Business Intelligence for everyone

Monday, February 22, 2010

Security Mechanism in CMC

A very good post written by David Lai about how does security works in CMC : 

 
http://davidlai101.com/blog/2010/02/20/understanding-business-objects-inheritance/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+DavidLaisBusinessIntelligenceBlog+%28David+Lai%27s+Business+Intelligence+Blog%29
Published by yoav ב- Monday, February 22, 2010 No comments:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Labels BOXI, CMC, Learning Business Objects, Security

Thursday, February 18, 2010

Sap business objects text analysis

צפו בסרטון מעניין הממחיש כיצד ניתן לבצע text analysis למסרים המגיעים מה-twitter וע"י כך להפיק מידע חשוב על פקקי תנועה:

Published by yoav ב- Thursday, February 18, 2010 No comments:
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Labels SAP BusinessObjects Innovation Center
Newer Posts Older Posts Home
Subscribe to: Posts (Atom)

About me

My photo
yoav
Hello everyone and welcome to my blog, My name is Yoav and I'm a BI consultant and an expert in BI technologies of Sap Business Objects. In this blog you will find live updates from the best sites and blogs around the world discussing Sap Business Objects and BI in particular, here you can learn about new tricks, solutions, scripts, Functions, books, be the first to know about the hottest developments in the BI field and read about the current technological innovations. You are invited to ask questions, read, respond to my posts and contact me: bi.bobjects@gmail.com
View my complete profile

SCN : Blog List - Business Intelligence

  • Celebrate the Small Stuff Along the Road to BI Maturity - 7/5/2016
  • Preview of ASUG BI at ASUG Annual Conference #ASUG2016 - 5/8/2016
  • BI is Dead (?!) - 5/2/2016
  • KiwiRail gets on track with SAP Business Intelligence - 5/2/2016
  • Call for Speakers: ASUG BI + Analytics Conference - 5/1/2016

Business Intelligence Network, Latest News

  • Business Flexibility and Agility With a Modern Cloud Architecture - 6/2/2020 - 
  • Taking Steps to Democratize Data Science - 5/28/2020 - 
  • The Importance of Data Protection Using Encryption to Comply with Privacy Regulations (Podcast) - 3/3/2020 - 
  • Data Science is No Longer Just for Data Scientists (Podcast) - 12/13/2019 - 
  • Understanding Your Data: A Fundamental Requirement - 4/30/2019 - 

My Favorites

  • SAP Research Prototypes
  • Business objects official site
  • (Business Objects Board (BOB
  • Global BusinessObjects Network (GBN)
  • (Business Objects Community (SAP Community
  • SAP Help Portal
  • SAP businessobjects support

Third Party Tools for Sap Business Objets

  • EV technologies
  • Noad BI
  • ebiexperts
  • APOS BI Tools
  • 360view
  • agile WORKFLOW
  • Performance of BO
  • ReportMessenger
  • Infoburst-Report Distribution
  • Antivia:Xcelsius Web Intelligence

Labels

  • BOXI (65)
  • Tips and Tricks (55)
  • SQL (43)
  • Xcelsius (43)
  • XI 3.X (30)
  • Webi XI (24)
  • CMC (21)
  • Prompts (17)
  • SAP BusinessObjects Innovation Center (14)
  • BI4 (12)
  • Best practices (12)
  • Oracle (12)
  • Security (12)
  • BI (11)
  • dashboard (11)
  • SQL Server (10)
  • Deski (8)
  • XI 4.0 (8)
  • metadata (7)
  • Add in (6)
  • Business Objects and Sap (6)
  • SP (6)
  • Business Objetcs Labs (5)
  • Hana (5)
  • In Memory (5)
  • LOV (5)
  • Polestar (4)
  • Publications (4)
  • Query Builder (4)
  • microsoft (4)
  • BI Tools compare (3)
  • BO and Excel (3)
  • DWH (3)
  • QaaWS (3)
  • Qlikview (3)
  • Roadmap (3)
  • BI Trends (2)
  • Live office (2)
  • Olap (2)
  • SDK (2)
  • Impact Analysis (1)
  • Rich Client (1)

Blog Archive

  • ►  2014 (4)
    • ►  August (1)
    • ►  June (2)
    • ►  March (1)
  • ►  2013 (10)
    • ►  September (1)
    • ►  July (2)
    • ►  June (3)
    • ►  May (1)
    • ►  March (1)
    • ►  January (2)
  • ►  2012 (9)
    • ►  November (4)
    • ►  September (1)
    • ►  June (1)
    • ►  March (2)
    • ►  January (1)
  • ►  2011 (29)
    • ►  December (2)
    • ►  November (1)
    • ►  October (2)
    • ►  September (2)
    • ►  August (8)
    • ►  July (3)
    • ►  June (2)
    • ►  May (3)
    • ►  April (1)
    • ►  March (2)
    • ►  February (2)
    • ►  January (1)
  • ▼  2010 (31)
    • ►  December (3)
    • ►  November (3)
    • ►  September (1)
    • ►  August (1)
    • ►  July (3)
    • ►  June (3)
    • ►  May (2)
    • ►  April (1)
    • ►  March (3)
    • ▼  February (2)
      • Security Mechanism in CMC
      • Sap business objects text analysis
    • ►  January (9)
  • ►  2009 (65)
    • ►  December (2)
    • ►  November (13)
    • ►  October (5)
    • ►  September (8)
    • ►  August (9)
    • ►  July (7)
    • ►  June (6)
    • ►  May (5)
    • ►  April (8)
    • ►  February (1)
    • ►  January (1)
  • ►  2008 (144)
    • ►  December (12)
    • ►  November (132)

TDWI News and Articles

  • Q&A: Prescriptive Analytics to Play Big Role in Transforming Healthcare (Part 2 of 2) - 3/10/2015
  • Artificial Intelligence May Transition Decision Support to Actual Decision-Making - 3/10/2015
  • Have MDM, Will Deliver Data-Driven Apps - 3/10/2015
  • Q&A: Advanced Analytics Crucial to Healthcare Evolution (Part 1 of 2) - 3/3/2015
  • Confidence in Analytics Begins with the Data - 3/3/2015

Data Doghouse

  • The Data Doghouse has moved
  • BI from a student perspective
  • How to Tap IT's Hidden Potential
  • Suites (BI, data integration or data modeling): Boom or Bust?
  • Public DW/BI Courses in March

SAP Business Objects blogs

Error loading feed.
Awesome Inc. theme. Powered by Blogger.