SlideShare a Scribd company logo
By
VIGNESH.R
BI defined as Business Intelligence
BI refers to technologies application and practices for
the collection integration, analysis and presentation
of business information
Business intelligence tools are a type of application
software designed to retrieve, analyze and report data
for business intelligence. The tools generally read data
that have been previously stored, often, though not
necessarily, in a data warehouse or data mart.
To support better, improved and more efficient Decision
Making
BI systems provide historical, current, and predictive
views of business operations.,
BI system information from Uses data that has been
gathered into a data warehouse or data mart.
Spreadsheets
Reporting and querying software: tools that extract,
sort, summarize, and present selected data
OLAP: Online analytical processing
Digital dashboards
Data mining
Data warehousing
Decision engineering
Process mining
Business performance management
Local information systems
IBM's purchase of Cognos and other business
intelligence software vendors was a step in
establishing IBM as a BI "megavendor" (along with
Oracle, Microsoft, and SAP).
 Due to many consolidations in the BI industry, there
are only a few independent "pure-play" vendors
remaining (SAS and Micro Strategy being the largest).
 Hyperion from Oracle Corporation & Business Object
from SAP
Cognos is Business Intelligence software that
enables users to extract data, analyze it, and then
assemble reports
Cognos is a web-based enterprise reporting solution.
Cognos allows you to gather data from various storage
locations and assemble the data into a personalized
package
IBM acquired Cognos (Jan 2008) ,Cognos name
continues to be applied to IBM's line of business
intelligence and performance management products
The software is designed to enable business users
without technical knowledge to extract corporate
data, analyze it and assemble reports.
Cognos product for the individuals, workgroups
department, midsize & large enterprise.
Cognos software is designed to help everyone in your
organization make the decisions that achieve better
business outcomes—for now and in the future
More than 23,000 customers in over 135 countries so
they in market
 Cognos Connection (the web portal for IBM Cognos
BI. It is the starting point for the browser-based access
to all functions provided with the suite. With the help
of this, content can be searched in the form of reports,
scorecards and agents.
 Report Studio (Professional report authoring tool
formatted for the web)
Query Studio (Ad hoc report authoring tool with
instant data preview)
Analysis Studio (Explore multi-dimensional cube data
to answer business questions)
Limited Resources
Time-consuming and cumbersome presentation of
information
IBM Cognos 8 BI provides a more time efficient, concise
and clear method of reporting financial data to support
better, improved, more efficient Decision Making.
IBM Cognos 8 BI, initially launched in September 2005,
combined the features of several previous products,
including ReportNet, PowerPlay, Metrics Manager,
NoticeCast, and DecisionStream.
IBM Cognos Express BI, launched in 2008 for mid
range companies.
IBM Cognos 10 BI , launched in October 2010, it bring
together social collaboration &analytics for business
users for single user ,user-friendly ,online through
mobile, such as ipad,iphone,etc..
When a report has multiple formats or languages,
when a report has a delivery method of save, print, or
email, and when a report is burst.
 Hypertext markup language (.html)
Adobe portable document format (.pdf)
Microsoft Excel spreadsheet (.xls or .xlsx)
Delimited text (.csv)
Extensible markup language (.xml)
If you are the owner of a report or have the necessary
permissions, you can specify the default format for
each report.
Web Application
No software loaded onto user machines
Web address provided via Management Reporting
website or email
User Login setup
Request for Cognos access available via MR website or
email
Users will be setup within Cognos with using existing
UTSA Login ID & Password
Framework Manager
Infrastructure organizer for Cognos: security,
administration, metadata and portal.
Data View
A single store of related information containing a
number of Data Elements. Also referred to simply as a
View.
Role
Your security is based on permission to view selected
data within your individual account, and roles to
which you belong. Cognos supports the union of
access permissions.
Term Description
Consumer Consumers can read and execute reports in Cognos
based on security. Consumers can also interact with
prompts, and define output reports to other formats
such as PDF and CSV. This is the most widely spread
role/user in Cognos.
Query User Query Users have the same access permissions as
Consumers. They can also use Cognos Query Studio to
create ad hoc queries, simple reports, and charts.
Report Author Authors have the same access permissions as Query
Users. They can also use Cognos Report Studio which
provides the ability to create sophisticated, richly
formatted reports and charts with complex prompts
and filters.
Data Modeler Data Modelers create packages that define a subset of
data that is relevant to an intended group of users.
Followings are they advantage of Cognos:
Planning
Analysis
Forecasting
Scorecard
IBM Cognos BI is secured by setting permissions and
enabling user authentication.
When anonymous access is enabled, you can use IBM
Cognos BI without authenticating as a specific user.
In IBM Cognos BI, administrators define permissions
so that users can access functionality. For example, to
edit a report using IBM Cognos Report Studio, you
must have the appropriate security and licensing
permissions.
In addition, each entry in IBM Cognos Connection is
secured to define who can read, edit, and run the entry
Firefox 3.6 Windows / OS X/UNIX/Linux Compatible
Firefox 3.5 Windows / OS X/UNIX/Linux Active
Microsoft Internet Explorer 8.0 Windows Active
Microsoft Internet Explorer 7.0 Windows Active
Microsoft Internet Explorer 6 SP2 Windows XP
Compatible
It Support all Operation system (platform
independent) such as Linux,Unix,Solarix,Windows
Mac Os.
H/w Process Pentium and above and more than 1GB
RAM.
Cognos training provide across India Most of they
center in Bangalore city.
In Chennai Course fee around 10,000 and above and
duration as 40 hours. Such center as Green Tech
Besent technologies..etc

More Related Content

What's hot

Data Virtualization: Introduction and Business Value (UK)
Data Virtualization: Introduction and Business Value (UK)Data Virtualization: Introduction and Business Value (UK)
Data Virtualization: Introduction and Business Value (UK)
Denodo
 
Requirements document for big data use cases
Requirements document for big data use casesRequirements document for big data use cases
Requirements document for big data use cases
Allied Consultants
 
Delivering scalable and high performance BI with least IT effort
Delivering scalable and high performance BI with least IT effortDelivering scalable and high performance BI with least IT effort
Delivering scalable and high performance BI with least IT effort
BiBoard.Org
 
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
IRJET Journal
 
Microstrategy 9.2
Microstrategy 9.2Microstrategy 9.2
Microstrategy 9.2
krmartin_dal
 
Fight Fraud with Big Data Analytics
Fight Fraud with Big Data AnalyticsFight Fraud with Big Data Analytics
Fight Fraud with Big Data Analytics
Datameer
 
How to Swiftly Operationalize the Data Lake for Advanced Analytics Using a Lo...
How to Swiftly Operationalize the Data Lake for Advanced Analytics Using a Lo...How to Swiftly Operationalize the Data Lake for Advanced Analytics Using a Lo...
How to Swiftly Operationalize the Data Lake for Advanced Analytics Using a Lo...
Denodo
 
Unlocking Business Value Using Data
Unlocking Business Value Using DataUnlocking Business Value Using Data
Unlocking Business Value Using Data
Splunk
 
A Study on Big Data Privacy Protection Models using Data Masking Methods
A Study on Big Data Privacy Protection Models using Data Masking Methods A Study on Big Data Privacy Protection Models using Data Masking Methods
A Study on Big Data Privacy Protection Models using Data Masking Methods
IJECEIAES
 
Myth Busters: I’m Building a Data Lake, So I Don’t Need Data Virtualization (...
Myth Busters: I’m Building a Data Lake, So I Don’t Need Data Virtualization (...Myth Busters: I’m Building a Data Lake, So I Don’t Need Data Virtualization (...
Myth Busters: I’m Building a Data Lake, So I Don’t Need Data Virtualization (...
Denodo
 
COIRS: Cost Optimized Identity based Ring Signature with Forward Secrecy in ...
 COIRS: Cost Optimized Identity based Ring Signature with Forward Secrecy in ... COIRS: Cost Optimized Identity based Ring Signature with Forward Secrecy in ...
COIRS: Cost Optimized Identity based Ring Signature with Forward Secrecy in ...
IJCSIS Research Publications
 
Maximizing Data Lake ROI with Data Virtualization: A Technical Demonstration
Maximizing Data Lake ROI with Data Virtualization: A Technical DemonstrationMaximizing Data Lake ROI with Data Virtualization: A Technical Demonstration
Maximizing Data Lake ROI with Data Virtualization: A Technical Demonstration
Denodo
 
IRJET- A Survey on File Storage and Retrieval using Blockchain Technology
IRJET- A Survey on File Storage and Retrieval using Blockchain TechnologyIRJET- A Survey on File Storage and Retrieval using Blockchain Technology
IRJET- A Survey on File Storage and Retrieval using Blockchain Technology
IRJET Journal
 
SplunkLive! New York April 2013 - Enrich Machine Data with Structured Data
SplunkLive! New York April 2013 - Enrich Machine Data with Structured DataSplunkLive! New York April 2013 - Enrich Machine Data with Structured Data
SplunkLive! New York April 2013 - Enrich Machine Data with Structured Data
Splunk
 
Database Management in Different Applications of IOT
Database Management in Different Applications of IOTDatabase Management in Different Applications of IOT
Database Management in Different Applications of IOT
ijceronline
 
What Is Solution Architecture? The Black Art Of I/T Solution Architecture
What Is Solution Architecture? The Black Art Of I/T Solution ArchitectureWhat Is Solution Architecture? The Black Art Of I/T Solution Architecture
What Is Solution Architecture? The Black Art Of I/T Solution Architecture
Nick Noecker
 
OpenText PowerDOCS: A Cloud Solution for Document Generation
OpenText PowerDOCS: A Cloud Solution for Document GenerationOpenText PowerDOCS: A Cloud Solution for Document Generation
OpenText PowerDOCS: A Cloud Solution for Document Generation
Marc St-Pierre
 
In-Network Distributed Analytics on Data-Centric IoT Network for BI-Service A...
In-Network Distributed Analytics on Data-Centric IoT Network for BI-Service A...In-Network Distributed Analytics on Data-Centric IoT Network for BI-Service A...
In-Network Distributed Analytics on Data-Centric IoT Network for BI-Service A...
IRJET Journal
 
Product Keynote: Denodo 8.0 - A Logical Data Fabric for the Intelligent Enter...
Product Keynote: Denodo 8.0 - A Logical Data Fabric for the Intelligent Enter...Product Keynote: Denodo 8.0 - A Logical Data Fabric for the Intelligent Enter...
Product Keynote: Denodo 8.0 - A Logical Data Fabric for the Intelligent Enter...
Denodo
 
Denodo’s Data Catalog: Bridging the Gap between Data and Business (APAC)
Denodo’s Data Catalog: Bridging the Gap between Data and Business (APAC)Denodo’s Data Catalog: Bridging the Gap between Data and Business (APAC)
Denodo’s Data Catalog: Bridging the Gap between Data and Business (APAC)
Denodo
 

What's hot (20)

Data Virtualization: Introduction and Business Value (UK)
Data Virtualization: Introduction and Business Value (UK)Data Virtualization: Introduction and Business Value (UK)
Data Virtualization: Introduction and Business Value (UK)
 
Requirements document for big data use cases
Requirements document for big data use casesRequirements document for big data use cases
Requirements document for big data use cases
 
Delivering scalable and high performance BI with least IT effort
Delivering scalable and high performance BI with least IT effortDelivering scalable and high performance BI with least IT effort
Delivering scalable and high performance BI with least IT effort
 
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
 
Microstrategy 9.2
Microstrategy 9.2Microstrategy 9.2
Microstrategy 9.2
 
Fight Fraud with Big Data Analytics
Fight Fraud with Big Data AnalyticsFight Fraud with Big Data Analytics
Fight Fraud with Big Data Analytics
 
How to Swiftly Operationalize the Data Lake for Advanced Analytics Using a Lo...
How to Swiftly Operationalize the Data Lake for Advanced Analytics Using a Lo...How to Swiftly Operationalize the Data Lake for Advanced Analytics Using a Lo...
How to Swiftly Operationalize the Data Lake for Advanced Analytics Using a Lo...
 
Unlocking Business Value Using Data
Unlocking Business Value Using DataUnlocking Business Value Using Data
Unlocking Business Value Using Data
 
A Study on Big Data Privacy Protection Models using Data Masking Methods
A Study on Big Data Privacy Protection Models using Data Masking Methods A Study on Big Data Privacy Protection Models using Data Masking Methods
A Study on Big Data Privacy Protection Models using Data Masking Methods
 
Myth Busters: I’m Building a Data Lake, So I Don’t Need Data Virtualization (...
Myth Busters: I’m Building a Data Lake, So I Don’t Need Data Virtualization (...Myth Busters: I’m Building a Data Lake, So I Don’t Need Data Virtualization (...
Myth Busters: I’m Building a Data Lake, So I Don’t Need Data Virtualization (...
 
COIRS: Cost Optimized Identity based Ring Signature with Forward Secrecy in ...
 COIRS: Cost Optimized Identity based Ring Signature with Forward Secrecy in ... COIRS: Cost Optimized Identity based Ring Signature with Forward Secrecy in ...
COIRS: Cost Optimized Identity based Ring Signature with Forward Secrecy in ...
 
Maximizing Data Lake ROI with Data Virtualization: A Technical Demonstration
Maximizing Data Lake ROI with Data Virtualization: A Technical DemonstrationMaximizing Data Lake ROI with Data Virtualization: A Technical Demonstration
Maximizing Data Lake ROI with Data Virtualization: A Technical Demonstration
 
IRJET- A Survey on File Storage and Retrieval using Blockchain Technology
IRJET- A Survey on File Storage and Retrieval using Blockchain TechnologyIRJET- A Survey on File Storage and Retrieval using Blockchain Technology
IRJET- A Survey on File Storage and Retrieval using Blockchain Technology
 
SplunkLive! New York April 2013 - Enrich Machine Data with Structured Data
SplunkLive! New York April 2013 - Enrich Machine Data with Structured DataSplunkLive! New York April 2013 - Enrich Machine Data with Structured Data
SplunkLive! New York April 2013 - Enrich Machine Data with Structured Data
 
Database Management in Different Applications of IOT
Database Management in Different Applications of IOTDatabase Management in Different Applications of IOT
Database Management in Different Applications of IOT
 
What Is Solution Architecture? The Black Art Of I/T Solution Architecture
What Is Solution Architecture? The Black Art Of I/T Solution ArchitectureWhat Is Solution Architecture? The Black Art Of I/T Solution Architecture
What Is Solution Architecture? The Black Art Of I/T Solution Architecture
 
OpenText PowerDOCS: A Cloud Solution for Document Generation
OpenText PowerDOCS: A Cloud Solution for Document GenerationOpenText PowerDOCS: A Cloud Solution for Document Generation
OpenText PowerDOCS: A Cloud Solution for Document Generation
 
In-Network Distributed Analytics on Data-Centric IoT Network for BI-Service A...
In-Network Distributed Analytics on Data-Centric IoT Network for BI-Service A...In-Network Distributed Analytics on Data-Centric IoT Network for BI-Service A...
In-Network Distributed Analytics on Data-Centric IoT Network for BI-Service A...
 
Product Keynote: Denodo 8.0 - A Logical Data Fabric for the Intelligent Enter...
Product Keynote: Denodo 8.0 - A Logical Data Fabric for the Intelligent Enter...Product Keynote: Denodo 8.0 - A Logical Data Fabric for the Intelligent Enter...
Product Keynote: Denodo 8.0 - A Logical Data Fabric for the Intelligent Enter...
 
Denodo’s Data Catalog: Bridging the Gap between Data and Business (APAC)
Denodo’s Data Catalog: Bridging the Gap between Data and Business (APAC)Denodo’s Data Catalog: Bridging the Gap between Data and Business (APAC)
Denodo’s Data Catalog: Bridging the Gap between Data and Business (APAC)
 

Viewers also liked

Business Intelligence
Business Intelligence Business Intelligence
Business Intelligence
Migrant Systems
 
Buisness Intelligence and Web Analytics
Buisness Intelligence and Web AnalyticsBuisness Intelligence and Web Analytics
Buisness Intelligence and Web Analytics
Vincent Maher
 
Improving Service Centre Performance
Improving Service Centre PerformanceImproving Service Centre Performance
Improving Service Centre Performance
immysdream
 
Business intelligence overview
Business intelligence overviewBusiness intelligence overview
Business intelligence overview
Canara bank
 
Business intelligence
Business intelligenceBusiness intelligence
Business intelligence
Roots Cast Pvt Ltd
 
Business Intelligence - Intro
Business Intelligence - IntroBusiness Intelligence - Intro
Business Intelligence - Intro
David Hubbard
 
Business Intelligence Presentation (1/2)
Business Intelligence Presentation (1/2)Business Intelligence Presentation (1/2)
Business Intelligence Presentation (1/2)
Bernardo Najlis
 

Viewers also liked (7)

Business Intelligence
Business Intelligence Business Intelligence
Business Intelligence
 
Buisness Intelligence and Web Analytics
Buisness Intelligence and Web AnalyticsBuisness Intelligence and Web Analytics
Buisness Intelligence and Web Analytics
 
Improving Service Centre Performance
Improving Service Centre PerformanceImproving Service Centre Performance
Improving Service Centre Performance
 
Business intelligence overview
Business intelligence overviewBusiness intelligence overview
Business intelligence overview
 
Business intelligence
Business intelligenceBusiness intelligence
Business intelligence
 
Business Intelligence - Intro
Business Intelligence - IntroBusiness Intelligence - Intro
Business Intelligence - Intro
 
Business Intelligence Presentation (1/2)
Business Intelligence Presentation (1/2)Business Intelligence Presentation (1/2)
Business Intelligence Presentation (1/2)
 

Similar to Business intelligent

cognos BI10.pptx
cognos BI10.pptxcognos BI10.pptx
cognos BI10.pptx
vishal choudhary
 
cognos BI10.pptx
cognos BI10.pptxcognos BI10.pptx
cognos BI10.pptx
vishal choudhary
 
Cognos bi10
Cognos bi10Cognos bi10
Cognos bi10
vishal choudhary
 
Cognos demo.
Cognos demo.Cognos demo.
Cognos demo.
Vivek Raja
 
Power BI Overview, Deployment and Governance
Power BI Overview, Deployment and GovernancePower BI Overview, Deployment and Governance
Power BI Overview, Deployment and Governance
James Serra
 
Power BI: Introduction with a use case and solution
Power BI: Introduction with a use case and solutionPower BI: Introduction with a use case and solution
Power BI: Introduction with a use case and solution
Alvina Verghis
 
business analysis-Data warehousing
business analysis-Data warehousingbusiness analysis-Data warehousing
business analysis-Data warehousing
Dhilsath Fathima
 
Business Intelligence Module 5
Business Intelligence Module 5Business Intelligence Module 5
Business Intelligence Module 5
Home
 
Cognos CIO CEE 2010 Prague CZE
Cognos CIO CEE 2010 Prague CZECognos CIO CEE 2010 Prague CZE
Cognos CIO CEE 2010 Prague CZE
Stepan Kutaj
 
Business analysis in data warehousing
Business analysis in data warehousingBusiness analysis in data warehousing
Business analysis in data warehousing
Himanshu
 
ARTICLE ON BI AND BO
ARTICLE ON BI AND BOARTICLE ON BI AND BO
ARTICLE ON BI AND BO
Trisha Chakraborty
 
Top 20 Best Business Intelligence Tools | CIO Women Magazine
Top 20 Best Business Intelligence Tools | CIO Women MagazineTop 20 Best Business Intelligence Tools | CIO Women Magazine
Top 20 Best Business Intelligence Tools | CIO Women Magazine
CIOWomenMagazine
 
Brijesh Soni
Brijesh SoniBrijesh Soni
Brijesh Soni
Brijesh Soni
 
New German interface in InsFocus BI
New German interface in InsFocus BINew German interface in InsFocus BI
New German interface in InsFocus BI
Yaron
 
Open Source Solution
Open Source SolutionOpen Source Solution
Open Source Solution
ittishait
 
Cognos Analytics/Business Intelligence Training Catalog - Self Paced, Instruc...
Cognos Analytics/Business Intelligence Training Catalog - Self Paced, Instruc...Cognos Analytics/Business Intelligence Training Catalog - Self Paced, Instruc...
Cognos Analytics/Business Intelligence Training Catalog - Self Paced, Instruc...
QueBIT Consulting
 
Vivantek
VivantekVivantek
Bdi Systems
Bdi SystemsBdi Systems
Bdi Systems
aryan990
 
Business intelligence tools to handle big data
Business intelligence tools to handle big dataBusiness intelligence tools to handle big data
Business intelligence tools to handle big data
Ishucs
 
SAP BusinessObject's Webi Rich Client
SAP BusinessObject's Webi Rich ClientSAP BusinessObject's Webi Rich Client
SAP BusinessObject's Webi Rich Client
Eric Molner
 

Similar to Business intelligent (20)

cognos BI10.pptx
cognos BI10.pptxcognos BI10.pptx
cognos BI10.pptx
 
cognos BI10.pptx
cognos BI10.pptxcognos BI10.pptx
cognos BI10.pptx
 
Cognos bi10
Cognos bi10Cognos bi10
Cognos bi10
 
Cognos demo.
Cognos demo.Cognos demo.
Cognos demo.
 
Power BI Overview, Deployment and Governance
Power BI Overview, Deployment and GovernancePower BI Overview, Deployment and Governance
Power BI Overview, Deployment and Governance
 
Power BI: Introduction with a use case and solution
Power BI: Introduction with a use case and solutionPower BI: Introduction with a use case and solution
Power BI: Introduction with a use case and solution
 
business analysis-Data warehousing
business analysis-Data warehousingbusiness analysis-Data warehousing
business analysis-Data warehousing
 
Business Intelligence Module 5
Business Intelligence Module 5Business Intelligence Module 5
Business Intelligence Module 5
 
Cognos CIO CEE 2010 Prague CZE
Cognos CIO CEE 2010 Prague CZECognos CIO CEE 2010 Prague CZE
Cognos CIO CEE 2010 Prague CZE
 
Business analysis in data warehousing
Business analysis in data warehousingBusiness analysis in data warehousing
Business analysis in data warehousing
 
ARTICLE ON BI AND BO
ARTICLE ON BI AND BOARTICLE ON BI AND BO
ARTICLE ON BI AND BO
 
Top 20 Best Business Intelligence Tools | CIO Women Magazine
Top 20 Best Business Intelligence Tools | CIO Women MagazineTop 20 Best Business Intelligence Tools | CIO Women Magazine
Top 20 Best Business Intelligence Tools | CIO Women Magazine
 
Brijesh Soni
Brijesh SoniBrijesh Soni
Brijesh Soni
 
New German interface in InsFocus BI
New German interface in InsFocus BINew German interface in InsFocus BI
New German interface in InsFocus BI
 
Open Source Solution
Open Source SolutionOpen Source Solution
Open Source Solution
 
Cognos Analytics/Business Intelligence Training Catalog - Self Paced, Instruc...
Cognos Analytics/Business Intelligence Training Catalog - Self Paced, Instruc...Cognos Analytics/Business Intelligence Training Catalog - Self Paced, Instruc...
Cognos Analytics/Business Intelligence Training Catalog - Self Paced, Instruc...
 
Vivantek
VivantekVivantek
Vivantek
 
Bdi Systems
Bdi SystemsBdi Systems
Bdi Systems
 
Business intelligence tools to handle big data
Business intelligence tools to handle big dataBusiness intelligence tools to handle big data
Business intelligence tools to handle big data
 
SAP BusinessObject's Webi Rich Client
SAP BusinessObject's Webi Rich ClientSAP BusinessObject's Webi Rich Client
SAP BusinessObject's Webi Rich Client
 

More from Migrant Systems

Secure Mining of Association Rules in Horizontally Distributed Databases
Secure Mining of Association Rules in Horizontally Distributed DatabasesSecure Mining of Association Rules in Horizontally Distributed Databases
Secure Mining of Association Rules in Horizontally Distributed Databases
Migrant Systems
 
m-Privacy for Collaborative Data Publishing
m-Privacy for Collaborative Data Publishingm-Privacy for Collaborative Data Publishing
m-Privacy for Collaborative Data Publishing
Migrant Systems
 
NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Net...
NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Net...NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Net...
NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Net...
Migrant Systems
 
Supporting Privacy Protection in Personalized Web Search
Supporting Privacy Protection in Personalized Web SearchSupporting Privacy Protection in Personalized Web Search
Supporting Privacy Protection in Personalized Web Search
Migrant Systems
 
Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Co...
Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Co...Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Co...
Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Co...
Migrant Systems
 
Exploiting Service Similarity for Privacy in Location Based Search Queries
Exploiting Service Similarity for Privacy in Location Based Search QueriesExploiting Service Similarity for Privacy in Location Based Search Queries
Exploiting Service Similarity for Privacy in Location Based Search Queries
Migrant Systems
 
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
Migrant Systems
 
Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
Oruta: Privacy-Preserving Public Auditing for Shared Data in the CloudOruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
Migrant Systems
 
Java introduction
Java introductionJava introduction
Java introduction
Migrant Systems
 
Voyage planet
Voyage planetVoyage planet
Voyage planet
Migrant Systems
 
User friendly pattern search paradigm
User friendly pattern search paradigmUser friendly pattern search paradigm
User friendly pattern search paradigm
Migrant Systems
 
Cloud Computing in migrant
 Cloud Computing in migrant Cloud Computing in migrant
Cloud Computing in migrant
Migrant Systems
 
Enhancing Access Privacy of Range Retrievals over B+Trees
Enhancing Access Privacy of Range Retrievals over B+TreesEnhancing Access Privacy of Range Retrievals over B+Trees
Enhancing Access Privacy of Range Retrievals over B+Trees
Migrant Systems
 
Abstract
AbstractAbstract
Enhancing access privacy of range retrievals over b+trees
Enhancing access privacy of range retrievals over b+treesEnhancing access privacy of range retrievals over b+trees
Enhancing access privacy of range retrievals over b+trees
Migrant Systems
 
Opass
OpassOpass
Fingerprint combination for privacy protection
Fingerprint combination for privacy protectionFingerprint combination for privacy protection
Fingerprint combination for privacy protection
Migrant Systems
 

More from Migrant Systems (17)

Secure Mining of Association Rules in Horizontally Distributed Databases
Secure Mining of Association Rules in Horizontally Distributed DatabasesSecure Mining of Association Rules in Horizontally Distributed Databases
Secure Mining of Association Rules in Horizontally Distributed Databases
 
m-Privacy for Collaborative Data Publishing
m-Privacy for Collaborative Data Publishingm-Privacy for Collaborative Data Publishing
m-Privacy for Collaborative Data Publishing
 
NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Net...
NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Net...NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Net...
NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Net...
 
Supporting Privacy Protection in Personalized Web Search
Supporting Privacy Protection in Personalized Web SearchSupporting Privacy Protection in Personalized Web Search
Supporting Privacy Protection in Personalized Web Search
 
Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Co...
Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Co...Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Co...
Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Co...
 
Exploiting Service Similarity for Privacy in Location Based Search Queries
Exploiting Service Similarity for Privacy in Location Based Search QueriesExploiting Service Similarity for Privacy in Location Based Search Queries
Exploiting Service Similarity for Privacy in Location Based Search Queries
 
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
 
Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
Oruta: Privacy-Preserving Public Auditing for Shared Data in the CloudOruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
 
Java introduction
Java introductionJava introduction
Java introduction
 
Voyage planet
Voyage planetVoyage planet
Voyage planet
 
User friendly pattern search paradigm
User friendly pattern search paradigmUser friendly pattern search paradigm
User friendly pattern search paradigm
 
Cloud Computing in migrant
 Cloud Computing in migrant Cloud Computing in migrant
Cloud Computing in migrant
 
Enhancing Access Privacy of Range Retrievals over B+Trees
Enhancing Access Privacy of Range Retrievals over B+TreesEnhancing Access Privacy of Range Retrievals over B+Trees
Enhancing Access Privacy of Range Retrievals over B+Trees
 
Abstract
AbstractAbstract
Abstract
 
Enhancing access privacy of range retrievals over b+trees
Enhancing access privacy of range retrievals over b+treesEnhancing access privacy of range retrievals over b+trees
Enhancing access privacy of range retrievals over b+trees
 
Opass
OpassOpass
Opass
 
Fingerprint combination for privacy protection
Fingerprint combination for privacy protectionFingerprint combination for privacy protection
Fingerprint combination for privacy protection
 

Recently uploaded

UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 

Recently uploaded (20)

UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 

Business intelligent

  • 2. BI defined as Business Intelligence BI refers to technologies application and practices for the collection integration, analysis and presentation of business information Business intelligence tools are a type of application software designed to retrieve, analyze and report data for business intelligence. The tools generally read data that have been previously stored, often, though not necessarily, in a data warehouse or data mart.
  • 3. To support better, improved and more efficient Decision Making BI systems provide historical, current, and predictive views of business operations., BI system information from Uses data that has been gathered into a data warehouse or data mart.
  • 4. Spreadsheets Reporting and querying software: tools that extract, sort, summarize, and present selected data OLAP: Online analytical processing Digital dashboards Data mining Data warehousing Decision engineering Process mining Business performance management Local information systems
  • 5. IBM's purchase of Cognos and other business intelligence software vendors was a step in establishing IBM as a BI "megavendor" (along with Oracle, Microsoft, and SAP).  Due to many consolidations in the BI industry, there are only a few independent "pure-play" vendors remaining (SAS and Micro Strategy being the largest).  Hyperion from Oracle Corporation & Business Object from SAP
  • 6. Cognos is Business Intelligence software that enables users to extract data, analyze it, and then assemble reports Cognos is a web-based enterprise reporting solution. Cognos allows you to gather data from various storage locations and assemble the data into a personalized package IBM acquired Cognos (Jan 2008) ,Cognos name continues to be applied to IBM's line of business intelligence and performance management products
  • 7. The software is designed to enable business users without technical knowledge to extract corporate data, analyze it and assemble reports. Cognos product for the individuals, workgroups department, midsize & large enterprise. Cognos software is designed to help everyone in your organization make the decisions that achieve better business outcomes—for now and in the future More than 23,000 customers in over 135 countries so they in market
  • 8.  Cognos Connection (the web portal for IBM Cognos BI. It is the starting point for the browser-based access to all functions provided with the suite. With the help of this, content can be searched in the form of reports, scorecards and agents.  Report Studio (Professional report authoring tool formatted for the web) Query Studio (Ad hoc report authoring tool with instant data preview) Analysis Studio (Explore multi-dimensional cube data to answer business questions)
  • 9. Limited Resources Time-consuming and cumbersome presentation of information IBM Cognos 8 BI provides a more time efficient, concise and clear method of reporting financial data to support better, improved, more efficient Decision Making.
  • 10. IBM Cognos 8 BI, initially launched in September 2005, combined the features of several previous products, including ReportNet, PowerPlay, Metrics Manager, NoticeCast, and DecisionStream. IBM Cognos Express BI, launched in 2008 for mid range companies. IBM Cognos 10 BI , launched in October 2010, it bring together social collaboration &analytics for business users for single user ,user-friendly ,online through mobile, such as ipad,iphone,etc..
  • 11. When a report has multiple formats or languages, when a report has a delivery method of save, print, or email, and when a report is burst.  Hypertext markup language (.html) Adobe portable document format (.pdf) Microsoft Excel spreadsheet (.xls or .xlsx) Delimited text (.csv) Extensible markup language (.xml) If you are the owner of a report or have the necessary permissions, you can specify the default format for each report.
  • 12. Web Application No software loaded onto user machines Web address provided via Management Reporting website or email User Login setup Request for Cognos access available via MR website or email Users will be setup within Cognos with using existing UTSA Login ID & Password
  • 13. Framework Manager Infrastructure organizer for Cognos: security, administration, metadata and portal. Data View A single store of related information containing a number of Data Elements. Also referred to simply as a View. Role Your security is based on permission to view selected data within your individual account, and roles to which you belong. Cognos supports the union of access permissions.
  • 14. Term Description Consumer Consumers can read and execute reports in Cognos based on security. Consumers can also interact with prompts, and define output reports to other formats such as PDF and CSV. This is the most widely spread role/user in Cognos. Query User Query Users have the same access permissions as Consumers. They can also use Cognos Query Studio to create ad hoc queries, simple reports, and charts. Report Author Authors have the same access permissions as Query Users. They can also use Cognos Report Studio which provides the ability to create sophisticated, richly formatted reports and charts with complex prompts and filters. Data Modeler Data Modelers create packages that define a subset of data that is relevant to an intended group of users.
  • 15. Followings are they advantage of Cognos: Planning Analysis Forecasting Scorecard
  • 16. IBM Cognos BI is secured by setting permissions and enabling user authentication. When anonymous access is enabled, you can use IBM Cognos BI without authenticating as a specific user. In IBM Cognos BI, administrators define permissions so that users can access functionality. For example, to edit a report using IBM Cognos Report Studio, you must have the appropriate security and licensing permissions. In addition, each entry in IBM Cognos Connection is secured to define who can read, edit, and run the entry
  • 17. Firefox 3.6 Windows / OS X/UNIX/Linux Compatible Firefox 3.5 Windows / OS X/UNIX/Linux Active Microsoft Internet Explorer 8.0 Windows Active Microsoft Internet Explorer 7.0 Windows Active Microsoft Internet Explorer 6 SP2 Windows XP Compatible
  • 18. It Support all Operation system (platform independent) such as Linux,Unix,Solarix,Windows Mac Os. H/w Process Pentium and above and more than 1GB RAM.
  • 19. Cognos training provide across India Most of they center in Bangalore city. In Chennai Course fee around 10,000 and above and duration as 40 hours. Such center as Green Tech Besent technologies..etc