Feeds

A holistic view of second generation BI

Houston, we have a problem

Top three mobile application threats

Comment I wrote a series of articles about second generation BI (which I refuse to refer to as Business Intelligence twodotoh) about six months ago. Why then I am returning to it? Because I think it is time to take a step back from the BI market and view it more holistically before we even consider what a next generation environment might look like.

The simple problem is this: there are too many BI tools (taking BI to have the broadest possible meaning) to get a clear picture of the market. There is OLAP, reporting, data mining, text mining, ad hoc query, report mining (a la DataWatch), report reuse (see my recent article about 90 Degree Software) and web mining, plus there are dashboards, analytical applications and the sort of complex analytics for which data warehouse appliances are suitable.

Then there is operational intelligence, process intelligence, BAM (business activity monitoring) and operational BI (if that is different from operational intelligence and/or process intelligence), which may or may not be event driven and may be in real-time, near real-time or right time.

And then there is the added complication of performance management and whether that is within the domain of BI or not; there is a spreadsheet management, which is a fraught enough subject in its own right; and I haven't even touched on the ways that you can implement OLAP or the whole subject of data warehousing and data marts, or the need to support new types of devices, technologies such as mash-ups, the requirement to support dynamic chart updating and so on and so forth.

Given that this is the mess that BI is in, I think that there needs to be some clear holistic thinking about how all of this can be structured and put together in some reasonably simple way, and that this is as much a part of second generation BI as broader and wider functionality that appeals to more people throughout the organisation. Indeed, arguably the provision of a platform that underpins these various technologies is what will enable what HP refers to as ubiquitous BI.

However, what we have today is, in effect, a siloed approach to BI: companies like SAS, Business Objects and Cognos do some of the things mentioned but not many others; the application vendors like Oracle and SAP do others; IBM has a different subset; and then there are various pure plays that are active in various sectors of the market. But the different solutions from different companies often do not work well with each other or only to a limited extent.

We all know that silos are not a good idea. It is, for example, gratifying that all, more or less, all of the vendors of MDM (master data management) recognise the dangers of siloism but this doesn't seem to apply in the BI space and I think it should.

To conclude, I don't think I have an answer for this: I am merely pointing out the problem and suggesting that it needs resolving. It needs an architecture if you like. I would welcome readers' comments and suggestions as to what this might look like.

Copyright © 2007, IT-Analysis.com

Maximizing your infrastructure through virtualization

More from The Register

next story
Apple fanbois SCREAM as update BRICKS their Macbook Airs
Ragegasm spills over as firmware upgrade kills machines
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
NO MORE ALL CAPS and other pleasures of Visual Studio 14
Unpicking a packed preview that breaks down ASP.NET
Captain Kirk sets phaser to SLAUGHTER after trying new Facebook app
William Shatner less-than-impressed by Zuck's celebrity-only app
Cheer up, Nokia fans. It can start making mobes again in 18 months
The real winner of the Nokia sale is *drumroll* ... Nokia
EU dons gloves, pokes Google's deals with Android mobe makers
El Reg cops a squint at investigatory letters
Chrome browser has been DRAINING PC batteries for YEARS
Google is only now fixing ancient, energy-sapping bug
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.