Brought to you by:

Business Expert Press

An Introduction to Business Intelligence

By: Jerzy Surma

Business Intelligence: Making Decisions through Data Analytics is a six-chapter book written by Dr. Jerzy Surma, an assistant professor at Warsaw School of Economics, and published by Business Expert…

  • Length: 12 page(s)
  • Publication Date: Jan 31, 2011
  • Discipline: Information Technology
  • Product #: BEP146-PDF-ENG

What's included:

  • Educator Copy

$4.50 per student

degree granting course

$7.95 per student

non-degree granting course

Get access to this material, plus much more with a free Educator Account:

  • Access to world-famous HBS cases
  • Up to 60% off materials for your students
  • Resources for teaching online
  • Tips and reviews from other Educators

Already registered? Sign in

  • Student Registration
  • Non-Academic Registration
  • Included Materials

Business Intelligence: Making Decisions through Data Analytics is a six-chapter book written by Dr. Jerzy Surma, an assistant professor at Warsaw School of Economics, and published by Business Expert Press in January of 2011. Written for managers, business consultants, and undergraduate and postgraduate students in business administration, the book explores the use of business intelligence (BI), including data warehousing and data analytics, to support managerial decision-making. The author starts by examining data model infrastructure, then data preparation, followed by data analysis, integration, knowledge discovery, and finally the actual use of discovered knowledge. All examples are based on recent achievements in BI. Finally, the book outlines an overview of a methodology that takes into account the complexity of developing applications in an integrated BI environment. Chapter 1 presents the history of business intelligence (BI), defines pertinent terminology, and reviews BI's possible applications in selected businesses. The chapter concludes with a brief case study highlighting BI concepts that are used to fulfill a company's strategic initiatives.

Jan 31, 2011

Discipline:

Information Technology

Business Expert Press

BEP146-PDF-ENG

We use cookies to understand how you use our site and to improve your experience, including personalizing content. Learn More . By continuing to use our site, you accept our use of cookies and revised Privacy Policy .

business intelligence assignment pdf

Academia.edu no longer supports Internet Explorer.

To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to  upgrade your browser .

Enter the email address you signed up with and we'll email you a reset link.

  • We're Hiring!
  • Help Center

paper cover thumbnail

How Business Intelligence help Organizations?

Profile image of Enura Indula

This paper consists, a well-documneted thesis about how BI can help organizations in different ways.

Related Papers

Handbook on Economics of Discrimination and Affirmative Action

Hwok-Aun Lee

Malaysia maintains one of the world's most extensive affirmative action regimes, buttressed by the transformative and iconic New Economic Policy (NEP). Constitutional provisions, political imperatives and socioeconomic conditions gave rise to the establishment of preferential policies in four broad sectors-higher education, employment, enterprise and ownership-favouring the political dominant but economically disadvantaged Bumiputera majority. This chapter elucidates the origins, programmes, outcomes and implications of affirmative action in Malaysia. A brief historical overview explains the language and context of the constitutional authorization of Bumiputera quotas and the modest implementation in the early post-independence years, followed by policy expansion, centralization and intensification from 1971 under the NEP, which was forged in the aftermath of May 13 th , 1969 racial conflagration. The NEP judiciously conceptualized a two-pronged strategy of poverty eradication regardless of race, and "social restructuring" through Bumiputera-targeted affirmative action, as distinct but complementary elements of the ultimate goals of national integration, which entails redressing imbalances and ultimately rolling back overt preferential treatment. However, the NEP lacked a systematic articulation of policy objectives, instruments and outcomes. Malaysia has registered immense progress in facilitating Bumiputera access, participation and upward mobility in the four designated policy sectors. Recent discourses have popularized misguided notions of reform that conflate the NEP's twin elements, and omit attention to the decisive shortfall of affirmative action-its inefficacy in building capability and competitiveness among the Bumiputera beneficiaries, which are requisite for Malaysia to attain the ultimate NEP goals. Malaysia has substantially remedied destabilizing inequalities, but moving forward, must fundamentally rethink affirmative action.

business intelligence assignment pdf

Martin Rundkvist

Excavations in the summer of 2021 uncovered further features of the great hall on the platform mound at Aska in Hagebyhöga. Among the finds are additional gold foil figures of the embracing couple type, bringing the total up to at least 30.

International Journal of Contemporary Pediatrics

Praveena Gungam

India, the country with the second largest population in the world, is facing an evolving challenge of a double burden of malnutrition, which also involves micronutrient deficiencies. According to Global Nutrition Report 2020 by World Health Organization (WHO), among children under 5 years of age, 149.0 million are stunted, 49.5 million are wasted and 40.1 million are overweight. India alone contributes 37.9%to the total stunted population. The national prevalence of wasting and over weight is 20.8% and 2.4%respectively. With nutrition transition, both undernutrition and overweight coexist in the population. However, whether under or overweight, the risk of micronutrient deficiency is high. Micronutrients (vitamins and minerals) are an essential component of the diet and are necessary for normal cellular and molecular function. While micronutrients are only needed in trace amounts, their deficiency can result in wide-ranging negative health effects.

Boletim do Museu Paraense Emílio Goeldi. Ciências Humanas

Eliane Sebeika Rapchan

Resumo As ‘culturas de chimpanzés’ correspondem a uma ideia especialmente importante porque chimpanzés são os animais mais próximos aos humanos em termos genéticos e de complexidade de comportamento. Uma avaliação crítica desses fenômenos irá certamente redefinir as fronteiras entre humanos e não humanos. Além disso, criará novas formas de representação da humanidade e sua alteridade. Consequentemente, é também urgente discutir as definições de cultura porque as concepções de ‘culturas de chimpanzés’ adotadas pelos primatólogos são profundamente distintas das concepções de cultura adotadas pelos antropólogos socioculturais. Há um consenso crescente entre os antropólogos socioculturais de que cultura envolve necessariamente a produção de sentidos e a manipulação de símbolos. O que os primatólogos frequentemente apresentam está muito distante disso. Para os antropólogos, cultura é a expressão plena de representações, mitos, arte, rituais e ciência. Este artigo apresenta os resultados ...

渥太华大学毕业证办理成绩单 购买加拿大OTTAWA文凭学历

加拿大大学假文凭做加拿大硕士文凭《Q微信/1954292140》魁北克大学电子版毕业证1:1制作加拿大毕业证书案例复刻加拿大魁北克大学毕业证和学位证、魁北克大学毕业证和学位证样本、加拿大魁北克大学毕业证模板学位认证流程、魁北克大学文凭办理学历认证多少钱?、加拿大Quebec毕业证书案例原版定做加拿大Quebec Degree Certificate魁北克大学Degree Certificate。 快速办理国外原版魁北克大学毕业证成绩单《Q微1954 292 140》《Quebec毕业证书案例1:1制作》《加拿大本科文凭原版定做魁北克大学毕业证书案例》 1、魁北克大学毕业证+成绩单+留学回国人员证明+教育部学历认证(全套留学回国必备证明材料,给父母及亲朋好友一份完美交代); 2、雅思,托福,魁北克大学OFFER,在读证明,学生卡等留学相关材料(申请学校,转学,甚至是申请工签都可以用到)。 3、毕业证#成绩单等全套材料,从防伪到印刷,从水印到钢印烫金《1:1制作魁北克大学毕业证书案例》【Q/微1954 292 140】《Quebec研究生学位证书1比1定做》高精仿度跟学校原版100%相同。 一:毕业证#成绩单等全套材料《Quebec毕业证书案例1:1制作》【Q/微1954292140】《原版定做魁北克大学文凭学历认证本科文凭》,从防伪到印刷,水印底纹到钢印烫金; 二:真实使馆认证(留学人员回国证明),使馆存档; 三:真实教育部认证,教育部存档,教育部留服网站可查; 四:留信认证,留学生信息网站可查; 五:国外学历、毕业证、学位证、成绩单办理《Quebec研究生学位证书魁北克大学本科文凭1比1定做》【Q/微1954292140】《原版定做Quebec毕业证书案例研究生学位证书》; ◆可以提供《Quebec毕业证书案例1:1制作》【Q/微1954292140】《原版定做魁北克大学文凭学历认证本科文凭》钢印 #水印 #烫金 #激光防伪 #凹凸版 #最新版的毕业证 #百分之百让您绝对满意; ◆印刷、DHL快递魁北克大学毕业证 #成绩单5个工作日左右,真实学历学位认证5个工作日左右; ◆请您先以qq或微信的方式对我们的服务进行了解后,如果有帮助再进行电话咨询。 《1:1制作魁北克大学毕业证书案例》文凭学历证书办理流程《Q微1954292140》: 1、客户提供办理信息:姓名、生日、专业、学位、毕业时间等(如信息不确定可以咨询顾问:微信1954292140我们有专业老师帮你查询); 2、客户付定金下单; 3、公司确认到账转制作点做电子图; 4、电子图做好发给客户确认; 5、电子图确认好转成品部做成品; 6、成品做好拍照或者视频确认再付余款; 7、快递给客户(国内顺丰,国外DHL)。 留学服务中心:实体公司,注册经营,行业标杆,精益求精!咨询顾问:QQ/微信:1954292140 为留学生提供以下服务: ★真实教育部认证,教育部存档,中国教育部留学服务中心认证(即教育部留服认证)网站100%可查; ★真实使馆认证(即留学人员回国证明),使馆存档可通过大使馆查询确认; ★留信网认证,国家专业人才认证中心颁发入库证书,留信网永久存档可查; ★《1:1制作魁北克大学毕业证书案例》【Q/微1954292140】《Quebec研究生学位证书1比1定做》毕业证、成绩单等全套材料,从防伪到印刷,从水印到钢印烫金,高精仿度跟学校原版100%相同; 【真实可查】---【永久存档】---【安全可靠】---【值得信赖】 很多学生都愿意在国外留学《1:1制作魁北克大学毕业证书案例》【Q/微1954 292 140】《Quebec研究生学位证书1比1定做》,有可能是喜欢当地的一些文化,也有可能欣赏各个国家的艺术,然而,在毕业上,有些课题和作业难度都远高于国内。同时,我们都知道国内艺术生文化课相对薄弱,导致很多留学生学了几年也拿不到学历《加拿大本科文凭原版定做魁北克大学毕业证书案例》【Q/微1954 292 140】《1比1定做魁北克大学研究生学位证书》对个人发展的重要性。很多留学生回国选择就业,需要办理《Quebec毕业证书案例1:1制作》【Q/微1954 292 140】《原版定做魁北克大学本科文凭》的学生来说,相当于没有魁北克大学毕业证和学位证,魁北克大学毕业证的缺失会很大程度上影响学历认证的成功可能性。

办理拉筹伯大学毕业证 购买澳洲大学文凭LTU毕业证文凭学历

学位证电子版☀️1:1制作柏林洪堡大学毕业证书大小学位证书扫描件【办证微信Q:741003700】huberlin毕业证书大小1:1制作毕业成绩单,能完美还原海外各大学柏林洪堡大学Bachelor Diploma degree, Master Diploma(本科/硕士柏林洪堡大学毕业证书、成绩单)huberlin大学Offer录取通知书、雅思成绩单、托福成绩单、雅思托福代考、语言证书、学生卡、高仿留服认证书等毕业/入学/在读材料。1:1完美还原海外各大学毕业材料上的柏林洪堡大学毕业证书大小学位证书扫描件【办证微信Q:741003700】huberlin毕业证书大小1:1制作毕业成绩单工艺:水印,阴影底纹,钢印LOGO烫金烫银,LOGO烫金烫银复合重叠。文字图案浮雕,激光镭射,紫外荧光,温感,复印防伪。 【业务类型】 学历认证、柏林洪堡大学huberlin毕业证、成绩单、大学Offer、雅思托福代考、语言证书、学生卡、高仿教育部认证等一切高仿或者真实可查认证服务。 十年年留学服务公司,拥有海外样板无数,能完美1:1还原海外各国大学买huberlin柏林洪堡大学毕业证#就加【Q微/741003700】办理2021年原版德国huberlin毕业证成绩单degree、Diploma、Transcripts、certificate等毕业材料。 德国柏林洪堡大学毕业证书制作【Q微/741003700】专业VIP服务《柏林洪堡大学毕业证办理》《huberlin成绩单提高GPA修改》【Q微/741003700】做huberlin毕业证文凭柏林洪堡大学本科毕业证书德国学历认证原版《柏林洪堡大学成绩单、柏林洪堡大学学历证明、回国人员证明》【一整套留学文凭证件办理#包含毕业证、成绩单、学历认证、使馆认证、归国人员证明、教育部认证、留信网认证永远存档,教育部学历学位认证查询】办理德国大学毕业证。【Q微/741003700】购买德国柏林洪堡大学大学文凭学历 【Q微/741003700】柏林洪堡大学会计专业毕业证√电子工程专业文凭√制作huberlin生物工程专业学历证书√柏林洪堡大学MBA毕业证√柏林洪堡大学土木工程毕业证√【Q微/741003700】柏林洪堡大学计算机科学毕业证√huberlin商科毕业证【Q微/741003700】√huberlin工商管理毕业证√huberlin经济学毕业证√柏林洪堡大学建筑设计毕业证√huberlin市场营销毕业证√柏林洪堡大学机械工程毕业证√柏林洪堡大学电气工程毕业证√huberlin数学毕业证【Q微/741003700】√柏林洪堡大学物理学毕业证√huberlin人工智能毕业证√柏林洪堡大学会计和金融专业学位证 <a href="如何办理柏林洪堡大学毕业证成绩单?" rel="nofollow">买huberlin柏林洪堡大学毕业证#就加【Q微/741003700】办理2021年原版德国huberlin毕业证成绩单</a> “这……”张正等人相视一眼,都在思考秦天提出的问题,最终张正代表回答:“秦天师弟,如果你真能够发现窃贼并且爆发战斗,那么希望你尽量将战场转移出灵药园,发生灵药的意外损失,我们可以向宗门如实报告,应该不会追究你的责任,毕竟是来接任务的,这样的回答你满意了吧?”“行了,多谢诸位师兄的理解。”秦天点了点头,目光扫视灵药园,发现灵药园面积不小,估计有五亩的样子。“随我进去。”张正打开了灵药园的铁门,率先走了进去,其他的内门弟子却没有进去。秦天冲着外面的内门弟子抱了抱拳,毫不犹豫的迈步进去,他的神识强大,根本不惧里面是否有危险,而且他知道这里的宗门弟子还没有知道他在宗门的名气,这让他行事会更加方便一些。进入了灵药园,秦天目光一扫,发现灵药园内种植成片的灵药,灵药的种类有多种,品阶也有多种,由此可见日月宗的财富底蕴非常不错。秦天对灵药没有什么感觉,自然不会对灵药打什么主意,他冲着雷宏要求道:“雷宏师兄,请带我去损失过灵药的区域,然后就不用麻烦你了。”“好,跟我来。”雷宏点头答应,在前面带路,走到了最里面的一片极品灵药区域,然后停下了脚步,说道:“这片灵药是神秘窃贼主要光临的区域,你在这里慢慢查看吧,我出去有点事情,有什么需要可以去灵药园旁边的那座木楼找我或者其他的师兄。”“有劳师兄了。”秦天表示感谢,因为他暂时没有感觉到雷宏的敌意,所以他以诚相待。目送雷宏离去,秦天收回目光投向了这片灵药区域,同时将强大的神识外放开去覆盖这一片灵药区域,开始搜索窃贼的蛛丝马迹,希望能够推测出窃1:1制作柏林洪堡大学毕业证书大小学位证书扫描件【办证微信Q:741003700】huberlin毕业证书大小1:1制作毕业成绩单贼究竟是人还是兽?“这片小区域被窃贼关顾最明显。”秦天一边观察和感知,一边缓缓走动,当走到一片缺失一小块灵药的区域,他停下了脚步,并且蹲了下去,近距离观察被破坏的细节。

sonia narwal

Parkinson’s Disease (PD) is the second most common neurodegenerative disease affecting 1-2% of the global population with no cure to date. PD is characterized by accumulation of Lewy Bodies (LBs), which are caused due to aggregation of incorrectly folded α-Synuclein, (SNCA). Another form of PD manifestation is characterized by loss of function ofparkin, which encodes an E3 ubiquitin ligase. Despite extensive research, the cause for onset and progression of PD remains unknown and current therapeutics mainly help manage the disease. An alternative line of treatment can be useful.In this study, we have employed two different genetic models ofDrosophilato screen forAyurvediccompounds and found anAyurvedicmercury based organo-metallic drug Ras-Sindoor has neuroprotective function. Our data indicate that characteristic locomotory dysfunction phenotype of PD is restored upon administration of the compound. Interestingly, RS fed flies also exhibit reduced transcript levels of initiator casp...

Frontiers in Ecology and the Environment

Stephen Nindi

Mechanics of Materials

Tetsu Uesaka

Symbolic Interaction

Jason Turowetz

RELATED PAPERS

Annals of Clinical Microbiology and Antimicrobials

mohammad babaei

Clinical Neurophysiology

Mohamed Sabbahi

L'innovation sociale

Jean-Marc Fontan

Anna-liisa Brownell

Nature Communications

Dwayne Godwin

International Journal of Environmental Research and Public Health

Regna Darnell

Sustainability

Jaya Divakaran Sarasamma

MANINDRA KUMAR Singh

Journal of the American Chemical Society

Kieran McGourty

Revista de Administração Pública - FGV

Leonardo Barros Soares

Intensive care medicine experimental

Walter Linde-Zwirble

Ahmad Qazza

RELATED TOPICS

  •   We're Hiring!
  •   Help Center
  • Find new research papers in:
  • Health Sciences
  • Earth Sciences
  • Cognitive Science
  • Mathematics
  • Computer Science
  • Academia ©2024
  • Engineering & Technology
  • Computer Science
  • Data Mining

BI Assignment.pdf

business intelligence assignment pdf

Related documents

Emotional Intelligence

Add this document to collection(s)

You can add this document to your study collection(s)

Add this document to saved

You can add this document to your saved list

Suggest us how to improve StudyLib

(For complaints, use another form )

Input it if you want to receive answer

Programs submenu

Regions submenu, topics submenu, cyber leaders series: the future of cyber on the african continent; a conversation with kenya's ps tanui, outcomes and implications of the 2024 solomon islands election, the next generation of national security leaders: a conversation with major general arnold punaro.

  • Abshire-Inamori Leadership Academy
  • Aerospace Security Project
  • Africa Program
  • Americas Program
  • Arleigh A. Burke Chair in Strategy
  • Asia Maritime Transparency Initiative
  • Asia Program
  • Australia Chair
  • Brzezinski Chair in Global Security and Geostrategy
  • Brzezinski Institute on Geostrategy
  • Chair in U.S.-India Policy Studies
  • China Power Project
  • Chinese Business and Economics
  • Defending Democratic Institutions
  • Defense-Industrial Initiatives Group
  • Defense 360
  • Defense Budget Analysis
  • Diversity and Leadership in International Affairs Project
  • Economics Program
  • Emeritus Chair in Strategy
  • Energy Security and Climate Change Program
  • Europe, Russia, and Eurasia Program
  • Freeman Chair in China Studies
  • Futures Lab
  • Geoeconomic Council of Advisers
  • Global Food and Water Security Program
  • Global Health Policy Center
  • Hess Center for New Frontiers
  • Human Rights Initiative
  • Humanitarian Agenda
  • Intelligence, National Security, and Technology Program
  • International Security Program
  • Japan Chair
  • Kissinger Chair
  • Korea Chair
  • Langone Chair in American Leadership
  • Middle East Program
  • Missile Defense Project
  • Project on Critical Minerals Security
  • Project on Fragility and Mobility
  • Project on Nuclear Issues
  • Project on Prosperity and Development
  • Project on Trade and Technology
  • Renewing American Innovation Project
  • Scholl Chair in International Business
  • Smart Women, Smart Power
  • Southeast Asia Program
  • Stephenson Ocean Security Project
  • Strategic Technologies Program
  • Transnational Threats Project
  • Wadhwani Center for AI and Advanced Technologies
  • All Regions
  • Australia, New Zealand & Pacific
  • Middle East
  • Russia and Eurasia
  • American Innovation
  • Civic Education
  • Climate Change
  • Cybersecurity
  • Defense Budget and Acquisition
  • Defense and Security
  • Energy and Sustainability
  • Food Security
  • Gender and International Security
  • Geopolitics
  • Global Health
  • Human Rights
  • Humanitarian Assistance
  • Intelligence
  • International Development
  • Maritime Issues and Oceans
  • Missile Defense
  • Nuclear Issues
  • Transnational Threats
  • Water Security

2024 Priorities for the Intelligence Community

Photo: CSIS

Photo: CSIS

Congressional Testimony by Kari A. Bingen

Published May 15, 2024

Available Downloads

  • Download Testimony 530kb

Kari Bingen spoke on a House Permanent Select Committee on Intelligence panel about the acute security challenges facing the United States, the technology trends occurring around us, and the significant changes underway to posture the intelligence community (IC) for the competitive and contested environment we face.

  

Chairman Turner, Ranking Member Himes, and distinguished Members of the Subcommittee, thank you for the invitation to appear before you today. It has been a privilege working with this Committee and supporting many of you while a staffer on the Armed Services Committee. I am grateful for this Committee’s steadfast support of the Intelligence Community (IC) and especially of the defense intelligence enterprise, which I was honored to help lead while serving as Deputy Under Secretary of Defense for Intelligence and Security. My admiration for our intelligence professionals only grew while I served in the Department of Defense (DoD) and saw firsthand their dedication to mission and to our national security.

I cannot overemphasize how acute the security challenges are before us, the technology trends occurring around us, and the significant changes underway to posture the intelligence community (IC) for the competitive and contested environment we face. Adversary threats are increasing in speed, scale, and complexity, and are made even more difficult by the increasing collaboration across threat actors and simultaneity of crises and challenges upon us. We will have to question our assumptions, our policies and processes, and our ways of conducting intelligence activities that have been enshrined in our thinking over the last several decades.

Today, for your consideration, I offer observations on five aspects of the intelligence enterprise that are vitally important for the United States’ maintaining an advantage in this competitive and contested security environment. I make these observations largely through a defense intelligence lens, knowing that my colleagues on this panel complement my knowledge across other areas of the IC and its missions.

Reclaiming our ISR Advantage

First, our intelligence, surveillance, and reconnaissance (ISR) capabilities are under increasing threat while our adversaries’ ISR is rapidly advancing. Many of our ISR systems and operating concepts assume air, space, and spectrum superiority. We built large, exquisite satellite systems and controlled overseas drones from ground stations in the United States using satellite communications (SATCOM) and Global Positioning System (GPS) navigation. However, against a sophisticated adversary with anti-satellite weapons, robust air defenses, and ways to jam SATCOM and GPS, these ISR systems and operating models will be increasingly under strain. Such operational threats are driving investments towards more resilient architectures, including proliferated ISR satellite constellations, and networking solutions that create multiple pathways to deliver intelligence data to users.

Meanwhile, foreign advances in ISR, including ubiquitous sensing and artificial intelligence (AI), will make it more difficult for our military forces and intelligence operatives to maneuver undetected. Surveillance cities, sophisticated digital monitoring, and advanced analytic tools employed by our adversaries will make other aspects of intelligence, such as human intelligence (HUMINT) operations and the use of cover, increasingly harder. Such constant surveillance – whether through space, terrestrially, or in cyberspace – will necessitate new or modified capabilities, tactics, training, and tradecraft.

In space, the majority of recently launched Chinese satellites have been ISR satellites, which extend Beijing’s surveillance into space. According to U.S. Space Command, as of January 2024, China had approximately 360 ISR satellites on orbit, more than triple the number in 2018.[1] In August 2023, Beijing launched the world’s first geosynchronous orbit (GEO)-based syntheticaperture radar (SAR) satellite and in December 2023, it launched an optical imagery satellite to GEO, Yaogan-41. When paired with data from other Chinese ISR satellites, AI to rapidly identify objects, and networked communications systems, the People’s Liberation Army (PLA) is quickly closing its own sensor-to-shooter kill chains across the Indo-Pacific.[2] Our military forces will need to train under the assumption that they will be seen, located, and targeted.

Revitalizing Foundational Military Intelligence and Scientific and Technical Intelligence

Second, our peer adversaries are developing more technically advanced and complex military systems that we need to understand to defeat. This will place increasing demands on our foundational military intelligence (FMI) and scientific and technical intelligence (S&TI) capabilities, which received less emphasis over the last 20 years. During this time, China and Russia made substantial progress in developing and fielding hypersonic missiles, anti-satellite weapons, electronic warfare and cyber-attack weapons, and undersea systems, to name a few.

FMI involves developing a comprehensive understanding of foreign militaries, including their facilities, organizational units, and capabilities.[3] S&TI involves the in-depth technical analysis of foreign weapon systems, including performance, vulnerabilities, how they’re networked and controlled, and how they’re integrated into broader military operations. This analytic knowledge informs our development of defenses and countermeasures, as well as ways to defeat these systems. S&TI centers, such as the National Space Intelligence Center (NSIC), National Ground

Intelligence Center (NGIC), and the Office of Naval Intelligence (ONI), provide such detailed analysis of foreign weapons, air, space, and undersea systems.

I would also call your attention to the Defense Intelligence Agency’s (DIA) Machine-assisted Analytic Rapid-repository System (MARS) program – an effort to modernize our master data repository of FMI information. This is critical as today’s platform rests on 1980s database technology and is severely limited in capturing richer data sources, more dynamic targets, and newer military activities, including in space and cyberspace, necessary to support intelligence analyses, military operations, and activities with allies and partners.[4]

Harnessing Technological Change from Outside Government

Third, while the IC maintains exquisite intelligence capabilities and proficiencies, I would observe that many of the most consequential technological advancements are occurring in the private sector and are being fueled by private capital. These advancements have the potential to revolutionize how the IC collects and analyzes information, but they will challenge culture and existing ways of doing business.

Generative AI and advanced compute are prime examples of this. Based on research by GoldmanSachs, global AI investments are estimated to approach $200 billion by 2025,[5] in contrast to U.S. government investment at less than $5 billion.[6] The IC cannot replicate private sector AI and compute in scale, speed, or investment. For the IC to take full advantage of large-scale compute and generative AI – wherein machines can contextually learn, synthesize, and generate data across images, signals, and text – it will need to figure out how to work across both large-scale unclassified and classified compute environments.

While at the Pentagon, I recall pressing my daily intelligence briefer to provide deeper insights and context on topics than what I could access via open source. The advances described above can aid analysts in identifying patterns, drawing out unique connections across classified and unclassified datasets, and making sense of vast amounts of data that humans can’t process at scale. But we will also need to think through how to harmonize analytic tradecraft and human expertise with machine-generated analysis.

This technology can be harnessed for good, but can also lead us astray. Generative AI can create new kinds of deception, obfuscation, and disinformation at machine speeds. The IC must have an

in-depth understanding of these technologies in order to develop ways to mitigate such threats. We will need to expand traditional analytic disciplines like foreign denial and deception to account for these technology trends.

There is also a growing tension between the speed and depth of analysis: getting tactical ISR data directly and quickly to warfighters versus providing analysis, context, and verification of information. While this should not be an either-or choice, technological advancements in automation and AI are making possible different constructs for user access to data and information. Particularly in the space arena, private companies operating satellite constellations in the hundreds to thousands are leveraging automation, advanced processing, and AI to optimize their operations and quickly draw insights from collected data. These advancements present opportunities for the IC to think differently about its satellite tasking and dissemination models, allowing for more direct tasking by users, direct downlink of satellite data to tactical nodes, and greater AI-enabled analysis. 

A common theme here is that much of these technological advancements are occurring in the private sector, outside of the U.S. Government and outside the United States. We are in a technology race with China, which is after the same advanced technology that we are – AI, aerospace, quantum, microelectronics, biotechnology, etc. – for both military and economic benefit.[7] Many of the trends and insights about this techno-economic competition will not be found in highly classified reporting, but rather in understanding the flow of private capital, global supply chains, academic research, and business dynamics. Much of this can be gained through greater interaction with the private sector that competes with Chinese entities globally and on a daily basis. There is a need for intelligence analysts to understand this aspect of the global landscape and how U.S. competitiveness affects national security. 

Securing our People, Information, and Business Advantage

Fourth, please continue to pay close attention to the security and counterintelligence mission of the IC, including industrial security and personnel vetting. While not a high-profile IC mission or program, security and counterintelligence underpin all activities that the IC and DoD undertake. You know this well, but it bears emphasis: Beijing continues to comprehensively target U.S. technologies, intellectual property, supply chains, and critical infrastructure across government, industry, and academia. It is playing the long game to penetrate our technology base and steal our information, using both legal and illegal means, such as foreign capital, economic espionage, cyber data exfiltration, and talent recruitment programs.[8]

Much of the contact layer being targeted by our adversaries is outside government, in the private sector and academia. This necessitates the importance of education and engagement, as well as greater transparency on foreign threats and tactics, and communicating these in ways that resonate with and move at the speed of business. The National Counterintelligence and Security Center (NCSC) and Defense Counterintelligence and Security Agency (DCSA) are progressing in the right direction: from “checklist-based” approaches to industrial security towards more threatinformed, risk-based approaches to assess and mitigate vulnerabilities.

I would also encourage strong oversight of the government’s efforts to reform personnel vetting, including improving the clearance review and adjudication process. Continuous evaluation is an important step forward, but continue to push on personnel vetting reforms, reciprocity, and IT system modernization. With access to myriad data sources and advances in data analytics, there are smarter ways to assess and monitor personnel risks than current methods. The IC will simply not be competitive in attracting top, diverse talent if candidates are waiting months or years for a security clearance.

Developing our Workforce

Finally, I would recommend a comprehensive examination of workforce development within the IC. Candidly, this is an area in which I wish I had paid more attention. A big idea for the Committee’s consideration is whether personnel reforms analogous to those in the GoldwaterNichols Act of 1986 are needed to guide how the IC manages the career paths and professional development of its workforce. Goldwater-Nichols was a catalyst for enhancing operational effectiveness, building a joint force, and developing more well-rounded military leaders through professional military education and joint assignments that broaden their perspectives and crossservice relationships. 

While the Intelligence Reform and Terrorism Prevention Act (IRTPA) of 2004 sought some changes similar to Goldwater-Nichols, it did not go far enough and implementation has been mixed. My observation is that the IC could be stronger in how it cultivates its workforce, especially for those seeking promotions into leadership roles. Such career enhancing and stimulating experiences are also important to nurture and retain talent, build collaborative relationships across the IC, and enhance mission effectiveness.

In full disclosure in my role as a member of the National Intelligence University’s Board of Visitors, I see greater opportunity for professional education, akin to joint professional military education (JPME). I also see a need to broaden the knowledge and experience base for intelligence professionals – whether in conducting strategic research and analysis outside their day-to-day workflows, understanding their portfolio from different organizational perspectives, or experiencing firsthand the technology, capital, and global competitive dynamics at play through a public-private sector talent exchange. While largely anecdotal, I observed numerous joint duty assignment (JDA) professionals return to home organizations only to be relegated back to similar positions that they had left.

Throughout the Cold War, the United States competed politically and militarily, but never economically, with the Soviet Union. For the first time, our nation faces a strategic competitor with the resources and potential to match, if not one day exceed, the size and scope of U.S. economic might and to develop new technologies that rival our own. Over the last 40 years, the United States has had to adapt several times to a new geopolitical and strategic environment, first after the collapse of the Soviet Union and then, after the September 11 attacks.

Now 20 years after the IRTPA and the establishment of the Director of National Intelligence, we face yet another new and evolving global landscape. We are still learning how to adapt our intelligence and defense mindsets, processes, and systems to this new environment in which we face an adversary with economic and military potential unlike anything we’ve faced in the past. 

We have a window to get this right and are fully capable of rising to the challenge.

Please consult the PDF for references.

Kari Bingen

Kari A. Bingen

Programs & projects.

  • Congressional Affairs at CSIS

IMAGES

  1. Business Intelligence

    business intelligence assignment pdf

  2. Business Intelligence Assignment.docx

    business intelligence assignment pdf

  3. Unit 14

    business intelligence assignment pdf

  4. Business Intelligence Assignment 1 .pdf

    business intelligence assignment pdf

  5. Assignment 1

    business intelligence assignment pdf

  6. Business Intelligence Assignment 3

    business intelligence assignment pdf

VIDEO

  1. Business intelligence practical 1

  2. Relational Intelligence

  3. Relational Intelligence

  4. Relational Intelligence

  5. Relational Intelligence

  6. BUS-203 Module 6: Foundations of Business Intelligence

COMMENTS

  1. PDF Business Intelligence and Analytics

    Grades will be posted on Canvas after each exam or assignment is graded. Access to your grades will be through Canvas. Final grades will be based on the following scale: A >899, B-800-899, C-700-799, D-600-699, F <600. In addition, students are expected to receive an average of 65% in the three exams in order to receive a grade of C or better.

  2. (PDF) Business Intelligence Assignment by Dhunsyam Daji

    2.0 Aims and Objectives. Aim. The Aim for this Business Strategy is to critically analyse data using Business. intelligence tools and provide statistical analy sis in a report format. Objectives ...

  3. PDF The Definitive Guide to Business Intelligence

    Dresner defined business intelligence as the "concepts and methods to improve business decision making by using fact-based support systems." Today, business intelligence is defined by Forrester as "a set of methodologies, processes, architectures, and technologies that transform raw data into meaningful and useful

  4. PDF BUSINESS INTELLIGENCE

    Sometimes business intelligence refers to on-line decision making, that is, instant response. Most of the time, it refers to shrinking the time frame so that the intelligence is still useful to the decision maker when the decision time comes. In all cases, use of business intelligence is viewed as being proactive.

  5. (PDF) Assignment 1: BI Analysis

    Download PDF. 32558 Business Intelligence School of Systems, Management & Leadership Faculty of Engineering and IT University of Technology Sydney Assignment 1: BI Analysis Alejandro Cardenas Cardona Business Intelligence applied in Utilities to improve customer journey Choose a theme, industry or organisation for your topic and explain why you ...

  6. (PDF) The Bumper Book of Business Intelligence A 90 page guide to

    A traditional Business Intelligence tool typically takes between 12-24 months to implement whereas, here at Matillion, our customers can be up and running in as little as four weeks. // Page 20 8 common Business Intelligence requirements The precise Business Intelligence requirements of individual organisations will vary.

  7. An Introduction to Business Intelligence

    By: Jerzy Surma. Business Intelligence: Making Decisions through Data Analytics is a six-chapter book written by Dr. Jerzy Surma, an assistant professor at Warsaw School of Economics, and published by Business Expert…. Length: 12 page (s) Publication Date: Jan 31, 2011. Discipline: Information Technology. Product #: BEP146-PDF-ENG.

  8. PDF Modern Business Intelligence The Path to Big Data Analytics

    The Path to Big Data Analytics | Modern Business Intelligence Management 6 Modern Business Intelligence Management A BI Platform without data management is a data swamp - a place where data goes in, but is unable to be retrieved or provide the desired value. Modern business intelligence data management focuses on increasing the value, and ...

  9. Business Intelligence and Analytics: A Comprehensive Overview

    Business Intelligence Systems Application in Transport and Logistics Companies. Chapter. Jan 2022. Виктория Ильяшенко. Igor Ilin. Peter Schuur. Manfred Esser. PDF | An ...

  10. How Business Intelligence help Organizations?

    Enura Indula (COL/A-060329) Business Intelligence 29 f1.6 Evaluate the benefits and drawbacks of using application software as a mechanism for business processing. Benefits and Drawbacks of Using Application Softwares All systems possess benefits and drawbacks. However, it all depends on the use and users.

  11. Jonathan Mottley

    Jonathan Mottley - Business Intelligence Assignment 1 - Free download as PDF File (.pdf), Text File (.txt) or read online for free. Scribd is the world's largest social reading and publishing site.

  12. (PDF) Business Intelligence

    Business intelligence systems combine operational data with analytical tools to present complex. and competitive information to planners and decision makers. The objective is to improve the ...

  13. PDF Unit 14: Business Intelligence

    Unit 14: Business Intelligence. Unit 14: Business Intelligence. Unit code M/615/1641 Unit type Core Unit level 5 Credit value 15. Introduction. Data and information is core to any organisation and business process. The necessity of having meaningful information is the key driver for effective decision- making and problem-solving.

  14. Unit-14 Business Intelligence assignment 1

    Business Intelligence is broad term covering data mining, system analysis, benchmarking of results, and descriptive analytics. Business Intelligence analyzes all the data generated by an organization and provides easy-to- digest reports, quality metrics and trends that guide management decisions. Business Intelligence helps in the fields of ...

  15. PDF Databases and Business Intelligence Assignment

    databases and business intelligence Amazon has used business intelligence and databases to offer many different cloud computing hardware and software to companies. In 2018, NASA signed contact with AWS for 65 million for various features. Google created the Google play store which allows game creators to put their games in a central database.

  16. Business Intelligence Assignment.pdf

    Higher National Diploma in Business Assignment Brief. Student Name /ID Number Shadir Nawfer/KAN/A- Unit Number and Title Unit 14 : Business Intelligence Academic Year 2020/ Unit Tutor Mr A Selvam Assignment Title Business Process Support Mechanisms Issue Date Submission Date IV Name & Date. Submission format. Submission to include:

  17. PDF Topics in Business Intelligence

    Course organization. Lectures: 1st Introduction to BI & case study 2nd Data reduction 3rd Model validation 4th Student lecture: Naive Bayes and k-NN, Classi cation trees 5th Student lecture: Logistic regression 6th Student lecture: Neural nets 7th Overview of results, comparison with (yet another) test set, feedback.

  18. PDF WHAT IS A BUSINESS INTELLIGENCE STRATEGY

    A paper that explains the benefits and steps of creating a BI strategy aligned with corporate vision and goals. It covers the key areas of BI roadmap, stakeholder management, architectural blueprint, capability improvement and data quality.

  19. PDF Teaching Business Intelligence through Case Studies

    The basic skill sets for business students in regard to information systems are summarized in Ives, B., Valacich, J. S., et al. (2002). The authors cite that business students should be aware of eight "key information systems concepts". In particular, with regard to business intelligence systems, business students need to

  20. Business Intelligence 1 Assignment

    Business intelligence streamline the effort people make to search for, merge or query data to get information needed to make good business decisions. For instance a company that wants to better manage its production floor might use business intelligence tools to determine where delays are happening, and what is affecting the quality of the ...

  21. Business Intelligence Assignment 2

    Business Intelligence Assignment 2 - Free download as Word Doc (.doc / .docx), PDF File (.pdf), Text File (.txt) or read online for free. Scribd is the world's largest social reading and publishing site.

  22. BI Assignment 00028923 Esoft PDF

    BI Assignment 00028923 Esoft .PDF - Free download as Word Doc (.doc / .docx), PDF File (.pdf), Text File (.txt) or read online for free. Scribd is the world's largest social reading and publishing site.

  23. PDF BI Assignment.pdf

    The main motive of using business intelligence is for faster and more accurate business reporting, to make better business decision, to provide satisfaction to their user, to increase business. productivity, etc. BI has a direct impact on organization's strategic, tactical and operational. business decisions.

  24. PDF Statement of Congressman Gerald E. Connolly (VA-11) Wednesday, May 15

    Full Committee Business Meeting . Wednesday, May 15, 2024 . H.R. 8333, the BIOSECURE Act. The BIOSECURE Act (H.R. 8333), sponsored by Reps. Brad Wenstrup and Raja Krishnamoorthi aims to prevent Americans' sensitive health data, including personal genomic data, from falling into the hands of the People 's Republic of China.

  25. 2024 Priorities for the Intelligence Community

    Surveillance cities, sophisticated digital monitoring, and advanced analytic tools employed by our adversaries will make other aspects of intelligence, such as human intelligence (HUMINT) operations and the use of cover, increasingly harder. Such constant surveillance - whether through space, terrestrially, or in cyberspace - will ...