Well Managed BI

You implement BI to optimize operational efficiency.
What do you do to optimize BI efficiency?


Monday, March 2, 2015

Is the Internet a public utility? Do providers have a responsibility to treat their customers' content equally? Should healthcare Internet traffic have priority over other Internet traffic?

Tuesday, December 23, 2014

Back in April, 2014, the FBI issued a Private Industry Notification (PIN) warning the healthcare sector that its vulnerability to attack remains high, primarily because it is a lucrative target for criminals. Why are healthcare data breaches so lucrative?A Reuters report on the FBI PIN indicates numerous reasons:

Monday, December 8, 2014

Forrester's Nick Hayes recently posted a summary of a new Forrester report, Dissecting Global Risk Perceptions and the Effects of Customer Obsession. In his summary, he writes of a shift in the perception of governance, risk management, and compliance that is occurring in "customer-obsessed" organizations -- organizations that take the need to improve customer experience seriously.

Monday, December 8, 2014

The latest update to APOS Storage Center for SAP BusinessObjects 4. 1 includes some great new features and improvements. For example, you can now use the familiar SAP LCMBIAR file technology to back up your standard, system and application objects. You also have the option to include object level security in your LCMBIAR backups. However, unlike the standard SAP LCMBIAR method, the APOS Storage Center LCMBIAR backup method allows you to restore objects selectively. It also overcomes any volum...

Thursday, March 20, 2014

We have seen the future of BI, and it is self-serve. The growth of BI has steadily tended away from simple, passive reporting toward engagement and interaction, and finally to providing the ability to build your own query and render it with statistical and visual impact.

Monday, February 24, 2014

If you are a BI platform manager or BI administrator responsible for ensuring the proper implementation of your organization's security model, or if you're involved in BI user support, then you'll find administrative user impersonation to be an extremely useful new feature of APOS Administrator and APOS Security Manager. User impersonation allows administrators to see what specific users see, so you can examine the implementation of your security model down to row-level security with more ...

Tuesday, February 26, 2013

If you didn't have a chance to attend our recent Intelligent Data Access Controller (IDAC) webinar, you missed some great insights on BI data governance -- how you can gain greater control over your BI platform through increased visibility into data connectivity, better security through awareness of data access, and more accountability through sensitive data audit. It's no surprise that BI data governance is becoming a hot topic. As BI assumes a more critical role in business decision support...

Tuesday, June 19, 2012

Volume, Variety, and Velocity are the three "Vs" of Big Data. @RobertKugel tweeting on a talk by IBM's Brenda Dietrich reveals a fourth: Veracity. Here's an IBM presentation slide (PDF) that shows the relationship:

Get our newsletter for the latest BI insights and blog posts!

Subscribe!

 

 

Post Archive