RPA Online Training | RPA Introduction | RPA Automation Explained - PowerPoint PPT Presentation

About This Presentation
Title:

RPA Online Training | RPA Introduction | RPA Automation Explained

Description:

eTrainingsIndia is one of the best online training provider for Robotic Process Automation Blue prism . Best thing about joining with us for Blue prism online training is you will get licensed Blue prism software access to get real time knowledge on Blue prism tool. We have best prices compared to other organizations with full corporate training features. eTrainingsIndia provides Online Training and Corporate Training, Job Support for all IT courses. Interested can reach us at www.etrainingsindia.com & Phone/Wtsapp: +91 9010769088 – PowerPoint PPT presentation

Number of Views:400
Slides: 16
Provided by: edwardeswar

less

Transcript and Presenter's Notes

Title: RPA Online Training | RPA Introduction | RPA Automation Explained


1
  • ROBOTIC PROCESS AUTOMATION

www.etrainingsindia.com
91 9010769088
contact_at_etrainingsindia.com
2
  • RPA Use Cases
  • Calculators Initial practice- Calculate
    Manually complex tasks- Invention of
    calculators. But we are still feeding numbers in
    calculator manually. This is now implemented by
    bots
  • Data Entry Employee Job Data entry employees
    repeatedly gets data from different sources and
    aggregates them in an excel file.
  • Premium Provider Insurance Company To process
    multiple invoices everyday.
  • Banking Sector To process different loan
    application

3
(No Transcript)
4
(No Transcript)
5
Types Of Bots Front Office Robots An Attended
Bot executes its automation on the users local
work station and need a human to trigger or
schedule them. Back Office Robots An
Unattended Bot runs on a virtual machine and
executes automation that do not require user
interaction.
6
(No Transcript)
7
(No Transcript)
8
  • Assess
  • This phase starts by investigating the process
    that could be automated
  • We take decision on
  • - Schedule
  • - Degree of importance
  • - Data type usage and the
    department it is related to.
  • Assess phase ends with an assessment of report
    that outlines the feasibility of the RPA project
    more in detail.
  • Approve
  • It starts with an approval of the process which
    is to be automated.
  • It is followed by thorough investigation and
    documentation of the process.
  • After documentation, we design future processes
    as part of the solution.
  • This phase ends with Business case being resented
    to the management team

9
  • Design
  • Starts by looking at which software vendor best
    fulfils the criteria outlined in the business
    case.
  • During this phase we will design the robot with
    exact process which is outlined
  • Robot will be programmed to scale the level of
    automation.
  • This phase ends with testing the process.
  • Implement
  • Process we designed will be released into a
    working environment, mimicking an user behavior.
  • When deployed , business side monitors the robot
    and handles any exceptions.
  • If there are any changes in the process
  • - Robots have to be
    programmed again
  • - Business side does it
    themselves.

10
  • How to handle exceptions encountered in RPA
  • Exceptions arise when dealing with a software
    program and should be handled properly.
  • If the exception left unhandled, it could
    drastically impair RPA functionality.
  • The success of exception handling depends on how
    well it is implemented during development.
  • It ensures that the problems are resolved, easily
    identifiable and repairable by system admins.
  • Exception Types
  • Business Exception
  • System Exception

11
  • What are Business Exceptions
  • These exceptions occur when established rules are
    broken
  • Business exceptions are the implementation of
    business rules that exist within a process to be
    automated.
  • Example
  • In making business payments online, if an
    encountered value is above a threshold amount,
    then it need an approval.
  • How to handle it?
  • Process that encounter business exceptions are
    rerouted for alternative processing.

12
  • What are System Exceptions
  • These exceptions occur in response to technical
    situations like,
  • - Application not responding
  • - Application crashes
  • - UI changes, New
    screens/changes within an application that were
    not accounted during design and development
    phase.
  • Example
  • Any change in the UI of an application
  • How to handle it?
  • These exceptions can either be monitored or
    handled by reprogramming the bots.

13
(No Transcript)
14
  • Role Based Access Overview
  • Role Based Access control (RBAC) is a method of
    regulating access to computer or network
    resources based on the roles of individual users
    within an enterprise.
  • Role-based access involves a built-in privilege
    system hat can be configured by the
    administrator.
  • Users will have to login to interact with
    automation and are restricted based on security
    that is implemented in an organization.
  • Example
  • A developer who develops the process can be
    blocked from releasing the configured changes
    into live environment until they are fully
    approved by the administrator.
  • There is huge risk to business in accidentally
    providing access to sensitive data to someone who
    is not authorized to see it.

15
Credential Management Credential Manager
Credential manager is the digital locker, where
we can store login credentials Orchestrator
Credentials Credentials are stored in encrypted
format in server database. Orchestrator
Credential Integration with Third Party
Tools Orchestration credentials can be
integrated with third party tools like CyberArk.
Write a Comment
User Comments (0)
About PowerShow.com