/automation-process-within-digital-transformation\/","title":{"rendered":"Automation of a Process Within Digital Transformation"},"content":{"rendered":"<p>Here are a few considerations for the automation of a process within Digital Transformation.<\/p>\n<p>In general, a digital transformation plan will be a multi-stage process that will affect many aspects of the organization.\u00a0 For example:<\/p>\n<p>&#8211; Implementing or replacing a CRM<\/p>\n<p>&#8211; Implementation or replacement of an ERP<\/p>\n<p>&#8211; Implementation or replacement of a management system<\/p>\n<p>&#8211; Automation of a particular process through custom development<\/p>\n<p>&#8211; Creating a Data Warehouse<\/p>\n<p>&#8211; Implementation of a platform or security layer<\/p>\n<p>Your transformation plan may not consider all of these aspects, each organization has its own budget, priorities, capacities, etc.<\/p>\n<p>In our last post about digital transformation, we identified 9 considerations in replacing your CRM and we ended by indicating that at Analystik, our role is often to automate business functions following the creation of an opportunity.<\/p>\n<p>&nbsp;<\/p>\n<h2><strong>The true nature of process automation<\/strong><\/h2>\n<p><!--more-->In this post, we&rsquo;ll look at an organization that has moved its CRM to Salesforce and now wants to automate a specific business function; in short, to meet a specific business need.<\/p>\n<p>Once again, there are several elements to consider in this operation:<\/p>\n<ol>\n<li>Who will be the users of this functionality?<\/li>\n<li>What links will be required with existing systems?<\/li>\n<li>The size of the feature?<\/li>\n<li>Backup of data<\/li>\n<li>In what technological environment should the development be carried out?<\/li>\n<li>Should the functionality be available in mobility?<\/li>\n<li>Does the functionality access sensitive data?<\/li>\n<li>Security management<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<h2><strong>Premise for the automation of a process<\/strong><\/h2>\n<p>To detail each of these points, let&rsquo;s take the example of an organization that wants to automate the functionality of issuing a letter of offer for the financing of a piece of equipment.<\/p>\n<p>Downstream of this transaction, an account had been created in Salesforce and two contacts have been associated with this account. An opportunity is now created in the CRM for this customer and some financial data is entered (<em>so the opportunity module of the CRM has been customized to the needs of the company<\/em>).<\/p>\n<p>The customer verbally accepts the representative&rsquo;s proposal and asks for a financing proposal. In order to make this request, new data must be entered, some of them in the letter of offer generation module and some of them in other company systems.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>So, let&rsquo;s detail the elements listed above:<\/strong><\/p>\n<h3><strong>1.\u00a0\u00a0\u00a0\u00a0\u00a0 Who will be the users of this feature?<\/strong><\/h3>\n<p>This question is important because we will not want to buy additional CRM licenses for users who would only use the letter of offer generation module.<\/p>\n<p>If these are the same users as the CRM, then it must be determined whether the CRM&rsquo;s role and permissions management capability is sufficient to control access to the various sections of the functionality to be developed.<\/p>\n<p>&nbsp;<\/p>\n<h3><strong>2.\u00a0\u00a0\u00a0\u00a0\u00a0 Necessary bridges with existing systems<\/strong><\/h3>\n<p>Interconnectivity with existing business systems is an important consideration especially if we have opted for a CRM Cloud solution that is outside of the organization&rsquo;s IT environment. Bridges must be created with the enterprise systems and according to the security rules in place, these bridges will not always be easy to build.<\/p>\n<p>In our example, we need to enter financial data into one of the enterprise systems in order to obtain a credit rating.<\/p>\n<p>Once the letter of offer has been accepted, the data will also need to be transferred to another system, which is responsible for managing the loan.<\/p>\n<p>The more recent the business systems are, the easier it will be to create powerful and secure interfaces. Unfortunately, this is not often the case and the development of \u00ab\u00a0bridge connectors\u00a0\u00bb can be difficult.<\/p>\n<p>&nbsp;<\/p>\n<h3><strong>3.\u00a0\u00a0\u00a0\u00a0\u00a0 The size of the feature?<\/strong><\/h3>\n<p>The purpose here is to help us determine where and with which technology the new feature should be developed.<\/p>\n<p>In our example, the requirement is the generation of a letter of offer, in contrast, the vision is the increasingly comprehensive automation of the financing process. So, the size of this functionality will tend to become larger and larger.<\/p>\n<p>&nbsp;<\/p>\n<h3><strong>4.\u00a0\u00a0\u00a0\u00a0\u00a0 Backup of data?<\/strong><\/h3>\n<p>In point 2 above, we have indicated that some data must be entered, others must come from the enterprise systems.<\/p>\n<p>The amount of data that will be required, the vision of the functionality to be developed (size) as well as the security required for some of the data will influence the choice of the data warehouse.<\/p>\n<p>Many organizations save data in CRM without really analyzing this aspect too much. This is a big mistake because despite the great flexibility of a CRM, it will never provide the same power of as a database like SQL.<\/p>\n<p>In our example, considering the vision and the amount of data required, you will understand that a database independent of the CRM was favoured. In this case, an SQL database \u00ab\u00a0on the premises\u00a0\u00bb but which could just as well have been an SQL Cloud service.<\/p>\n<p>&nbsp;<\/p>\n<h3><strong>5.\u00a0\u00a0\u00a0\u00a0\u00a0 Within which technological environment should the automation of a process be carried out?<\/strong><\/h3>\n<p>&#8211; Directly in the CRM or in proprietary code of the company<\/p>\n<p>If the functionality to be developed is \u00ab\u00a0glued\u00a0\u00bb to the CRM or if it is a customization of the CRM, the choice is easy to make; the functionality is developed in the CRM.<\/p>\n<p>On the other hand, as we mentioned earlier, too many companies undertake major developments in their CRM and become \u00ab\u00a0prisoners\u00a0\u00bb of it and sometimes even of a version of it.<\/p>\n<p>You will understand that in the case of our example, the choice was fixed in advance for several reasons:<\/p>\n<p>&#8211; The vision of the functionalities to be developed will be potentially great<\/p>\n<p>&#8211; The organization does not want to become a prisoner of its CRM and its future developments.<\/p>\n<p>&#8211; Critical data must be safeguarded<\/p>\n<p>&#8211; In time, more users than those who have access to CRM will be needed.<\/p>\n<p>Even though the CRM is Salesforce, the organization&rsquo;s IT environment is Microsoft, it is imperative to develop proprietary code that belongs to the organization with technology that allows for future evolution and whose specificities will not require \u00ab\u00a0tricks\u00a0\u00bb to be programmed.<\/p>\n<p>&nbsp;<\/p>\n<h3><strong>6.\u00a0\u00a0\u00a0\u00a0\u00a0 Does the functionality need to be available in mobility?<\/strong><\/h3>\n<p>Of course, today a lot of applications are Web-based and for many, a good Web application will also be Mobile. This is indeed true for a simple application that manipulates little data and does not have complex business rules.<\/p>\n<p>In our experience, in order to properly meet \u00ab\u00a0mobile\u00a0\u00bb needs, it is often preferable to program only the features that really need to be mobile, so as to provide a good customer experience for both the Web user and the Mobile user.<\/p>\n<p>&nbsp;<\/p>\n<h3><strong>7.\u00a0\u00a0\u00a0\u00a0\u00a0 Can the functionality access sensitive data?<\/strong><\/h3>\n<p>Functionality that needs to handle and store sensitive data, such as a Social Insurance Number, must be programmed to higher standards, its development will not run the same way.<\/p>\n<p>Do we want the data to be encrypted, within the database? During transfers between the database and the user&rsquo;s screen? Will this data be automatically erased for a client that has been inactive for several years? Who can have access to this data? With what rights?<\/p>\n<p>&nbsp;<\/p>\n<h3><strong>8.\u00a0\u00a0\u00a0\u00a0\u00a0 Security management of the process<\/strong><\/h3>\n<p>IT environments are becoming more and more complex and we often find hybrid environments at our customers&rsquo;; \u00ab\u00a0On the premises\u00a0\u00bb, \u00ab\u00a0Cloud\u00a0\u00bb, \u201cWeb\u201d, \u201cMobile\u201d or \u201cWindows\u201d.<\/p>\n<p>We&rsquo;ve all heard about stolen data in recent months, and this in high-profile organizations.<\/p>\n<p>Security is now much more than a good architecture of the login\/password mechanism and good management of roles and permissions.<\/p>\n<p>Security management must be found at all stages of the software development process, from requirements definition to deployment of the solution.<\/p>\n<p>At the same time, we want to make things easier for users; we will not want a user who has just \u00ab\u00a0logged in\u00a0\u00bb to his CRM to have to relog to perform a function outside of the CRM.<\/p>\n<p>Nor will we want a smart guy to manually enter a URL address to access a feature that he would not normally have access to if he had been in the application.<\/p>\n<p>Nor would we want to open the firewall of the mobile application that wants to retrieve data from enterprise systems.<\/p>\n<p>These are just a few examples. The necessary level of security in the organization will dictate the \u00ab\u00a0acceptable\u00a0\u00bb risks and impose limits on the data or functionality that can be exposed.<\/p>\n<p>&nbsp;<\/p>\n<h3><strong>Conclusion<\/strong><\/h3>\n<p>Once again, the 8 elements covered in this post are only a preview to get you started on your digital turn. Hopefully, this will allow you to ask the right questions to the various people involved in your project.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Happy Digital Transformation!<\/strong><\/p>\n<!-- AddThis Advanced Settings generic via filter on the_content --><!-- AddThis Share Buttons generic via filter on the_content -->","protected":false},"excerpt":{"rendered":"<p>Here are a few considerations for the automation of a process within Digital Transformation. In general, a digital transformation plan will be a multi-stage process that will affect many aspects of the organization.\u00a0 For example: &#8211; Implementing or replacing a CRM &#8211; Implementation or replacement of an ERP &#8211; Implementation or replacement of a management&#8230;  <a class=\"excerpt-read-more\" href=\"https:\/\/analystik.ca\/blogue\/language\/en\/automation-process-within-digital-transformation\/\" title=\"Read Automation of a Process Within Digital Transformation\">Read more &raquo;<\/a><!-- AddThis Advanced Settings generic via filter on wp_trim_excerpt --><!-- AddThis Share Buttons generic via filter on wp_trim_excerpt --><\/p>\n","protected":false},"author":10,"featured_media":12256,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_seopress_robots_primary_cat":"","_seopress_titles_title":"Automation of a process within Digital Transformation","_seopress_titles_desc":"Considerations for the automation of a process within Digital Transformation which is a multi-stage process affecting many aspects of the organization","_seopress_robots_index":"","content-type":"","footnotes":""},"categories":[3421,3425],"tags":[],"better_featured_image":{"id":12256,"alt_text":"processus","caption":"","description":"processus","media_type":"image","media_details":{"width":2880,"height":1620,"file":"2019\/05\/process2.jpg","sizes":{"thumbnail":{"file":"process2-63x63.jpg","width":63,"height":63,"mime-type":"image\/jpeg","source_url":"https:\/\/analystik.ca\/blogue\/wp-content\/uploads\/2019\/05\/process2-63x63.jpg"},"medium":{"file":"process2-300x169.jpg","width":300,"height":169,"mime-type":"image\/jpeg","source_url":"https:\/\/analystik.ca\/blogue\/wp-content\/uploads\/2019\/05\/process2-300x169.jpg"},"medium_large":{"file":"process2-768x432.jpg","width":768,"height":432,"mime-type":"image\/jpeg","source_url":"https:\/\/analystik.ca\/blogue\/wp-content\/uploads\/2019\/05\/process2-768x432.jpg"},"large":{"file":"process2-1024x576.jpg","width":1024,"height":576,"mime-type":"image\/jpeg","source_url":"https:\/\/analystik.ca\/blogue\/wp-content\/uploads\/2019\/05\/process2-1024x576.jpg"},"bones-thumb-2880":{"file":"process2-2880x1620.jpg","width":2880,"height":1620,"mime-type":"image\/jpeg","source_url":"https:\/\/analystik.ca\/blogue\/wp-content\/uploads\/2019\/05\/process2-2880x1620.jpg"},"bones-thumb-1920":{"file":"process2-1920x1271.jpg","width":1920,"height":1271,"mime-type":"image\/jpeg","source_url":"https:\/\/analystik.ca\/blogue\/wp-content\/uploads\/2019\/05\/process2-1920x1271.jpg"},"bones-thumb-1536":{"file":"process2-1536x1016.jpg","width":1536,"height":1016,"mime-type":"image\/jpeg","source_url":"https:\/\/analystik.ca\/blogue\/wp-content\/uploads\/2019\/05\/process2-1536x1016.jpg"},"bones-thumb-960":{"file":"process2-960x635.jpg","width":960,"height":635,"mime-type":"image\/jpeg","source_url":"https:\/\/analystik.ca\/blogue\/wp-content\/uploads\/2019\/05\/process2-960x635.jpg"},"bones-thumb-600":{"file":"process2-600x397.jpg","width":600,"height":397,"mime-type":"image\/jpeg","source_url":"https:\/\/analystik.ca\/blogue\/wp-content\/uploads\/2019\/05\/process2-600x397.jpg"},"bones-thumb-300":{"file":"process2-300x199.jpg","width":300,"height":199,"mime-type":"image\/jpeg","source_url":"https:\/\/analystik.ca\/blogue\/wp-content\/uploads\/2019\/05\/process2-300x199.jpg"},"post-thumbnail":{"file":"process2-125x125.jpg","width":125,"height":125,"mime-type":"image\/jpeg","source_url":"https:\/\/analystik.ca\/blogue\/wp-content\/uploads\/2019\/05\/process2-125x125.jpg"}},"image_meta":{"aperture":"0","credit":"","camera":"","caption":"","created_timestamp":"0","copyright":"","focal_length":"0","iso":"0","shutter_speed":"0","title":"","orientation":"0","keywords":[]}},"post":null,"source_url":"https:\/\/analystik.ca\/blogue\/wp-content\/uploads\/2019\/05\/process2.jpg"},"_links":{"self":[{"href":"https:\/\/analystik.ca\/blogue\/wp-json\/wp\/v2\/posts\/12353"}],"collection":[{"href":"https:\/\/analystik.ca\/blogue\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/analystik.ca\/blogue\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/analystik.ca\/blogue\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/analystik.ca\/blogue\/wp-json\/wp\/v2\/comments?post=12353"}],"version-history":[{"count":1,"href":"https:\/\/analystik.ca\/blogue\/wp-json\/wp\/v2\/posts\/12353\/revisions"}],"predecessor-version":[{"id":12354,"href":"https:\/\/analystik.ca\/blogue\/wp-json\/wp\/v2\/posts\/12353\/revisions\/12354"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/analystik.ca\/blogue\/wp-json\/wp\/v2\/media\/12256"}],"wp:attachment":[{"href":"https:\/\/analystik.ca\/blogue\/wp-json\/wp\/v2\/media?parent=12353"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/analystik.ca\/blogue\/wp-json\/wp\/v2\/categories?post=12353"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/analystik.ca\/blogue\/wp-json\/wp\/v2\/tags?post=12353"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}