A common complaint about data warehousing/BI has been time to market. The investment in real months required to stand up analytics is just too large. Descriptions of the actual time required vary (depending on who you ask, and what their interests are) from a year to 24 months. The numbers are open to debate, but let’s go ahead and stick with the conventional wisdom that Data Warehousing typically requires a significant timeline to see results. This assumption then begs two questions:
Looking at the second question first, there’s a very simple answer: YES. Successful DW/BI projects can utterly revolutionize an organization’s processes and even their outlook. They can shine light on problems, point the way to new opportunities, and improve the daily work lives of employees at almost any level. I consider it a foregone conclusion that there is tremendous value in well-built DW/BI systems.
Of course, the caveat there is the whole “well-built” part. That’s where the delays creep in, and where the real timeline resides. In addition to the experience and expertise brought to the design and construction these systems, the degree of involvement of the business also plays a very large role in how successful the solution will be. Too many gaps or failures on either side can result in less-than-satisfactory outcomes being reached after spending a lot of time and effort.
So that leads us back to the first question above: does it have to take that long? I mean, upwards of 2 years to build a decent Business Intelligence solution? This answer is not nearly as easy because the factors that contribute to extending timelines in DW/BI projects are numerous and varied. For instance:
You get the point. The development work in and of itself is not necessarily what takes a long time. What takes a long time is when business needs are misunderstood or disregarded, when expectations aren’t managed, when the chosen technology platform is not well-aligned to business requirements — basically, when either side doesn’t fully understand what they are getting into, and there is misalignment in that area.
In the next few posts, I’ll go over various tools and techniques currently in the market that offer some kind of acceleration of the data warehousing process, and see what paths are available to speed up time-to-analytics. I will include the tool class sometimes variously referred to as either “frameworks” or “accelerators”. I’ll talk about iterative development and the potential risks and benefits of using Agile methodologies. And I’ll discuss possible ways that planning in itself can help deliver results sooner rather than later.
Next time: Accelerators and Frameworks. Hope to see you then!
Jamie Stump, Parshva Vora, myself, and others from the Perficient family attended Sitecore Symposium this past week. We absorbed a lot of knowledge about what is upcoming with Sitecore 7.5 and Sitecore 8. The cadence communicated from Sitecore is around “experience”. The building blocks are being put in place for you, our clients, to help your customers have a custom and personal experience while we as a partner provide solutions that allow you to place “experience before content”. Read the rest of this post »
What a week it was! I am referring to the last week spent at Sitecore Symposium North America and Annual MVP Summit that took place in Las Vegas. There was plenty to absorb with as much as seven sessions in progress at the same time. Sessions were divided into three different tracks: Product, Business and Developer. Obviously I couldn’t make it to all, but I did attend a good mix of them. All sessions were diverse in terms of subject matter. However, from opening keynote to closing keynote, the emerging theme was clear, and it was the Connected Consumer Experience!
Well, the concept of the consumer experience is not entirely brand new. At the symposium, stronger emphasis was placed on the term ‘connected’. The digital marketing landscape is continuously shifting as customers are engaging in doing business across several channels – email, website, mobile sites, apps. social media, CRM etc., and it poses at least two immediate questions for any organization that takes their customers seriously.
Ok, I’ve got to admit I really meant to say “Almost everything you need to know in first Release.”
The more you share, the more you get. Believe in that? Office 365 community does and as a result , this week Microsoft hosted “Delve Yamjam” to coincide with the launch of the new Office 365 product called “Delve”. (If you are new to I highly recommend reading earlier articles here and here to get to know your new friend Delve). Look at a screenshot of Delve from my demo tenant, looks pretty cool, huh?
Some great questions asked some great thoughts shared. I summarize here for the larger community. Microsoft responses were from Christophe Fiessinger, Kady Dundas, Josh Stickler, Mark Kashman, Cem Aykan and on the phone Ashok Kuppusamy, Stefan Debald, Fredrik Holm, John Toews, and Robin Miller.
Hope this provides some insights around how Office Graph captures and renders signals. Check back for more details as I dive more into Delve.
Microsoft position as a Leader in Gartner’s 2014 Magic Quadrant for Social Software in the Workplace has moved to the top. Read the rest of this post »
On Tuesday, we teamed up with Binary Tree, Microsoft’s 2014 Messaging Partner of the Year, for a webinar on Best Practices & Solutions For Migrating to Microsoft Exchange.
The session delved into Office 365, common challenges when migrating to Exchange, along with an example of a customer who recently migrated to Exchange Online with the help of Binary Tree’s solution, and then, how Binary Tree’s CMT Suite works with a demonstration of CMT for Coexistence and CMT for Exchange.
First, Perficient’s Rene Strawser, whose role as a lead technical consultant allows her to focus primarily on the deployment and migration of the Microsoft unified communications technologies of Exchange, gave attendees a bit of background on the trends surrounding the cloud, and specific features of cloud-based Exchange in Office 365.
Following this, James Tolentino, another lead technical consultant at Perficient, shared the common challenges he’s worked through when migrating customers to Exchange from legacy email platforms, and then walked through a situation where a customer recently moved from a legacy email platform to Exchange Online. He described the key features of the Binary Tree tools that were used as well as an overview of the migration process. This included the criticality of end user communication and the use of PowerShell commands and replica/staging.
For the second half of the webinar, Binary Tree solution architect Perry Hiltz went into further detail on Binary Trees’s award-winning SMART migration software solutions, CMT for Coexistence and CMT for Exchange, and then gave the audience a live demo of the tools in action.
The Suite Bar is the thin blue bar that runs at the very top of your Office 365 window with your Outlook, Calendar, People, Yammer, OneDrive, and Sites links. Its your primary navigation to all the different services in your Office 365 Suite of products. Have you ever wished the bar wasn’t blue? Have you ever wanted to add your own logo? Well now you can!
Microsoft has announced a new feature of Office 365 – Custom Themes. Go to your Office 365 Admin Dashboard, click your company hyperlink in the top right corner, then you’ll see options to change the following: Read the rest of this post »
As Microsoft continues to blend and expand Yammer capabilities across the platform, they have retired Tags and Notes in SharePoint Online.
Key factor to note is that users can no longer create create or access existing tags or notes. The only option is for SharePoint Online admins to export all existing tags and notes via an archived csv files, from the SharePoint admin center. Also, for those using this feature, the webparts will start showing up blank.
Below is the table of how this will affect users :
|Tags & Notes button on ribbon||Still visible but disabled.|
|Note Board and Tag Cloud web parts in the web part gallery||Still visible and enabled. The web parts will show up as blank when added to a page.|
|Note Board and Tag Cloud web parts embedded in a page||Page will display a blank space in the area previously occupied by the web parts. Edit the page to remove the web parts.|
|Social tags||Social tags will no longer appear in the tags refiner. The refiner will still display hashtags.|
|Tags and notes listed on personal sites||The area that previously listed tags and notes will be blank.|
How long have you been patiently waiting for this amazing new search powered app called “Delve”? Days, weeks, months?
The wait is finally over with Microsoft announcing today that it is releasing Delve to office 365 subscribers!
The Office blog says, “Delve will roll out to Office 365 customers in phases, first to customers that have elected to receive significant Office 365 service updates at first release, an opt-in program. Following that, Delve will roll out to all Office 365 customers over several months in standard release, the default option for Office 365 customers. We expect Delve to roll out to all eligible Office 365 customers by early 2015. For the Office 365 Business Essentials, Business Premium, Small Business, Small Business Premium, and Midsize Business customers, first release rollout will begin in January 2015.”
Admin Get Started
If you are wondering how to avail this feature, check out the Delve for Admins here.
In the past month, Microsoft has added two key new service capabilities to SharePoint Online and Rights Management that provide a more robust secure computing experience. The first is the introduction of data loss prevention and the second is the improvements in protecting content across all platforms including OS X Support.
SharePoint Online now provides the ability to perform a legal audit to determine the amount of risk posed by data stored on SharePoint sites and OneDrive, commonly known as data loss prevention or DLP. This capability provides the ability to identifying 51 built-in sensitive information types such as credit cards, passport numbers, and Social Security numbers. Once discovered there is the ability to perform an audit and export a report with suspect content.
There is future capabilities for policy creation that automatically detects sensitive content and applies protection, such as deletion or quarantine for review.