Welcome to the World of Process Mining
Welcome to process mining. This guide gives a brief tour and explains the features of this cloud process mining software solution.
Process mining is a powerful emerging AI/ML technique with expansive use cases throughout the corporate & government world.
The first and most obvious use case is greatly speeding the discovery and accuracy of process models. But that is just the tip of the iceberg.
In a very general sense, it reduces the costs associated with managing and operating modern organizations, and it helps organizations make effective use of finite resources by understanding their processes in a quantifiable, data driven, repeatable, scalable, and sliceable fashion. Process mining, aka “Automated Process Discovery,” is platform agnostic. It analyzes IT system log data or “data exhaust” and surfaces latent processes within the data. Compared to traditional interview-based process mapping methodologies, process mining learns processes in a fraction of the time. This allows organizations to quickly understand their processes, shorten process times, target improvements without guesswork, re-measure the outcome, simulate change assumptions, and adopt additional bleeding edge technologies like robotic process automation (RPA). Continuous data-driven process improvement. Very powerful. The use cases are tremendous — from quickly understanding and fixing discrete processes to continual compliance/audit monitoring to enterprise digital transformation (DX) efforts to improving the lethality of joint warfighting systems — any organization that relies upon information technology systems to operate would benefit from this technique.
Process mining uses AI/ML to extract existing data from IT systems and visually reconstructs how processes actually perform. It creates full transparency and enables you to drive efficiency, quality and productivity across your entire organization.
It works for any industry, any organization, any process.
On the home screen, you will see a login box. Place your login credentials here or contact us to request an account.
You may import data in three different formats: Microsoft® Office Excel® spreadsheet (XLS or XLSX), Comma Separated Values (CSV), or XES format. XES, or eXtensible Event Stream, format defines a grammar for a tag-based language whose aim is to provide designers of information systems with a unified and extensible methodology for capturing systems behaviors by means of event logs and event streams.
You may upload your own data or use any of our test data in our example data repository. The repository also contains a CSV template for you to create an analyzable log file from your own data.
Please Note: You must be logged into the cloud solution in order to access and download the example log files.
Also, depending upon the size and the complexity of the example log data you use, it may take up to five (5) minutes for your results to appear. Please be patient.
Use Your Own Data Template
If you would like to use your own data, then you may do so. There is a CSV Template. It is important, however, that your data are formatted properly. You must have three data elements, structured as follows:
Case ID: This Case Identifier is the unique number assigned to each case in your log. It could be a job applicant ID, or a repair order ID, etc.
Start Time: Date time format, for example 3/22/2018 14:59.
Activity: These are all of the activities associated with your process. In a call center environment, some of these activities might include: Call Inbound or Outbound, Email Inbound or Outbound, Handle Case, Handle Email, etc.
Projects and Analysis Results
Depending upon the size and the complexity of the example log data you use, it may take up to five (5) minutes for your results to appear. Please be patient.
In this space, previously uploaded files and corresponding results are listed in their own directories. Analyses are performed automatically after a file is uploaded.
After your process mining analysis is complete, you will have the following items available in the corresponding directory:
Narrative Description/Commentary: This high-level narrative identifies some of the prominent findings from in the discovered process model. For example, the number of observed process cases, activities which take the longest, and capacity estimates.
BPMN: This file contains the XML code which represents the found process model, according to our BPMN Miner algorithm. This file may be imported into popular programs, such as Microsoft® Office Visio® for further editing and analysis. Additionally, this file may also be imported into the web-based BPMN Modeler tool for additional visualizing and editing. To import your BPMN diagram into this tool: 1) right-click on the link with the “.bpmn” extension and copy the link, 2) go to the BPMN Modeler tool, 3) select “Open”, 4) paste the link text, 5) select or OK. Your BPMN diagram should appear in an editable format.
BPMN Diagram: The process model image is also visible in BPMN format diagram.
Model Descriptive Statistics and Probability Distributions: Our log analytics engine produces a number of descriptive statistics and probability distributions, which are useful for understanding the process and simulating changes to the ecosystem. These data are presented as a color-coded heat map tables for easily understanding relative values. For example, it is might be important to know which process activities take the longest; this table helps highlight such information. Please see the Appendix for additional details.
Downloadable Statistics: These statistics may also be downloaded in Microsoft® Office Excel® or CSV format.
XES: You will also see your uploaded log analysis data. If you imported a Microsoft® Office Excel® spreadsheet or a CSV file, that file has been converted into XES or eXtensible Event Stream format. XES was adopted in 2010 by the IEEE Task Force on Process Mining as the standard format for logging events.
A Word About Data Privacy and Security
We take your data privacy & security very seriously, and aspire to the highest industry security standards This site is intended to give you a taste of what we can do with your data. If you have data & privacy concerns, free to reach out and contact us & let’s talk about our data security efforts!
We welcome feedback and suggestions for improvement. You may submit feedback any time here. If you encounter an issue which is not addressed in this manual, please contact us right away.