Rules within an Enterprise

Slides:



Advertisements
Similar presentations
Copyright © 2008 Accenture All Rights Reserved. Accenture, its logo, and High Performance Delivered are trademarks of Accenture. Andrew Stone Common Security.
Advertisements

© 2004 Visible Systems Corporation. All rights reserved. 1 (800) 6VISIBLE Holistic View of the Enterprise Business Development Operations.
Building Enterprise Applications Using Visual Studio ®.NET Enterprise Architect.
Software Configuration Management
SE 555 Software Requirements & Specification Requirements Management.
DITSCAP Phase 2 - Verification Pramod Jampala Christopher Swenson.
Software Process and Product Metrics
Configuration Management
DBMS1 Database Management System (DBMS) Introductory Concepts Week-1.
Information Systems Controls for System Reliability -Information Security-
Database Auditing Models Dr. Gabriel. 2 Auditing Overview Audit examines: documentation that reflects (from business or individuals); actions, practices,
Chapter 7 Database Auditing Models
Patch Management Strategy
Application of SAS®! Enterprise Miner™ in Credit Risk Analytics
© 2010 Plexent – All rights reserved. 1 Change –The addition, modification or removal of approved, supported or baselined CIs Request for Change –Record.
© Joseph F Iaquinto, PE May 14, © Joseph F Iaquinto, PE May 14, 2012 EAI / SOA Composite System A System Engineering Approach.
Global Quality Operations Sustaining Quality ^ : Why is Quality Good for Business? Diane E. Bergeron Vice President Global Quality Operations Schering-Plough.
Efficient BI Solution Presented by: Leo Khaskin, PowerCubes Lab Value of Information as Business Asset.
Database Design, Application Development, and Administration, 5 th Edition Copyright © 2011 by Michael V. Mannino All rights reserved. Chapter 2 Introduction.
1 IBM Software Group ® Mastering Object-Oriented Analysis and Design with UML 2.0 Module 1: Best Practices of Software Engineering.
1 Introduction to Database Systems. 2 Database and Database System / A database is a shared collection of logically related data designed to meet the.
© 2013 Visible Systems Corporation. All rights reserved. 1 (800) 6VISIBLE Achievement of an Integrated Applications Environment Enterprise.
Service Transition & Planning Service Validation & Testing
IT Requirements Management Balancing Needs and Expectations.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 7 Database Auditing Models.
Lecture 7: Requirements Engineering
Middleware for FIs Apeego House 4B, Tardeo Rd. Mumbai Tel: Fax:
C6 Databases. 2 Traditional file environment Data Redundancy and Inconsistency: –Data redundancy: The presence of duplicate data in multiple data files.
Slide 1 Product Line Studio TM Features used for “Customization of Documents”
Configuration Management and Change Control Change is inevitable! So it has to be planned for and managed.
International Security Management Standards. BS ISO/IEC 17799:2005 BS ISO/IEC 27001:2005 First edition – ISO/IEC 17799:2000 Second edition ISO/IEC 17799:2005.
IT System Administration Lesson 3 Dr Jeffrey A Robinson.
Evaluate Phase Pertemuan Matakuliah: A0774/Information Technology Capital Budgeting Tahun: 2009.
12-CRS-0106 REVISED 8 FEB 2013 APO (Align, Plan and Organise)
Non-Confidential Copyright © 2006 CyberRAVE LLC. All Rights Reserved. CyberRAVE January 24, 2006 Strategic Approach to Developing Corporate Data Insurance.
EECS David C. Chan1 Computer Security Management Session 1 How IT Affects Risks and Assurance.
© 2011 IBM Corporation ® Managing Decision services in WebSphere Message Broker using WebSphere ILOG JRules. Amar Shah Mallanagouda Patil December 2011.
Chapter 6 Internal Control in a Financial Statement Audit McGraw-Hill/IrwinCopyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved.
ARMA Boston Spring Seminar 2011 Jesse Wilkins, CRM.
OSLC PLM Workgroup1 Towards detailed use cases and alignment to OSLC V0.1 Gray Bachelor 18 th July 2011.
Copyright © 2006, Oracle. All rights reserved Rule Engine.
SQL Database Management
ITEC 275 Computer Networks – Switching, Routing, and WANs
Building Enterprise Applications Using Visual Studio®
The Premier Test Lab Management Software
Business rules.
The benefit of using Autoline for centralised service booking
Configuration Management
Software Configuration Management
Software Configuration Management
Eli Lilly and Company: Responding to Global Health Needs While Strengthening Compliance with SAP® Process Control Company ​Eli Lilly and Company Headquarters.
CIM Modeling for E&U - (Short Version)
Software Metrics 1.
Documentation control
12.3 Control Procurements The process of managing procurement relationships, monitoring contract performance and making changes or corrections as needed.
Software Configuration Management
1 The roles of actuaries & general operating environment
Chapter 4 Internal Controls McGraw-Hill/Irwin
Configuration Management
PanAust: Launching New Mining Projects Quickly and Efficiently with SAP® Business Suite powered by SAP HANA® Company PanAust Limited Headquarters Brisbane,
IBM WebSphere ILOG BRMS Release 7.1
Software Requirements
Information System and Management
An Introduction to Functional Setup Manager
Tools of Software Development
Course: Module: Lesson # & Name Instructional Material 1 of 32 Lesson Delivery Mode: Lesson Duration: Document Name: 1. Professional Diploma in ERP Systems.
DAT381 Team Development with SQL Server 2005
Chapter 11 Describing Process Specifications and Structured Decisions
Business Integration and Business Optimization in 2003
Software Configuration Management
Presentation transcript:

Rules within an Enterprise and their management with a BRMS DJ Des Jardins Technical Account Manger 630.389.9922 pdesjardins@ilog.com

What are Business Rules Example 1: IF a person is a senior citizen, THEN provide a 5% discount. Example 2: IF a person drives more than 150 miles a week to and from work, THEN add $25 to their auto insurance premium. Example 3: IF a customer invests less than $5000 THEN place the customer in the bronze level. IF a customer invests $5000 or more but less than $10,000, THEN classify the customer as silver. IF a customer invests more than $10,000, THEN consider the customer as gold. Policies & Procedures 11/19/2018 © ILOG, All rights reserved

Types of Business Rules Derivation rule: A rule that uses an algorithm to return a value. It can return any type of value that makes sense in the business context in which it is used. For example, a derivation rule may calculate a discount or compute the total price of an order. Constraint rule: A rule that confirms that an operation has met all of its obligations, and that a particular constraint or edit has been met. For instance, it may check that a value entered by an external user is within legal bounds. 11/19/2018 © ILOG, All rights reserved

? What do they “DO” Is this a valid application? What is the next step in the process? Is the loan approved? Rating? What is the “Risk”? What should the next question be in the questionnaire? Score? What is the price? What Discount should apply? 11/19/2018 © ILOG, All rights reserved

Implementation of Business Rules 11/19/2018 © ILOG, All rights reserved

© ILOG, All rights reserved Scorecard A scorecard is an executable implementation of a statistically based model for attributing a number (score) to a customer (or an account) which indicates the predicted probability that the customer will exhibit a certain behavior. 11/19/2018 © ILOG, All rights reserved

When Should Rules be Externalized Business logic volatility Turnaround times Regulatory compliance Visibility Complex processing Large number of Rules Reuse 11/19/2018 © ILOG, All rights reserved

Why Externalized Rules Explicit documentation of business practice decisions. Clearer understanding of application behavior Reuse of rules across business processes Increased consistency of business practices Decreased maintenance and testing costs Improved manageability of business practice decisions Increased confidence in predicting the business impact of changes Identify and correct conflicting business rules in different parts of the business 11/19/2018 © ILOG, All rights reserved

© ILOG, All rights reserved Business Rules Engine 11/19/2018 © ILOG, All rights reserved

Business Rules Management System BRMS Business Rules Management System 11/19/2018 © ILOG, All rights reserved

Address Needs of Enterprise Need secure, safe, easy, efficient and reliable policy change delivery 11/19/2018 © ILOG, All rights reserved

© ILOG, All rights reserved Components of a BRMS Developer Business Analyst Model Analyze Author Enterprise Rule Repository Policy Manager Validate Monitor System Administrator Test Execute Deploy Rule Administrator 11/19/2018 © ILOG, All rights reserved

© ILOG, All rights reserved BRMS 11/19/2018 © ILOG, All rights reserved

What to look for in a BRMS Authoring Plain English, Decision Table, Decision Tree Templates Managing Queries Smart Views Version Management Baseline Validating Syntactic Check Semantic Check Semantic Queries Auditing Version Management Baseline Query-based reporting Deploying Query base Extraction Rule service management Administration and configuration Authorization policies Rule Service Display Options 11/19/2018 © ILOG, All rights reserved

JRules - BRMS Need secure, safe, easy, efficient and reliable policy change delivery 11/19/2018 © ILOG, All rights reserved

© ILOG, All rights reserved JRules - BRMS Developers Business Users Rule Studio Rule Team Server Rule Scenario Manager Rule Execution Server Administrator 11/19/2018 © ILOG, All rights reserved

© ILOG, All rights reserved JRules - BRMS 11/19/2018 © ILOG, All rights reserved