scispace - formally typeset
Open AccessBook ChapterDOI

Real-time business intelligence

Deepak Pareek
- pp 167-192
Reads0
Chats0
About
The article was published on 2006-11-29 and is currently open access. It has received 12 citations till now. The article focuses on the topics: Real-time business intelligence & Intelligence cycle (target-centric approach).

read more

Content maybe subject to copyright    Report






Citations
More filters
Patent

Systems and methods for blockchain rule synchronization

TL;DR: In this article, a syntax for altering one or more rules by which a blockchain may be modified is presented, where the software implementing each client of a blockchain network are programmed to be responsive to requests or directives to alter one or multiple rules by adding or modifying an existing rule.
Patent

Transactionally deterministic high speed financial exchange having improved, efficiency, communication, customization, performance, access, trading opportunities, credit controls, and fault tolerance

TL;DR: In this article, the authors describe the implementation of a trading system, which may also be referred to as trading system architecture, having improved performance which further assures transactional determinism under increasing processing transaction loads while providing improved trading opportunities, fault tolerance, low latency processing, high volume capacity, risk mitigation and market protections with minimal impact.
Journal ArticleDOI

The Study on the Application of Business Intelligence in Manufacturing: A Review

TL;DR: To fill in this gap, a Business Intelligence (BI) implementation will be reviewed, with the aim to execute the right action at the right time or in other words, to improve the decision making process of an organization.
Journal ArticleDOI

Integration of business intelligence with corporate strategic management

TL;DR: In this paper, the authors propose a BSC-BI framework that facilitates the integration of business intelligence with a balanced scorecard methodology, which is demonstrated using a case study on the telecom field.
Patent

Data payment and authentication via a shared data structure

TL;DR: In this paper, a third party, e.g., a party other than the data provider or the data recipient, is involved in controlling whether data streams from the data providers can reach the data recipients.