2. 2
Neumann
Enter
Statement Of Purpose and Opportunities
Enter
To those who rely on data to approach the truth,
Who desire to cope with change and technology,
We distinctively deliver intelligent, simple to use business tools
that run on one single Data Platform.
4. 4
Data
Big Data
RDBMs
Social
Click Stream
Geo Location
Server Logs
Sensor
Feeds
Flat Files
→ Visual wizards to design templates for data capturing of any data type
→ On-demand or automatic capturing through workflows
9. 9
Data Virtualization
Design Tools
Cache
Scheduler
Monitoring
Metadata
Security
Publish Real time Data Services
CombineTransforms, Improve Quality, Integrate
Connect NormalizedViews of Disparate Data
Connectors Any Data or Content Read andWrite
→ Raw data can be bridged and manipulated to create a performant virtual data model, kind of virtual
views available for ad-hoc reporting
10. 10
Loading & Provisioning Data
Data Source
Virtualization Layer
Direct Real Time Read
Materialization
Scheduled Materialization
Local Repository
11. 11
Data Visualization
→ Self-service business intelligence tool
→ 360° view of the business
→ Codeless, drag-and drop advanced visualizations
→ Ad-hoc reporting/Cross document drilling
→ Export to excel or to any data form
13. 13
Data Input Through Designed Forms
→ Bi-directional
→ Data can be edited through forms and grids via a built-in form designer
→ Forms and grids can be linked to workflows to create case management scenarios
→ Form designer also used to build user driven full-fledged applications
→ Ad-hoc reports can be assembled in one application, with a set of documents, menu, navigation, landing page
→ One ad-hoc report can exist in multiple documents and one document can be embedded in other documents
→ Concept tailored towards a team work
14. 14
User Authentication and Security
→ OrBAC (Organization Based Access Control) security model
→ Supports LDAP integration
Log level security is also available, where each user views only the
logs that he is allowed to, also access to the logs is within an
authenticated user session.
All the data source connection strings have their usernames and
passwords encrypted at the database level and are not displayed on
the log level.
Role Activity View
User Action Object
Organization