Enterprise needs 'predictive analytics' to survive
- 12 August, 2010 14:33
Organsations that want to survive in an ever-changing marketplace must supplement their business intelligence activities with business analytics, according to SAS senior vice-president and chief marketing officer, Jim Davis.
Speaking at the SAS Forum in Sydney, Davis told delegates the past couple of years have provided a global challenge for enterprise that was unlikely to dissipate.
“We have seen incredible change in the last couple of years and we have been retooling for the future,” he said of SAS which, despite the GFC, grew during 2009 with revenue of $2.3 billion. In the first half of 2010, SAS Australia and New Zealand achieved 20 per cent total software revenue growth.
Businesses are facing several issues, such as making businesses more effective. But they must also understand and focus on their competencies, and drop things that are mediocre.
“And probably the most important thing we need to be dealing with from a management perspective is taking the business and turning it into a new business for a very new the future,” Davis said.
“The message is what was core to your business in the past may not be going forward. So don't rely on the past.”
Enterprise must think about balancing optimisation and innovation, and be willing to accept the inherent risks of innovating.
“If we talk about innovation, we are talking about new ways of thinking. We're not talking about best practices, we talking about next practices.”
Driving this is the explosion of data. Not only is it doubling every 18 months, new data sources have made their way into the mainstream. And while 95 per cent of the data is unstructured, most enterprise level decision making is based on structured data from organisational databases.
“There is a lot of rich information out there that we can use and incorporate in our decision making. Look at social media – what would happen if we married that with our structured data and used that to support decision making.”
Yet Davis considers the term ‘analytics’ to be “the most used and abused term in the marketplace today”. Nonetheless, he said it plays a very important role, particular when it is predictive in nature.
Analytics, he told delegates, combines traditional business intelligence such as standard and ad hoc reports, online analytic processing and alerts with business analytics — statistical analysis, forecasts, predictive modelling and optimisation. One is descriptive while the other is more predictive.
“I think the term BI is overused as well,” he said. “We really need to move beyond BI and talk about business analytics. BI is too much of a catchall.”
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
- OAIC releases privacy impact assessment guide for consultation
- Some Australian businesses 'unlikely' to be ready for Privacy Act changes: survey
- BYOA 'shadow IT' grows in the enterprise: Telsyte
- Cost of a Privacy Act breach could extend to ongoing audits: legal expert
- How Hunter Water is saving $50k a year in software licences
Trust issue looms large for tech companies capitalizing on personal data
5 women who've made it in IT
Five trends affecting legal CIOs
CIO Roundtable: The changing face of security
Bitcoin malware count soars as cryptocurrency value climbs
451 Group Research Report MDM Trends
As the BYOD model continues to grow at twice the rate of corporate-owned devices, enterprises are facing an increasingly diversified mobility landscape. And though BYOD brings many benefits, complex management and security challenges are also ushered in. Read this report to understand what MDM can and cannot do for you and which solutions are being chosen today - and tomorrow.
Implementing an Effective Vulnerability Management Program
Your company's information is often not secured in a large safe which can be easily protected. Instead, information is spread across many systems, networks and devices exposing it to a higher possibility of it being compromised in some way. This paper discusses the challenges of vulnerability management - human, implementation, changes, and software and how to overcome these by implementing an effective vulnerability management program.
Best Practices in Data Protection Monitoring
This whitepaper discusses best practice in data protection monitoring, with a focus on recoverability and visibility as significant drivers for success. Whether backing up a private cloud or several smaller environments, learn how a unified view is necessary for proactively reporting protection, compliance to auditors, and understanding overall data protection health, performance, and reliability.