search

What is bi?

May 18, 2019 pm 02:18 PM
bi

Business Intelligence (BI, Business Intelligence).

What is bi?

BI (Business Intelligence) is business intelligence. It is a complete set of solutions used to effectively integrate existing data in the enterprise, quickly and accurately Provide reports and provide decision-making basis to help enterprises make wise business decisions.

The concept of business intelligence was first proposed in 1996. At that time, business intelligence was defined as a type of technology and its application consisting of data warehouse (or data mart), query reports, data analysis, data mining, data backup and recovery, etc., with the purpose of helping enterprise decision-making. These data may come from the enterprise's CRM, SCM and other business systems.

The business operation decisions that business intelligence can assist can be made at the operational level, as well as at the tactical and strategic levels. In order to transform data into knowledge, technologies such as data warehouses, online analytical processing (OLAP) tools, and data mining need to be utilized. Therefore, from a technical perspective, business intelligence is not a new technology, it is just the comprehensive application of data warehouse, OLAP and data mining technologies.

It would be more appropriate to think of business intelligence as a solution. The key to business intelligence is to extract useful data from many data from different enterprise operating systems and clean it to ensure the correctness of the data, and then go through extraction, transformation and loading, that is, The ETL process is merged into an enterprise-level data warehouse to obtain a global view of enterprise data. On this basis, appropriate query and analysis tools, data mining tools, OLAP tools, etc. are used to analyze and process it (at this time Information becomes knowledge that assists decision-making), and finally the knowledge is presented to managers to provide data support for managers’ decision-making processes. Business intelligence products and solutions can be roughly divided into data warehouse products, data extraction products, OLAP products, display products, and overall solutions for a certain application that integrate the above products.

The above is the detailed content of What is bi?. For more information, please follow other related articles on the PHP Chinese website!

Statement
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

Video Face Swap

Video Face Swap

Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Tools

Dreamweaver Mac version

Dreamweaver Mac version

Visual web development tools

SAP NetWeaver Server Adapter for Eclipse

SAP NetWeaver Server Adapter for Eclipse

Integrate Eclipse with SAP NetWeaver application server.

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

MantisBT

MantisBT

Mantis is an easy-to-deploy web-based defect tracking tool designed to aid in product defect tracking. It requires PHP, MySQL and a web server. Check out our demo and hosting services.

DVWA

DVWA

Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is very vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, to help web developers better understand the process of securing web applications, and to help teachers/students teach/learn in a classroom environment Web application security. The goal of DVWA is to practice some of the most common web vulnerabilities through a simple and straightforward interface, with varying degrees of difficulty. Please note that this software