Intel has outlined a roadmap for advanced business intelligence (BI) solutions that it intends for use across the enterprise.
Intel is currently running three proofs of concept in its business to illustrate the value BI can deliver:
• Batch Computing - To support its product design community, Intel has developed a batch computing algorithm that predicts how long jobs are likely to run and when they are likely to fail. It hopes that early intervention will resolve issues before time and resources are expanded.
• Security - In a bid to protect Intel's information assets, it has deployed a dashboard that integrates malware data from multiple sources to provide granular information about specific clients or servers that have been infected. It also hopes to add a predictive engine to this data, which should enable proactive protection.
• To support its high-volume manufacturing, Intel has developed an engine that will enable early detection of product quality problems on manufacturing lines. It hopes that this will improve line yields and prevent high-volume and costly mistakes.
Despite its predicted value benefits, Intel also anticipates that there will be infrastructure and technical challenges to successfully pursuing an advanced BI roadmap. For example, it predicts that reducing latency to give employees access to real-time data, supporting multiple data sources, enabling collaborative, mobile and visual BI and implementing context-aware BI to a variety of devices will all be difficult tasks.
Intel's BI roadmap whitepaper reads: "Implementing advanced business analytics helps Intel business groups dramatically improve the velocity and quality of decision-making. Intel IT's vision for BI includes personalised, visual solutions that allow employees to manipulate, analyse and interrogate both structured and unstructured data autonomously.
"Advances in affordable processing power, as well as improvements in affordable data storage technology, make such advanced capabilities a reality at Intel," reads the white paper.
There is a lot of attention being paid to how business leaders can use the mobile computing preferences of employees and customers to be more responsive, efficient and successful. This white paper runs through five security considerations for the mobile age.
This Dummies white paper will help you better understand business process management (BPM)