Sunteți pe pagina 1din 22

MOBILE BUSINESS

INTELLIGENCE

AGENDA

History of information delivery to


mobile devices

What is MOBILE BI ?

Mobile Business Intelligence (Mobile BI or Mobile


Intelligence) is defined as The capability that enables the
mobile workforce to gain business insights through
information analysis using applications optimized for mobile
devices

Benefits of Mobile BI

Browser-Based vs. Native


BI App

5 Best practices of Mobile BI


Avoid dashboard proliferation
Write to a smaller form factor
Consider an audience on the go
Account for new mobile scenarios
Leverage mobiles natural process of
collaboration

Trends in Mobile BI
Mobilization of business analytics is unstoppable
9.25 million Apple iPads sold in the Q2 2011
Tablet sales estimated to reach 100 million by 2012
Gartner estimates that by 2013 a third of BI
functionality will be consumed via mobile devices
Mobile BI will drive wider adoption of BI
Only 8% of the people in most organizations are using
mobile BI
Using mobile devices, BI becomes a more integral part
of work processes away from the desk
Tablets like the iPad that are always-on and provide a
gesture-based UI make BI more accessible and easier to
consume

Emerging areas in Mobile BI

Profile of Typical Mobile BI


User
Not an information producer
Data analyst
Report Writer

Rather an information collaborator


Project lead, manager, specialist

Definitely an information consumer


Sales, marketing
Executives
IT

Mobile BI Best Practices


1. Avoid dashboard proliferation and rework
Plan for author-once, distribute-everywhere dashboards

2. Design to a smaller form factor

Most important chart/table at the top left


Limit charts & tables to 4
Avoid legends if possible
Size fonts appropriately

3. Design for on-the-go usage


Intuitive drill paths to more detail
Limit to essential prompts
Encourage collaboration

4. Focus on operational data


Avoid data requiring deep analysis
here and now metrics

Mobile BI Security
Considerations
1. Device Security
Utilize the handset/device security features to
protect the data
Remote data management

2. Transmission Security
Cryptographic shared key systems
Secure socket layers

3. Authentication & Authorization


Control access rights to information
Provisions and policies

User Perceived

Drawbac
ks

Benefit
s

MICROSTRATEGY

ACTUATE

BIRST

PENTAHO

THANK YOU

S-ar putea să vă placă și