Practically Speaking About Cloud Computing: Business Intelligence in the Cloud Part II

Practically Speaking About Cloud Computing: Business Intelligence in the Cloud Part II

BI Vendors and IBM Smart Analytics Cloud: In the latest magic quadrant for Business Intelligence Software, Gartner is mentioning, IBM, SAP, MicroStrategy, SAS, Oracle and Microsoft as leaders; QlikTech, Tibco Spotfire and Tableau as challengers.

IBM Cognos is one of the popular enterprise BI software. IBM is leading in cloud computing deployments with its Smart Analytics Cloud solution. Also, IBM’s Blue Insight, IBM’s own Business Intelligence and Analytics private cloud deployment serves as the template Smart Analytics Cloud. IBM claims that its cloud BI solution can result in 75% cost reduction per user.

Mobile Business Intelligence

The power of mobility is entering into BI space, resulting in Mobile Business Intelligence. The enablers are mobile devices like iPhone, Blackberry, iPad etc… and the spread of mobile broadband. Oracle 11 g has demonstrated its BI capabilities with Apple’s iPad. QlikView claims that it has the most powerful BI application designed for iPad’ s touch interface.

Cloud BI Plan:

Executive Highlights:

  • Business Intelligence is one of the major enterprise technology spend.
  • Only in limited enterprises, the full ROI is realized on BI implementation.
  • Traditional On Premises BI Installations take longer gestation time.
  • Cloud BI is emerging as alternate for quick deployment and value.
  • Cloud BI Vendor offerings are increasingly available in the market place.
  • A careful approach is required to adopt and manage Cloud BI.

By Glenn Blake

About Glenn Blake

Glenn Blake is a writer for CloudTweaks and has been writing about technology trends for over 25 years.

View Website
View All Articles

Sorry, comments are closed for this post.

Your Biggest Data Security Threat Could Be….

Your Biggest Data Security Threat Could Be….

Paying Attention To Data Security Your biggest data security threat could be sitting next to you… Data security is a big concern for businesses. The repercussions of a data security breach ranges from embarrassment, to costly lawsuits and clean-up jobs – particularly when confidential client information is involved. But although more and more businesses are…

Maintaining Network Performance And Security In Hybrid Cloud Environments

Maintaining Network Performance And Security In Hybrid Cloud Environments

Hybrid Cloud Environments After several years of steady cloud adoption in the enterprise, an interesting trend has emerged: More companies are retaining their existing, on-premise IT infrastructures while also embracing the latest cloud technologies. In fact, IDC predicts markets for such hybrid cloud environments will grow from the over $25 billion global market we saw…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

Don’t Be Intimidated By Data Governance

Don’t Be Intimidated By Data Governance

Data Governance Data governance, the understanding of the raw data of an organization is an area IT departments have historically viewed as a lose-lose proposition. Not doing anything means organizations run the risk of data loss, data breaches and data anarchy – no control, no oversight – the Wild West with IT is just hoping…

Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks Does cloud security risks ever bother you? It would be weird if it didn’t. Cloud computing has a lot of benefits, but also a lot of risks if done in the wrong way. So what are the most important risks? The European Network Information Security Agency did extensive research on that, and…

Using Private Cloud Architecture For Multi-Tier Applications

Using Private Cloud Architecture For Multi-Tier Applications

Cloud Architecture These days, Multi-Tier Applications are the norm. From SharePoint’s front-end/back-end configuration, to LAMP-based websites using multiple servers to handle different functions, a multitude of apps require public and private-facing components to work in tandem. Placing these apps in entirely public-facing platforms and networks simplifies the process, but at the cost of security vulnerabilities. Locating everything…

5 Things To Consider About Your Next Enterprise Sharing Solution

5 Things To Consider About Your Next Enterprise Sharing Solution

Enterprise File Sharing Solution Businesses have varying file sharing needs. Large, multi-regional businesses need to synchronize folders across a large number of sites, whereas small businesses may only need to support a handful of users in a single site. Construction or advertising firms require sharing and collaboration with very large (several Gigabytes) files. Financial services…