Skip to main content

Optimizing Business Processes with BTM

The Role of Business Transaction Management

Gartner's Senior VP Research, Peter Sondergaard, recently spoke at Gartner Symposium 2010 about four trends changing computing. As part of this, he emphasized that, while IT departments have been internally focused on optimizing internal processes and costs for the past 20 years, it’s now more about IT’s involvement in optimizing business processes.

IT’s forward motion towards optimizing business processes and controlling their costs is aimed at empowering businesses to be more competitive at a lower cost and with an improved customer experience. This is crucial in today’s economy.

The key here is to enable IT teams to instantly see technology issues situationally in the context of their business and to automatically predict, and even prevent, the issue’s business impact. This allows companies to optimize the IT implementation of their business processes, and as a result, achieve greater productivity at a lower cost.

The Great Convergence

IT thought leaders have begun to realize that in order to successfully optimize business processes, they need to converge the disciplines of Business Transaction Management (BTM), Application Performance Management (APM) and Complex Event Processing (CEP). This convergence enables the correlation of operational metrics for IT applications, middleware and infrastructure with the real-time visibility into business transactions and the business processes they comprise.

Using this new convergence, businesses can avoid the all too common scenario where, following a serious technology problem, representatives from each IT silo gather in a room for several hours to determine what the root cause of the problem was with no clear consensus on whether this problem is of IT interest only or in fact impacts an important business process.

More effectively, this new approach uses the CEP engine at its core to constantly scan for patterns foretelling a transaction is heading for a “business abnormal” state and thus, via an “early warning system,” prevent the unnecessary costs optimization involved in cleaning up the damage of a transactional mishap.

Typically, when IT staff resolves a complex problem, they describe the resolution and share this process with the other members of support. The next time the problem occurs, this resolution is reused by the assigned member of support. This is a reactive approach, and an expensive one. While the mean-time-to-repair the problem is reduced after the first occurrence, support is still utilizing a manual process to detect, and then resolve, the problem. The side effect of this might be personally painful where an IT administrator is woken up two days in a row to deal with the same problem. At this point a problem has been detected, a ticket is open and most likely users and business processes are already impacted. This is an expensive approach to problem management.

A better approach would be the following: after the first time the problem has occurred, it could be described as a situation to the converged BTM solution along with appropriate business rules describing how to resolve this issue before it has business impact. This approach is, in effect, adding inference in order to predict problems, the ultimate key to being proactive monitoring of business transactions and the business processes they realize.

In this scenario, the pattern describing the problem is detected and immediately, an automated resolution is initiated before users are impacted or a business process is disrupted. Essentially, the mean-time-to-know a multi-tier composite application is no longer performing or behaving within a business normal state and the mean-time-to-react to the issue have both been reduced. Furthermore, the impact of the problem has been prevented via automated dynamic invocation of business rules. This is a much better business outcome with contained cost, but one that can only be leveraged when utilizing a solution that can, in real-time, detect the patterns and dependencies occurring across your complex composite applications and dynamically take action.

Over time, the system’s capabilities and value continuously improve. This approach continues to help optimize business processes by automatically learning and adjusting to what is normal and abnormal for your business via analysis of the real-time data provided by BTM and its integration with legacy event monitoring systems. Imagine a spiral where a complex problem occurs; its resolution is specified and over time, the system is learning to behave better and to handle more issues automatically. The 360-degree situational awareness this provides reduces costs and streamlines business processes and does this in a cycle of continuous availability improvement. The key points here are an increase in automation, prediction, prevention and a resultant decrease in operational cost and business process disruption.

Calculating ROI on the Ground and in the Clouds

Cloud Computing, one of the four trends Sondergaard discussed, is no longer a future direction and is being readily implemented today. While the benefits of Cloud Computing are many, the difficulty in managing the availability and performance of applications, business transactions and the business processes they actualize becomes incalculably more difficult to do. Why? This complexity is due to the very benefit of flexibility the Cloud provides – elasticity through virtualization. It is now much harder to achieve the 360-degree situational awareness a business needs in order to reduce support costs, improve service levels and achieve its desired ROI. In a Cloud Computing environment, the challenge of transaction, application and middleware message detection in real-time is much harder to do as the number of places they can be greatly expands and may constantly be in flux.

So how does one assess the benefits of business transaction management and whether or not it is yielding results in terms of optimizing business processes? ROI is calculated by a reduction in capital and operational expenditures, an avoidance of the lost revenue hidden in order fallout and customer attrition. This translates into the following benefits: fewer tickets at the service desk - reducing labor costs, improved customer experience - preserving customer loyalty, reduced disruption to business processes - maintaining profitability and compliance with service level agreements - steering clear of penalties.

Achieving these benefits enables a business to focus on using IT as it was intended for - to deliver more services to customers, grow market share and no longer spend the majority of the time and money allocated to IT on merely fixing problems in order to maintain current availability and performance levels.

In summary, with the recent worldwide recession, layoffs and cost-cutting efforts have turned the spotlight on IT infrastructure and how utilizing advancements in enterprise technology can optimize business processes. This new thought-leading approach to converging BTM with CEP and APM helps IT personnel find ways to squeeze stealth waste out of business processes by providing the full visibility prediction and performance that is necessary to reduce costs, improve service and manage risk.

About Charley Rich

Charley Rich is VP Product Management and Marketing at Nastel Technologies and has over 28 years of technical, hands-on experience working with large-scale customers to meet their application and systems management requirements. Prior to joining Nastel, Charley was Product Manager for IBM's Tivoli Application Dependency Discovery Manager software, where he co-authored an IBM Redbook, charted the product roadmap, managed an agile requirements process and was recognized for his accomplishments by winning the Tivoli General Manager's Award. Recently, Charley was granted a patent for an Application Discovery and Monitoring process.

Related Links:

www.nastel.com

The Latest

Traditional observability requires users to leap across different platforms or tools for metrics, logs, or traces and related issues manually, which is very time-consuming, so as to reasonably ascertain the root cause. Observability 2.0 fixes this by unifying all telemetry data, logs, metrics, and traces into a single, context-rich pipeline that flows into one smart platform. But this is far from just having a bunch of additional data; this data is actionable, predictive, and tied to revenue realization ...

64% of enterprise networking teams use internally developed software or scripts for network automation, but 61% of those teams spend six or more hours per week debugging and maintaining them, according to From Scripts to Platforms: Why Homegrown Tools Dominate Network Automation and How Vendors Can Help, my latest EMA report ...

Cloud computing has transformed how we build and scale software, but it has also quietly introduced one of the most persistent challenges in modern IT: cost visibility and control ... So why, after more than a decade of cloud adoption, are cloud costs still spiraling out of control? The answer lies not in tooling but in culture ...

CEOs are committed to advancing AI solutions across their organization even as they face challenges from accelerating technology adoption, according to the IBM CEO Study. The survey revealed that executive respondents expect the growth rate of AI investments to more than double in the next two years, and 61% confirm they are actively adopting AI agents today and preparing to implement them at scale ...

Image
IBM

 

A major architectural shift is underway across enterprise networks, according to a new global study from Cisco. As AI assistants, agents, and data-driven workloads reshape how work gets done, they're creating faster, more dynamic, more latency-sensitive, and more complex network traffic. Combined with the ubiquity of connected devices, 24/7 uptime demands, and intensifying security threats, these shifts are driving infrastructure to adapt and evolve ...

Image
Cisco

The development of banking apps was supposed to provide users with convenience, control and piece of mind. However, for thousands of Halifax customers recently, a major mobile outage caused the exact opposite, leaving customers unable to check balances, or pay bills, sparking widespread frustration. This wasn't an isolated incident ... So why are these failures still happening? ...

Cyber threats are growing more sophisticated every day, and at their forefront are zero-day vulnerabilities. These elusive security gaps are exploited before a fix becomes available, making them among the most dangerous threats in today's digital landscape ... This guide will explore what these vulnerabilities are, how they work, why they pose such a significant threat, and how modern organizations can stay protected ...

The prevention of data center outages continues to be a strategic priority for data center owners and operators. Infrastructure equipment has improved, but the complexity of modern architectures and evolving external threats presents new risks that operators must actively manage, according to the Data Center Outage Analysis 2025 from Uptime Institute ...

As observability engineers, we navigate a sea of telemetry daily. We instrument our applications, configure collectors, and build dashboards, all in pursuit of understanding our complex distributed systems. Yet, amidst this flood of data, a critical question often remains unspoken, or at best, answered by gut feeling: "Is our telemetry actually good?" ... We're inviting you to participate in shaping a foundational element for better observability: the Instrumentation Score ...

We're inching ever closer toward a long-held goal: technology infrastructure that is so automated that it can protect itself. But as IT leaders aggressively employ automation across our enterprises, we need to continuously reassess what AI is ready to manage autonomously and what can not yet be trusted to algorithms ...

Optimizing Business Processes with BTM

The Role of Business Transaction Management

Gartner's Senior VP Research, Peter Sondergaard, recently spoke at Gartner Symposium 2010 about four trends changing computing. As part of this, he emphasized that, while IT departments have been internally focused on optimizing internal processes and costs for the past 20 years, it’s now more about IT’s involvement in optimizing business processes.

IT’s forward motion towards optimizing business processes and controlling their costs is aimed at empowering businesses to be more competitive at a lower cost and with an improved customer experience. This is crucial in today’s economy.

The key here is to enable IT teams to instantly see technology issues situationally in the context of their business and to automatically predict, and even prevent, the issue’s business impact. This allows companies to optimize the IT implementation of their business processes, and as a result, achieve greater productivity at a lower cost.

The Great Convergence

IT thought leaders have begun to realize that in order to successfully optimize business processes, they need to converge the disciplines of Business Transaction Management (BTM), Application Performance Management (APM) and Complex Event Processing (CEP). This convergence enables the correlation of operational metrics for IT applications, middleware and infrastructure with the real-time visibility into business transactions and the business processes they comprise.

Using this new convergence, businesses can avoid the all too common scenario where, following a serious technology problem, representatives from each IT silo gather in a room for several hours to determine what the root cause of the problem was with no clear consensus on whether this problem is of IT interest only or in fact impacts an important business process.

More effectively, this new approach uses the CEP engine at its core to constantly scan for patterns foretelling a transaction is heading for a “business abnormal” state and thus, via an “early warning system,” prevent the unnecessary costs optimization involved in cleaning up the damage of a transactional mishap.

Typically, when IT staff resolves a complex problem, they describe the resolution and share this process with the other members of support. The next time the problem occurs, this resolution is reused by the assigned member of support. This is a reactive approach, and an expensive one. While the mean-time-to-repair the problem is reduced after the first occurrence, support is still utilizing a manual process to detect, and then resolve, the problem. The side effect of this might be personally painful where an IT administrator is woken up two days in a row to deal with the same problem. At this point a problem has been detected, a ticket is open and most likely users and business processes are already impacted. This is an expensive approach to problem management.

A better approach would be the following: after the first time the problem has occurred, it could be described as a situation to the converged BTM solution along with appropriate business rules describing how to resolve this issue before it has business impact. This approach is, in effect, adding inference in order to predict problems, the ultimate key to being proactive monitoring of business transactions and the business processes they realize.

In this scenario, the pattern describing the problem is detected and immediately, an automated resolution is initiated before users are impacted or a business process is disrupted. Essentially, the mean-time-to-know a multi-tier composite application is no longer performing or behaving within a business normal state and the mean-time-to-react to the issue have both been reduced. Furthermore, the impact of the problem has been prevented via automated dynamic invocation of business rules. This is a much better business outcome with contained cost, but one that can only be leveraged when utilizing a solution that can, in real-time, detect the patterns and dependencies occurring across your complex composite applications and dynamically take action.

Over time, the system’s capabilities and value continuously improve. This approach continues to help optimize business processes by automatically learning and adjusting to what is normal and abnormal for your business via analysis of the real-time data provided by BTM and its integration with legacy event monitoring systems. Imagine a spiral where a complex problem occurs; its resolution is specified and over time, the system is learning to behave better and to handle more issues automatically. The 360-degree situational awareness this provides reduces costs and streamlines business processes and does this in a cycle of continuous availability improvement. The key points here are an increase in automation, prediction, prevention and a resultant decrease in operational cost and business process disruption.

Calculating ROI on the Ground and in the Clouds

Cloud Computing, one of the four trends Sondergaard discussed, is no longer a future direction and is being readily implemented today. While the benefits of Cloud Computing are many, the difficulty in managing the availability and performance of applications, business transactions and the business processes they actualize becomes incalculably more difficult to do. Why? This complexity is due to the very benefit of flexibility the Cloud provides – elasticity through virtualization. It is now much harder to achieve the 360-degree situational awareness a business needs in order to reduce support costs, improve service levels and achieve its desired ROI. In a Cloud Computing environment, the challenge of transaction, application and middleware message detection in real-time is much harder to do as the number of places they can be greatly expands and may constantly be in flux.

So how does one assess the benefits of business transaction management and whether or not it is yielding results in terms of optimizing business processes? ROI is calculated by a reduction in capital and operational expenditures, an avoidance of the lost revenue hidden in order fallout and customer attrition. This translates into the following benefits: fewer tickets at the service desk - reducing labor costs, improved customer experience - preserving customer loyalty, reduced disruption to business processes - maintaining profitability and compliance with service level agreements - steering clear of penalties.

Achieving these benefits enables a business to focus on using IT as it was intended for - to deliver more services to customers, grow market share and no longer spend the majority of the time and money allocated to IT on merely fixing problems in order to maintain current availability and performance levels.

In summary, with the recent worldwide recession, layoffs and cost-cutting efforts have turned the spotlight on IT infrastructure and how utilizing advancements in enterprise technology can optimize business processes. This new thought-leading approach to converging BTM with CEP and APM helps IT personnel find ways to squeeze stealth waste out of business processes by providing the full visibility prediction and performance that is necessary to reduce costs, improve service and manage risk.

About Charley Rich

Charley Rich is VP Product Management and Marketing at Nastel Technologies and has over 28 years of technical, hands-on experience working with large-scale customers to meet their application and systems management requirements. Prior to joining Nastel, Charley was Product Manager for IBM's Tivoli Application Dependency Discovery Manager software, where he co-authored an IBM Redbook, charted the product roadmap, managed an agile requirements process and was recognized for his accomplishments by winning the Tivoli General Manager's Award. Recently, Charley was granted a patent for an Application Discovery and Monitoring process.

Related Links:

www.nastel.com

The Latest

Traditional observability requires users to leap across different platforms or tools for metrics, logs, or traces and related issues manually, which is very time-consuming, so as to reasonably ascertain the root cause. Observability 2.0 fixes this by unifying all telemetry data, logs, metrics, and traces into a single, context-rich pipeline that flows into one smart platform. But this is far from just having a bunch of additional data; this data is actionable, predictive, and tied to revenue realization ...

64% of enterprise networking teams use internally developed software or scripts for network automation, but 61% of those teams spend six or more hours per week debugging and maintaining them, according to From Scripts to Platforms: Why Homegrown Tools Dominate Network Automation and How Vendors Can Help, my latest EMA report ...

Cloud computing has transformed how we build and scale software, but it has also quietly introduced one of the most persistent challenges in modern IT: cost visibility and control ... So why, after more than a decade of cloud adoption, are cloud costs still spiraling out of control? The answer lies not in tooling but in culture ...

CEOs are committed to advancing AI solutions across their organization even as they face challenges from accelerating technology adoption, according to the IBM CEO Study. The survey revealed that executive respondents expect the growth rate of AI investments to more than double in the next two years, and 61% confirm they are actively adopting AI agents today and preparing to implement them at scale ...

Image
IBM

 

A major architectural shift is underway across enterprise networks, according to a new global study from Cisco. As AI assistants, agents, and data-driven workloads reshape how work gets done, they're creating faster, more dynamic, more latency-sensitive, and more complex network traffic. Combined with the ubiquity of connected devices, 24/7 uptime demands, and intensifying security threats, these shifts are driving infrastructure to adapt and evolve ...

Image
Cisco

The development of banking apps was supposed to provide users with convenience, control and piece of mind. However, for thousands of Halifax customers recently, a major mobile outage caused the exact opposite, leaving customers unable to check balances, or pay bills, sparking widespread frustration. This wasn't an isolated incident ... So why are these failures still happening? ...

Cyber threats are growing more sophisticated every day, and at their forefront are zero-day vulnerabilities. These elusive security gaps are exploited before a fix becomes available, making them among the most dangerous threats in today's digital landscape ... This guide will explore what these vulnerabilities are, how they work, why they pose such a significant threat, and how modern organizations can stay protected ...

The prevention of data center outages continues to be a strategic priority for data center owners and operators. Infrastructure equipment has improved, but the complexity of modern architectures and evolving external threats presents new risks that operators must actively manage, according to the Data Center Outage Analysis 2025 from Uptime Institute ...

As observability engineers, we navigate a sea of telemetry daily. We instrument our applications, configure collectors, and build dashboards, all in pursuit of understanding our complex distributed systems. Yet, amidst this flood of data, a critical question often remains unspoken, or at best, answered by gut feeling: "Is our telemetry actually good?" ... We're inviting you to participate in shaping a foundational element for better observability: the Instrumentation Score ...

We're inching ever closer toward a long-held goal: technology infrastructure that is so automated that it can protect itself. But as IT leaders aggressively employ automation across our enterprises, we need to continuously reassess what AI is ready to manage autonomously and what can not yet be trusted to algorithms ...