Welcome to the World of Process Mining

Drive Results
Target Process Improvements Without Guesswork
Simulate Process Changes
Make better decisions Based on Data
Provide Accurate Inputs
Into Other Simulation Platforms
Lightning Fast
Detailed, Accurate BMPN Diagrams from Log Data or Data Exhaust
Descriptive Statistics
Enable Data-driven KPIs Ready for download
Visualize Your Processes
Detailed, Accurate BMPN Diagrams from Log Data or Data Exhaust

Help Background

Welcome to process mining.  This guide gives a brief tour and explains the features of this cloud process mining software solution.

Process mining is a powerful emerging AI/ML technique with expansive use cases throughout the corporate & government world.

The first and most obvious use case is greatly speeding the discovery and accuracy of process models.  But that is just the tip of the iceberg.

In a very general sense, it reduces the costs associated with managing and operating modern organizations, and it helps organizations make effective use of finite resources by understanding their processes in a quantifiable, data driven, repeatable, scalable, and sliceable fashion.  Process mining, aka “Automated Process Discovery,” is platform agnostic.  It analyzes IT system log data or “data exhaust” and surfaces latent processes within the data.  Compared to traditional interview-based process mapping methodologies, process mining learns processes in a fraction of the time.  This allows organizations to quickly understand their processes, shorten process times, target improvements without guesswork, re-measure the outcome, simulate change assumptions, and adopt additional bleeding edge technologies like robotic process automation (RPA).  Continuous data-driven process improvement.  Very powerful.  The use cases are tremendous — from quickly understanding and fixing discrete processes to continual compliance/audit monitoring to enterprise digital transformation (DX) efforts to improving the lethality of joint warfighting systems — any organization that relies upon information technology systems to operate would benefit from this technique.

Process mining uses AI/ML to extract existing data from IT systems and visually reconstructs how processes actually perform. It creates full transparency and enables you to drive efficiency, quality and productivity across your entire organization.

It works for any industry, any organization, any process.

On the home screen, you will see a login box. Place your login credentials here or contact us to request an account.

Importing Data

You may import data as Comma Separated Values (CSV) or IEEE XES format.  XES, or eXtensible Event Stream, format defines a grammar for a tag-based language whose aim is to provide designers of information systems with a unified and extensible methodology for capturing systems behaviors by means of event logs and event streams.

You may upload your own data or use any of our test data in our example data repository. The repository also contains a CSV template for you to create an analyzable log file from your own data. If you upload your own data in CSV format, please be sure the file is sorted by CASE ID and then TIMESTAMP.

Upload Limits: Free software accounts are limited to uploads which are less than 100MB. Contact us for larger requirements.

Multiple Uploads: You may upload and process several files simultaneously. To do so, open multiple Import screen tabs within the same web browser instance, and then upload one file into each tab. 

Please Note: You must be logged into the cloud solution in order to access and download the example log files.

Depending upon the size and the complexity of the example log data you use, it may take up to five (5) minutes for your results to appear. Please be patient.

Use Your Own Data Template

If you would like to use your own data, then you may do so.  There is a CSV Template.  It is important, however, that your data are formatted properly.  You must have three data elements, structured as follows:

Case ID: This Case Identifier is the unique number assigned to each case in your log.  It could be a job applicant ID, or a repair order ID, etc.

Start Time: Date time format, for example 3/22/2018 14:59.

Activity: These are all of the activities associated with your process.  In a call center environment, some of these activities might include: Call Inbound or Outbound, Email Inbound or Outbound, Handle Case, Handle Email, etc.

Projects and Analysis Results

Depending upon the size and the complexity of the example log data you use, it may take up to five (5) minutes for your results to appear. Please be patient.

Project Folder

In this space, previously uploaded files and corresponding results are listed in their own directories.  Analyses are performed automatically after a file is uploaded.

Analysis Results

After your process mining analysis is complete, you will have the following items available in the corresponding directory:

Model Descriptive Statistics and Probability Distributions:  Our log analytics engine produces a number of descriptive statistics and probability distributions, which are useful for understanding the process and simulating changes to the ecosystem.  These data are presented as a color-coded heat map tables for easily understanding relative values.  For example, it is might be important to know which process activities take the longest; this table helps highlight such information.  Please see the Appendix for additional details.

Interactive Sankey Diagram: This diagram provides a view of information flow through the ecosystem. In a sankey diagram, the width of the arrows or connecting lines are proportional to the flow rate. The diagram changes dynamically when the user selects different model descriptive statistics tables.

Narrative Description/Commentary:  This high-level narrative identifies some of the prominent findings from in the discovered process model. For example, the number of observed process cases, activities which take the longest, and capacity estimates. For example:

This process model was created by analyzing 608 cases. The average case time is 21.46 days, and the median case time is 11.92 days. The min case time is 10.70 hours. The max case time is 108.31 days. It appears that the case durations are log normal skewed to the right. There were 18238 total events processed. The activities which were estimated to take the longest amount of time are “Analyze Request for Quotation” at 6.94 days and “Deliver Goods Services” at 3.89 days. There were an average of 30.0 events per case, and a median of 36.0 events per case. There were a max of 88 events per case and a min of 4. The most frequent activities are “Analyze Request for Quotation” at 1107 sojourns and “Create Purchase Requisition” at 1107 sojourns. The process activities with the highest capacity estimates are “Deliver Goods Services” and “Send invoice.”

BPMN:  This file contains the XML code which represents the found process model, according to our algorithm.  This file may be imported into popular programs, such as Microsoft® Office Visio® for further editing and analysis.  Additionally, this file may also be imported into the web-based BPMN Modeler tool for additional visualizing and editing. To import your BPMN diagram into this tool: 1) right-click on the link with the “.bpmn” extension and copy the link, 2) go to the BPMN Modeler tool, 3) select “Open”, 4) paste the link text, 5) select or OK. Your BPMN diagram should appear in an editable format.

BPMN Diagram:  The process model image is also visible in BPMN format diagram.


Downloadable Statistics:  These statistics may also be downloaded in Microsoft® Office Excel® or CSV format.

XES:  You will also see your uploaded log analysis data.  If you imported a Microsoft® Office Excel® spreadsheet or a CSV file, that file has been converted into XES or eXtensible Event Stream format. XES was adopted in 2010 by the IEEE Task Force on Process Mining as the standard format for logging events.

BPMN Social Network and Distance Metrics: Various network distance and centrality metrics are presented which help describe the process ecosystem further. See the Appendix for additional details.

A Word About Data Privacy and Security

We take your data privacy & security very seriously, and aspire to the highest industry security standards This site is intended to give you a taste of what we can do with your data. If you have data & privacy concerns, free to reach out and contact us & let’s talk about our data security efforts!


We welcome feedback and suggestions for improvement.  You may submit feedback any time here.  If you encounter an issue which is not addressed in this manual, please contact us right away.