{"id":134,"date":"2016-07-21T18:21:33","date_gmt":"2016-07-21T15:21:33","guid":{"rendered":"http:\/\/community.virtono.com\/?p=134"},"modified":"2023-06-21T09:39:06","modified_gmt":"2023-06-21T06:39:06","slug":"how-to-get-into-the-game-of-business-intelligence","status":"publish","type":"post","link":"https:\/\/www.virtono.com\/community\/internet-and-technology-news\/how-to-get-into-the-game-of-business-intelligence\/","title":{"rendered":"How to Get into the Game of Business Intelligence"},"content":{"rendered":"<p>In the <a href=\"https:\/\/virtono.com\/community\/knowledgebase\/business-intelligence-and-data-challenges\/\" target=\"_blank\" rel=\"noopener\">last article<\/a> we talked about Business Intelligence and how it is changing the world around us, how it is shaping the new businesses, and about the struggles of the current industry.<\/p>\n<p>Today we\u2019ll take a look at how you can setup a business intelligence unit of our own, from the perspective of your IT department, because the variance in data means that the IT has to be at the focal point of it.<\/p>\n<p>So lets talk about the old process from a bird\u2019s-eye view, the data collected and that has to be understood, that data goes to the IT analyst, who detach the spine from that data, metaphorically ofcourse, then that spine is sent to the programmer, who is responsible for providing the code, which runs and iterates over the given data and produces results!<\/p>\n<p>Now those results were not to be understood by an untrained eye, but along came the revolution of personal computing that introduced simple, smart, compact methods of dealing with data atleast for small organisations, which rooted out the middleman IT, which created a neat looking data but unreliable to say the least.<\/p>\n<p>BI has come a long way from when it began and now its time to combine both the old ways and the new to create the ways of the future, the waves of data advancement are looked in three stages, I\u2019d go as far to say that its time for the fourth!<\/p>\n<p>Now, lets talk about how to cement your feet in the world of Business Intelligence.<\/p>\n<ol>\n<li><strong>Find the right Project<\/strong><\/li>\n<\/ol>\n<p>Finding the right project is not exactly, starting working on the data that will help you right away, you will have to consider the holistic view, kind of what I mentioned in the last article. You have to find the project that is meaningful to your organisation, and divide it in stages, that way changes can be made based on the last stage, again something mentioned in the last article about optimality.<\/p>\n<ol start=\"2\">\n<li><strong>Have a team of Customer Representatives<\/strong><\/li>\n<\/ol>\n<p>If you have a business I am pretty sure you are already familiar with this one, have atleast five people under your wing actively focused on the customer part of your organisation, not on the part of how your organization is perceived, but what goes on inside the mind of your customers, hire mentalists if possible, just kidding, no I\u2019m not.<\/p>\n<ol start=\"3\">\n<li><strong>Ask for help from your competitors<\/strong><\/li>\n<\/ol>\n<p>It sounds kind of, I don\u2019t know, weird? Yeah it does, but you are running this project for BI, like mentioned in the first part its not only for selling more products, its more for cementing yourself in the ground for the years to come, to have a loyal customer base, so go around ask for help, give help in return because we are in the making of something new, and we can use all the help we can get, right? , I\u2019ll leave this one upto you my friend.<\/p>\n<ol start=\"4\">\n<li><strong>Keep experimenting<\/strong><\/li>\n<\/ol>\n<p>BI is not a month\u2019s work, it\u2019s a long journey of trial and error, your Customer Representative\u2019s decisions will make or break everything. Thats why have them in odd number something to break the tie, just saying.<\/p>\n<p>With the new world of tech around us, its upto you to find the right people to head over he BI part of your business, you have to find the right people, the right project, make the right decisions, I know it sounds like a lot of work and it is because the rewards are high, so what are you waiting for.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In the last article we talked about Business Intelligence and how it is changing the world around us, how it is shaping the new businesses, and about the struggles of the current industry. Today we\u2019ll take a look at how you can setup a business intelligence unit of our own,<\/p>\n","protected":false},"author":3,"featured_media":129,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[25],"tags":[],"class_list":["post-134","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-internet-and-technology-news"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/07\/IMG_2035.jpg?fit=3264%2C2448&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p7ISfL-2a","jetpack_likes_enabled":true,"jetpack-related-posts":[{"id":93,"url":"https:\/\/www.virtono.com\/community\/knowledgebase\/business-intelligence-and-data-challenges\/","url_meta":{"origin":134,"position":0},"title":"Business Intelligence And Data Challenges","author":"Virtono","date":"July 18, 2016","format":false,"excerpt":"One growing demand in the business and analytics world is that of something called Business Intelligence (BI). BI is a combination of data subjected over analytical tools to produce complex and relevant information to the business\u2019s decision makers. The objective is simple, to gain a competitive edge over others, and\u2026","rel":"","context":"In &quot;Knowledgebase&quot;","block_context":{"text":"Knowledgebase","link":"https:\/\/www.virtono.com\/community\/category\/knowledgebase\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/07\/Business-Intelligence.jpg?fit=1200%2C675&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/07\/Business-Intelligence.jpg?fit=1200%2C675&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/07\/Business-Intelligence.jpg?fit=1200%2C675&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/07\/Business-Intelligence.jpg?fit=1200%2C675&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/07\/Business-Intelligence.jpg?fit=1200%2C675&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":777,"url":"https:\/\/www.virtono.com\/community\/knowledgebase\/business-intelligence-roadblocks\/","url_meta":{"origin":134,"position":1},"title":"Business Intelligence Roadblocks","author":"Daniel Draga","date":"November 27, 2016","format":false,"excerpt":"Business Information asked attendees at the BI Leadership Summit, \u00a0a conference in New York co-hosted by SearchBusinessAnalytics and \u00a0consultancy Eckerson Group, about the biggest challenges they face \u00a0in increasing the use of business intelligence, or BI, and analytics \u00a0applications inside their organizations. \u00a0 IT User-oriented technology trends like self-service BI\u2026","rel":"","context":"In &quot;Knowledgebase&quot;","block_context":{"text":"Knowledgebase","link":"https:\/\/www.virtono.com\/community\/category\/knowledgebase\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/11\/Business-Intelligence-Buzzwords-panda.jpg?fit=901%2C533&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/11\/Business-Intelligence-Buzzwords-panda.jpg?fit=901%2C533&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/11\/Business-Intelligence-Buzzwords-panda.jpg?fit=901%2C533&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/11\/Business-Intelligence-Buzzwords-panda.jpg?fit=901%2C533&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":784,"url":"https:\/\/www.virtono.com\/community\/tutorial-how-to\/targeted-attacks\/","url_meta":{"origin":134,"position":2},"title":"Targeted Attacks.","author":"Daniel Draga","date":"December 2, 2016","format":false,"excerpt":"More Data than Sense. As we look at the responses, most of these detection and correction efforts combine human expertise with tools and data. All efforts can be improved through access to and better interpretation of relevant data, policy-based workflows, and appropriate and facilitated automation. So what\u2019s holding these valiant\u2026","rel":"","context":"In &quot;Knowledgebase&quot;","block_context":{"text":"Knowledgebase","link":"https:\/\/www.virtono.com\/community\/category\/knowledgebase\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":760,"url":"https:\/\/www.virtono.com\/community\/knowledgebase\/3-major-challenges-in-cloud-security\/","url_meta":{"origin":134,"position":3},"title":"3 major challenges in Cloud security","author":"Daniel Draga","date":"November 17, 2016","format":false,"excerpt":"Is your institution planning to leverage cloud computing and mobile computing in order to improve service agility, increase increase student and research success and lower costs of ownership, and lower capital expenses? If so, you are no doubt aware that your institution is also increasing its attack surface. Cloud-based technologies,\u2026","rel":"","context":"In &quot;Knowledgebase&quot;","block_context":{"text":"Knowledgebase","link":"https:\/\/www.virtono.com\/community\/category\/knowledgebase\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/11\/Cloud-security.jpg?fit=1200%2C800&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/11\/Cloud-security.jpg?fit=1200%2C800&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/11\/Cloud-security.jpg?fit=1200%2C800&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/11\/Cloud-security.jpg?fit=1200%2C800&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/11\/Cloud-security.jpg?fit=1200%2C800&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":1171,"url":"https:\/\/www.virtono.com\/community\/internet-and-technology-news\/aws-and-microsoft-introduce-a-source-driven-ai-interface\/","url_meta":{"origin":134,"position":4},"title":"AWS and Microsoft introduce a source-driven AI interface","author":"Shreyash Sharma","date":"October 25, 2017","format":false,"excerpt":"Gluon is another step towards standardized\u00a0APIs\u00a0for neural networks.\u00a0The interface is compatible with both\u00a0Microsoft's\u00a0Cognitive Toolkit and\u00a0Apache\u00a0Mxnet.\u00a0It scales with more than 500 GPUs and is intended to deal with little rather than much data. Microsoft\u00a0and\u00a0Amazon Web Services (AWS)\u00a0co-operate and jointly present the deep-learning interface Gluon.\u00a0Both companies have issued an online report.\u00a0Gluon will\u2026","rel":"","context":"In &quot;IT News&quot;","block_context":{"text":"IT News","link":"https:\/\/www.virtono.com\/community\/category\/internet-and-technology-news\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/10\/20130906170823-0_0_0.jpg?fit=980%2C560&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/10\/20130906170823-0_0_0.jpg?fit=980%2C560&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/10\/20130906170823-0_0_0.jpg?fit=980%2C560&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/10\/20130906170823-0_0_0.jpg?fit=980%2C560&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":749,"url":"https:\/\/www.virtono.com\/community\/knowledgebase\/hunt-down-apts-with-big-data-analytics\/","url_meta":{"origin":134,"position":5},"title":"HUNT DOWN  APTs WITH BIG DATA ANALYTICS","author":"Daniel Draga","date":"November 11, 2016","format":false,"excerpt":"ORGANIZATIONS THAT START to address information security in a meaningful way will come to a point in their maturity when they have a lot of machine data. The challenge many CISOs face is how to leverage that data quickly and correlate events dynamically across the enterprise to track down advanced\u2026","rel":"","context":"In &quot;Knowledgebase&quot;","block_context":{"text":"Knowledgebase","link":"https:\/\/www.virtono.com\/community\/category\/knowledgebase\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/11\/dataintegration2.jpg?fit=1200%2C500&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/11\/dataintegration2.jpg?fit=1200%2C500&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/11\/dataintegration2.jpg?fit=1200%2C500&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/11\/dataintegration2.jpg?fit=1200%2C500&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/11\/dataintegration2.jpg?fit=1200%2C500&ssl=1&resize=1050%2C600 3x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/posts\/134","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/comments?post=134"}],"version-history":[{"count":3,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/posts\/134\/revisions"}],"predecessor-version":[{"id":3547,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/posts\/134\/revisions\/3547"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/media\/129"}],"wp:attachment":[{"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/media?parent=134"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/categories?post=134"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/tags?post=134"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}