SlideShare a Scribd company logo
Taking Well Constructed Decisions
Taking Well Constructed Decisions
Taking Well Constructed Decisions
Taking Well Constructed Decisions
Taking Well Constructed Decisions

More Related Content

More from Dhiren Gala

Microsoft SQL Server 2012
Microsoft SQL Server 2012 Microsoft SQL Server 2012
Microsoft SQL Server 2012
Dhiren Gala
 
MAIA Intelligence profiled on DQ Channel Tree
MAIA Intelligence profiled on DQ Channel TreeMAIA Intelligence profiled on DQ Channel Tree
MAIA Intelligence profiled on DQ Channel Tree
Dhiren Gala
 
XBRL on SaaS Platform
XBRL on SaaS PlatformXBRL on SaaS Platform
XBRL on SaaS Platform
Dhiren Gala
 
Barriers to Business Intelligence (BI)
Barriers to Business Intelligence (BI)Barriers to Business Intelligence (BI)
Barriers to Business Intelligence (BI)
Dhiren Gala
 
Compliance to Compete
Compliance to CompeteCompliance to Compete
Compliance to Compete
Dhiren Gala
 
XBRL Overview
XBRL OverviewXBRL Overview
XBRL Overview
Dhiren Gala
 
An Introduction To XBRL
An Introduction To XBRLAn Introduction To XBRL
An Introduction To XBRL
Dhiren Gala
 
XBRL Presentation
XBRL PresentationXBRL Presentation
XBRL Presentation
Dhiren Gala
 
Financial Consolidation Management
Financial Consolidation ManagementFinancial Consolidation Management
Financial Consolidation Management
Dhiren Gala
 
Experiments with Social Media & Networking
Experiments with Social Media & NetworkingExperiments with Social Media & Networking
Experiments with Social Media & Networking
Dhiren Gala
 
Best Deployment: Raymond opts for 1KEY FCM - Financial Consolidation
Best Deployment: Raymond opts for 1KEY FCM - Financial ConsolidationBest Deployment: Raymond opts for 1KEY FCM - Financial Consolidation
Best Deployment: Raymond opts for 1KEY FCM - Financial Consolidation
Dhiren Gala
 
KPI Dashboard for Port Terminals
KPI Dashboard for Port TerminalsKPI Dashboard for Port Terminals
KPI Dashboard for Port Terminals
Dhiren Gala
 
Business Intelligence in Logistics
Business Intelligence in LogisticsBusiness Intelligence in Logistics
Business Intelligence in Logistics
Dhiren Gala
 
Business Intelligence in Pharma
Business Intelligence in PharmaBusiness Intelligence in Pharma
Business Intelligence in Pharma
Dhiren Gala
 
Marketing Analytics with Business Intelligence
Marketing Analytics with Business IntelligenceMarketing Analytics with Business Intelligence
Marketing Analytics with Business Intelligence
Dhiren Gala
 
BI at work for Port Operations
BI at work for Port OperationsBI at work for Port Operations
BI at work for Port Operations
Dhiren Gala
 
Confluent - Monthly magazine by Symbiosis Centre for IT - September 2010
Confluent - Monthly magazine by Symbiosis Centre for IT - September 2010Confluent - Monthly magazine by Symbiosis Centre for IT - September 2010
Confluent - Monthly magazine by Symbiosis Centre for IT - September 2010
Dhiren Gala
 
India's first Business Intelligence (BI)
India's first Business Intelligence (BI)India's first Business Intelligence (BI)
India's first Business Intelligence (BI)
Dhiren Gala
 
Business Intelligence (BI) for Manufacturing
Business Intelligence (BI) for ManufacturingBusiness Intelligence (BI) for Manufacturing
Business Intelligence (BI) for Manufacturing
Dhiren Gala
 
Shifting Trends - BI for Logistics Industry
Shifting Trends - BI for Logistics IndustryShifting Trends - BI for Logistics Industry
Shifting Trends - BI for Logistics Industry
Dhiren Gala
 

More from Dhiren Gala (20)

Microsoft SQL Server 2012
Microsoft SQL Server 2012 Microsoft SQL Server 2012
Microsoft SQL Server 2012
 
MAIA Intelligence profiled on DQ Channel Tree
MAIA Intelligence profiled on DQ Channel TreeMAIA Intelligence profiled on DQ Channel Tree
MAIA Intelligence profiled on DQ Channel Tree
 
XBRL on SaaS Platform
XBRL on SaaS PlatformXBRL on SaaS Platform
XBRL on SaaS Platform
 
Barriers to Business Intelligence (BI)
Barriers to Business Intelligence (BI)Barriers to Business Intelligence (BI)
Barriers to Business Intelligence (BI)
 
Compliance to Compete
Compliance to CompeteCompliance to Compete
Compliance to Compete
 
XBRL Overview
XBRL OverviewXBRL Overview
XBRL Overview
 
An Introduction To XBRL
An Introduction To XBRLAn Introduction To XBRL
An Introduction To XBRL
 
XBRL Presentation
XBRL PresentationXBRL Presentation
XBRL Presentation
 
Financial Consolidation Management
Financial Consolidation ManagementFinancial Consolidation Management
Financial Consolidation Management
 
Experiments with Social Media & Networking
Experiments with Social Media & NetworkingExperiments with Social Media & Networking
Experiments with Social Media & Networking
 
Best Deployment: Raymond opts for 1KEY FCM - Financial Consolidation
Best Deployment: Raymond opts for 1KEY FCM - Financial ConsolidationBest Deployment: Raymond opts for 1KEY FCM - Financial Consolidation
Best Deployment: Raymond opts for 1KEY FCM - Financial Consolidation
 
KPI Dashboard for Port Terminals
KPI Dashboard for Port TerminalsKPI Dashboard for Port Terminals
KPI Dashboard for Port Terminals
 
Business Intelligence in Logistics
Business Intelligence in LogisticsBusiness Intelligence in Logistics
Business Intelligence in Logistics
 
Business Intelligence in Pharma
Business Intelligence in PharmaBusiness Intelligence in Pharma
Business Intelligence in Pharma
 
Marketing Analytics with Business Intelligence
Marketing Analytics with Business IntelligenceMarketing Analytics with Business Intelligence
Marketing Analytics with Business Intelligence
 
BI at work for Port Operations
BI at work for Port OperationsBI at work for Port Operations
BI at work for Port Operations
 
Confluent - Monthly magazine by Symbiosis Centre for IT - September 2010
Confluent - Monthly magazine by Symbiosis Centre for IT - September 2010Confluent - Monthly magazine by Symbiosis Centre for IT - September 2010
Confluent - Monthly magazine by Symbiosis Centre for IT - September 2010
 
India's first Business Intelligence (BI)
India's first Business Intelligence (BI)India's first Business Intelligence (BI)
India's first Business Intelligence (BI)
 
Business Intelligence (BI) for Manufacturing
Business Intelligence (BI) for ManufacturingBusiness Intelligence (BI) for Manufacturing
Business Intelligence (BI) for Manufacturing
 
Shifting Trends - BI for Logistics Industry
Shifting Trends - BI for Logistics IndustryShifting Trends - BI for Logistics Industry
Shifting Trends - BI for Logistics Industry
 

Recently uploaded

FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1