SlideShare une entreprise Scribd logo
1  sur  19
By
VIGNESH.R
BI defined as Business Intelligence
BI refers to technologies application and practices for
the collection integration, analysis and presentation
of business information
Business intelligence tools are a type of application
software designed to retrieve, analyze and report data
for business intelligence. The tools generally read data
that have been previously stored, often, though not
necessarily, in a data warehouse or data mart.
To support better, improved and more efficient Decision
Making
BI systems provide historical, current, and predictive
views of business operations.,
BI system information from Uses data that has been
gathered into a data warehouse or data mart.
Spreadsheets
Reporting and querying software: tools that extract,
sort, summarize, and present selected data
OLAP: Online analytical processing
Digital dashboards
Data mining
Data warehousing
Decision engineering
Process mining
Business performance management
Local information systems
IBM's purchase of Cognos and other business
intelligence software vendors was a step in
establishing IBM as a BI "megavendor" (along with
Oracle, Microsoft, and SAP).
 Due to many consolidations in the BI industry, there
are only a few independent "pure-play" vendors
remaining (SAS and Micro Strategy being the largest).
 Hyperion from Oracle Corporation & Business Object
from SAP
Cognos is Business Intelligence software that
enables users to extract data, analyze it, and then
assemble reports
Cognos is a web-based enterprise reporting solution.
Cognos allows you to gather data from various storage
locations and assemble the data into a personalized
package
IBM acquired Cognos (Jan 2008) ,Cognos name
continues to be applied to IBM's line of business
intelligence and performance management products
The software is designed to enable business users
without technical knowledge to extract corporate
data, analyze it and assemble reports.
Cognos product for the individuals, workgroups
department, midsize & large enterprise.
Cognos software is designed to help everyone in your
organization make the decisions that achieve better
business outcomes—for now and in the future
More than 23,000 customers in over 135 countries so
they in market
 Cognos Connection (the web portal for IBM Cognos
BI. It is the starting point for the browser-based access
to all functions provided with the suite. With the help
of this, content can be searched in the form of reports,
scorecards and agents.
 Report Studio (Professional report authoring tool
formatted for the web)
Query Studio (Ad hoc report authoring tool with
instant data preview)
Analysis Studio (Explore multi-dimensional cube data
to answer business questions)
Limited Resources
Time-consuming and cumbersome presentation of
information
IBM Cognos 8 BI provides a more time efficient, concise
and clear method of reporting financial data to support
better, improved, more efficient Decision Making.
IBM Cognos 8 BI, initially launched in September 2005,
combined the features of several previous products,
including ReportNet, PowerPlay, Metrics Manager,
NoticeCast, and DecisionStream.
IBM Cognos Express BI, launched in 2008 for mid
range companies.
IBM Cognos 10 BI , launched in October 2010, it bring
together social collaboration &analytics for business
users for single user ,user-friendly ,online through
mobile, such as ipad,iphone,etc..
When a report has multiple formats or languages,
when a report has a delivery method of save, print, or
email, and when a report is burst.
 Hypertext markup language (.html)
Adobe portable document format (.pdf)
Microsoft Excel spreadsheet (.xls or .xlsx)
Delimited text (.csv)
Extensible markup language (.xml)
If you are the owner of a report or have the necessary
permissions, you can specify the default format for
each report.
Web Application
No software loaded onto user machines
Web address provided via Management Reporting
website or email
User Login setup
Request for Cognos access available via MR website or
email
Users will be setup within Cognos with using existing
UTSA Login ID & Password
Framework Manager
Infrastructure organizer for Cognos: security,
administration, metadata and portal.
Data View
A single store of related information containing a
number of Data Elements. Also referred to simply as a
View.
Role
Your security is based on permission to view selected
data within your individual account, and roles to
which you belong. Cognos supports the union of
access permissions.
Term Description
Consumer Consumers can read and execute reports in Cognos
based on security. Consumers can also interact with
prompts, and define output reports to other formats
such as PDF and CSV. This is the most widely spread
role/user in Cognos.
Query User Query Users have the same access permissions as
Consumers. They can also use Cognos Query Studio to
create ad hoc queries, simple reports, and charts.
Report Author Authors have the same access permissions as Query
Users. They can also use Cognos Report Studio which
provides the ability to create sophisticated, richly
formatted reports and charts with complex prompts
and filters.
Data Modeler Data Modelers create packages that define a subset of
data that is relevant to an intended group of users.
Followings are they advantage of Cognos:
Planning
Analysis
Forecasting
Scorecard
IBM Cognos BI is secured by setting permissions and
enabling user authentication.
When anonymous access is enabled, you can use IBM
Cognos BI without authenticating as a specific user.
In IBM Cognos BI, administrators define permissions
so that users can access functionality. For example, to
edit a report using IBM Cognos Report Studio, you
must have the appropriate security and licensing
permissions.
In addition, each entry in IBM Cognos Connection is
secured to define who can read, edit, and run the entry
Firefox 3.6 Windows / OS X/UNIX/Linux Compatible
Firefox 3.5 Windows / OS X/UNIX/Linux Active
Microsoft Internet Explorer 8.0 Windows Active
Microsoft Internet Explorer 7.0 Windows Active
Microsoft Internet Explorer 6 SP2 Windows XP
Compatible
It Support all Operation system (platform
independent) such as Linux,Unix,Solarix,Windows
Mac Os.
H/w Process Pentium and above and more than 1GB
RAM.
Cognos training provide across India Most of they
center in Bangalore city.
In Chennai Course fee around 10,000 and above and
duration as 40 hours. Such center as Green Tech
Besent technologies..etc

Contenu connexe

Tendances

Data Virtualization: Introduction and Business Value (UK)
Data Virtualization: Introduction and Business Value (UK)Data Virtualization: Introduction and Business Value (UK)
Data Virtualization: Introduction and Business Value (UK)Denodo
 
Requirements document for big data use cases
Requirements document for big data use casesRequirements document for big data use cases
Requirements document for big data use casesAllied Consultants
 
Delivering scalable and high performance BI with least IT effort
Delivering scalable and high performance BI with least IT effortDelivering scalable and high performance BI with least IT effort
Delivering scalable and high performance BI with least IT effortBiBoard.Org
 
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...IRJET Journal
 
Fight Fraud with Big Data Analytics
Fight Fraud with Big Data AnalyticsFight Fraud with Big Data Analytics
Fight Fraud with Big Data AnalyticsDatameer
 
How to Swiftly Operationalize the Data Lake for Advanced Analytics Using a Lo...
How to Swiftly Operationalize the Data Lake for Advanced Analytics Using a Lo...How to Swiftly Operationalize the Data Lake for Advanced Analytics Using a Lo...
How to Swiftly Operationalize the Data Lake for Advanced Analytics Using a Lo...Denodo
 
Unlocking Business Value Using Data
Unlocking Business Value Using DataUnlocking Business Value Using Data
Unlocking Business Value Using DataSplunk
 
A Study on Big Data Privacy Protection Models using Data Masking Methods
A Study on Big Data Privacy Protection Models using Data Masking Methods A Study on Big Data Privacy Protection Models using Data Masking Methods
A Study on Big Data Privacy Protection Models using Data Masking Methods IJECEIAES
 
Myth Busters: I’m Building a Data Lake, So I Don’t Need Data Virtualization (...
Myth Busters: I’m Building a Data Lake, So I Don’t Need Data Virtualization (...Myth Busters: I’m Building a Data Lake, So I Don’t Need Data Virtualization (...
Myth Busters: I’m Building a Data Lake, So I Don’t Need Data Virtualization (...Denodo
 
COIRS: Cost Optimized Identity based Ring Signature with Forward Secrecy in ...
 COIRS: Cost Optimized Identity based Ring Signature with Forward Secrecy in ... COIRS: Cost Optimized Identity based Ring Signature with Forward Secrecy in ...
COIRS: Cost Optimized Identity based Ring Signature with Forward Secrecy in ...IJCSIS Research Publications
 
Maximizing Data Lake ROI with Data Virtualization: A Technical Demonstration
Maximizing Data Lake ROI with Data Virtualization: A Technical DemonstrationMaximizing Data Lake ROI with Data Virtualization: A Technical Demonstration
Maximizing Data Lake ROI with Data Virtualization: A Technical DemonstrationDenodo
 
IRJET- A Survey on File Storage and Retrieval using Blockchain Technology
IRJET- A Survey on File Storage and Retrieval using Blockchain TechnologyIRJET- A Survey on File Storage and Retrieval using Blockchain Technology
IRJET- A Survey on File Storage and Retrieval using Blockchain TechnologyIRJET Journal
 
SplunkLive! New York April 2013 - Enrich Machine Data with Structured Data
SplunkLive! New York April 2013 - Enrich Machine Data with Structured DataSplunkLive! New York April 2013 - Enrich Machine Data with Structured Data
SplunkLive! New York April 2013 - Enrich Machine Data with Structured DataSplunk
 
Database Management in Different Applications of IOT
Database Management in Different Applications of IOTDatabase Management in Different Applications of IOT
Database Management in Different Applications of IOTijceronline
 
What Is Solution Architecture? The Black Art Of I/T Solution Architecture
What Is Solution Architecture? The Black Art Of I/T Solution ArchitectureWhat Is Solution Architecture? The Black Art Of I/T Solution Architecture
What Is Solution Architecture? The Black Art Of I/T Solution ArchitectureNick Noecker
 
OpenText PowerDOCS: A Cloud Solution for Document Generation
OpenText PowerDOCS: A Cloud Solution for Document GenerationOpenText PowerDOCS: A Cloud Solution for Document Generation
OpenText PowerDOCS: A Cloud Solution for Document GenerationMarc St-Pierre
 
In-Network Distributed Analytics on Data-Centric IoT Network for BI-Service A...
In-Network Distributed Analytics on Data-Centric IoT Network for BI-Service A...In-Network Distributed Analytics on Data-Centric IoT Network for BI-Service A...
In-Network Distributed Analytics on Data-Centric IoT Network for BI-Service A...IRJET Journal
 
Product Keynote: Denodo 8.0 - A Logical Data Fabric for the Intelligent Enter...
Product Keynote: Denodo 8.0 - A Logical Data Fabric for the Intelligent Enter...Product Keynote: Denodo 8.0 - A Logical Data Fabric for the Intelligent Enter...
Product Keynote: Denodo 8.0 - A Logical Data Fabric for the Intelligent Enter...Denodo
 
Denodo’s Data Catalog: Bridging the Gap between Data and Business (APAC)
Denodo’s Data Catalog: Bridging the Gap between Data and Business (APAC)Denodo’s Data Catalog: Bridging the Gap between Data and Business (APAC)
Denodo’s Data Catalog: Bridging the Gap between Data and Business (APAC)Denodo
 

Tendances (20)

Data Virtualization: Introduction and Business Value (UK)
Data Virtualization: Introduction and Business Value (UK)Data Virtualization: Introduction and Business Value (UK)
Data Virtualization: Introduction and Business Value (UK)
 
Requirements document for big data use cases
Requirements document for big data use casesRequirements document for big data use cases
Requirements document for big data use cases
 
Delivering scalable and high performance BI with least IT effort
Delivering scalable and high performance BI with least IT effortDelivering scalable and high performance BI with least IT effort
Delivering scalable and high performance BI with least IT effort
 
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
 
Microstrategy 9.2
Microstrategy 9.2Microstrategy 9.2
Microstrategy 9.2
 
Fight Fraud with Big Data Analytics
Fight Fraud with Big Data AnalyticsFight Fraud with Big Data Analytics
Fight Fraud with Big Data Analytics
 
How to Swiftly Operationalize the Data Lake for Advanced Analytics Using a Lo...
How to Swiftly Operationalize the Data Lake for Advanced Analytics Using a Lo...How to Swiftly Operationalize the Data Lake for Advanced Analytics Using a Lo...
How to Swiftly Operationalize the Data Lake for Advanced Analytics Using a Lo...
 
Unlocking Business Value Using Data
Unlocking Business Value Using DataUnlocking Business Value Using Data
Unlocking Business Value Using Data
 
A Study on Big Data Privacy Protection Models using Data Masking Methods
A Study on Big Data Privacy Protection Models using Data Masking Methods A Study on Big Data Privacy Protection Models using Data Masking Methods
A Study on Big Data Privacy Protection Models using Data Masking Methods
 
Myth Busters: I’m Building a Data Lake, So I Don’t Need Data Virtualization (...
Myth Busters: I’m Building a Data Lake, So I Don’t Need Data Virtualization (...Myth Busters: I’m Building a Data Lake, So I Don’t Need Data Virtualization (...
Myth Busters: I’m Building a Data Lake, So I Don’t Need Data Virtualization (...
 
COIRS: Cost Optimized Identity based Ring Signature with Forward Secrecy in ...
 COIRS: Cost Optimized Identity based Ring Signature with Forward Secrecy in ... COIRS: Cost Optimized Identity based Ring Signature with Forward Secrecy in ...
COIRS: Cost Optimized Identity based Ring Signature with Forward Secrecy in ...
 
Maximizing Data Lake ROI with Data Virtualization: A Technical Demonstration
Maximizing Data Lake ROI with Data Virtualization: A Technical DemonstrationMaximizing Data Lake ROI with Data Virtualization: A Technical Demonstration
Maximizing Data Lake ROI with Data Virtualization: A Technical Demonstration
 
IRJET- A Survey on File Storage and Retrieval using Blockchain Technology
IRJET- A Survey on File Storage and Retrieval using Blockchain TechnologyIRJET- A Survey on File Storage and Retrieval using Blockchain Technology
IRJET- A Survey on File Storage and Retrieval using Blockchain Technology
 
SplunkLive! New York April 2013 - Enrich Machine Data with Structured Data
SplunkLive! New York April 2013 - Enrich Machine Data with Structured DataSplunkLive! New York April 2013 - Enrich Machine Data with Structured Data
SplunkLive! New York April 2013 - Enrich Machine Data with Structured Data
 
Database Management in Different Applications of IOT
Database Management in Different Applications of IOTDatabase Management in Different Applications of IOT
Database Management in Different Applications of IOT
 
What Is Solution Architecture? The Black Art Of I/T Solution Architecture
What Is Solution Architecture? The Black Art Of I/T Solution ArchitectureWhat Is Solution Architecture? The Black Art Of I/T Solution Architecture
What Is Solution Architecture? The Black Art Of I/T Solution Architecture
 
OpenText PowerDOCS: A Cloud Solution for Document Generation
OpenText PowerDOCS: A Cloud Solution for Document GenerationOpenText PowerDOCS: A Cloud Solution for Document Generation
OpenText PowerDOCS: A Cloud Solution for Document Generation
 
In-Network Distributed Analytics on Data-Centric IoT Network for BI-Service A...
In-Network Distributed Analytics on Data-Centric IoT Network for BI-Service A...In-Network Distributed Analytics on Data-Centric IoT Network for BI-Service A...
In-Network Distributed Analytics on Data-Centric IoT Network for BI-Service A...
 
Product Keynote: Denodo 8.0 - A Logical Data Fabric for the Intelligent Enter...
Product Keynote: Denodo 8.0 - A Logical Data Fabric for the Intelligent Enter...Product Keynote: Denodo 8.0 - A Logical Data Fabric for the Intelligent Enter...
Product Keynote: Denodo 8.0 - A Logical Data Fabric for the Intelligent Enter...
 
Denodo’s Data Catalog: Bridging the Gap between Data and Business (APAC)
Denodo’s Data Catalog: Bridging the Gap between Data and Business (APAC)Denodo’s Data Catalog: Bridging the Gap between Data and Business (APAC)
Denodo’s Data Catalog: Bridging the Gap between Data and Business (APAC)
 

En vedette

Buisness Intelligence and Web Analytics
Buisness Intelligence and Web AnalyticsBuisness Intelligence and Web Analytics
Buisness Intelligence and Web AnalyticsVincent Maher
 
Improving Service Centre Performance
Improving Service Centre PerformanceImproving Service Centre Performance
Improving Service Centre Performanceimmysdream
 
Business intelligence overview
Business intelligence overviewBusiness intelligence overview
Business intelligence overviewCanara bank
 
Business Intelligence - Intro
Business Intelligence - IntroBusiness Intelligence - Intro
Business Intelligence - IntroDavid Hubbard
 
Business Intelligence Presentation (1/2)
Business Intelligence Presentation (1/2)Business Intelligence Presentation (1/2)
Business Intelligence Presentation (1/2)Bernardo Najlis
 

En vedette (7)

Business Intelligence
Business Intelligence Business Intelligence
Business Intelligence
 
Buisness Intelligence and Web Analytics
Buisness Intelligence and Web AnalyticsBuisness Intelligence and Web Analytics
Buisness Intelligence and Web Analytics
 
Improving Service Centre Performance
Improving Service Centre PerformanceImproving Service Centre Performance
Improving Service Centre Performance
 
Business intelligence overview
Business intelligence overviewBusiness intelligence overview
Business intelligence overview
 
Business intelligence
Business intelligenceBusiness intelligence
Business intelligence
 
Business Intelligence - Intro
Business Intelligence - IntroBusiness Intelligence - Intro
Business Intelligence - Intro
 
Business Intelligence Presentation (1/2)
Business Intelligence Presentation (1/2)Business Intelligence Presentation (1/2)
Business Intelligence Presentation (1/2)
 

Similaire à Business intelligent

Power BI Overview, Deployment and Governance
Power BI Overview, Deployment and GovernancePower BI Overview, Deployment and Governance
Power BI Overview, Deployment and GovernanceJames Serra
 
Power BI: Introduction with a use case and solution
Power BI: Introduction with a use case and solutionPower BI: Introduction with a use case and solution
Power BI: Introduction with a use case and solutionAlvina Verghis
 
business analysis-Data warehousing
business analysis-Data warehousingbusiness analysis-Data warehousing
business analysis-Data warehousingDhilsath Fathima
 
Business Intelligence Module 5
Business Intelligence Module 5Business Intelligence Module 5
Business Intelligence Module 5Home
 
Cognos CIO CEE 2010 Prague CZE
Cognos CIO CEE 2010 Prague CZECognos CIO CEE 2010 Prague CZE
Cognos CIO CEE 2010 Prague CZEStepan Kutaj
 
Business analysis in data warehousing
Business analysis in data warehousingBusiness analysis in data warehousing
Business analysis in data warehousingHimanshu
 
Top 20 Best Business Intelligence Tools | CIO Women Magazine
Top 20 Best Business Intelligence Tools | CIO Women MagazineTop 20 Best Business Intelligence Tools | CIO Women Magazine
Top 20 Best Business Intelligence Tools | CIO Women MagazineCIOWomenMagazine
 
New German interface in InsFocus BI
New German interface in InsFocus BINew German interface in InsFocus BI
New German interface in InsFocus BIYaron
 
Open Source Solution
Open Source SolutionOpen Source Solution
Open Source Solutionittishait
 
Cognos Analytics/Business Intelligence Training Catalog - Self Paced, Instruc...
Cognos Analytics/Business Intelligence Training Catalog - Self Paced, Instruc...Cognos Analytics/Business Intelligence Training Catalog - Self Paced, Instruc...
Cognos Analytics/Business Intelligence Training Catalog - Self Paced, Instruc...QueBIT Consulting
 
Bdi Systems
Bdi SystemsBdi Systems
Bdi Systemsaryan990
 
Business intelligence tools to handle big data
Business intelligence tools to handle big dataBusiness intelligence tools to handle big data
Business intelligence tools to handle big dataIshucs
 
SAP BusinessObject's Webi Rich Client
SAP BusinessObject's Webi Rich ClientSAP BusinessObject's Webi Rich Client
SAP BusinessObject's Webi Rich ClientEric Molner
 

Similaire à Business intelligent (20)

cognos BI10.pptx
cognos BI10.pptxcognos BI10.pptx
cognos BI10.pptx
 
cognos BI10.pptx
cognos BI10.pptxcognos BI10.pptx
cognos BI10.pptx
 
Cognos bi10
Cognos bi10Cognos bi10
Cognos bi10
 
Cognos demo.
Cognos demo.Cognos demo.
Cognos demo.
 
Power BI Overview, Deployment and Governance
Power BI Overview, Deployment and GovernancePower BI Overview, Deployment and Governance
Power BI Overview, Deployment and Governance
 
Power BI: Introduction with a use case and solution
Power BI: Introduction with a use case and solutionPower BI: Introduction with a use case and solution
Power BI: Introduction with a use case and solution
 
business analysis-Data warehousing
business analysis-Data warehousingbusiness analysis-Data warehousing
business analysis-Data warehousing
 
Business Intelligence Module 5
Business Intelligence Module 5Business Intelligence Module 5
Business Intelligence Module 5
 
Cognos CIO CEE 2010 Prague CZE
Cognos CIO CEE 2010 Prague CZECognos CIO CEE 2010 Prague CZE
Cognos CIO CEE 2010 Prague CZE
 
Business analysis in data warehousing
Business analysis in data warehousingBusiness analysis in data warehousing
Business analysis in data warehousing
 
ARTICLE ON BI AND BO
ARTICLE ON BI AND BOARTICLE ON BI AND BO
ARTICLE ON BI AND BO
 
Top 20 Best Business Intelligence Tools | CIO Women Magazine
Top 20 Best Business Intelligence Tools | CIO Women MagazineTop 20 Best Business Intelligence Tools | CIO Women Magazine
Top 20 Best Business Intelligence Tools | CIO Women Magazine
 
Brijesh Soni
Brijesh SoniBrijesh Soni
Brijesh Soni
 
New German interface in InsFocus BI
New German interface in InsFocus BINew German interface in InsFocus BI
New German interface in InsFocus BI
 
Open Source Solution
Open Source SolutionOpen Source Solution
Open Source Solution
 
Cognos Analytics/Business Intelligence Training Catalog - Self Paced, Instruc...
Cognos Analytics/Business Intelligence Training Catalog - Self Paced, Instruc...Cognos Analytics/Business Intelligence Training Catalog - Self Paced, Instruc...
Cognos Analytics/Business Intelligence Training Catalog - Self Paced, Instruc...
 
Vivantek
VivantekVivantek
Vivantek
 
Bdi Systems
Bdi SystemsBdi Systems
Bdi Systems
 
Business intelligence tools to handle big data
Business intelligence tools to handle big dataBusiness intelligence tools to handle big data
Business intelligence tools to handle big data
 
SAP BusinessObject's Webi Rich Client
SAP BusinessObject's Webi Rich ClientSAP BusinessObject's Webi Rich Client
SAP BusinessObject's Webi Rich Client
 

Plus de Migrant Systems

Secure Mining of Association Rules in Horizontally Distributed Databases
Secure Mining of Association Rules in Horizontally Distributed DatabasesSecure Mining of Association Rules in Horizontally Distributed Databases
Secure Mining of Association Rules in Horizontally Distributed DatabasesMigrant Systems
 
m-Privacy for Collaborative Data Publishing
m-Privacy for Collaborative Data Publishingm-Privacy for Collaborative Data Publishing
m-Privacy for Collaborative Data PublishingMigrant Systems
 
NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Net...
NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Net...NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Net...
NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Net...Migrant Systems
 
Supporting Privacy Protection in Personalized Web Search
Supporting Privacy Protection in Personalized Web SearchSupporting Privacy Protection in Personalized Web Search
Supporting Privacy Protection in Personalized Web SearchMigrant Systems
 
Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Co...
Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Co...Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Co...
Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Co...Migrant Systems
 
Exploiting Service Similarity for Privacy in Location Based Search Queries
Exploiting Service Similarity for Privacy in Location Based Search QueriesExploiting Service Similarity for Privacy in Location Based Search Queries
Exploiting Service Similarity for Privacy in Location Based Search QueriesMigrant Systems
 
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...Migrant Systems
 
Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
Oruta: Privacy-Preserving Public Auditing for Shared Data in the CloudOruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
Oruta: Privacy-Preserving Public Auditing for Shared Data in the CloudMigrant Systems
 
User friendly pattern search paradigm
User friendly pattern search paradigmUser friendly pattern search paradigm
User friendly pattern search paradigmMigrant Systems
 
Cloud Computing in migrant
 Cloud Computing in migrant Cloud Computing in migrant
Cloud Computing in migrantMigrant Systems
 
Enhancing Access Privacy of Range Retrievals over B+Trees
Enhancing Access Privacy of Range Retrievals over B+TreesEnhancing Access Privacy of Range Retrievals over B+Trees
Enhancing Access Privacy of Range Retrievals over B+TreesMigrant Systems
 
Enhancing access privacy of range retrievals over b+trees
Enhancing access privacy of range retrievals over b+treesEnhancing access privacy of range retrievals over b+trees
Enhancing access privacy of range retrievals over b+treesMigrant Systems
 
Fingerprint combination for privacy protection
Fingerprint combination for privacy protectionFingerprint combination for privacy protection
Fingerprint combination for privacy protectionMigrant Systems
 

Plus de Migrant Systems (17)

Secure Mining of Association Rules in Horizontally Distributed Databases
Secure Mining of Association Rules in Horizontally Distributed DatabasesSecure Mining of Association Rules in Horizontally Distributed Databases
Secure Mining of Association Rules in Horizontally Distributed Databases
 
m-Privacy for Collaborative Data Publishing
m-Privacy for Collaborative Data Publishingm-Privacy for Collaborative Data Publishing
m-Privacy for Collaborative Data Publishing
 
NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Net...
NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Net...NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Net...
NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Net...
 
Supporting Privacy Protection in Personalized Web Search
Supporting Privacy Protection in Personalized Web SearchSupporting Privacy Protection in Personalized Web Search
Supporting Privacy Protection in Personalized Web Search
 
Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Co...
Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Co...Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Co...
Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Co...
 
Exploiting Service Similarity for Privacy in Location Based Search Queries
Exploiting Service Similarity for Privacy in Location Based Search QueriesExploiting Service Similarity for Privacy in Location Based Search Queries
Exploiting Service Similarity for Privacy in Location Based Search Queries
 
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
 
Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
Oruta: Privacy-Preserving Public Auditing for Shared Data in the CloudOruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
 
Java introduction
Java introductionJava introduction
Java introduction
 
Voyage planet
Voyage planetVoyage planet
Voyage planet
 
User friendly pattern search paradigm
User friendly pattern search paradigmUser friendly pattern search paradigm
User friendly pattern search paradigm
 
Cloud Computing in migrant
 Cloud Computing in migrant Cloud Computing in migrant
Cloud Computing in migrant
 
Enhancing Access Privacy of Range Retrievals over B+Trees
Enhancing Access Privacy of Range Retrievals over B+TreesEnhancing Access Privacy of Range Retrievals over B+Trees
Enhancing Access Privacy of Range Retrievals over B+Trees
 
Abstract
AbstractAbstract
Abstract
 
Enhancing access privacy of range retrievals over b+trees
Enhancing access privacy of range retrievals over b+treesEnhancing access privacy of range retrievals over b+trees
Enhancing access privacy of range retrievals over b+trees
 
Opass
OpassOpass
Opass
 
Fingerprint combination for privacy protection
Fingerprint combination for privacy protectionFingerprint combination for privacy protection
Fingerprint combination for privacy protection
 

Dernier

The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 

Dernier (20)

The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 

Business intelligent

  • 2. BI defined as Business Intelligence BI refers to technologies application and practices for the collection integration, analysis and presentation of business information Business intelligence tools are a type of application software designed to retrieve, analyze and report data for business intelligence. The tools generally read data that have been previously stored, often, though not necessarily, in a data warehouse or data mart.
  • 3. To support better, improved and more efficient Decision Making BI systems provide historical, current, and predictive views of business operations., BI system information from Uses data that has been gathered into a data warehouse or data mart.
  • 4. Spreadsheets Reporting and querying software: tools that extract, sort, summarize, and present selected data OLAP: Online analytical processing Digital dashboards Data mining Data warehousing Decision engineering Process mining Business performance management Local information systems
  • 5. IBM's purchase of Cognos and other business intelligence software vendors was a step in establishing IBM as a BI "megavendor" (along with Oracle, Microsoft, and SAP).  Due to many consolidations in the BI industry, there are only a few independent "pure-play" vendors remaining (SAS and Micro Strategy being the largest).  Hyperion from Oracle Corporation & Business Object from SAP
  • 6. Cognos is Business Intelligence software that enables users to extract data, analyze it, and then assemble reports Cognos is a web-based enterprise reporting solution. Cognos allows you to gather data from various storage locations and assemble the data into a personalized package IBM acquired Cognos (Jan 2008) ,Cognos name continues to be applied to IBM's line of business intelligence and performance management products
  • 7. The software is designed to enable business users without technical knowledge to extract corporate data, analyze it and assemble reports. Cognos product for the individuals, workgroups department, midsize & large enterprise. Cognos software is designed to help everyone in your organization make the decisions that achieve better business outcomes—for now and in the future More than 23,000 customers in over 135 countries so they in market
  • 8.  Cognos Connection (the web portal for IBM Cognos BI. It is the starting point for the browser-based access to all functions provided with the suite. With the help of this, content can be searched in the form of reports, scorecards and agents.  Report Studio (Professional report authoring tool formatted for the web) Query Studio (Ad hoc report authoring tool with instant data preview) Analysis Studio (Explore multi-dimensional cube data to answer business questions)
  • 9. Limited Resources Time-consuming and cumbersome presentation of information IBM Cognos 8 BI provides a more time efficient, concise and clear method of reporting financial data to support better, improved, more efficient Decision Making.
  • 10. IBM Cognos 8 BI, initially launched in September 2005, combined the features of several previous products, including ReportNet, PowerPlay, Metrics Manager, NoticeCast, and DecisionStream. IBM Cognos Express BI, launched in 2008 for mid range companies. IBM Cognos 10 BI , launched in October 2010, it bring together social collaboration &analytics for business users for single user ,user-friendly ,online through mobile, such as ipad,iphone,etc..
  • 11. When a report has multiple formats or languages, when a report has a delivery method of save, print, or email, and when a report is burst.  Hypertext markup language (.html) Adobe portable document format (.pdf) Microsoft Excel spreadsheet (.xls or .xlsx) Delimited text (.csv) Extensible markup language (.xml) If you are the owner of a report or have the necessary permissions, you can specify the default format for each report.
  • 12. Web Application No software loaded onto user machines Web address provided via Management Reporting website or email User Login setup Request for Cognos access available via MR website or email Users will be setup within Cognos with using existing UTSA Login ID & Password
  • 13. Framework Manager Infrastructure organizer for Cognos: security, administration, metadata and portal. Data View A single store of related information containing a number of Data Elements. Also referred to simply as a View. Role Your security is based on permission to view selected data within your individual account, and roles to which you belong. Cognos supports the union of access permissions.
  • 14. Term Description Consumer Consumers can read and execute reports in Cognos based on security. Consumers can also interact with prompts, and define output reports to other formats such as PDF and CSV. This is the most widely spread role/user in Cognos. Query User Query Users have the same access permissions as Consumers. They can also use Cognos Query Studio to create ad hoc queries, simple reports, and charts. Report Author Authors have the same access permissions as Query Users. They can also use Cognos Report Studio which provides the ability to create sophisticated, richly formatted reports and charts with complex prompts and filters. Data Modeler Data Modelers create packages that define a subset of data that is relevant to an intended group of users.
  • 15. Followings are they advantage of Cognos: Planning Analysis Forecasting Scorecard
  • 16. IBM Cognos BI is secured by setting permissions and enabling user authentication. When anonymous access is enabled, you can use IBM Cognos BI without authenticating as a specific user. In IBM Cognos BI, administrators define permissions so that users can access functionality. For example, to edit a report using IBM Cognos Report Studio, you must have the appropriate security and licensing permissions. In addition, each entry in IBM Cognos Connection is secured to define who can read, edit, and run the entry
  • 17. Firefox 3.6 Windows / OS X/UNIX/Linux Compatible Firefox 3.5 Windows / OS X/UNIX/Linux Active Microsoft Internet Explorer 8.0 Windows Active Microsoft Internet Explorer 7.0 Windows Active Microsoft Internet Explorer 6 SP2 Windows XP Compatible
  • 18. It Support all Operation system (platform independent) such as Linux,Unix,Solarix,Windows Mac Os. H/w Process Pentium and above and more than 1GB RAM.
  • 19. Cognos training provide across India Most of they center in Bangalore city. In Chennai Course fee around 10,000 and above and duration as 40 hours. Such center as Green Tech Besent technologies..etc