Feeds

A holistic view of second generation BI

Houston, we have a problem

SANS - Survey on application security programs

Comment I wrote a series of articles about second generation BI (which I refuse to refer to as Business Intelligence twodotoh) about six months ago. Why then I am returning to it? Because I think it is time to take a step back from the BI market and view it more holistically before we even consider what a next generation environment might look like.

The simple problem is this: there are too many BI tools (taking BI to have the broadest possible meaning) to get a clear picture of the market. There is OLAP, reporting, data mining, text mining, ad hoc query, report mining (a la DataWatch), report reuse (see my recent article about 90 Degree Software) and web mining, plus there are dashboards, analytical applications and the sort of complex analytics for which data warehouse appliances are suitable.

Then there is operational intelligence, process intelligence, BAM (business activity monitoring) and operational BI (if that is different from operational intelligence and/or process intelligence), which may or may not be event driven and may be in real-time, near real-time or right time.

And then there is the added complication of performance management and whether that is within the domain of BI or not; there is a spreadsheet management, which is a fraught enough subject in its own right; and I haven't even touched on the ways that you can implement OLAP or the whole subject of data warehousing and data marts, or the need to support new types of devices, technologies such as mash-ups, the requirement to support dynamic chart updating and so on and so forth.

Given that this is the mess that BI is in, I think that there needs to be some clear holistic thinking about how all of this can be structured and put together in some reasonably simple way, and that this is as much a part of second generation BI as broader and wider functionality that appeals to more people throughout the organisation. Indeed, arguably the provision of a platform that underpins these various technologies is what will enable what HP refers to as ubiquitous BI.

However, what we have today is, in effect, a siloed approach to BI: companies like SAS, Business Objects and Cognos do some of the things mentioned but not many others; the application vendors like Oracle and SAP do others; IBM has a different subset; and then there are various pure plays that are active in various sectors of the market. But the different solutions from different companies often do not work well with each other or only to a limited extent.

We all know that silos are not a good idea. It is, for example, gratifying that all, more or less, all of the vendors of MDM (master data management) recognise the dangers of siloism but this doesn't seem to apply in the BI space and I think it should.

To conclude, I don't think I have an answer for this: I am merely pointing out the problem and suggesting that it needs resolving. It needs an architecture if you like. I would welcome readers' comments and suggestions as to what this might look like.

Copyright © 2007, IT-Analysis.com

3 Big data security analytics techniques

More from The Register

next story
OpenBSD founder wants to bin buggy OpenSSL library, launches fork
One Heartbleed vuln was too many for Theo de Raadt
Got Windows 8.1 Update yet? Get ready for YET ANOTHER ONE – rumor
Leaker claims big release due this fall as Microsoft herds us into the CLOUD
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Ubuntu 14.04 LTS: Great changes, but sssh don't mention the...
Why HELLO Amazon! You weren't here last time
Patch iOS, OS X now: PDFs, JPEGs, URLs, web pages can pwn your kit
Plus: iThings and desktops at risk of NEW SSL attack flaw
Next Windows obsolescence panic is 450 days from … NOW!
The clock is ticking louder for Windows Server 2003 R2 users
Batten down the hatches, Ubuntu 14.04 LTS due in TWO DAYS
Admins dab straining server brows in advance of Trusty Tahr's long-term support landing
Red Hat to ship RHEL 7 release candidate with a taste of container tech
Grab 'near-final' version of next Enterprise Linux next week
Apple inaugurates free OS X beta program for world+dog
Prerelease software now open to anyone, not just developers – as long as you keep quiet
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.