Who Needs Business Intelligence?
By: Peter Iuvara on Wednesday, July 18, 2012

To make good decisions, every business needs the right data—at the right time. But who needs business intelligence (BI) tools?

In almost every organization, there are people with broad, possibly enterprise-wide responsibilities, as well as individuals in departments and cross-functional teams who have more limited decision making roles. They are all potential users of business intelligence tools and they typically fall into one of these categories:

  • Executives
  • Divisional or departmental management
  • Functional business users
  • Power users (data analysts with deep technical skills)

When I develop BI solutions for mindSHIFT’s SharePoint clients, I like to work with the primary users early in the project, long before any programming is started. The goal is to be sure that the project deliverables meet their needs. Early interaction with the individuals who will use the BI screens and reports is a critical foundation for ensuring an on-target scope of work and the ultimate success of your BI project.

One of the best (and lowest cost) ways to elicit the true needs of the users is by prototyping the reports, graphs, charts and dashboards. Whiteboard and paper prototyping, with live interactive (and ideally in-person) discussion, is the easiest way to get the critical input and feedback you need to design useful BI tools. This is a great way to find out who really needs the business intelligence tools in an organization.

With today’s business intelligence technology and tools, boiling down “big data” into meaningful chunks is easier than ever before. Trends, snapshots of activity and results can be presented in formats that are intuitive to the reader. Creative screen layouts can make it easy for end-users to manage and assess the data. Reports like this one can be customized for an executive:

 Executive Business Intelligence Dashboard

This executive dashboard example is designed to provide both numerical data and graphical representations of activities and results. Depending on the individual, they might ask for more visual components, or more tables of data. By prototyping early in the project, you’ll get the guidance you need to properly scope out your business intelligence data warehouse and system requirements for the intended users.

Pete Iuvara is a strategic, business-centric specialist at mindSHIFT Technologies who focuses on helping companies mature their digital web presence, increase lead generation and top line growth, and maximize bottom lines. Read Pete’s blog at
http://peteiuvara.com/ , and follow him on twitter: http://twitter.com/#!/peteiuvara .

More Information on Business Intelligence development and SharePoint Services from mindSHIFT

For more information on business intelligence and SharePoint development services, contact mindSHIFT or call 877-227-5054.




IT security penetration testing pen testing vulnerability assessment vulnerability testing security audit Anti-virus malware ransomware Mobile device management MDM tablet security mobile phone security smartphone security Password security best practices E-rate E-rate Modernization Order K-12 schools Charter schools USAC Universal Service Administrative Company National Education Technology Plan Every Student Succeeds Act Trade associations IT support computer management cybersecurity business continuity disaster recovery data backup virtual desktop cloud desktop Cloud computing backup apps applications business growth Enterprise Web Protection Enterprise Threat Protection cybercrime spyware advanced persistent threats malvertising watering holes threat intelligence Nonprofit organizations charities Financial services secure desktop Wi-Fi data security phishing managed service provider MSP Computer support managed IT services computer consultant tech support Hybrid cloud public cloud private cloud classroom network PARCC Measures of Academic Progress APTs AWS Amazon Web Services Sitecore CMS content management systems personalization social engineering spear phishing cyber security cyber safety email security BYOD VDI desktop in the cloud Windows Server 2003 Hosted Exchange Office 365 IT outsourcing outsource IT IT services cloud services cloud hosting desktop managed services Law firm IT Legal IT LegalTech IT Services for Law Firms SharePoint SharePoint migration SharePoint 2013 SharePoint 2010 SharePoint 2007 professional services infopath managed services legal IT solutions Small Business IT SMB IT Windows Server 2003 EOL cloud servers WinShock Windows vulnerability disaster planning disaster preparedness hurricane season email backup server backup cloud backup email encryption data encryption data breach HIPAA Heartbleed OpenSSL website security Windows XP desktop as a service DaaS software application hosting ISV SaaS Bring your own device smartphone hacker smartphone malware IT consulting IT strategy VoIP IT Management Services desktop virtualization Education IT Solutions IT management IT staffing Intranet Office 15 migration Collaboration Business Intelligence Apple® iOS 7® operating system iPhone® 5s iPhone® 5c iPhone® 4g iPhone® 4s iPad® 2 iPad mini iPod® touch hosted cloud services security data center IT support healthcare IT ePHI enterprise mobility management tablet pc security app security smart phone compliance hosted mobile device management SaaS MDM mobile content management MCM cloud mobile device management mobile application management Sitecore CMS Content Management System Telligent social marketing social media communities desktop backup laptop backup IBMi Power Systems iSeries AS/400 System I Power 7+ AIX Maxava iTera Mimix Vision Solutions Sitecore CMS 6.5 Hosted Desktop encryption compliance Document Management Virtualization videos customer testiomonials Green IT cloudshift Protected Health Information regulatory compliance Desktop vitrualization EHR Electronic Health Records