Critical Capabilities for the Enterprise with New Data Introduction - Cover Page - Overview

Total Page:16

File Type:pdf, Size:1020Kb

Critical Capabilities for the Enterprise with New Data Introduction - Cover Page - Overview Critical Capabilities for the Enterprise with New Data Introduction - Cover page - Overview Critical Capabilities for Deploying Enterprise Analytics and Mobility Applications Report generated on October 2, 2017 This information represents the opinions of MicroStrategy based on its assessment of the products listed. 1 / 167 Critical Capabilities for the Enterprise with New Data Introduction - Why MicroStrategy - Overview Why MicroStrategy Technical Critical Critical Capability Tableau Qlik IBM SAP MSFT Oracle MSTR Solution Capability Description Why MicroStrategy Score Sense Cognos BO PowerBI Score Score Score Score Score Score Enterprise Object An object-oriented MicroStrategy offers a centralized metadata repository that is built with and Platform Oriented architecture catalogs contains objects, as defined by developers, and can be reused across the Reusability every aspect of the BI project. Objects can be combined to create higher level objects (e.g., business. Data assets, attributes and metrics make up a report; reports, filters, and prompts make KPIs, dimensions, up a document; documents, and other reports can be embedded into a users, reports, and document - all of which are stored as "metadata objects"), and this dashboards are all together delivers a single BI project or a data model. stored in a central • The reusable model enables objects across the BI deployment to be location as unique securely reused hundreds of times by users across the enterprise, without logical objects to any duplication of effort. support reusability. • The model not only includes dimensions and metrics, but also covers filters, reports, prompts, custom groups, reports, dashboards, and documents - making it possible to flexibly reuse all of these objects multiple times across any application and BI project. • Changes or modifications made to any object in the metadata automatically proliferates to all other dependent objects. This eliminates the need to manually update the changes across the deployment, which is particularly helpful for larger BI projects. • The reusable model helps ensure faster development times, increased platform scalability, efficient management, and also maintains a single version of the truth. Data Unique definitions to The MicroStrategy metadata model makes it possible for anyone with the Governance every dimension and right privileges to promote new and external content to the Server and tie it metric bound together to a certified data model, all with easy workflows. by strict rules that are • It is possible to map the metadata at the dimension level, as well as the defined by a logical cube level, giving users the flexibility to control the data that is published to model, thus ensuring a the model. single version of the • The platform supports governance for data from disparate sources, even truth external non-certified sources, that helps build a system of record that users can trust--while also delivering flexibility to end users. • Beyond the ability to govern external data sources, the platform offers granular security features that allow project owners and data stewards to grant permissions and privileges to the right people. This delivers data security and also personalizes reports and dashboards to end users. • Workflows available with the MicroStrategy platform to promote external data into the system of record, combined with the flexibility of the system to deliver self-service access to business teams will increase the overall adoption of the BI platform. User Security Roles and privileges The security model within the MicroStrategy platform is built around users that assign restrictions and user groups, which are represented as logical metadata objects. This to users and groups ensures that data is secured at the most granular levels. ensure that end users • Security filters based on dimension values help ensure that users are only see personalized restricted to only see data that is relevant to them. This eliminates the and relevant content need to build multiple copies of the same application, and makes it and are only able to possible to optimally scale. perform authorized • With MicroStrategy's tools, administrators can apply Access Control Lists actions. (ACLs) to large user groups, restricting the range of data objects they can access or actions they can perform, and specifying the scope of their privileges in the environment. • With Usher, it is possible to provide secure digital authentication options, including geo-fencing and time-fencing capabilities, making it possible to restrict user access based on location and time. Scalability Deliver analytics to MicroStrategy is optimized in its design for enterprise scale and speed; as everyone across the such, the platform can support the analytical reporting needs of 100s of enterprise, and beyond. thousands of users across the enterprise. Allow 1000s of users to • The platform can be clustered with up to 8 nodes with work- and user- 2 / 167 Critical Capabilities for the Enterprise with New Data Introduction - Why MicroStrategy - Why MicroStrategy Technical Critical Critical Capability Tableau Qlik IBM SAP MSFT Oracle MSTR Solution Capability Description Why MicroStrategy Score Sense Cognos BO PowerBI Score Score Score Score Score Score Enterprise Object An object-oriented MicroStrategy offers a centralized metadata repository that is built with and Platform Oriented architecture catalogs contains objects, as defined by developers, and can be reused across the Reusability every aspect of the BI project. Objects can be combined to create higher level objects (e.g., business. Data assets, attributes and metrics make up a report; reports, filters, and prompts make KPIs, dimensions, up a document; documents, and other reports can be embedded into a users, reports, and document - all of which are stored as "metadata objects"), and this dashboards are all together delivers a single BI project or a data model. stored in a central • The reusable model enables objects across the BI deployment to be location as unique securely reused hundreds of times by users across the enterprise, without logical objects to any duplication of effort. support reusability. • The model not only includes dimensions and metrics, but also covers filters, reports, prompts, custom groups, reports, dashboards, and documents - making it possible to flexibly reuse all of these objects multiple times across any application and BI project. • Changes or modifications made to any object in the metadata automatically proliferates to all other dependent objects. This eliminates the need to manually update the changes across the deployment, which is particularly helpful for larger BI projects. • The reusable model helps ensure faster development times, increased platform scalability, efficient management, and also maintains a single version of the truth. Data Unique definitions to The MicroStrategy metadata model makes it possible for anyone with the Governance every dimension and right privileges to promote new and external content to the Server and tie it metric bound together to a certified data model, all with easy workflows. by strict rules that are • It is possible to map the metadata at the dimension level, as well as the defined by a logical cube level, giving users the flexibility to control the data that is published to model, thus ensuring a the model. single version of the • The platform supports governance for data from disparate sources, even truth external non-certified sources, that helps build a system of record that users can trust--while also delivering flexibility to end users. • Beyond the ability to govern external data sources, the platform offers granular security features that allow project owners and data stewards to grant permissions and privileges to the right people. This delivers data security and also personalizes reports and dashboards to end users. • Workflows available with the MicroStrategy platform to promote external data into the system of record, combined with the flexibility of the system to deliver self-service access to business teams will increase the overall adoption of the BI platform. User Security Roles and privileges The security model within the MicroStrategy platform is built around users that assign restrictions and user groups, which are represented as logical metadata objects. This to users and groups ensures that data is secured at the most granular levels. ensure that end users • Security filters based on dimension values help ensure that users are only see personalized restricted to only see data that is relevant to them. This eliminates the and relevant content need to build multiple copies of the same application, and makes it and are only able to possible to optimally scale. perform authorized • With MicroStrategy's tools, administrators can apply Access Control Lists actions. (ACLs) to large user groups, restricting the range of data objects they can access or actions they can perform, and specifying the scope of their privileges in the environment. • With Usher, it is possible to provide secure digital authentication options, including geo-fencing and time-fencing capabilities, making it possible to restrict user access based on location and time. 3 / 167 Critical Capabilities for the Enterprise with New Data Introduction - Why MicroStrategy - Why MicroStrategy Technical Critical Critical Capability Tableau Qlik IBM SAP MSFT Oracle MSTR Solution Capability Description Why MicroStrategy Score Sense Cognos BO PowerBI Score
Recommended publications
  • Oracle Data Sheet
    COGNOS’ STRATEGYPLUS 4.0 FOR COGNOS ENTERPRISE BUSINESS INTELLIGENCE AND PEOPLESOFT ENTERPRISE PERFORMANCE MANAGEMENT 8.8 Cognos Enterprise Business Intelligence (EBI) provides Oracle’s PeopleSoft Enterprise Performance Management (EPM) customers with enhanced analytical, reporting, and scorecarding capabilities. Delivers end-to-end enterprise business intelligence. Integrated Cognos EBI integrates business intelligence components into a reporting, analysis, and scorecarding for PeopleSoft single, end-to-end framework serving all of the diverse informational Enterprise Performance Management. A PeopleSoft requirements of users across your organization. Using the consolida- Enterprise 8 validated software tion of a company’s various data sources to create a unified view of integration. the business, Cognos provides a consistent information environment. Cognos, Inc. Cognos, the leading provider of enterprise business intelligence (EBI), delivers software that helps companies improve business performance by enabling effective decision making at all levels of the organization. A forerunner in defining the BI software category, Cognos delivers the next level of competitive advantage— Corporate Performance Management (CPM)—achieved through the strategic application of BI on an enterprise scale. Cognos EBI for PeopleSoft Enterprise Performance Management 8.8 Integration Cognos offers a certified metadata and security integration with PeopleSoft Enterprise Performance Management. Through the StrategyPlus utility, PeopleSoft Enterprise metadata
    [Show full text]
  • IBM Cognos Analytics - Reporting Version 11.1
    IBM Cognos Analytics - Reporting Version 11.1 User Guide IBM © Product Information This document applies to IBM Cognos Analytics version 11.1.0 and may also apply to subsequent releases. Copyright Licensed Materials - Property of IBM © Copyright IBM Corp. 2005, 2021. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. IBM, the IBM logo and ibm.com are trademarks or registered trademarks of International Business Machines Corp., registered in many jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the Web at " Copyright and trademark information " at www.ibm.com/legal/copytrade.shtml. The following terms are trademarks or registered trademarks of other companies: • Adobe, the Adobe logo, PostScript, and the PostScript logo are either registered trademarks or trademarks of Adobe Systems Incorporated in the United States, and/or other countries. • Microsoft, Windows, Windows NT, and the Windows logo are trademarks of Microsoft Corporation in the United States, other countries, or both. • Intel, Intel logo, Intel Inside, Intel Inside logo, Intel Centrino, Intel Centrino logo, Celeron, Intel Xeon, Intel SpeedStep, Itanium, and Pentium are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries. • Linux is a registered trademark of Linus Torvalds in the United States, other countries, or both. • UNIX is a registered trademark of The Open Group in the United States and other countries. • Java and all Java-based trademarks and logos are trademarks or registered trademarks of Oracle and/or its affiliates.
    [Show full text]
  • Radio Frequency Identification Based Smart
    ISSN (Online) 2394-6849 International Journal of Engineering Research in Electronics and Communication Engineering (IJERECE) Vol 4, Issue 5, May 2017 IOT Based Smart Home [1] prof. Kavita S. patil, [2] Apurva R. Kokate, [3] Shruti R. Wagh, [4]Priyanka D. Tile, [5] Prajakata S. Somavanshi Electronics & Tele- Communication Dept., Sandip Institute of Technology, Nashik, Maharashtra, India. Abstract - In 21 St century Digital devices in our home are increases rapidly. And we all affixed to the mobile phones and laptops. As it becomes need, so this project may helpful to use this habit to get easy and safe life. Home automation provides user friendly access by mobile phone using android application. This project is focuses on controlling devices instead of only monitoring of environment Keywords: Internet of things, raspberry pi-3 module, android application, web page. according to high signal on pin. Then particular devices get ON or OFF. 1.INTRODUCTION 3.1Comparison of Wireless Systems Now a days our life is becoming very busy. Not only men but women are also start working and SR SYSTEM COMMUNIC CONTRO USER taking burden of work and home. So in this situation NO ATION LLER INTERFA they need a system which keeps their home secure. INTERFACE CE In this paper we described about our Home 1 Wi-Fi based Wireless Hardware Web based automation system. In which we can control home using the LAN and Wi- interface Applicatio application through internet from anywhere and any arduino Fi shield module n time. Microcontroll er 2.HARDWARE USED 2 Web service Web server Raspberry Android System consists of and android and interface pi Applicatio app based card n 2.1 raspberry pi module using raspberry pi Raspberry pi module is used as a development 3 Cloud based Zigbee Smart PC or board.
    [Show full text]
  • IBM Cognos Integration Server Make Data Extractions Easier to Build and Maintain
    IBM Analytics Cognos Integration Server Data Sheet IBM Cognos Integration Server Make data extractions easier to build and maintain Organizations need higher performance Highlights with greater ease of use Integrating financial data from disparate sources can be a critical factor • Enables users to populate IBM Cognos TM1 and IBM Planning Analytics in a company’s ability to successfully manage its business. Yet many applications and BI warehouses by organizations find that extracting data from almost any source can moving data and metadata from Cognos be a slow and cumbersome process. They need to be able to extract TM1, Oracle Hyperion, SAP Business Warehouse (BW) or other applications. data quickly, in a repeatable process that eliminates the need to start over again in the next planning or reporting cycle. IBM® Cognos® • Performs automated high-speed Integration Server satisfies this need with a high-performance, data extraction. easy-to-use alternative to manual data extraction processes. • Offers an intuitive interface designed for business users. IBM Cognos Integration Server • Supports continuous planning and As proprietary applications for business intelligence (BI) and reporting cycles. performance management (PM) have transitioned from being data end-points to key sources of information, the need to extract that information from these varied systems for loading into centralized repositories has grown to be a business imperative. The various sources can become “data islands,” with users forced to constantly compare spreadsheets to confirm that the information is correct. Custom interfaces are too unstable to reliably extract data and metadata for reporting purposes. IT requires the rigidity of a relational system while finance users need their cubes.
    [Show full text]
  • Heartmate: a Competitive and Motivational Fitness Application for Ios Devices
    University of Nevada, Reno HeartMate: A Competitive and Motivational Fitness Application for iOS Devices A thesis submitted in partial fulfillment of the requirements for the degree of Master of Science in Computer Science and Engineering by Marlon Daniel Chavez Dr. Frederick C. Harris, Jr., Thesis Advisor May, 2016 THE GRADUATE SCHOOL We recommend that the thesis prepared under our supervision by MARLON DANIEL CHAVEZ Entitled HeartMate: A Competitive and Motivational Fitness Application for iOS Devices be accepted in partial fulfillment of the requirements for the degree of MASTER OF SCIENCE Dr. Frederick C. Harris, Jr., Advisor Dr. Sergiu M. Dascalu, Committee Member Dr. Yantao Shen, Graduate School Representative David W. Zeh, Ph.D., Dean, Graduate School May, 2016 i Abstract Smartphones today are more advanced than they have ever been before with hardware sensors built into them to detect location, motion, as well ways to com- municate with third party hardware through bluetooth, and the internet through cellular or wifi. With the introduction of Apple’s App Store, and the Google Play store smartphone devices have been given features one would not think possible on a cell phone. One of the target categories for app developers is health, due to the sensors provided in current smartphones an application can be developed to track a user’s health. The apps currently on the market motivate users through mostly goal based challenges between themselves or their friends. HeartMate is an iOS mobile application that utilizes the sensors in the iPhone, and the use of a Bluetooth LE connected heart rate monitor to create a new competitive, motivational, real time social experience using heart rates as a performance measure.
    [Show full text]
  • Atwinc15x0 ATWINC3400 Wi-Fi Network Controller Software Programming Guide
    AN5305 ATWINC15x0/ATWINC3400 Wi-Fi® Network Controller Software Programming Guide Introduction This software programming guide describes the use of the ATWINC15x0/ATWINC3400 Wi-Fi Network Controller to build state-of-the-art Internet of Things (IoT) applications. The following topics will be covered: • How examples are organized • Target board information • Instruction for each example Note: All the listed examples and folder structure/files are similar for both WINC15x0 and ATWINC3400. The diagrams and console logs in this document refer to ATWINC15x0. Prerequisites • Hardware Prerequisites: – SAM D21 Xplained Pro Evaluation Kit – ATWINC15x0 extension (For more details, refer to ATWINC15x0 user guide) – ATWINC3400 extension (For more details, refer to ATWINC3400 user guide) – IO1 extension – Micro-USB Cable (Micro-A/Micro-B) • Software Prerequisites: – Atmel Studio 7.0 (For more details, refer to user guide) – Wi-Fi IoT Examples (for more details, refer to application notes) Figure 1. SAM D21 XSTK Board Demo Setup © 2019 Microchip Technology Inc. Application Note DS70005305C-page 1 AN5305 Table of Contents Introduction.....................................................................................................................................................1 Prerequisites.................................................................................................................................................. 1 1. How the Examples are Organized.........................................................................................................
    [Show full text]
  • ©2014 Strafford Technology. All Rights Reserved. Who We Are
    ©2014 Strafford Technology. All rights reserved. Who We Are • Leader in Enterprise Performance Management consultancy founded in 1995 • Decades of experience Implementing Oracle Hyperion and other tools • Broad Experience across many tools and technologies • Focused on improving Process within Finance 2 Today Our History 2003 Focus on Office of the CFO Multi-technology Partnerships Challenges 1995 Enterprise Performance Leading Provider of Enterprise Management solutions Performance Management Strong Business Intelligence solutions in North America Background Clients across Eastern US and Canada Enterprise Reporting and Leading provider of Business Analytics Intelligence solutions in North Partnerships: Partnerships: Oracle (Hyperion) America Hyperion/OutlookSoft/Cognos/ Comshare/Business Objects/ Platinum Partner Crystal Reports/Business SAP Clients range from mid to large Objects/Brio Partner Evaluation Practice - Assisting enterprise, many Fortune 50 Partnerships: Clients with EPM tool selection companies ADP/Kronos/Oracle/Microsoft 3 Recent Clients We are Focused… Budgeting, Forecasting and Planning Business Consolidation Intelligence and Financial Analytics – Reporting Operational Reporting 5 We are Focused… Capital Expenditure Budgeting, Forecasting Headcount Planning and Planning Project Financial Planning Revenue Planning Strategic Long Term Planning Driver Based Planning Allocations Profitability Modeling Business Intelligence Consolidation and Analytics – Financial Reporting Operational Reporting 6 We are Focused… Budgeting,
    [Show full text]
  • Downloaded from ORCA, Cardiff University's Institutional Repository
    This is an Open Access document downloaded from ORCA, Cardiff University's institutional repository: http://orca.cf.ac.uk/113958/ This is the author’s version of a work that was submitted to / accepted for publication. Citation for final published version: Anthi, Eirini, Ahmad, Shazaib, Rana, Omer, Burnap, Pete and Theodorakopoulos, Georgios 2018. EclipseIoT: A secure and adaptive hub for the Internet of Things. Computers and Security 78 , pp. 477-490. 10.1016/j.cose.2018.07.016 file Publishers page: https://doi.org/10.1016/j.cose.2018.07.016 <https://doi.org/10.1016/j.cose.2018.07.016> Please note: Changes made as a result of publishing processes such as copy-editing, formatting and page numbers may not be reflected in this version. For the definitive version of this publication, please refer to the published source. You are advised to consult the publisher’s version if you wish to cite this paper. This version is being made available in accordance with publisher policies. See http://orca.cf.ac.uk/policies.html for usage policies. Copyright and moral rights for publications made available in ORCA are retained by the copyright holders. EclipseIoT: A Secure and Adaptive Hub for the Internet of Things Eirini Anthi∗, Shazaib Ahmad, Omer Rana, George Theodorakopoulos, Pete Burnap Cardiff University, School of Computer Science & Informatics, 5 The Parade, Roath, Cardiff, CF24 3AA Abstract With the proliferation in the quantity and types of devices that may be included in an Internet of Things (IoT) ecosystem, particularly in the context of a smart home, it is essential to provide mechanisms to deal with the heterogeneity which such devices encompass.
    [Show full text]
  • IBM Embraces AI for BI in Cognos Analytics
    REPORT REPRINT IBM embraces AI for BI in Cognos Analytics KRISHNA ROY 28 NOVEMBER 2018 The company has infused its business intelligence and analytics platform with additional AI in order to automate as many features as possible and bring out-of-the-box advanced analytics to business users. THIS REPORT, LICENSED TO IBM, DEVELOPED AND AS PROVIDED BY 451 RESEARCH, LLC, WAS PUBLISHED AS PART OF OUR SYNDICATED MARKET INSIGHT SUBSCRIPTION SERVICE. IT SHALL BE OWNED IN ITS ENTIRETY BY 451 RESEARCH, LLC. THIS REPORT IS SOLELY INTEND- ED FOR USE BY THE RECIPIENT AND MAY NOT BE REPRODUCED OR RE-POSTED, IN WHOLE OR IN PART, BY THE RECIPIENT WITHOUT EXPRESS PERMISSION FROM 451 RESEARCH. ©2018 451 Research, LLC | WWW.451RESEARCH.COM 451 RESEARCH REPRINT IBM has made good on the Cognos Analytics investment priorities the company outlined earlier in 2018. With Cognos Analytics 11.1, which is the latest release of IBM’s flagship BI and analytics platform, the company has integrated artificial intelligence through existing layers, unleashed a new AI-assisted data exploration user experience and expanded the offering’s purview into automated advanced analytics. Cognos Analytics 11.1 contains new features too numerous to delve into here, so we will concentrate on what we believe to be the key ones. THE 451 TAKE IBM has certainly followed through on its stated intentions for Cognos Analytics, delivering capabilities on time and in the manner that it said it would, which is to be applauded. The result of development work carried out for over a year has turned Cognos Analytics into a compelling BI and analysis platform that hits all the market requirement and trends, including smart data discovery, augmented analytics and automated predic- tive analysis.
    [Show full text]
  • IBM Cognos Analytics Version 11.1 : Administration and Security Guide Chapter 1
    IBM Cognos Analytics Version 11.1 Administration and Security Guide IBM © Product Information This document applies to IBM Cognos Analytics version 11.1.0 and may also apply to subsequent releases. Copyright Licensed Materials - Property of IBM © Copyright IBM Corp. 2005, 2021. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. IBM, the IBM logo and ibm.com are trademarks or registered trademarks of International Business Machines Corp., registered in many jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the Web at " Copyright and trademark information " at www.ibm.com/legal/copytrade.shtml. The following terms are trademarks or registered trademarks of other companies: • Adobe, the Adobe logo, PostScript, and the PostScript logo are either registered trademarks or trademarks of Adobe Systems Incorporated in the United States, and/or other countries. • Microsoft, Windows, Windows NT, and the Windows logo are trademarks of Microsoft Corporation in the United States, other countries, or both. • Linux is a registered trademark of Linus Torvalds in the United States, other countries, or both. • UNIX is a registered trademark of The Open Group in the United States and other countries. • Java and all Java-based trademarks and logos are trademarks or registered trademarks of Oracle and/or its affiliates. Microsoft product screen shot(s) used with permission from Microsoft. © Copyright International Business Machines Corporation . US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp.
    [Show full text]
  • Future-Proofing the Connected World: 13 Steps to Developing Secure Iot Products
    Future-proofing the Connected World: 13 Steps to Developing Secure IoT Products Presented by the IoT Working Group Table of Contents Forward Introduction Document Scope The Need for IoT Security IoT Products Can Compromise Privacy IoT products can lend their computing power to launch DDoS Attacks Medical Devices and Medical Standard Protocols are Vulnerable to Attack Drones Are Approaching Mainstream Status and Being Used as a Platform for Reconnaissance Critical national infrastructure can rely on the IoT ecosystem Cars are becoming connected and autonomous Moving Forward Why Development Organizations Should Care About Securing IoT Products IoT Device Security Challenges IoT products may be deployed in insecure or physically exposed environments Security is new to many manufacturers and there is limited security planning in development methodologies Security is not a business driver and there is limited security sponsorship and management support in development of IoT products There is a lack of defined standards and reference architecture for secure IoT development There are difficulties recruiting and retaining requisite skills for IoT development teams including architects, secure software engineers, hardware security engineers, and security testing staff The low price point increases the potential adversary pool Resource constraints in embedded systems limit security options IoT Security Survey Guidance for Secure IoT Development 1. Start with a Secure Development Methodology Security Requirements Security Processes Perform Safety Impact Assessment Perform Threat Modeling 2. Implement a Secure Development and Integration Environment Evaluate Programming Languages OWASP Python Security Project Link Integrated Development Environments Continuous Integration Plugins Testing and Code Quality Processes 3. Identify Framework and Platform Security Features Selecting an Integration Framework Evaluate Platform Security Features 4.
    [Show full text]
  • Cognos Analytics Navigation
    Cognos Analytics Navigation COG 101 Cognos Version 11.1.7 November 2020 Purdue IBM Cognos Analytics for Users Business Intelligence Competency Center Copyright © 2020 by Purdue University. All rights reserved. Some topics of this manual reference IBM Cognos proprietary materials. Permission to print or copy this material is granted to Purdue University faculty and staff for Purdue business purposes. Any other reproduction or use requires written permission of ITaP Business Intelligence Competency Center, Purdue University. Page ii Purdue IBM Cognos Analytics for Users Table of Contents Consuming Reports ................................................................................................... 4 Security ..................................................................................................................... 5 Data Classification & Handling ................................................................................... 5 Accessing Cognos Analytics ........................................................................................ 6 Main Portal Page Content .......................................................................................... 7 Application Bar ........................................................................................................... 8 Personal Menu ........................................................................................................... 9 Navigation Bar .........................................................................................................
    [Show full text]