SlideShare a Scribd company logo
9 t h 	 E u r o p e a n 	 T D W I 	 C o n f e r e n c e , 	 M u n i c h , 	 1 5 . 0 6 . 2 0 0 9	
	
Dr.	Olivera	Marjanovic	
University	of	Sydney	
ChrisFan	Schieder	
Chemnitz	University	of	Technology	
Opera&onal	Intelligence	
An	IntroducFon	to	Event-driven,	Rule-based	Business	Process	Intelligence	SoluFons
©	2009	by	ChrisFan	Schieder	 2
Agenda	
What	is	OperaFonal	
Intelligence	about?	
Understanding	
OperaFonal	Intelligence	
Concepts	
BI/BPM	IntegraFon	
Roadmap,	Strategies,	
Methods	and	Training	
Technologies	for	
OperaFonal	Intelligence	
Case	Study	II:	RealFme	
ReporFng	in	CamshaT	
Manufactoring	
Case	Study	I:	Change	
Data	Capture	@	Sony	
Online	Entertainment	
Case	Study	III:	
Customer	Centric	
Decisioning:	Deliver	
the	Perfect	Message	
at	the	Perfect	
Moment
What	is	Opera&onal	Intelligence	about?	
		 	 	 													…turning	data	into	acFonable	intelligence…
©	2009	by	ChrisFan	Schieder	 4
A	brief	history	of	Opera&onal	Intelligence
©	2009	by	ChrisFan	Schieder	 5
From	Sun	Tsu‘s	“Art	of	War”…	
by	663highland	@	wikipedia	
“Superior	commanders	succeed	in	
situaFons	where	ordinary	people	fail	
because	they	obtain	more	Fmely	
informaFon	and	use	it	more	
quickly.”	
	
Sun	Tsu,	The	Art	of	War,	6th	century	BC
©	2009	by	ChrisFan	Schieder	 6
…to	Churchill‘s	Adap&ve	Enterprise…		
Bletchley	Park	
Intelligence	Capture	
Storey‘s	Gate	
Cabinet	War	Room	
Whitehall	Minitries	
Supply	Chain	Management	
Bentley	Prior	
RealFme	Monitoring
©	2009	by	ChrisFan	Schieder	 7
…and	modern	BaFlefield	Surveillance…	
US AF Air and Space Operations Center
Screenshot from Command & Conquer
The Combined US Air and Space Operations Center
at an undisclosed Mideast location.
Sgt.JimVarhegyi/USAF/AP
©	2009	by	ChrisFan	Schieder	 8
…to	current	Business	Monitoring	and	Automa&on
©	2009	by	ChrisFan	Schieder	 9
Defining	Opera&onal	Intelligence	
	
OperaFonal	Intelligence	focuses	on	providing	real-&me	monitoring	
of	business	processes	and	acFviFes	as	they	are	executed	within	computer		
systems,	and	in	assisFng	in	op&mizing	these	acFviFes	and	processes	
by	iden&fying	and	detec&ng	situa&ons	that	correspond	to	
interrupFons	and	bo^lenecks.		
	 	 	 	 					Source:	h^p://en.wikipedia.org/wiki/OperaFonal_Intelligence,	12.05.2009	
Courtesy:	BBC	2008,	h^p://www.youtube.com/view_play_list?p=F5D324185EE73FEC
©	2009	by	ChrisFan	Schieder	 10
The	Cost	of	Latency…	
Source:	Hackathorn,	Richard:	Minimizing	AcFon	Distance,	h^p://www.tdan.com/i025fe04.htm,	01-07	-2003.	
Business	transacFon	
Decision	taken	
																												available	
Data	available	in	DW	
AcFon	performed	
Data	
latency	
Analysis	
latency	
Decision	
latency	
AcFon	
latency	
Time	
(PotenFal)	
Value	of	Decision	
Analysis	results
©	2009	by	ChrisFan	Schieder	 11
…differs!	
Strategic	D	
TacFcal	Decisioning	
OperaFonal	Decisioning	
AddiFonal	Benefit	from	
immediate	Decision	
Time	
ecisioning
©	2009	by	ChrisFan	Schieder	 12
Eckerson‘s	Layer	Model	
Source:	Eckerson,	Wayne	W.:	Best	PracFces	in	OperaFonal	BI,	TDWI	Best	PracFses	Report,	2007,	p.	6.	
LOW	
HIGH	
HIGH	
DATA	LATENCY	
BUSINESS	VALUE	
EXECUTE	
PROCESSES	
FACILITATE	
PROCESSES	
MONITOR	
PROCESSES	
ANALYZE	
PROCESSES	
OperaFonal	
reports	
OperaFonal	
dashboards	
Composite	
applicaFons	
Event-driven	
AnalyFc	plamorms	
REAL	TIME	DAILY	
LOW
©	2009	by	ChrisFan	Schieder	 13
The	past,	the	present	and	the	situa&on…	
Business	Process	
Intelligence	
Business	Ac&vity	
Monitoring	
Complex	Event	
Processing	
§  Ex	post	
§  Long-term	staFsFcal	
Process	Control		
§  „The	Rear	Mirror“	
§  Rule/Model	generaFon	
	
§  In	situ	
§  AlerFng	
§  Surveillance	of	defined	
processes	in	execuFon	
	
§  In	situ	
§  DetecFon	of	complex	
events/	situaFons	
§  CorrelaFon	of	distributed	
Events	
…3	Pillars	of	Opera&onal	Intelligence
Understanding	Opera&onal	Intelligence	Concepts	
		 	 	 			 	…sense…interpret…analyze…decide…respond…	
Concept	by	Silvia	Helena	Cardoso,	Ph.D.	
Center	for	Biomedical	InformaFon,	University	of	Campinas,	Brazil
©	2009	by	ChrisFan	Schieder	 15
Scale	(sec)	 System	 Stratum	
107	
106	
105	
Social	
104	
103	
102	
Task	
Task	
Task	
RaFonal	
101	
100	
	10-1	
Unit	Task	
OperaFons	
Deliberate	Act	
CogniFve	
10-2	
10-3	
10-4	
Neural	Circuit	
Neuron	
Organelle	
Biological	
Time	Scale	of	Human	Ac&ons
©	2009	by	ChrisFan	Schieder	 16
		
	
§ 		System	CapabiliFes	
§ 		Interface	Design	
§ 		Stress	&	Workload	
§ 		Complexity	
§ 		AutomaFon	
§ 		AbiliFes	
§ 		Experience	
§ 		Training	
§ 		Goals	&	ObjecFves	
§ 		PreconcepFons	
				(ExpectaFons)	
InformaFon		Processing	
Mechanisms	
Long	Term		
Memory	Store	
AutomaFcity	
Performance		
of		
AcFons	
Decision	
Situa&on	Awareness	
	
	
	
	
	
	
	
	
	
ProjecFon		
of	future		
Status	
Comprehension	
of		current		
SituaFon	
PercepFon		
of		Elements		
in	current		
SituaFon	
State	of	the	
Environment	
Level	1	 Level	2	 Level	3	
Feedback	
Individual	Factors	
Task	Factors	
Endsley,	M.	R.	(1995b).	Toward	a	theory	of	situaFon	awareness	in	dynamic	systems.	Human	Factors	37(1),	32-64	
Situa&on	Awareness
©	2009	by	ChrisFan	Schieder	 17
		
	
§ 		System	CapabiliFes	
§ 		Interface	Design	
§ 		Stress	&	Workload	
§ 		Complexity	
§ 		AutomaFon	
§ 		AbiliFes	
§ 		Experience	
§ 		Training	
§ 		Goals	&	ObjecFves	
§ 		PreconcepFons	
				(ExpectaFons)	
ApplicaFons	
Data	Warehouse	 Business	Rules	
Performance		
of		
AcFons	
Decision	
Situa&on	Awareness	
	
	
	
	
	
	
	
	
	
PredicFve	
AnalyFcs	
Business	
Intelligence	
Business	
AcFvity	
Monitoring	
State	of	the	
Environment	
Level	1	 Level	2	 Level	3	
Feedback	
Individual	Factors	
Task	Factors	
Processes	
Strategy	
People	
IT	Infrastructure	
Business	Situa&on	Awareness
©	2009	by	ChrisFan	Schieder	 18
Key	Requirements	for	Opera&onal	Intelligence	
Responsiveness
Agility
Flexibility
©	2009	by	ChrisFan	Schieder	 19
Never	forget	the	importance	of	agility…		
h^p://geekandpoke.typepad.com/geekandpoke/2009/03/simply-explained-part-37-agility.html
Technologies	for	Opera&onal	Intelligence	
	 	 		 	 						responsiveness,	agility,	and	flexibility	
Courtesy:	Lookheed	MarFn	Corp.
©	2009	by	ChrisFan	Schieder	 21
Opera&onal	Intelligence	Trends
©	2009	by	ChrisFan	Schieder	 22
Opera&onal	Intelligence	IT	Architectures	
Source:	Fair	Issac	
Source:	Eckerson,	TDWI	
Source:	Terradata	
Source:	Microstrategy
©	2009	by	ChrisFan	Schieder	 23
Event-driven	IT	Architectures	
Source:	Oracle	
Source:	SAP	
Source:	IBM
©	2009	by	ChrisFan	Schieder	 24
A	Simple	Model	for	Complex	Event	Processing	
EXTERNAL	
	
	
	
	
	
	
	
	
	
	
	
	
	
	
	
	
	
	
DISTRIBUTED	
	
	
	
	
	
	
	
	
	
	
	
	
	
	
	
	
	
	
	
	
	
	
LOCAL	
	
	
EVENT	
SERVICES	
	
EVENT	
PROFILES	
	
DATA	
BASES	
	
OTHER	DATA	
	
	
	
	
	
	
	
	 	 				Complex	Event	Processing						
	
	
	
	
	
	
	
	
	
	
	
	
	
	
	
	
	
	
	
	
	
		
	
	
	
	
	
HUMAN	
COMPUTER	
INTERACTION	
	
	
	
	
	
	
	
	
	
EVENT	SOURCES	
LEVEL	0	
	
EVENT	
PREPROCESSING	
LEVEL	1	
	
EVENT	
REFINEMENT	
LEVEL	2	
	
SITUATION	
REFINEMENT	
LEVEL	3	
	
IMPACT	
ASSESSMENT	
LEVEL	4	
	
PROCESS	
REFINEMENT	
DB	MANAGEMENT	
	
	
	
	
Historical	
Data	
Profiles	&	
Pa^erns	
Adapted	from:	David	L.	Hall	,	James	Llinas	(Eds.):	Handbook	of	MulFsensor	Data	Fusion,	CRC,	2001,	Front-Cover.	Source:	Tim	Bass,	Event-Decision	Architecture	for	PredicFve	Business,	
2006,	h^p://www.slideshare.net/TimBassCEP/cep-eventdecision-architecture-for-predicFvebusiness-july-2006-presentaFon.
©	2009	by	ChrisFan	Schieder	 25
	
	
	
	
	
	
	
	
		
	
	
	
	
	
	
	
	
	
	
	
	
		
Level	0	
Discovery	and	Detec&on	–	Mining	and	fusing	data	
Source:	James	Llinas,	Christopher	Bowman,	Galina	Rogova,	Alan	Steinberg,	Ed	Waltz,	Frank	White:	RevisiFng	the	JDL	Data	Fusion	Model	II.	In	P.	Svensson	and	J.	Schubert	(Eds.),	
Proceedings	of	the	7th	InternaFonal	Conference	on	InformaFon	Fusion	(FUSION	2004),	2004,	p.	8.	
1	
2	
3	
OperaFonal		
Data	Stores	
Level	1	Fusion	
Object	
Database	
Level	2	Fusion	
SituaFon	
Database	
Level	3	
	
VisualizaFon	
	
Data		
Ware-	
house	
	
Post-DWH	ETL	
	
Model	
Repository	
EnFty	
RelaFonship	
Clustering	
	
Model		
CreaFing	
	
	
Model		
TesFng	
	
AnalyFc	
GeneralizaFon	
ValidaFon	
Data	Fusion	
Real-Fme	
detec%on		
of	known	
pa^erns	
Data	Mining	
Off-line	
discovery		
of	new	
pa^erns	
	
Pre-DWH	ETL	
	
SituaFons	
Impacts	
Discovered	Templates
©	2009	by	ChrisFan	Schieder	 26
Opera&onal	Business	Intelligence	Architecture	
ETL-Batch	
Event	Streams	
Purchasing	
Sales	
ProducFon	
ETL-Batch	
Micro	
Batches	
ERP	
SCM	
CRM	
Legacy	
Workflow-	
Engine	
ODS	
Data	Warehouse	
Stream	Cache	
Business		
Rules	
Engine	
Business	
Rules	
Repository	
Dashboards	
OLAP	
Reports	
Mobile	
Devices	
Data	Mining	
ExecuFves	
Analysts	
Decision		
Makers	
Processes	 Systems	 Data	IntegraFon	 Data	Storage	 Decisions	 Analysis	 Users	
Event	
Processing	
Engine
©	2009	by	ChrisFan	Schieder	 27
Concepts	and	Technologies	for	Latency	reduc&on	
Data	latency	
	
	 	Micro	Batches 	 	 	 	Change	Data	Capture	 	 	Data	ReplicaFon
	 	 	 	Event	Stream	Processing			 	In-Memory	Databases	 	Data	
SynchronizaFon 		
Analysis	latency	
	
	 	Data	Mining	 	 	 	 	Process	Mining	
	 	 	 	 	 	 	 	 	 	Visual	Analysis 	 	 	 	Business	
AcFvity	Monitoring	
Decision	latency		
	
	 	Business	Rules	 	 	 	 	Complex	Event	Processing	 	 	 	 	 	
	 	 		
AcFon	latency	
	 	ERP/	CRM/	SCM 	 	 	 		Workflow	AutomaFon
Case	Study	I	–	Talend	
Sony	Online	Entertainment	leverages	Talend's	Change	
Data	Capture	for	its	real-&me	gaming	analy&cs
©	2009	by	ChrisFan	Schieder	 30
Agenda	
What	is	OperaFonal	
Intelligence	about?	
Understanding	
OperaFonal	Intelligence	
Concepts	
BI/BPM	IntegraFon	
Roadmap,	Strategies,	
Methods	and	Training	
Technologies	for	
OperaFonal	Intelligence	
Case	Study	II:	RealFme	
ReporFng	in	CamshaT	
Manufactoring	
Case	Study	I:	Change	
Data	Capture	@	Sony	
Online	Entertainment	
Case	Study	III:	
Customer	Centric	
Decisioning:	Deliver	
the	Perfect	Message	
at	the	Perfect	
Moment
Case	Study	II	–	DMC	Group	
Real&me	Repor&ng	in	Camshae	Manufactoring
BI/BPM	Integra&on	Roadmap,	Strategies,	
Methods	and	Training	
	 		 	 	 			 	 	 								…geung	down	to	business…	
By	teliko82	@	flickr
Case	Study	III	–	Accenture 		
Customer	Centric	Decisioning
Add	on	
h^p://geekandpoke.typepad.com/geekandpoke/2009/03/simply-explained-part-37-agility.html
©	2009	by	ChrisFan	Schieder	 37
h^p://web.mit.edu/sheffi/www/	h^p://www.lessons-from-history.com	h^p://www.senseandrespond.com/SHHaeckel.html	
Literature	I
©	2009	by	ChrisFan	Schieder	 38
Literature	II	
h^p://complexevents.com/	 h^p://www.manning.com/etzion/	
h^p://epthinking.blogspot.com/
©	2009	by	ChrisFan	Schieder	 39
Contact	
	
	
	
	
	
	
	
	ChrisFan	Schieder	
Research	Associate	
		
Chemnitz	University	of	Technology	
Faculty	of	Business	AdministraFon	and	
Economics	
Chair	for	Systems	Engineering	and	InformaFon	
Systems																	
	
	
	
	
	
	
	
	
	
	
	
	
	
	
	
	
	
	
	
	
	
	
	
	
	
Dr.	Olivera	Marjanovic	
Senior	Lecturer	
	
University	of	Sydney	
Faculty	of	Economics	and	Business	
	
Thueringer	Weg	7,	09126	Chemnitz,	Germany	
		
Tel.	:	+49	(0)371	531	35792	
Fax	:	+49	(0)371	531	8	35792	
Mail:	chrisFan.schieder@wirtschaT.tu-chemnitz.de	
h^p://www.tu-chemnitz.de/wirtschaT/wi2/mitarbeiter/cschie.php	
	
Room	434,	H69	-	Economics	and	Business	Building,		
The	University	of	Sydney,	NSW	2006	Australia	
	
Phone:	+61	2	9351	8477	
Fax:	+61	2	9351	7294	
Mail:		O.Marjanovic@econ.usyd.edu.au	
h^p://www.econ.usyd.edu.au/staff/oliveram
©	2009	by	ChrisFan	Schieder	 40
Bildnachweis	
Flugzeug	 	 	h^ps://pixabay.com/de/flugzeug-flugzeug-kreuzfahrt-h%C3%B6hen-897048/	
Cockpit 	 	h^ps://pixabay.com/de/cockpit-flugzeug-jet-pkw-pilot-100624/	
Sunzi 	 	 	h^ps://de.wikipedia.org/wiki/Sunzi#/media/File:Enchoen27n3200.jpg	
JoysFck 	 	h^ps://de.wikipedia.org/wiki/JoysFck#/media/File:Joyopis.svg	
Control	Center 	h^ps://upload.wikimedia.org/wikipedia/commons/f/fd/STS-128_MCC_space_staFon_flight_control_room.jpg	
AutoprodukFon	 	h^ps://upload.wikimedia.org/wikipedia/commons/5/55/Geely_assembly_line_in_Beilun,_Ningbo.JPG	
Schach	 	 	h^ps://pixabay.com/de/schach-strategie-schachbre^-316658/

More Related Content

What's hot

NIST SP 800 30 Flow Chart
NIST SP 800 30 Flow ChartNIST SP 800 30 Flow Chart
NIST SP 800 30 Flow Chart
James W. De Rienzo
 
Splunk Enterprise Security
Splunk Enterprise SecuritySplunk Enterprise Security
Splunk Enterprise Security
Splunk
 
Integrated Security Operations Center (ISOC) for Cybersecurity Collaboration
Integrated Security Operations Center (ISOC) for Cybersecurity CollaborationIntegrated Security Operations Center (ISOC) for Cybersecurity Collaboration
Integrated Security Operations Center (ISOC) for Cybersecurity Collaboration
Priyanka Aash
 
Information Security Management.Introduction
Information Security Management.IntroductionInformation Security Management.Introduction
Information Security Management.Introduction
yuliana_mar
 
Owasp osint presentation - by adam nurudini
Owasp osint presentation - by adam nurudiniOwasp osint presentation - by adam nurudini
Owasp osint presentation - by adam nurudini
Adam Nurudini
 
Digital Forensic
Digital ForensicDigital Forensic
Digital Forensic
Cleverence Kombe
 
The Indicators of Compromise
The Indicators of CompromiseThe Indicators of Compromise
The Indicators of Compromise
Tomasz Jakubowski
 
SIEM Architecture
SIEM ArchitectureSIEM Architecture
SIEM Architecture
Nishanth Kumar Pathi
 
Security operation center (SOC)
Security operation center (SOC)Security operation center (SOC)
Security operation center (SOC)
Ahmed Ayman
 
Digital Forensic ppt
Digital Forensic pptDigital Forensic ppt
Digital Forensic ppt
Suchita Rawat
 
Establishing Effective ERM of IT: Implementation and Operational Issues of th...
Establishing Effective ERM of IT: Implementation and Operational Issues of th...Establishing Effective ERM of IT: Implementation and Operational Issues of th...
Establishing Effective ERM of IT: Implementation and Operational Issues of th...
Robert Stroud
 
Security risk management
Security risk managementSecurity risk management
Security risk management
G Prachi
 
Boardroom to War Room: Practical Application of the NIST Cybersecurity Frame...
Boardroom to War Room:  Practical Application of the NIST Cybersecurity Frame...Boardroom to War Room:  Practical Application of the NIST Cybersecurity Frame...
Boardroom to War Room: Practical Application of the NIST Cybersecurity Frame...
robbiesamuel
 
Combating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial IntelligenceCombating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial Intelligence
Inderjeet Singh
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
Prachi Mishra
 
Database forensics
Database forensicsDatabase forensics
Database forensics
Denys A. Flores, PhD
 
Splunk for Enterprise Security and User Behavior Analytics
 Splunk for Enterprise Security and User Behavior Analytics Splunk for Enterprise Security and User Behavior Analytics
Splunk for Enterprise Security and User Behavior Analytics
Splunk
 
FireEye Solutions
FireEye SolutionsFireEye Solutions
FireEye Solutions
Prime Infoserv
 
Artificial Intelligence for Cyber Security
Artificial Intelligence for Cyber SecurityArtificial Intelligence for Cyber Security
Artificial Intelligence for Cyber Security
Priyanshu Ratnakar
 
Global Cyber Threat Intelligence
Global Cyber Threat IntelligenceGlobal Cyber Threat Intelligence
Global Cyber Threat Intelligence
NTT Innovation Institute Inc.
 

What's hot (20)

NIST SP 800 30 Flow Chart
NIST SP 800 30 Flow ChartNIST SP 800 30 Flow Chart
NIST SP 800 30 Flow Chart
 
Splunk Enterprise Security
Splunk Enterprise SecuritySplunk Enterprise Security
Splunk Enterprise Security
 
Integrated Security Operations Center (ISOC) for Cybersecurity Collaboration
Integrated Security Operations Center (ISOC) for Cybersecurity CollaborationIntegrated Security Operations Center (ISOC) for Cybersecurity Collaboration
Integrated Security Operations Center (ISOC) for Cybersecurity Collaboration
 
Information Security Management.Introduction
Information Security Management.IntroductionInformation Security Management.Introduction
Information Security Management.Introduction
 
Owasp osint presentation - by adam nurudini
Owasp osint presentation - by adam nurudiniOwasp osint presentation - by adam nurudini
Owasp osint presentation - by adam nurudini
 
Digital Forensic
Digital ForensicDigital Forensic
Digital Forensic
 
The Indicators of Compromise
The Indicators of CompromiseThe Indicators of Compromise
The Indicators of Compromise
 
SIEM Architecture
SIEM ArchitectureSIEM Architecture
SIEM Architecture
 
Security operation center (SOC)
Security operation center (SOC)Security operation center (SOC)
Security operation center (SOC)
 
Digital Forensic ppt
Digital Forensic pptDigital Forensic ppt
Digital Forensic ppt
 
Establishing Effective ERM of IT: Implementation and Operational Issues of th...
Establishing Effective ERM of IT: Implementation and Operational Issues of th...Establishing Effective ERM of IT: Implementation and Operational Issues of th...
Establishing Effective ERM of IT: Implementation and Operational Issues of th...
 
Security risk management
Security risk managementSecurity risk management
Security risk management
 
Boardroom to War Room: Practical Application of the NIST Cybersecurity Frame...
Boardroom to War Room:  Practical Application of the NIST Cybersecurity Frame...Boardroom to War Room:  Practical Application of the NIST Cybersecurity Frame...
Boardroom to War Room: Practical Application of the NIST Cybersecurity Frame...
 
Combating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial IntelligenceCombating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial Intelligence
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
Database forensics
Database forensicsDatabase forensics
Database forensics
 
Splunk for Enterprise Security and User Behavior Analytics
 Splunk for Enterprise Security and User Behavior Analytics Splunk for Enterprise Security and User Behavior Analytics
Splunk for Enterprise Security and User Behavior Analytics
 
FireEye Solutions
FireEye SolutionsFireEye Solutions
FireEye Solutions
 
Artificial Intelligence for Cyber Security
Artificial Intelligence for Cyber SecurityArtificial Intelligence for Cyber Security
Artificial Intelligence for Cyber Security
 
Global Cyber Threat Intelligence
Global Cyber Threat IntelligenceGlobal Cyber Threat Intelligence
Global Cyber Threat Intelligence
 

Similar to Operational Intelligence

CIS AIML Beginners Series Part 1
CIS AIML Beginners Series Part 1CIS AIML Beginners Series Part 1
CIS AIML Beginners Series Part 1
Council Of Information Security
 
Twente Data Meetup - Lessons learned from data science in industry (Jeroen Li...
Twente Data Meetup - Lessons learned from data science in industry (Jeroen Li...Twente Data Meetup - Lessons learned from data science in industry (Jeroen Li...
Twente Data Meetup - Lessons learned from data science in industry (Jeroen Li...
Saxion University of Applied Sciences
 
ISC2014 Beijing Keynote
ISC2014 Beijing KeynoteISC2014 Beijing Keynote
ISC2014 Beijing Keynote
Cyphort
 
WebStrategija #16 - IoT & Marketing (Croatian)
WebStrategija #16 - IoT & Marketing (Croatian)WebStrategija #16 - IoT & Marketing (Croatian)
WebStrategija #16 - IoT & Marketing (Croatian)
Goran Candrlic
 
Steven adler ibm big data predictions
Steven adler   ibm big data predictionsSteven adler   ibm big data predictions
Steven adler ibm big data predictionsGlobalForum
 
The fundamental five
The fundamental fiveThe fundamental five
The fundamental five
The Economist Media Businesses
 
Mechatronics for Homeland Security
Mechatronics for Homeland SecurityMechatronics for Homeland Security
Mechatronics for Homeland Security
ADGP, Public Grivences, Bangalore
 
TECH WARRIORS_INNOVATE FOR SOCIETY.pptx
TECH WARRIORS_INNOVATE FOR SOCIETY.pptxTECH WARRIORS_INNOVATE FOR SOCIETY.pptx
TECH WARRIORS_INNOVATE FOR SOCIETY.pptx
JAYAPRIYAR7
 
M2M Journal 2017
M2M Journal 2017M2M Journal 2017
M2M Journal 2017
M2M Alliance e.V.
 
Drones and Fog Computing - New Frontiers of IoT and Digital Transformation -...
Drones and Fog Computing  - New Frontiers of IoT and Digital Transformation -...Drones and Fog Computing  - New Frontiers of IoT and Digital Transformation -...
Drones and Fog Computing - New Frontiers of IoT and Digital Transformation -...
Biren Gandhi
 
Demystifying Data Virtualization: Why it’s Now Critical for Your Data Strategy
Demystifying Data Virtualization: Why it’s Now Critical for Your Data StrategyDemystifying Data Virtualization: Why it’s Now Critical for Your Data Strategy
Demystifying Data Virtualization: Why it’s Now Critical for Your Data Strategy
Denodo
 
Forget about AI and do Mathematical Modelling instead!
Forget about AI and do Mathematical Modelling instead!Forget about AI and do Mathematical Modelling instead!
Forget about AI and do Mathematical Modelling instead!
Florian Wilhelm
 
M2M Journal 2017
M2M Journal 2017 M2M Journal 2017
M2M Journal 2017
M2M Alliance e.V.
 
Frameworks2 go business insights delivered socially exponentiality & noiseles...
Frameworks2 go business insights delivered socially exponentiality & noiseles...Frameworks2 go business insights delivered socially exponentiality & noiseles...
Frameworks2 go business insights delivered socially exponentiality & noiseles...
frameworks2go.com
 
2015 06-17 - supply chaindays ibm presentation thorsten schroeer
2015 06-17 - supply chaindays ibm presentation thorsten schroeer2015 06-17 - supply chaindays ibm presentation thorsten schroeer
2015 06-17 - supply chaindays ibm presentation thorsten schroeer
Thorsten Schroeer
 
TA CR Day - Industrie 40 (Ralf Wehrspohn, Fraunhofer Institute)
TA CR Day - Industrie 40 (Ralf Wehrspohn, Fraunhofer Institute)TA CR Day - Industrie 40 (Ralf Wehrspohn, Fraunhofer Institute)
TA CR Day - Industrie 40 (Ralf Wehrspohn, Fraunhofer Institute)
Technologická agentura ČR
 
Public safety in a multi media era facilitating incident management response
Public safety in a multi media era   facilitating incident management responsePublic safety in a multi media era   facilitating incident management response
Public safety in a multi media era facilitating incident management response
Jack Brown
 
2012 09-20 infosphere ab intelligence overview
2012 09-20 infosphere ab intelligence overview2012 09-20 infosphere ab intelligence overview
2012 09-20 infosphere ab intelligence overview
Mats Björe
 

Similar to Operational Intelligence (20)

CIS AIML Beginners Series Part 1
CIS AIML Beginners Series Part 1CIS AIML Beginners Series Part 1
CIS AIML Beginners Series Part 1
 
Twente Data Meetup - Lessons learned from data science in industry (Jeroen Li...
Twente Data Meetup - Lessons learned from data science in industry (Jeroen Li...Twente Data Meetup - Lessons learned from data science in industry (Jeroen Li...
Twente Data Meetup - Lessons learned from data science in industry (Jeroen Li...
 
ISC2014 Beijing Keynote
ISC2014 Beijing KeynoteISC2014 Beijing Keynote
ISC2014 Beijing Keynote
 
WebStrategija #16 - IoT & Marketing (Croatian)
WebStrategija #16 - IoT & Marketing (Croatian)WebStrategija #16 - IoT & Marketing (Croatian)
WebStrategija #16 - IoT & Marketing (Croatian)
 
Steven adler ibm big data predictions
Steven adler   ibm big data predictionsSteven adler   ibm big data predictions
Steven adler ibm big data predictions
 
The fundamental five
The fundamental fiveThe fundamental five
The fundamental five
 
Mechatronics for Homeland Security
Mechatronics for Homeland SecurityMechatronics for Homeland Security
Mechatronics for Homeland Security
 
TECH WARRIORS_INNOVATE FOR SOCIETY.pptx
TECH WARRIORS_INNOVATE FOR SOCIETY.pptxTECH WARRIORS_INNOVATE FOR SOCIETY.pptx
TECH WARRIORS_INNOVATE FOR SOCIETY.pptx
 
M2M Journal 2017
M2M Journal 2017M2M Journal 2017
M2M Journal 2017
 
Drones and Fog Computing - New Frontiers of IoT and Digital Transformation -...
Drones and Fog Computing  - New Frontiers of IoT and Digital Transformation -...Drones and Fog Computing  - New Frontiers of IoT and Digital Transformation -...
Drones and Fog Computing - New Frontiers of IoT and Digital Transformation -...
 
Demystifying Data Virtualization: Why it’s Now Critical for Your Data Strategy
Demystifying Data Virtualization: Why it’s Now Critical for Your Data StrategyDemystifying Data Virtualization: Why it’s Now Critical for Your Data Strategy
Demystifying Data Virtualization: Why it’s Now Critical for Your Data Strategy
 
Forget about AI and do Mathematical Modelling instead!
Forget about AI and do Mathematical Modelling instead!Forget about AI and do Mathematical Modelling instead!
Forget about AI and do Mathematical Modelling instead!
 
M2M Journal 2017
M2M Journal 2017 M2M Journal 2017
M2M Journal 2017
 
Frameworks2 go business insights delivered socially exponentiality & noiseles...
Frameworks2 go business insights delivered socially exponentiality & noiseles...Frameworks2 go business insights delivered socially exponentiality & noiseles...
Frameworks2 go business insights delivered socially exponentiality & noiseles...
 
E. Mannens - LODGE
E. Mannens - LODGEE. Mannens - LODGE
E. Mannens - LODGE
 
2015 06-17 - supply chaindays ibm presentation thorsten schroeer
2015 06-17 - supply chaindays ibm presentation thorsten schroeer2015 06-17 - supply chaindays ibm presentation thorsten schroeer
2015 06-17 - supply chaindays ibm presentation thorsten schroeer
 
TA CR Day - Industrie 40 (Ralf Wehrspohn, Fraunhofer Institute)
TA CR Day - Industrie 40 (Ralf Wehrspohn, Fraunhofer Institute)TA CR Day - Industrie 40 (Ralf Wehrspohn, Fraunhofer Institute)
TA CR Day - Industrie 40 (Ralf Wehrspohn, Fraunhofer Institute)
 
OpsTech FS 3222
OpsTech FS 3222OpsTech FS 3222
OpsTech FS 3222
 
Public safety in a multi media era facilitating incident management response
Public safety in a multi media era   facilitating incident management responsePublic safety in a multi media era   facilitating incident management response
Public safety in a multi media era facilitating incident management response
 
2012 09-20 infosphere ab intelligence overview
2012 09-20 infosphere ab intelligence overview2012 09-20 infosphere ab intelligence overview
2012 09-20 infosphere ab intelligence overview
 

More from Christian Schieder

Grundzüge einer Pathologie medienbezogener Störungen im Web 2.0
Grundzüge einer Pathologie medienbezogener Störungen im Web 2.0Grundzüge einer Pathologie medienbezogener Störungen im Web 2.0
Grundzüge einer Pathologie medienbezogener Störungen im Web 2.0Christian Schieder
 
Dynamisierung von Pricingprozessen
Dynamisierung von PricingprozessenDynamisierung von Pricingprozessen
Dynamisierung von PricingprozessenChristian Schieder
 
Open Source Business Intelligence - TDWI 2007
Open Source Business Intelligence - TDWI 2007Open Source Business Intelligence - TDWI 2007
Open Source Business Intelligence - TDWI 2007Christian Schieder
 
Operational Intelligence - TDWI Europe 2008
Operational Intelligence - TDWI Europe 2008Operational Intelligence - TDWI Europe 2008
Operational Intelligence - TDWI Europe 2008Christian Schieder
 
Operational Intelligence im Kontext des Enterprise Decision Managements - MKW...
Operational Intelligence im Kontext des Enterprise Decision Managements - MKW...Operational Intelligence im Kontext des Enterprise Decision Managements - MKW...
Operational Intelligence im Kontext des Enterprise Decision Managements - MKW...Christian Schieder
 
Open Source Business Intelligence - TDWI 2007
Open Source Business Intelligence - TDWI 2007Open Source Business Intelligence - TDWI 2007
Open Source Business Intelligence - TDWI 2007Christian Schieder
 
Open Source Data Mining - Data Mining Cup 2007
Open Source Data Mining - Data Mining Cup 2007Open Source Data Mining - Data Mining Cup 2007
Open Source Data Mining - Data Mining Cup 2007Christian Schieder
 
CeBIT 2007 - BI goes Open Source
CeBIT 2007 - BI goes Open SourceCeBIT 2007 - BI goes Open Source
CeBIT 2007 - BI goes Open SourceChristian Schieder
 
Angebot und Nachfrage für Open Source Business Intelligence
Angebot und Nachfrage für Open Source Business IntelligenceAngebot und Nachfrage für Open Source Business Intelligence
Angebot und Nachfrage für Open Source Business IntelligenceChristian Schieder
 

More from Christian Schieder (11)

Grundzüge einer Pathologie medienbezogener Störungen im Web 2.0
Grundzüge einer Pathologie medienbezogener Störungen im Web 2.0Grundzüge einer Pathologie medienbezogener Störungen im Web 2.0
Grundzüge einer Pathologie medienbezogener Störungen im Web 2.0
 
Dynamisierung von Pricingprozessen
Dynamisierung von PricingprozessenDynamisierung von Pricingprozessen
Dynamisierung von Pricingprozessen
 
Open Source Business Intelligence - TDWI 2007
Open Source Business Intelligence - TDWI 2007Open Source Business Intelligence - TDWI 2007
Open Source Business Intelligence - TDWI 2007
 
PalOOCa - CeBIT 2008
PalOOCa - CeBIT 2008PalOOCa - CeBIT 2008
PalOOCa - CeBIT 2008
 
PalOOCa - PaloCon2007
PalOOCa - PaloCon2007PalOOCa - PaloCon2007
PalOOCa - PaloCon2007
 
Operational Intelligence - TDWI Europe 2008
Operational Intelligence - TDWI Europe 2008Operational Intelligence - TDWI Europe 2008
Operational Intelligence - TDWI Europe 2008
 
Operational Intelligence im Kontext des Enterprise Decision Managements - MKW...
Operational Intelligence im Kontext des Enterprise Decision Managements - MKW...Operational Intelligence im Kontext des Enterprise Decision Managements - MKW...
Operational Intelligence im Kontext des Enterprise Decision Managements - MKW...
 
Open Source Business Intelligence - TDWI 2007
Open Source Business Intelligence - TDWI 2007Open Source Business Intelligence - TDWI 2007
Open Source Business Intelligence - TDWI 2007
 
Open Source Data Mining - Data Mining Cup 2007
Open Source Data Mining - Data Mining Cup 2007Open Source Data Mining - Data Mining Cup 2007
Open Source Data Mining - Data Mining Cup 2007
 
CeBIT 2007 - BI goes Open Source
CeBIT 2007 - BI goes Open SourceCeBIT 2007 - BI goes Open Source
CeBIT 2007 - BI goes Open Source
 
Angebot und Nachfrage für Open Source Business Intelligence
Angebot und Nachfrage für Open Source Business IntelligenceAngebot und Nachfrage für Open Source Business Intelligence
Angebot und Nachfrage für Open Source Business Intelligence
 

Recently uploaded

When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 

Recently uploaded (20)

When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 

Operational Intelligence