Big Data Arrêtons d en parler, passons à l action!
|
|
|
- Esther Pearson
- 10 years ago
- Views:
Transcription
1 Big Data Arrêtons d en parler, passons à l action! Aidan J. O Brien Paris, 4 avril 2013 Copyright 2013 EMC Corporation. All rights reserved. 1
2 Copyright 2013 EMC Corporation. All rights reserved. 2
3 Copyright 2013 EMC Corporation. All rights reserved. 3
4 Copyright 2013 EMC Corporation. All rights reserved. 4
5 Copyright 2013 EMC Corporation. All rights reserved. 5
6 Source: Copyright 2013 EMC Corporation. All rights reserved. 6
7 Copyright 2013 EMC Corporation. All rights reserved. 7
8 The Journey To Big Data Copyright 2013 EMC Corporation. All rights reserved. 8
9 Copyright 2013 EMC Corporation. All rights reserved. 9
10 Copyright 2013 EMC Corporation. All rights reserved. 10
11
12 Our Big Data Story We started focusing on predicting infrastructure outages IT Security Sales Forecasting Manufacturing (Quality) Logistics Voice of Customer (TCE) Digital Marketing HR (Healthcare Insurance)
13 March 17 th 2011 RSA disclosed it was the target of an Advanced Persistent Threat. On June 6th, RSA issued an open letter to customers. They reinforced that the attack on Lockheed Martin did not reflect a new threat or vulnerability in RSA SecurID technology. 1 TARGETED SPECIFIC OBJECTIVE 2 INTERACTIVE HUMAN INVOLVEMENT 3 STEALTHY LOW AND SLOW System Intrusion Attack Begins Cover-Up Discovery Leap Frog Attacks Cover-Up Complete TIME Dwell Time Response Time Attack Identified Decrease Speed 1 Dwell Time 2 Response Time Response Copyright 2013 EMC Corporation. All rights reserved. 13
14 EMC Connected Proactive Services (ECPS) Copyright 2013 EMC Corporation. All rights reserved. 14
15 Big Data is but part of a wider strategy What rights are being sold Creator (Ownership of asset plus significant transformation of the asset) What type of asset is involved Financial Physical Intangible Human Entrepreneur Manufacturer Inventor Human Creator* Distributor (Ownership of asset plus limited transformation of the asset) Financial Trader Wholesaler / Retailer IP Trader Human Distributor* Landlord (Use of asset) Financial Landlord Physical Landlord Intellectual Landlord Contractor Broker (Matching of buyer and seller) Financial Broker Physical Broker IP Broker HR Broker Financial Performance Market value: Tobin s Q, factor-risk alpha Profitability: Return on invested capital (ROIC), Return on assets (ROA) Operating Efficiency: Operating cash flow on assets, cash flow margin on sales Sources: Do Some Business Models Perform Better than Others? Malone, Weill, Lai, D Urso, Herman, Apel & Woerner, May, What Is Your Digital Business Model? Weill, June * Models illegal in the US today. Copyright 2013 EMC Corporation. All rights reserved. 15
16 Marketplace to market-space Your business model is important. Does it change in a changing world? CONTENT CONTEXT INFRASTRUCTURE Information, products Packaging, format, tailoring, service, community, tools Platforms of services including infrastructure, technology, data and know how CONTENT EXPERIENCE PLATFORM MARKETPLACE Tangible, product paradigm, physically based, traditional economics, customer transactions, integrated MARKET-SPACE Intangible, service paradigm, information based, new economics, customer relationships, modular Sources: Do Some Business Models Perform Better than Others? Malone, Weill, Lai, D Urso, Herman, Apel & Woerner, May, What Is Your Digital Business Model? Weill, June 2011 Copyright 2013 EMC Corporation. All rights reserved. 16
17 and the role of Big Data Can new data and better analytics improve content, experience & platform CONTENT What is consumed (information/ product) EXPERIENCE How is it packaged How do you get / create value from your content? Do you know how good your customer experience is? Franklin Templeton Fund Manager 139 Mutual funds, 21 insurance funds Interactive online presentations, portfolio manager webcasts, emerging markets blog YOU Can you improve content by including new previously inaccessible data sources? How to have a better understanding of and more intimate relationships with a growing customer population? PLATFORM How is it delivered (internally/ externally) How good is your platform? Can others co-create on it? Security pricing, client transactions, report processing Would it be beneficial to do more or more complex analytics more quickly? Sources: Do Some Business Models Perform Better than Others? Malone, Weill, Lai, D Urso, Herman, Apel & Woerner, May, What Is Your Digital Business Model? Weill, June 2011 Copyright 2013 EMC Corporation. All rights reserved. 17
18 Business Monitoring Business Insights Business Optimization Data Monetization Business Metamorphosis Use BI to identify underand overperforming business areas Derive insights from data and plug them back into the business Automate analytics by embedding into certain business operations New revenue streams #1) sell data with analytics #2) create intelligent products #3) transform customer relationships Create new services and/or new markets
19 TOOLS & CONSULTING DATA SCIENTIST C O L L A B O R AT I O N SOLUTION TRAINING DESIGN/ DEVELOPMENT VISUALIZATION REPORTING DASHBOARDS ANALYTICS PREDICTIVE PLANNING / WHAT-IF TEXT ANALYTICS BIG DATA PLATFORM STRUCTURED U N S T R U C T U R E D DATA GOVERNANCE DATA QUALITY MASTER DATA MANAGEMENT DATA INTEGRATION DATA SOURCES TRANSACTIONAL DATA M A C H I N E D ATA S O C I A L EXTERNAL O T H E R S Copyright 2013 EMC Corporation. All rights reserved. 19
20 The 3 Phases of Data Science Denial #1 The problem is the Data #2 The problem is the Model #3 The problem is You
21 Copyright 2013 EMC Corporation. All rights reserved. 21
22 Priest (Super) Mum Horse rider Retired Consultant Teenager Hairdresser Entrepreneur Nurse Copyright 2013 EMC Corporation. All rights reserved. 22
23 Copyright 2013 EMC Corporation. All rights reserved. 23
24 Big Data Arrêtons d en parler, passons à l action! Aidan J. O Brien [email protected] +33 (0) Copyright 2013 EMC Corporation. All rights reserved. 24
SECURITY MEETS BIG DATA. Achieve Effectiveness And Efficiency. Copyright 2012 EMC Corporation. All rights reserved.
SECURITY MEETS BIG DATA Achieve Effectiveness And Efficiency 1 IN 2010 THE DIGITAL UNIVERSE WAS 1.2 ZETTABYTES 1,000,000,000,000,000,000,000 Zetta Exa Peta Tera Giga Mega Kilo Byte Source: 2010 IDC Digital
Advanced Threats: The New World Order
Advanced Threats: The New World Order Gary Lau Technology Consulting Manager Greater China [email protected] 1 Agenda Change of Threat Landscape and Business Impact Case Sharing Korean Incidents EMC CIRC
Security Analytics for Smart Grid
Security Analytics for Smart Grid Dr. Robert W. Griffin Chief Security Architect RSA, the Security Division of EMC [email protected] blogs.rsa.com/author/griffin @RobtWesGriffin 1 No Shortage of Hard
BREAKING THE KILL CHAIN AN EARLY WARNING SYSTEM FOR ADVANCED THREAT
BREAKING THE KILL CHAIN AN EARLY WARNING SYSTEM FOR ADVANCED THREAT Rashmi Knowles RSA, The Security Division of EMC Session ID: Session Classification: SPO-W07 Intermediate APT1 maintained access to
RSA Security Anatomy of an Attack Lessons learned
RSA Security Anatomy of an Attack Lessons learned Malcolm Dundas Account Executive John Hurley Senior Technology Consultant 1 Agenda Advanced Enterprise/ Threats The RSA Breach A chronology of the attack
Rashmi Knowles Chief Security Architect EMEA
Rashmi Knowles Chief Security Architect EMEA AGENDA Transformation of IT New cyber-security challenges Intelligence Driven Security Security Analytics Q&A 2 ENTERPRISE DATA CENTER ADVANCED SECURITY A UNIQUE
Business Model Archetypes Four archetypes describe the basic patterns of doing business: 1
FOCUS: SOFTWARE BUSINESS Software Industry Karl Michael Popp, SAP // Software companies can leverage successful firms business and revenue models to create a competitive advantage. // product. The creator
The Next Generation Security Operations Center
The Next Generation Security Operations Center Vassil Barsakov Regional Manager, CEE & CIS RSA, the Security Division of EMC 1 Threats are Evolving Rapidly Criminals Petty criminals Unsophisticated Organized
The Future of the Advanced SOC
The Future of the Advanced SOC Developing a platform for more effective security management and compliance Steven Van Ormer RSA Technical Security Consultant 1 Agenda Today s Security Landscape and Why
After the Attack. The Transformation of EMC Security Operations
After the Attack The Transformation of EMC Security Operations Thomas Wood Senior Systems Engineer, GSNA CISSP RSA, The Security Division of EMC [email protected] 1 Agenda Review 2011 Attack on RSA
Advanced SOC Design. Next Generation Security Operations. Shane Harsch Senior Solutions Principal, MBA GCED CISSP RSA
Advanced SOC Design Next Generation Security Operations Shane Harsch Senior Solutions Principal, MBA GCED CISSP RSA 1 ! Why/How security investments need to shift! Key functions of a Security Operations
Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence
Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence Chris Poulin Security Strategist, IBM Reboot Privacy & Security Conference 2013 1 2012 IBM Corporation Securing
The session is about to commence. Please switch your phone to silent!
The session is about to commence. Please switch your phone to silent! 1 Defend with Confidence Against Advanced Threats Nicholas Chia SE Manager, SEA RSA 2 TRUST? Years to earn, seconds to break 3 Market
Oracle Business Intelligence Mobile
Oracle Business Intelligence Mobile Jon Ainsworth Director of Business Development Oracle EMEA Business Analytics 1 Copyright 2011, Oracle and/or its affiliates. All rights reserved. Fact: Today Mobile
CLOUD MANAGED SERVICES FRAMEWORK E-BOOK
CLOUD MANAGED SERVICES FRAMEWORK E-BOOK TABLE OF CONTENTS 1 Introduction 2 2 Operational Insight 3 3 Cloud Management Process Control 4 4 Infrastructure, Application & Data Security 5 5 Continuous Improvement
Increase Revenue THE JOURNEY TO BIG DATA. Gary Evans. CTO EMC Ireland. Twitter.com/Gary3vans. Copyright 2013 EMC Corporation. All rights reserved.
THE JOURNEY TO BIG DATA Increase Revenue Gary Evans CTO EMC Ireland Twitter.com/Gary3vans 1 THE VALUE OF BIG DATA VARIETY VELOCITY BIG DATA VOLUME COMPLEXITY organizations can earn an incremental ROI of
Big Data Are You Ready? Jorge Plascencia Solution Architect Manager
Big Data Are You Ready? Jorge Plascencia Solution Architect Manager Big Data: The Datafication Of Everything Thoughts Devices Processes Thoughts Things Processes Run the Business Organize data to do something
Oracle Business Intelligence Applications: Complete Solutions for Rapid BI Success
1 Oracle Business Intelligence Applications: Complete Solutions for Rapid BI Success Lara Chedid Associate Project Manager Youssef Halawi Sales Consulting Manager Safe Harbor Statement
Disrupt or be disrupted IT Driving Business Transformation
Disrupt or be disrupted IT Driving Business Transformation Gokula Mishra VP, Big Data & Advanced Analytics Business Analytics Product Group Copyright 2014 Oracle and/or its affiliates. All rights reserved.
Harness the Power of Analytics Across Lines of Business with Speed and Ease
SAP Brief SAP Crystal s Objectives Harness the Power of Analytics Across Lines of Business with Speed and Ease Enable better insight at critical moments of engagement Enable better insight at critical
How Smart, Connected Products are Transforming Competition
How Smart, Connected Products are Transforming Competition Professor Michael E. Porter Harvard Business School James Heppelmann President & CEO, PTC Executive Event Munich, Germany January 21, 2015 This
Business Intelligence in the Construction Industry. Presented by: Bruce Vanderzyde, CA Anterra
Business Intelligence in the Construction Industry Presented by: Bruce Vanderzyde, CA Anterra Goals for this Session Review Business Intelligence concepts Evaluate report effectiveness against best practices
THE 2014 THREAT DETECTION CHECKLIST. Six ways to tell a criminal from a customer.
THE 2014 THREAT DETECTION CHECKLIST Six ways to tell a criminal from a customer. Telling criminals from customers online isn t getting any easier. Attackers target the entire online user lifecycle from
Business Model for Business Rules:
27 th Bled econference eecosystems June 1-5, 2014; Bled, Slovenia Business Model for Business Rules: Martijn Zoet HU University of Applied Sciences Utrecht, Nijenoord 1, 3552 AS Utrecht, Netherlands, [email protected]
The Big Data Paradigm Shift. Insight Through Automation
The Big Data Paradigm Shift Insight Through Automation Agenda The Problem Emcien s Solution: Algorithms solve data related business problems How Does the Technology Work? Case Studies 2013 Emcien, Inc.
BIG DATA. Shaun McLagan General Manager, RSA Australia and New Zealand CHANGING THE REALM OF POSSIBILITY IN SECURITY
BIG DATA CHANGING THE REALM OF POSSIBILITY IN SECURITY Shaun McLagan General Manager, RSA Australia and New Zealand 1 Things have changed #2 Buzz word 2012 Big Data only behind something called Fiscal
Chapter 4: Buying an Existing Business
Chapter 4: Buying an Existing Business 1 Learning Objectives To understand that buying an existing business has several important advantages over starting one, including less risk, less time and effort,
WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales
WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales The Cost of Cybercrime Sony $171m PlayStation 3 data breach (April 2011) $3 trillion
Predictive Analytics for Procurement Lead Time Forecasting at Lockheed Martin Space Systems
Orange County Convention Center Orlando, Florida June 3-5, 2014 Session Code: 0204 Predictive Analytics for Procurement Lead Time Forecasting at Lockheed Martin Space Systems Using SAP HANA, R, and the
Getting Ahead of Advanced Threats
Getting Ahead of Advanced Threats Advanced Security Solutions for Trusted IT Chezki Gil Territory Manager Israel & Greece 1 Threats are Evolving Rapidly Criminals Petty criminal s Unsophisticated Organized
Connected Intelligence and the 21 st Century Digital Enterprise
Connected Intelligence and the 21 st Century Digital Enterprise Lewis Carr Senior Director, HP Software May 25 th, 2015 By 2025 we will become a deeply connected, digital world Digital everything everywhere,
Big Data: How can it enhance your strategy?
7 Big Data: How can it enhance your strategy? Practice Area: IT Strategy Topic Area: Big Data Connecting the data dots for better strategic decisions Data is essential for organisations looking for answers
1 Regional Bank Regional banks specialize in consumer and commercial products within one region of a country, such as a state or within a group of states. A regional bank is smaller than a bank that operates
Beyond Traditional Management Reporting. 2013 IBM Corporation
Beyond Traditional Management Reporting 1 Agenda From Reporting to Business Analytics Expanding your capabilities set Workspace Authoring Statistical Analysis Predictive Modeling What-if analysis and planning
Brief Contents. Part Three: Decisions and Strategies. Part One: Information Technology Infrastructure. Part Four: Organizing Businesses and Systems
Brief Contents 1 Introduction Part One: Information Technology Infrastructure 2 Information Technology Foundations 3 Networks and Telecommunications 4 Database Management Part Two: Business Integration
BUSINESS-TO-BUSINESS MARKETING 2014-2015
BUSINESS-TO-BUSINESS MARKETING 2014-2015 Published by Richard K. Miller & Associates (RKMA) February 2014 biennial 316 pages ISBN# 9781577831969 PART I: MARKET OVERVIEW 1 BUSINESS-TO-BUSINESS MARKETING
BUSINESS-TO-BUSINESS MARKETING 2016-2017
BUSINESS-TO-BUSINESS MARKETING 2016-2017 September 2015 335 pages ISBN# 9781577832300 Published by Richard K. Miller & Associates (RKMA) PART I: MARKET OVERVIEW 1 BUSINESS-TO-BUSINESS MARKETING 1.1 B2B
Cisco ASA 5500 Series Firewall Edition for the Enterprise
Взято с сайта www.wit.ru Solution Overview Cisco ASA 5500 Series Firewall Edition for the Enterprise Threats to today s networks continue to grow, with attacks coming from both outside and within corporate
Attack Intelligence: Why It Matters
Attack Intelligence: Why It Matters WHITE PAPER Core Security +1 617.399-6980 [email protected] www.coresecurity.com A Proactive Strategy Attacks against your organization are more prevalent than ever,
Big Data Use Cases Update
Big Data Use Cases Update Sanat Joshi Industry Solutions Manufacturing Industries Business Unit 1 Data Explosion Web & social networks experienced it first Infographic by Go-gulf.com 2 Number Of Connected
Determining Data Equity: Capture and Calculate Valuation at Risk
Matthew Mikell- IBM Market Manager [email protected] IOT North America April 15, 2015 Determining Data Equity: Capture and Calculate Valuation at Risk Agenda Foundations of Capturing Equity Closing Gaps
How To Use Social Media To Improve Your Business
IBM Software Business Analytics Social Analytics Social Business Analytics Gaining business value from social media 2 Social Business Analytics Contents 2 Overview 3 Analytics as a competitive advantage
Deploy New Technologies Quickly with Cisco Managed Services for Service Providers
Solution Overview Deploy New Technologies Quickly with Cisco Managed Services for Service Providers CUSTOMER BENEFITS Cisco Managed Services Deliver a Wide Range of Customer Benefits Up to 50% ROI within
IDC FutureScape: Worldwide Big Data & Analytics 2016 Predictions. IDC Web Conference November 2015
IDC FutureScape: Worldwide Big Data & Analytics 2016 Predictions IDC Web Conference November 2015 Logistics Today s Speakers Submit any questions to [email protected] You can download slides from
Leading The World Into Connected Security. Paolo Florian Sales Engineer
Leading The World Into Connected Security Paolo Florian Sales Engineer History of Defining Largest Dedicated Delivering a Next Generation Architecture Security Provider Security Architecture Inventor of
LIGHTHOUSE. Case Study: Impact Telecom Early Warning System
LIGHTHOUSE Case Study: Impact Telecom Early Warning System About Impact Telecom Impact Telecom is a leader in the telecommunications market, with a complex network that encompasses nationwide IP, interconnection
Cisco ASA 5500 Series Firewall Edition for the Enterprise
Solution Overview Cisco ASA 5500 Series Firewall Edition for the Enterprise Threats to today s networks continue to grow, with attacks coming from both outside and within corporate networks. These threats
Ocean Tomo Live Intellectual Property Auctions
Ocean Tomo Live Intellectual Property Auctions Auction Effects Created price transparency in the market Provided an alternative option to the small inventor/small company Enabled the ability for companies
the 3 keys to achieving real-time visibility of your customer s experience
www.hcltech.com the 3 keys to achieving real-time visibility of your customer s experience big data & business analytics AuthOr: john wills global director, center of excellence hcl business analytics
MarketsandMarkets. http://www.marketresearch.com/marketsandmarkets-v3719/ Publisher Sample
MarketsandMarkets http://www.marketresearch.com/marketsandmarkets-v3719/ Publisher Sample Phone: 800.298.5699 (US) or +1.240.747.3093 or +1.240.747.3093 (Int'l) Hours: Monday - Thursday: 5:30am - 6:30pm
Online business models
Online business models 1 B2C INTERNET MARKETING: CATEGORIES OF PLAYERS 2 E-commerce: players Dot.com Pure Player Old Economy Click & Bricks Click & Mortar 3 E-commerce: players Dot.com Pure Player Old
GETTING REAL ABOUT SECURITY MANAGEMENT AND "BIG DATA"
GETTING REAL ABOUT SECURITY MANAGEMENT AND "BIG DATA" A Roadmap for "Big Data" in Security Analytics ESSENTIALS This paper examines: Escalating complexity of the security management environment, from threats
The IBM Cognos family
IBM Software Business Analytics Cognos software The IBM Cognos family Analytics in the hands of everyone who needs it The IBM Cognos family Overview Business intelligence (BI) and business analytics have
How CFD Trading Works?
What are CFD s In finance, a contract for difference (CFD) is a contract between two parties, typically described as "buyer" and "seller", stipulating that the seller will pay to the buyer the difference
The Business Value of Predictive Analytics
The Business Value of Predictive Analytics Alys Woodward Program Manager, European Business Analytics, Collaboration and Social Solutions, IDC London, UK 15 November 2011 Copyright IDC. Reproduction is
Accenture Intelligent Security for the Digital Enterprise. Archer s important role in solving today's pressing security challenges
Accenture Intelligent Security for the Digital Enterprise Archer s important role in solving today's pressing security challenges The opportunity to improve cyber security has never been greater 229 2,287
Τhe SAS BI delivers business-critical answers ahead of the competition Yannis Salamaras Senior Business Intelligence Consultant SAS Greece & Cyprus
Τhe SAS BI delivers business-critical answers ahead of the competition Yannis Salamaras Senior Business Intelligence Consultant SAS Greece & Cyprus The Value of the Information What s wrong with this picture?
Introducing Best Practices to Aggregation an EBS Consultation
Introducing Best Practices to Aggregation an EBS Consultation Gil Mandelzis, CEO June 2013 Copyright 2013 EBS Service Company Limited. All rights reserved. No part of this document may be reproduced or
IBM Business Partners: Top Five Best Practices for Maximizing Your Success Selling IBM Software
IBM Business Partners: Top Five Best Practices for Maximizing Your Success Selling IBM Software Judith Hurwitz President and CEO Marcia Kaufman COO and Principal Analyst Sponsored by IBM Introduction IBM
InforCloudSuite. Distribution Enterprise. Overview INFOR CLOUDSUITE DISTRIBUTION ENTERPRISE 1
InforCloudSuite Distribution Enterprise Overview INFOR CLOUDSUITE DISTRIBUTION ENTERPRISE 1 What if... You could implement an enterprise solution customized for distribution without the risks of traditional
WHITE PAPER. CRM Evolved. Introducing the Era of Intelligent Engagement
WHITE PAPER CRM Evolved Introducing the Era of Intelligent Engagement November 2015 CRM Evolved Introduction Digital Transformation, a key focus of successful organizations, proves itself a business imperative,
57% 30% 5.4 Stakeholders 53% 97% Customers are. Reps only retain. Average B2B purchase decisions have
Average B2B purchase decisions have 5.4 Stakeholders Customers are 57% through the buying process before they talk to the supplier Reps only retain 30% of training information within 1 week Cold calls
SUSTAINING COMPETITIVE DIFFERENTIATION
SUSTAINING COMPETITIVE DIFFERENTIATION Maintaining a competitive edge in customer experience requires proactive vigilance and the ability to take quick, effective, and unified action E M C P e r s pec
Tuning Incentives To Motivate Sales & Drive Profits. Christopher W. Cabrera, Founder, President & CEO Jeff Williams, Vice President Sales, IronPort
Tuning Incentives To Motivate Sales & Drive Profits Christopher W. Cabrera, Founder, President & CEO Jeff Williams, Vice President Sales, IronPort Agenda Introduction to Xactly Corporation How to Use Incentive
Organization transformation in times of change
Organization transformation in times of change Insurance is sold, not bought is a phrase of unknown attribution, but common wisdom for decades. Thus, insurers and most financial services organizations
Use Advanced Analytics to Guide Your Business to Financial Success
SAP Information Sheet Analytics Solutions from SAP Quick Facts Use Advanced Analytics to Guide Your Business to Financial Success Quick Facts Summary With advanced analytics from SAP, finance experts can
In effect CFD s are financial derivatives, originally known as Traded Options, that allow traders to take advantage of prices moving up (long
What are CFD s In finance, a contract for difference (CFD) is a contract between two parties, typically described as "buyer" and "seller", stipulating that the seller will pay to the buyer the difference
SAS Enterprise Decision Management at a Global Financial Services Firm: Enabling More Rapid Implementation of Decision Models into Production
Buyer Case Study SAS Enterprise Decision Management at a Global Financial Services Firm: Enabling More Rapid Implementation of Decision Models into Production Brian McDonough IDC OPINION The goal of decision
Endeavour Dynamics Offering
Endeavour Dynamics Offering Microsoft Dynamics AX 2012 is recognised as a global leading ERP system that supports a single instance strategy for medium to large enterprise companies. Endeavour is proud
How To Build Security By Silo
Leading The World Into Connected Security Building Security By Silo Technology Acquisition Process Has Delivered Security Chaos Endpoint Protection Firewall Gateway Security Network IPS Compliance Data
IP Audit and Management
WIPO Training of Trainers Program on Asset Management by Small and IP Audit and Management 10 12 June 2013 Presented by Mowafak Al Yafi Ph.D Discussion points What is IP Audit What are the types of assets
SAP Predictive Analytics
SAP Predictive Analytics What s the best that COULD happen? Bringing predictive analytics to the end user SAP Forum Belgium September 9, 2015 Waldemar Adams @adamsw SVP & GM Analytics SAP Europe, Middle-East
Using Predictive Analytics to Increase Profitability Part III
Using Predictive Analytics to Increase Profitability Part III Jay Roy Chief Strategy Officer Practical Intelligence for Ensuring Profitability Fall 2011 Dallas, TX Table of Contents A Brief Review of Part
Digitization of intermediated insurance distribution
1 Digitization of intermediated insurance distribution An Efma Think Tank supported by Roland Berger Summary Paris, June 6th 2013 We have analyzed the Digital maturity of a REPRESENTATIVE SAMPLE of European
An Enterprise Resource Planning Solution for Mill Products Companies
SAP Thought Leadership Paper Mill Products An Enterprise Resource Planning Solution for Mill Products Companies Driving Operational Excellence and Profitable Growth Table of Contents 4 What It Takes to
Delivering new insights and value to consumer products companies through big data
IBM Software White Paper Consumer Products Delivering new insights and value to consumer products companies through big data 2 Delivering new insights and value to consumer products companies through big
This IDC Retail Insights Perspective looks at the growing applicability of business intelligence and analytics for the wholesale industry.
The Growing Use of Business Intelligence and Analytics in Wholesale P E R S P E C T I V E # G R I 2 2 5 6 4 4 Simon D. Ellis Henry D. Morris IN THIS PERSPECTIVE This IDC Retail Insights Perspective looks
Analytics for Oil & Gas
Analytics for Oil & Gas Table of Contents Project Delivery. 3 Sales & Operations. 5 Resources. 8 Finance. 10 Contact Us. 14 2 Are you tracking and maximizing the profitability of every project? Don t let
Strategic Decisions Supported by SAP Big Data Solutions. Angélica Bedoya / Strategic Solutions GTM Mar /2014
Strategic Decisions Supported by SAP Big Data Solutions Angélica Bedoya / Strategic Solutions GTM Mar /2014 What critical new signals Might you be missing? Use Analytics Today 10% 75% Need Analytics by
@LogiAnalytics #SelfServiceBI
The Continuum of Self-Service Steven Schneider, Chief Product Officer David Abramson, Director of Product Management Alvin Wong, Product Marketing Manager @LogiAnalytics #SelfServiceBI Unmet Need 2 Unmet
Chapter 4: Business Valuation (Adjusted Book Value or Cost Approach)
Chapter 4: Business Valuation (Adjusted Book Value or Cost Approach) In adjusting the balance sheet, the most difficult task is to mark to market (substitute market values for book values) the assets and
Big Data Analytics. A Game Changer for OD Practitioners. Michele Reeves, SAS. Technology & Tools Change & Agility Diversity & Culture
Big Data Analytics A Game Changer for OD Practitioners Michele Reeves, SAS Technology & Tools Change & Agility Diversity & Culture Look Who s Talking I hope you learn 1. The difference between business
Cisco ASA 5500 Series IPS Solution
Cisco ASA 5500 Series IPS Solution Product Overview Network threats and security compliance mandates continue to increase in number. The Cisco ASA 5500 Series Intrusion Prevention System (IPS) solution
@DanSSenter. Business Intelligence Centre of Excellence Manager. [email protected]. +44 (0) 7805 162092 dansenter.co.
Dan Senter Business Intelligence Centre of Excellence Manager [email protected] @DanSSenter +44 (0) 7805 162092 dansenter.co.uk Agenda National Grid Evolution of BI The BICC Empowerment Learnings
