{"id":777,"date":"2016-11-27T20:30:33","date_gmt":"2016-11-27T18:30:33","guid":{"rendered":"https:\/\/community.virtono.com\/?p=777"},"modified":"2016-11-27T20:30:33","modified_gmt":"2016-11-27T18:30:33","slug":"business-intelligence-roadblocks","status":"publish","type":"post","link":"https:\/\/www.virtono.com\/community\/knowledgebase\/business-intelligence-roadblocks\/","title":{"rendered":"Business Intelligence Roadblocks"},"content":{"rendered":"<p>Business Information asked attendees at the BI Leadership Summit, \u00a0a conference in New York co-hosted by SearchBusinessAnalytics and \u00a0consultancy Eckerson Group, about the biggest challenges they face \u00a0in increasing the use of business intelligence, or BI, and analytics \u00a0applications inside their organizations.<\/p>\n<p>&nbsp;<\/p>\n<p>IT User-oriented technology trends like self-service BI and cloud-based content management are better for IT departments than people think.<br \/>\nAS NEW TECHNOLOGIES infiltrate companies\u2019 walls and transfer greater control to mainstream business users, a question keeps surfacing: Just how relevant is IT? Technology and business writer Nicholas Carr asked that question more than a decade ago. But in the wake of technologies like cloud computing, mobile devices and social media, the relevance of IT departments continues to be an important issue. New tools\u2014from self-service business analytics to cloud-based content management\u2014have enabled users to take the steering wheel from IT and drive the bus themselves. Self-service business intelligence, or BI, enables executives and marketing departments to crunch the numbers without the help of data analysts. Likewise, online file sharing and cloud enterprise content management, or ECM, tools allow workers to collaborate with<br \/>\none another even when they\u2019re out of the office. But the reality is that even when applications are business-user-friendly, IT is still a key part of the equation. Despite Carr\u2019s assertion that \u201cIT doesn\u2019t matter,\u201d one can argue that current technology trends actually make IT departments more, not less, relevant. Let\u2019s further consider self-service BI and cloud ECM software, two applications that should be managed by traditional IT instead of \u201cshadow IT\u201d groups in business units. Self-service analytics is about providing direct access to data so that managers and business analysts in sales, marketing and operations\u2014in other words, departments other than IT\u2014can gain insight into their businesses. For accurate results, though, that data must be kept clean and consistent. ECM software enables users to make changes without support from programmers and without being subject to strict controls. Although technical in nature, these tools are typically \u201cowned\u201d by marketing, but IT still needs to provision them, deal with data silos, ensure security and keep application performance humming along. The proliferation of diverse technologies reinforces job security for IT professionals. As companies embrace analytics, digital business and social media, IT departments are best positioned to ensure that these technologies function properly and work together seamlessly and securely, even across data silos.<\/p>\n<p>Companies may seek help from outsourcers and consultancies, which do certain things well but fall short when it comes to integrating the various technologies within a company. To handle this complex undertaking of seamless integration on a daily basis, companies are best served by an internal IT department that\u2019s knowledgeable about the business and committed to supporting it long term.<br \/>\nData that endlessly multiplies must also be secured. Corporate executives are taking a keen interest in security because it can directly impact their companies\u2019 brand value. Users can sometimes stealthily introduce lightweight cloud-based ECM technologies into their companies without official IT sanction or awareness. IT departments need to get in front of these back-door efforts, not to block them but rather to ensure that the software applications are compliant with company and industry policies and don\u2019t cause data breaches. Again, IT is perfectly\u00a0positioned to make sure workers keep their data and content protected and accurate. A strategic part of the IT mandate is to help a company determine the risks and rewards of investing in technology. That expertise is even more relevant in today\u2019s environment, where technology is diverse, accessible and constantly changing. From their unbiased perspective, \u00a0IT leaders can best determine applicability and establish the cost savings, competitive advantages and time to market of different technologies. But they also need to explain their findings in terms that executives can understand. In other words, IT departments should paint a very pragmatic picture of their company\u2019s technology landscape. Selling a vision internally is not a traditional role for IT leaders\u2014it doesn\u2019t come naturally to them. They\u2019re more accustomed to implementing projects and keeping things running\u2014that\u2019s their DNA. But given the rapid speed of technology advancements, IT professionals don\u2019t have the luxury of waiting for their DNA to evolve. They must add the \u201cstrategic-vision gene\u201d themselves\u2014and fast. As technology and business continue to merge, IT professionals willing to change their DNA, develop their ability to communicate with business stakeholders in simpler terms and sell their vision will go far.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Business Information asked attendees at the BI Leadership Summit, \u00a0a conference in New York co-hosted by SearchBusinessAnalytics and \u00a0consultancy Eckerson Group, about the biggest challenges they face \u00a0in increasing the use of business intelligence, or BI, and analytics \u00a0applications inside their organizations. &nbsp; IT User-oriented technology trends like self-service BI<\/p>\n","protected":false},"author":3,"featured_media":778,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[5],"tags":[],"class_list":["post-777","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-knowledgebase"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/11\/Business-Intelligence-Buzzwords-panda.jpg?fit=901%2C533&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p7ISfL-cx","jetpack_likes_enabled":true,"jetpack-related-posts":[{"id":93,"url":"https:\/\/www.virtono.com\/community\/knowledgebase\/business-intelligence-and-data-challenges\/","url_meta":{"origin":777,"position":0},"title":"Business Intelligence And Data Challenges","author":"Virtono","date":"July 18, 2016","format":false,"excerpt":"One growing demand in the business and analytics world is that of something called Business Intelligence (BI). BI is a combination of data subjected over analytical tools to produce complex and relevant information to the business\u2019s decision makers. The objective is simple, to gain a competitive edge over others, and\u2026","rel":"","context":"In &quot;Knowledgebase&quot;","block_context":{"text":"Knowledgebase","link":"https:\/\/www.virtono.com\/community\/category\/knowledgebase\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/07\/Business-Intelligence.jpg?fit=1200%2C675&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/07\/Business-Intelligence.jpg?fit=1200%2C675&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/07\/Business-Intelligence.jpg?fit=1200%2C675&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/07\/Business-Intelligence.jpg?fit=1200%2C675&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/07\/Business-Intelligence.jpg?fit=1200%2C675&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":760,"url":"https:\/\/www.virtono.com\/community\/knowledgebase\/3-major-challenges-in-cloud-security\/","url_meta":{"origin":777,"position":1},"title":"3 major challenges in Cloud security","author":"Daniel Draga","date":"November 17, 2016","format":false,"excerpt":"Is your institution planning to leverage cloud computing and mobile computing in order to improve service agility, increase increase student and research success and lower costs of ownership, and lower capital expenses? If so, you are no doubt aware that your institution is also increasing its attack surface. Cloud-based technologies,\u2026","rel":"","context":"In &quot;Knowledgebase&quot;","block_context":{"text":"Knowledgebase","link":"https:\/\/www.virtono.com\/community\/category\/knowledgebase\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/11\/Cloud-security.jpg?fit=1200%2C800&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/11\/Cloud-security.jpg?fit=1200%2C800&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/11\/Cloud-security.jpg?fit=1200%2C800&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/11\/Cloud-security.jpg?fit=1200%2C800&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/11\/Cloud-security.jpg?fit=1200%2C800&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":134,"url":"https:\/\/www.virtono.com\/community\/internet-and-technology-news\/how-to-get-into-the-game-of-business-intelligence\/","url_meta":{"origin":777,"position":2},"title":"How to Get into the Game of Business Intelligence","author":"Daniel Draga","date":"July 21, 2016","format":false,"excerpt":"In the last article we talked about Business Intelligence and how it is changing the world around us, how it is shaping the new businesses, and about the struggles of the current industry. Today we\u2019ll take a look at how you can setup a business intelligence unit of our own,\u2026","rel":"","context":"In &quot;IT News&quot;","block_context":{"text":"IT News","link":"https:\/\/www.virtono.com\/community\/category\/internet-and-technology-news\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/07\/IMG_2035.jpg?fit=1200%2C900&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/07\/IMG_2035.jpg?fit=1200%2C900&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/07\/IMG_2035.jpg?fit=1200%2C900&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/07\/IMG_2035.jpg?fit=1200%2C900&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/07\/IMG_2035.jpg?fit=1200%2C900&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":676,"url":"https:\/\/www.virtono.com\/community\/knowledgebase\/data-security-in-cloud-computing\/","url_meta":{"origin":777,"position":3},"title":"Data Security in Cloud Computing","author":"Daniel Draga","date":"October 3, 2016","format":false,"excerpt":"\u0097With the development of cloud computing, Data security becomes more and more important in cloud computing. This paper analyses the basic problem of cloud computing data security. . \u0097Cloud Computing provides the way to share distributed resources and services that belong to different organizations or sites. Since Cloud Computing share\u2026","rel":"","context":"In &quot;Knowledgebase&quot;","block_context":{"text":"Knowledgebase","link":"https:\/\/www.virtono.com\/community\/category\/knowledgebase\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/07\/IMG_2035.jpg?fit=1200%2C900&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/07\/IMG_2035.jpg?fit=1200%2C900&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/07\/IMG_2035.jpg?fit=1200%2C900&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/07\/IMG_2035.jpg?fit=1200%2C900&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/07\/IMG_2035.jpg?fit=1200%2C900&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":3151,"url":"https:\/\/www.virtono.com\/community\/internet-and-technology-news\/virtono-at-cloudfest-2023-a-journey-into-the-future-of-cloud-computing\/","url_meta":{"origin":777,"position":4},"title":"Virtono at CloudFest 2023: A Journey into the Future of Cloud Computing","author":"Teo Moraru","date":"April 3, 2023","format":false,"excerpt":"As members of the Virtono team, we were excited to attend CloudFest 2023 and explore the latest advancements and trends in cloud computing. The three-day conference provided us with an incredible opportunity to network with industry peers, learn from experts, and showcase our own cloud hosting solutions. The event was\u2026","rel":"","context":"In &quot;IT News&quot;","block_context":{"text":"IT News","link":"https:\/\/www.virtono.com\/community\/category\/internet-and-technology-news\/"},"img":{"alt_text":"CloudFest","src":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2023\/04\/Brand-Kit.png?fit=1200%2C675&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2023\/04\/Brand-Kit.png?fit=1200%2C675&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2023\/04\/Brand-Kit.png?fit=1200%2C675&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2023\/04\/Brand-Kit.png?fit=1200%2C675&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2023\/04\/Brand-Kit.png?fit=1200%2C675&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":4073,"url":"https:\/\/www.virtono.com\/community\/internet-and-technology-news\/virtono-admintools-at-davos-2025-innovation-recognition-and-a-vision-for-the-future\/","url_meta":{"origin":777,"position":5},"title":"Virtono &amp; AdminTools at Davos 2025: Innovation, Recognition, and a Vision for the Future","author":"Teo Moraru","date":"February 4, 2025","format":false,"excerpt":"Earlier this year, the world\u2019s most influential business, tech, and policy leaders gathered in Davos for the\u00a0World Economic Forum (WEF) 2025. Alongside this prestigious event,\u00a0Davos Innovation Week - Quantumfai\u00a0brought together the brightest minds in technology, investment, and entrepreneurship to discuss and showcase groundbreaking innovations. Among the standout participants was\u00a0Teodora Moraru,\u2026","rel":"","context":"In &quot;IT News&quot;","block_context":{"text":"IT News","link":"https:\/\/www.virtono.com\/community\/category\/internet-and-technology-news\/"},"img":{"alt_text":"WEF Teodora Moraru","src":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2025\/02\/wet.png?fit=1200%2C675&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2025\/02\/wet.png?fit=1200%2C675&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2025\/02\/wet.png?fit=1200%2C675&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2025\/02\/wet.png?fit=1200%2C675&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2025\/02\/wet.png?fit=1200%2C675&ssl=1&resize=1050%2C600 3x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/posts\/777","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/comments?post=777"}],"version-history":[{"count":1,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/posts\/777\/revisions"}],"predecessor-version":[{"id":779,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/posts\/777\/revisions\/779"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/media\/778"}],"wp:attachment":[{"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/media?parent=777"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/categories?post=777"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/tags?post=777"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}