{"global":{"lastError":{},"locale":"en","locales":{"data":[{"id":"de","name":"Deutsch"},{"id":"en","name":"English"}],"loading":false,"error":false},"currency":{"id":49,"name":"EUR"},"currencies":{"data":[{"id":49,"name":"EUR"},{"id":124,"name":"RUB"},{"id":153,"name":"UAH"},{"id":155,"name":"USD"}],"loading":false,"error":false},"translations":{"product":{"reference-bonus":{"en":"Offer a reference bonus","ru":"Предложить бонус за референс","_type":"localeString"},"configurator":{"_type":"localeString","en":"Сonfigurator","ru":"Конфигуратор"},"i-sell-it":{"ru":"I sell it","_type":"localeString","en":"I sell it"},"i-use-it":{"en":"I use it","ru":"I use it","_type":"localeString"},"roi-calculator":{"en":"ROI-calculator","ru":"ROI-калькулятор","_type":"localeString"},"selling":{"en":"Selling","ru":"Продают","_type":"localeString"},"using":{"en":"Using","ru":"Используют","_type":"localeString"},"show-more-button":{"ru":"Показать еще","_type":"localeString","en":"Show more"},"hide-button":{"en":"Hide","ru":"Скрыть","_type":"localeString"},"supplier-popover":{"ru":"поставщик","_type":"localeString","en":"supplier"},"implementation-popover":{"ru":"внедрение","_type":"localeString","en":"deployment"},"manufacturer-popover":{"ru":"производитель","_type":"localeString","en":"manufacturer"},"short-description":{"_type":"localeString","en":"Pitch","ru":"Краткое описание"},"i-use-it-popover":{"_type":"localeString","en":"Make your introduction and get a bonus from ROI4CIO or the supplier.","ru":"Внесите свое внедрение и получите бонус от ROI4CIO или поставщика."},"details":{"ru":"Детальнее","_type":"localeString","en":"Details"},"description":{"_type":"localeString","en":"Description","ru":"Описание"},"product-features":{"_type":"localeString","en":"Product features","ru":"Особенности продукта"},"categories":{"en":"Categories","ru":"Категории","_type":"localeString"},"solutions":{"ru":"Проблемы которые решает","_type":"localeString","en":" Problems that solves"},"values":{"ru":"Ценности","_type":"localeString","en":"Values"},"сomparison-matrix":{"en":"Comparison matrix","ru":"Матрица сравнения","_type":"localeString"},"testing":{"ru":"Тестирование","_type":"localeString","en":"Testing"},"compare":{"ru":"Сравнить с конкурентами","_type":"localeString","en":"Compare with competitors"},"characteristics":{"en":" Characteristics","ru":"Характеристики","_type":"localeString"},"transaction-features":{"ru":"Особенности сделки","_type":"localeString","en":"Transaction Features"},"average-discount":{"_type":"localeString","en":"Partner average discount","ru":"Средняя скидка партнера"},"deal-protection":{"_type":"localeString","en":"Deal protection","ru":"Защита сделки"},"average-deal":{"ru":"Средний размер сделки","_type":"localeString","en":"Average deal size"},"average-time":{"_type":"localeString","en":"Average deal closing time","ru":"Средний срок закрытия сделки"},"login":{"ru":"Войти","_type":"localeString","en":"Login"},"register":{"en":"Register","ru":"Зарегистрироваться","_type":"localeString"},"to-know-more":{"ru":"Чтобы узнать больше","_type":"localeString","en":"To know more"},"scheme":{"ru":"Схема работы","_type":"localeString","en":" Scheme of work"},"competitive-products":{"ru":"Конкурентные продукты","_type":"localeString","en":" Competitive products"},"implementations-with-product":{"ru":"Внедрения с этим продуктом","_type":"localeString","en":"Deployments with this product"},"user-features":{"_type":"localeString","en":"User features","ru":"Особенности пользователей"},"job-roles":{"ru":"Роли заинтересованных сотрудников","_type":"localeString","en":" Roles of Interested Employees"},"organizational-features":{"ru":"Организационные особенности","_type":"localeString","en":"Organizational Features"},"calculate-price":{"en":" Calculate product price","ru":"Рассчитать цену продукта","_type":"localeString"},"selling-stories":{"ru":"Продающие истории","_type":"localeString","en":" Selling stories"},"materials":{"ru":"Материалы","_type":"localeString","en":"Materials"},"about-product":{"ru":"О продукте","_type":"localeString","en":"About Product"},"or":{"ru":"или","_type":"localeString","en":"or"},"program-sends-data":{"_type":"localeString","en":"Program Sends Data"},"calculate-roi":{"_type":"localeString","en":"Calculate Product ROI","ru":"Рассчитать ROI продукта"},"complementary-categories":{"_type":"localeString","en":"Complementary Categories","ru":"Схожие категории"},"program-receives-data":{"en":"Program Receives Data","_type":"localeString"},"rebate":{"_type":"localeString","en":"Bonus","ru":"Бонус"},"rebate-for-poc":{"en":"Bonus 4 POC","ru":"Бонус 4 POC","_type":"localeString"},"configurator-content":{"en":"Calculate price for this product here","ru":"Рассчитайте стоимость продукта","_type":"localeString"},"configurator-link":{"ru":"тут","_type":"localeString","en":"here"},"vendor-popover":{"_type":"localeString","en":"vendor","ru":"производитель"},"user-popover":{"ru":"пользователь","_type":"localeString","en":"user"},"select-for-presentation":{"_type":"localeString","en":"select product for presentation","ru":"выбрать продукт для презентации"},"auth-message":{"ru":"Вам нужно зарегистрироваться или войти.","_type":"localeString","en":"You have to register or login."},"add-to-comparison":{"_type":"localeString","en":"Add to comparison","ru":"Добавить в сравнение"},"added-to-comparison":{"ru":"Добавлено в сравнения","_type":"localeString","en":"Added to comparison"},"roi-calculator-content":{"_type":"localeString","en":"Calculate ROI for this product here","ru":"Рассчитайте ROI для данного продукта"},"not-yet-converted":{"ru":"Данные модерируются и вскоре будут опубликованы. Попробуйте повторить переход через некоторое время.","_type":"localeString","en":"Data is moderated and will be published soon. Please, try again later."},"videos":{"ru":"Видео","_type":"localeString","en":"Videos"},"vendor-verified":{"ru":"Подтверждено производителем","_type":"localeString","en":"Vendor verified"},"event-schedule":{"en":"Events schedule","ru":"Расписание событий","_type":"localeString"},"scheduling-tip":{"_type":"localeString","en":"Please, сhoose a convenient date and time and register for the event.","ru":"Выберите удобную дату и время и зарегистрируйтесь на ивент."},"register-to-schedule":{"ru":"Для того чтобы зарегистрироваться на ивент пожалуйста авторизируйтесь или зарегистрируйтесь на сайт.","_type":"localeString","en":"To register for the event please log in or register on the site."},"comparison-matrix":{"ru":"Матрица сравнений","_type":"localeString","en":"Comparison matrix"},"compare-with-competitive":{"en":" Compare with competitive","ru":"Сравнить с конкурентными","_type":"localeString"},"avg-deal-closing-unit":{"ru":"месяцев","_type":"localeString","en":"months"},"under-construction":{"en":"Current feature is still developing to become even more useful for you.","ru":"Данная услуга всё ещё находится в разработке.","_type":"localeString"},"product-presentation":{"en":"Product presentation","ru":"Презентация продукта","_type":"localeString"},"go-to-comparison-table":{"ru":"Перейти к таблице сравнения","_type":"localeString","en":" Go to comparison table"},"see-product-details":{"en":"See Details","ru":"Детали","_type":"localeString"}},"header":{"help":{"ru":"Помощь","_type":"localeString","en":"Help","de":"Hilfe"},"how":{"de":"Wie funktioniert es","ru":"Как это работает","_type":"localeString","en":"How does it works"},"login":{"de":"Einloggen","ru":"Вход","_type":"localeString","en":"Log in"},"logout":{"ru":"Выйти","_type":"localeString","en":"Sign out"},"faq":{"ru":"FAQ","_type":"localeString","en":"FAQ","de":"FAQ"},"references":{"ru":"Мои запросы","_type":"localeString","en":"Requests","de":"References"},"solutions":{"ru":"Возможности","_type":"localeString","en":"Solutions"},"find-it-product":{"_type":"localeString","en":"Selection and comparison of IT product","ru":"Подбор и сравнение ИТ продукта"},"autoconfigurator":{"ru":"Калькулятор цены","_type":"localeString","en":" Price calculator"},"comparison-matrix":{"_type":"localeString","en":"Comparison Matrix","ru":"Матрица сравнения"},"roi-calculators":{"ru":"ROI калькуляторы","_type":"localeString","en":"ROI calculators"},"b4r":{"ru":"Бонус за референс","_type":"localeString","en":"Bonus for reference"},"business-booster":{"_type":"localeString","en":"Business boosting","ru":"Развитие бизнеса"},"catalogs":{"ru":"Каталоги","_type":"localeString","en":"Catalogs"},"products":{"ru":"Продукты","_type":"localeString","en":"Products"},"implementations":{"ru":"Внедрения","_type":"localeString","en":"Deployments"},"companies":{"_type":"localeString","en":"Companies","ru":"Компании"},"categories":{"ru":"Категории","_type":"localeString","en":"Categories"},"for-suppliers":{"ru":"Поставщикам","_type":"localeString","en":"For suppliers"},"blog":{"_type":"localeString","en":"Blog","ru":"Блог"},"agreements":{"ru":"Сделки","_type":"localeString","en":"Deals"},"my-account":{"ru":"Мой кабинет","_type":"localeString","en":"My account"},"register":{"ru":"Зарегистрироваться","_type":"localeString","en":"Register"},"comparison-deletion":{"ru":"Удаление","_type":"localeString","en":"Deletion"},"comparison-confirm":{"ru":"Подтвердите удаление","_type":"localeString","en":"Are you sure you want to delete"},"search-placeholder":{"ru":"Введите поисковый запрос","_type":"localeString","en":"Enter your search term"},"my-profile":{"en":"My profile","ru":"Мои данные","_type":"localeString"},"about":{"_type":"localeString","en":"About Us"},"it_catalogs":{"en":"IT catalogs","_type":"localeString"},"roi4presenter":{"_type":"localeString","en":"Roi4Presenter"},"roi4webinar":{"_type":"localeString","en":"Pitch Avatar"},"sub_it_catalogs":{"_type":"localeString","en":"Find IT product"},"sub_b4reference":{"_type":"localeString","en":"Get reference from user"},"sub_roi4presenter":{"en":"Make online presentations","_type":"localeString"},"sub_roi4webinar":{"_type":"localeString","en":"Create an avatar for the event"},"catalogs_new":{"_type":"localeString","en":"Products"},"b4reference":{"_type":"localeString","en":"Bonus4Reference"},"it_our_it_catalogs":{"_type":"localeString","en":"Our IT Catalogs"},"it_products":{"_type":"localeString","en":"Find and compare IT products"},"it_implementations":{"_type":"localeString","en":"Learn implementation reviews"},"it_companies":{"_type":"localeString","en":"Find vendor and company-supplier"},"it_categories":{"en":"Explore IT products by category","_type":"localeString"},"it_our_products":{"en":"Our Products","_type":"localeString"},"it_it_catalogs":{"_type":"localeString","en":"IT catalogs"}},"footer":{"copyright":{"ru":"Все права защищены","_type":"localeString","en":"All rights reserved","de":"Alle rechte vorbehalten"},"company":{"ru":"О компании","_type":"localeString","en":"My Company","de":"Über die Firma"},"about":{"_type":"localeString","en":"About us","de":"Über uns","ru":"О нас"},"infocenter":{"en":"Infocenter","de":"Infocenter","ru":"Инфоцентр","_type":"localeString"},"tariffs":{"en":"Subscriptions","de":"Tarife","ru":"Тарифы","_type":"localeString"},"contact":{"de":"Kontaktiere uns","ru":"Связаться с нами","_type":"localeString","en":"Contact us"},"marketplace":{"de":"Marketplace","ru":"Marketplace","_type":"localeString","en":"Marketplace"},"products":{"de":"Produkte","ru":"Продукты","_type":"localeString","en":"Products"},"compare":{"_type":"localeString","en":"Pick and compare","de":"Wähle und vergleiche","ru":"Подобрать и сравнить"},"calculate":{"en":"Calculate the cost","de":"Kosten berechnen","ru":"Расчитать стоимость","_type":"localeString"},"get_bonus":{"ru":"Бонус за референс","_type":"localeString","en":"Bonus for reference","de":"Holen Sie sich einen Rabatt"},"salestools":{"_type":"localeString","en":"Salestools","de":"Salestools","ru":"Salestools"},"automatization":{"_type":"localeString","en":"Settlement Automation","de":"Abwicklungsautomatisierung","ru":"Автоматизация расчетов"},"roi_calcs":{"de":"ROI-Rechner","ru":"ROI калькуляторы","_type":"localeString","en":"ROI calculators"},"matrix":{"_type":"localeString","en":"Comparison matrix","de":"Vergleichsmatrix","ru":"Матрица сравнения"},"b4r":{"de":"Rebate 4 Reference","ru":"Rebate 4 Reference","_type":"localeString","en":"Rebate 4 Reference"},"our_social":{"en":"Our social networks","de":"Unsere sozialen Netzwerke","ru":"Наши социальные сети","_type":"localeString"},"subscribe":{"_type":"localeString","en":"Subscribe to newsletter","de":"Melden Sie sich für den Newsletter an","ru":"Подпишитесь на рассылку"},"subscribe_info":{"en":"and be the first to know about promotions, new features and recent software reviews","ru":"и узнавайте первыми об акциях, новых возможностях и свежих обзорах софта","_type":"localeString"},"policy":{"ru":"Политика конфиденциальности","_type":"localeString","en":"Privacy Policy"},"user_agreement":{"en":"Agreement","ru":"Пользовательское соглашение ","_type":"localeString"},"solutions":{"ru":"Возможности","_type":"localeString","en":"Solutions"},"find":{"ru":"Подбор и сравнение ИТ продукта","_type":"localeString","en":"Selection and comparison of IT product"},"quote":{"en":"Price calculator","ru":"Калькулятор цены","_type":"localeString"},"boosting":{"ru":"Развитие бизнеса","_type":"localeString","en":"Business boosting"},"4vendors":{"ru":"поставщикам","_type":"localeString","en":"4 vendors"},"blog":{"en":"blog","ru":"блог","_type":"localeString"},"pay4content":{"en":"we pay for content","ru":"платим за контент","_type":"localeString"},"categories":{"ru":"категории","_type":"localeString","en":"categories"},"showForm":{"ru":"Показать форму","_type":"localeString","en":"Show form"},"subscribe__title":{"en":"We send a digest of actual news from the IT world once in a month!","ru":"Раз в месяц мы отправляем дайджест актуальных новостей ИТ мира!","_type":"localeString"},"subscribe__email-label":{"ru":"Email","_type":"localeString","en":"Email"},"subscribe__name-label":{"ru":"Имя","_type":"localeString","en":"Name"},"subscribe__required-message":{"_type":"localeString","en":"This field is required","ru":"Это поле обязательное"},"subscribe__notify-label":{"_type":"localeString","en":"Yes, please, notify me about news, events and propositions","ru":"Да, пожалуйста уведомляйте меня о новостях, событиях и предложениях"},"subscribe__agree-label":{"ru":"Подписываясь на рассылку, вы соглашаетесь с %TERMS% и %POLICY% и даете согласие на использование файлов cookie и передачу своих персональных данных*","_type":"localeString","en":"By subscribing to the newsletter, you agree to the %TERMS% and %POLICY% and agree to the use of cookies and the transfer of your personal data"},"subscribe__submit-label":{"ru":"Подписаться","_type":"localeString","en":"Subscribe"},"subscribe__email-message":{"ru":"Пожалуйста, введите корректный адрес электронной почты","_type":"localeString","en":"Please, enter the valid email"},"subscribe__email-placeholder":{"_type":"localeString","en":"username@gmail.com","ru":"username@gmail.com"},"subscribe__name-placeholder":{"ru":"Имя Фамилия","_type":"localeString","en":"Last, first name"},"subscribe__success":{"ru":"Вы успешно подписаны на рассылку. Проверьте свой почтовый ящик.","_type":"localeString","en":"You are successfully subscribed! Check you mailbox."},"subscribe__error":{"en":"Subscription is unsuccessful. Please, try again later.","ru":"Не удалось оформить подписку. Пожалуйста, попробуйте позднее.","_type":"localeString"},"roi4presenter":{"ru":"roi4presenter","_type":"localeString","en":"Roi4Presenter","de":"roi4presenter"},"it_catalogs":{"_type":"localeString","en":"IT catalogs"},"roi4webinar":{"_type":"localeString","en":"Pitch Avatar"},"b4reference":{"_type":"localeString","en":"Bonus4Reference"}},"breadcrumbs":{"home":{"ru":"Главная","_type":"localeString","en":"Home"},"companies":{"ru":"Компании","_type":"localeString","en":"Companies"},"products":{"ru":"Продукты","_type":"localeString","en":"Products"},"implementations":{"ru":"Внедрения","_type":"localeString","en":"Deployments"},"login":{"_type":"localeString","en":"Login","ru":"Вход"},"registration":{"en":"Registration","ru":"Регистрация","_type":"localeString"},"b2b-platform":{"_type":"localeString","en":"B2B platform for IT buyers, vendors and suppliers","ru":"Портал для покупателей, поставщиков и производителей ИТ"}},"comment-form":{"title":{"ru":"Оставить комментарий","_type":"localeString","en":"Leave comment"},"firstname":{"ru":"Имя","_type":"localeString","en":"First name"},"lastname":{"ru":"Фамилия","_type":"localeString","en":"Last name"},"company":{"ru":"Компания","_type":"localeString","en":"Company name"},"position":{"en":"Position","ru":"Должность","_type":"localeString"},"actual-cost":{"ru":"Фактическая стоимость","_type":"localeString","en":"Actual cost"},"received-roi":{"ru":"Полученный ROI","_type":"localeString","en":"Received ROI"},"saving-type":{"ru":"Тип экономии","_type":"localeString","en":"Saving type"},"comment":{"en":"Comment","ru":"Комментарий","_type":"localeString"},"your-rate":{"_type":"localeString","en":"Your rate","ru":"Ваша оценка"},"i-agree":{"_type":"localeString","en":"I agree","ru":"Я согласен"},"terms-of-use":{"ru":"С пользовательским соглашением и политикой конфиденциальности","_type":"localeString","en":"With user agreement and privacy policy"},"send":{"en":"Send","ru":"Отправить","_type":"localeString"},"required-message":{"_type":"localeString","en":"{NAME} is required filed","ru":"{NAME} - это обязательное поле"}},"maintenance":{"title":{"ru":"На сайте проводятся технические работы","_type":"localeString","en":"Site under maintenance"},"message":{"_type":"localeString","en":"Thank you for your understanding","ru":"Спасибо за ваше понимание"}}},"translationsStatus":{"product":"success"},"sections":{},"sectionsStatus":{},"pageMetaData":{"product":{"title":{"ru":"ROI4CIO: Продукт","_type":"localeString","en":"ROI4CIO: Product"},"meta":[{"content":"website","name":"og:type"},{"content":"https://roi4cio.com/fileadmin/templates/roi4cio/image/roi4cio-logobig.jpg","name":"og:image"}],"translatable_meta":[{"name":"og:title","translations":{"en":"Example product","ru":"Конкретный продукт","_type":"localeString"}},{"name":"og:description","translations":{"en":"Description for one product","ru":"Описание для конкретного продукта","_type":"localeString"}},{"name":"title","translations":{"_type":"localeString","en":"Product","ru":"Продукт"}},{"name":"description","translations":{"_type":"localeString","en":"Product description","ru":"Описание продукта"}},{"name":"keywords","translations":{"ru":"Ключевые слова продукта","_type":"localeString","en":"Product keywords"}}]}},"pageMetaDataStatus":{"product":"success"},"subscribeInProgress":false,"subscribeError":false},"auth":{"inProgress":false,"error":false,"checked":true,"initialized":false,"user":{},"role":null,"expires":null},"products":{"productsByAlias":{"knightscope-k5":{"id":3802,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/knightscope_01.png","logo":true,"scheme":false,"title":"Knightscope K5","vendorVerified":0,"rating":"0.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"knightscope-k5","companyTitle":"Knightscope","companyTypes":["supplier","vendor"],"companyId":5976,"companyAlias":"knightscope","description":"The Knightscope K5 is primarily an outdoor machine which runs 24/7 on its own including autonomously recharging itself without any human intervention. It is best suited for securing large outdoor spaces. Working together with human eyes, you’ll be better equipped to keep areas such as parking lots, corporate campuses and hospitals safe autonomously.\r\n<b>Features:</b>\r\n<b>360 Degree HD Video Streaming</b>\r\nThe K5 was able to provide eye-level high definition video of the entire incident, providing the key necessary information in a timely manner, transmitted the information to law enforcement, which was received in time to arrest the suspect.\r\n<b>People Detection</b>\r\nPerhaps at your sensitive facility, there literally should be no humans during certain times of the day, say 10pm - 5am. The K5 can be on the lookout for any people during those times and proactively make pre-recorded announcements to deter negative behavior.\r\n<b>Automatic License Plate Recognition</b>\r\nUtilizing the KSOC, clients can whitelist or blacklist license plates depending on the needs of your location. The user can also automatically check for dwell times of plates (i.e., a parking meter) to deter overnight parking or assist with BOLOs (Be On The Lookout).\r\n<b>Thermal Anomaly Detection</b>\r\n<ul> <li>Early Detection of Potential Fire Threat</li> <li>Unauthorized Individuals in Restricted Areas</li> <li>Suspicious Persons After Hours</li> <li>Running Vehicles</li> <li>Positive Identification Capture</li> </ul>\r\n<b>Automatic Signal Detection</b>\r\nCombining this capability with Automatic License Plate Recognition as well as BOLO mug shot upload capabilities allows for unprecedented new capabilities in deterring unwanted behavior at your location.\r\n<b>Two-Way Intercom</b>\r\nA Two-Way Intercom (human-to-human voice interaction) call can be initiated either by the KSOC user or a human presses the button on a machine. The button press can be configured to call a certain number to further assist your security team.\r\n<b>Live Audio Broadcast</b>\r\nLive Audio Broadcast, similar to public address system, allows a KSOC user to throw their voice through a machine or machines providing new alerting capabilities.\r\n<b>Pre-recorded Broadcast Messages</b>\r\nPre-Recorded Messages may be played manually by the KSOC user or set automatically to play randomly, by time, by location or by detection, further automating visitor, patron, or employee engagement.","shortDescription":"Access real-time data around the clock via our desktop or mobile apps, ensuring you’ll always have the power of our technology at your fingertips. Knightscope has you covered 24/7/365\r\n\r\n","type":"Software","isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":15,"sellingCount":13,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Knightscope K5","keywords":"","description":"The Knightscope K5 is primarily an outdoor machine which runs 24/7 on its own including autonomously recharging itself without any human intervention. It is best suited for securing large outdoor spaces. Working together with human eyes, you’ll be better equi","og:title":"Knightscope K5","og:description":"The Knightscope K5 is primarily an outdoor machine which runs 24/7 on its own including autonomously recharging itself without any human intervention. It is best suited for securing large outdoor spaces. Working together with human eyes, you’ll be better equi","og:image":"https://old.roi4cio.com/fileadmin/user_upload/knightscope_01.png"},"eventUrl":"","translationId":3801,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":223,"title":"Data Access, Analysis, and Delivery Software","alias":"data-access-analysis-and-delivery-software","description":" Data access, analysis and delivery software are end-user oriented tools for ad hoc data access, analysis and reporting as well as production reporting. These products are most commonly used by information consumers or power users rather than professional programmers.\r\nThe processing and analysis of group data is a flexible, iterative method for processing and analyzing data to efficiently provide predictive analytics solutions and intelligent applications. This allows you to improve learning and teamwork. It contains selected recommendations and structures from Microsoft and other developers in the industry that ensure the successful implementation of data processing and analysis solutions. All this is to help companies take full advantage of their analytics software.","materialsDescription":"<span style=\"font-weight: bold; \">Data access</span>\r\nData access is a generic term referring to a process which has both an IT-specific meaning and other connotations involving access rights in a broader legal and/or political sense. In the former it typically refers to software and activities related to storing, retrieving, or acting on data housed in a database or other repository. Two fundamental types of data access exist:\r\n<ol><li>sequential access (as in magnetic tape, for example)</li><li>random access (as in indexed media)</li></ol>\r\nData access crucially involves authorization to access different data repositories. Data access can help distinguish the abilities of administrators and users. For example, administrators may have the ability to remove, edit and add data, while general users may not even have "read" rights if they lack access to particular information.\r\nHistorically, each repository (including each different database, file system, etc.), might require the use of different methods and languages, and many of these repositories stored their content in different and incompatible formats.\r\nOver the years standardized languages, methods, and formats, have developed to serve as interfaces between the often proprietary, and always idiosyncratic, specific languages and methods. Such standards include SQL (1974- ), ODBC (ca 1990- ), JDBC, XQJ, ADO.NET, XML, XQuery, XPath (1999- ), and Web Services.\r\nSome of these standards enable translation of data from unstructured (such as HTML or free-text files) to structured (such as XML or SQL).\r\nStructures such as connection strings and DBURLs[1] can attempt to standardise methods of connecting to databases.\r\n<span style=\"font-weight: bold; \">A program for data analysis</span>\r\nA data analysis program is a specially developed software that can analyze any information. This is usually a database program. It is within the database that you can store any information in any amount. A functional program allows incoming and stored data to analyze. Software development can be done for any tasks, which means that the program for data analysis can be customized for any activity. If, for example, you have a trade organization, then your data analysis program will analyze products, customers, funds, product balance, and more.\r\n<span style=\"font-weight: bold;\">On-demand software delivery</span>\r\nA type of software delivery service where the software is provided to the customer through a network (such as the Internet) as a service. On-demand software delivery is also called software on-demand. The terms on-demand software and Software as a Service (SaaS) are often used interchangeably.\r\nData access, analysis and delivery software are end-user oriented tools for ad hoc data access, analysis and reporting as well as production reporting. These products are most commonly used by information consumers or power users rather than professional programmers.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/Data_Access__Analysis__and_Delivery_Software1.png"},{"id":229,"title":"Spatial Information Management Software","alias":"spatial-information-management-software","description":" A spatial database is a database that is optimized for storing and querying data that represents objects defined in a geometric space. Most spatial databases allow the representation of simple geometric objects such as points, lines and polygons. Some spatial databases handle more complex structures such as 3D objects, topological coverages, linear networks, and TINs. While typical databases have developed to manage various numeric and character types of data, such databases require additional functionality to process spatial data types efficiently, and developers have often added geometry or feature data types. The Open Geospatial Consortium (OGC) developed the Simple Features specification (first released in 1997) and sets standards for adding spatial functionality to database systems. The SQL/MM Spatial ISO/IEC standard is a part the SQL/MM multimedia standard and extends the Simple Features standard with data types that support circular interpolations.\r\nA geodatabase (also geographical database and geospatial database) is a database of geographic data, such as countries, administrative divisions, cities, and related information. Such databases can be useful for websites that wish to identify the locations of their visitors for customization purposes.\r\nDatabase systems use indexes to quickly look up values; however, this way of indexing data is not optimal for spatial queries. Instead, spatial databases use a spatial index to speed up database operations.\r\nIn addition to typical SQL queries such as SELECT statements, spatial databases can perform a wide variety of spatial operations. The following operations and many more are specified by the Open Geospatial Consortium standard:\r\n<ul><li>Spatial Measurements: Computes line length, polygon area, the distance between geometries, etc.</li><li>Spatial Functions: Modify existing features to create new ones, for example by providing a buffer around them, intersecting features, etc.</li><li>Spatial Predicates: Allows true/false queries about spatial relationships between geometries. Examples include "do two polygons overlap" or 'is there a residence located within a mile of the area we are planning to build the landfill?'</li><li>Geometry Constructors: Creates new geometries, usually by specifying the vertices (points or nodes) which define the shape.</li><li>Observer Functions: Queries which return specific information about a feature such as the location of the center of a circle.</li></ul>\r\nSome databases support only simplified or modified sets of these operations, especially in cases of NoSQL systems like MongoDB and CouchDB.","materialsDescription":"<span style=\"font-weight: bold;\">What is the spatial index?</span>\r\nSpatial indices are used by spatial databases (databases which store information related to objects in space) to optimize spatial queries. Conventional index types do not efficiently handle spatial queries such as how far two points differ, or whether points fall within a spatial area of interest. Common spatial index methods include:\r\n<ul><li>Geohash</li><li>HHCode</li><li>Grid (spatial index)</li><li>Z-order (curve)</li><li>Quadtree</li><li>Octree</li><li>UB-tree</li><li>R-tree: Typically the preferred method for indexing spatial data.[citation needed] Objects (shapes, lines and points) are grouped using the minimum bounding rectangle (MBR). Objects are added to an MBR within the index that will lead to the smallest increase in its size.</li><li>R+ tree</li><li>R* tree</li><li>Hilbert R-tree</li><li>X-tree</li><li>kd-tree</li><li>m-tree – an m-tree index can be used for the efficient resolution of similarity queries on complex objects as compared using an arbitrary metric.</li><li>Binary space partitioning (BSP-Tree): Subdividing space by hyperplanes.</li></ul>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/Spatial_Information_Management_Software.png"},{"id":227,"title":"Advanced Analytics Software","alias":"advanced-analytics-software","description":" <span style=\"font-weight: bold;\">Advanced analytics</span> is a part of data science that uses high-level methods and tools to focus on projecting future trends, events, and behaviors. This gives organizations the ability to perform advanced statistical models such as ‘what-if’ calculations, as well as future-proof various aspects of their operations.\r\nThe term is an umbrella for several sub-fields of analytics that work together in their predictive capabilities.\r\nThe major areas that make up advanced analytics are predictive data analytics, big data, and data mining. The process of advanced analytics includes all three areas at various times.\r\n<span style=\"font-weight: bold;\">Data mining</span> is a key aspect of advanced analytics, providing the raw data that will be used by both big data and predictive analytics. <span style=\"font-weight: bold;\">Big data analytics</span> are useful in finding existing insights and creating connections between data points and sets, as well as cleaning data.\r\nFinally, <span style=\"font-weight: bold;\">predictive analytics</span> can use these clean sets and existing insights to extrapolate and make predictions and projections about future activity, trends, and consumer behaviors.\r\nAdvanced analytics also include newer technologies such as machine learning and artificial intelligence, semantic analysis, visualizations, and even neural networks. Taken together, they help advanced analytics software create an accurate enough canvas to make reliable predictions and generate actionable BI insights on a deeper level.","materialsDescription":"<h1 class=\"align-center\">A list of tips on how to manage the process of building an advanced analytics program</h1>\r\n<ul><li>Start with a proof-of-concept project to demonstrate the potential business value of analytics applications.</li><li>Take training seriously. New data management and analytics skills likely will be needed, especially if big data platforms and tools like SAS advanced analytics tools are involved.</li><li>Develop processes to ensure that business units are ready to act on analytical findings so the work of data scientists and other analysts doesn't go to waste.</li><li>Monitor and assess advanced and predictive analytics software on a regular basis to make sure the data being analyzed is still relevant and the analytical models being run against it are still valid.</li></ul>\r\n<h1 class=\"align-center\">Advanced analytics tools</h1>\r\nThere are a variety of advanced analytics tools to choose from that offer different advantages based on the use case. They generally break down into two categories: open source and proprietary.\r\nOpen source tools have become a go-to option for many data scientists doing machine learning and prescriptive analytics. They include programming languages, as well as computing environments, including Hadoop and Spark. Users typically say they like open source advanced analytics tools because they are generally inexpensive to operate, offer strong functionality and are backed by a user community that continually innovates the tools.\r\nOn the proprietary side, vendors including Microsoft, IBM and the SAS Institute all offer advanced analytics tools. Most require a deep technical background and understanding of mathematical techniques.\r\nIn recent years, however, a crop of self-service analytics tools has matured to make functionality more accessible to business users. Tableau, in particular, has become a common tool. While its functionality is more limited than deeper technical tools, it does enable users to conduct cluster analyses and other advanced analyses.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/Advanced_Analytics_Software.png"},{"id":225,"title":"End-User Query, Reporting, and Analysis","alias":"end-user-query-reporting-and-analysis","description":" Class systems of Query & Reporting are designed to form queries to information systems in user terms, as well as their execution, integration of data from different sources, viewing data with the possibilities of detailing and summarizing and building full-fledged reports, both on-screen and printed. Visualization of query results can be presented to the user in various forms - flat or multidimensional tables, graphs, charts, various specialized interfaces.\r\nEnd-user tools for querying and building reports are delivered in two ways:\r\n<ul><li>as part of OLAP-systems</li><li>in the form of specialized Query & Reporting</li></ul>\r\nVirtually every OLAP class system is equipped with Query & Reporting. These funds can be either embedded in the main product or separated into a separate product.\r\nThere are also specialized systems for generating and distributing reports. At the same time, these systems incorporate their own OLAP-means. Therefore, to draw a clear line between OLAP-systems and systems of class Query & Reporting is almost impossible.","materialsDescription":" <span style=\"font-weight: bold; \">What are the reporting tools?</span>\r\nReporting tools are widely used to support decision making and to measure organizational and team performance. Companies use them for financial consolidation, for evaluation of strategies and policies and often just for plain reporting. Today most of these tools are integrated with Business Intelligence tools.\r\n<span style=\"font-weight: bold; \">What are the advantages of these tools for your organization?</span>\r\nReporting tools allow companies to create attractive reports easily. In tabular or graphical format. With data from Excel, a data warehouse or the organization’s ERP system. With the reports containing the right information, people are able to manage and improve the business processes more easily.\r\n<span style=\"font-weight: bold; \">Which reporting tools are available in the market?</span>\r\nThere are many Business Intelligence Reporting tools in the market available. This list of reporting tools shows you a complete overview of all the major tools currently available and thoroughly studied by our industry analysts. To name a few: Cognos Query and reporting, Oracle Enterprise Reporting, Crystal Reports, Microsoft Reporting Services (SSRS), etc.\r\n<span style=\"font-weight: bold; \">Is there a difference between reporting tools and BI tools?</span>\r\nAlmost every company, large or small, needs a reporting tool or they have already one in place. But, what is the difference between reporting software and Business Intelligence tools? They are not the same. In general reporting tools tell us where we have been but are not very good at analyzing data (at real time) and telling us where we are going (predictive).\r\n<span style=\"font-weight: bold;\">What is the difference between a query and a report?</span>\r\nA query is a way to create a list of accounts or journal entries that match your criteria. Requests serve as an advanced search engine that finds and groups accounts or journal entries and can only create a list.\r\nA report is a detailed report of a group of accounts or journal entries. Reports analyze data and are designed to calculate and present data in a more formal form.\r\nTypically, a query finds information in the database for you, and a report is a more powerful way to display and analyze information about the accounts or log entries you want to view.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/End-User_Query__Reporting__and_Analysis.png"}],"characteristics":[],"concurentProducts":[{"id":6749,"logo":false,"scheme":false,"title":"Netscout nGeniusONE","vendorVerified":0,"rating":"0.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":1,"alias":"netscout-ngeniusone","companyTitle":"NetScout","companyTypes":["vendor"],"companyId":2747,"companyAlias":"netscout","description":"<span lang=\"EN-US\">The nGeniusONE Service Assurance platform provides real-time visibility into the performance of business-critical applications such as web-based applications, voice and video communications, database, financial, or other services by analyz ing wire data as it crosses the network, on premises or in the cloud. nGeniusONE with NETSCOUT’s patented Adaptive Service Intelligence (ASI) technology leverages this wire data to generate “smart data” for smarter analytics to assure performance, manage risk, and facilitate superior decision making regarding application and network services.</span>\r\n<span lang=\"EN-US\"> </span>\r\n<span lang=\"EN-US\">The nGeniusONE platform delivers valuable macro-level insights into the status and</span><span lang=\"EN-US\">performance of enterprise-wide services, application components, individual hosts or groups of clients or servers. This expands the IT architect’s understanding of service consumption patterns, application component dependencies, and overall user experience to better support resource optimization and capacity planning.</span> \r\n<span lang=\"EN-US\"> </span>\r\n<span lang=\"EN-US\">Powered by ASI technology, NETSCOUT’s highly scalable Deep Packet Inspection (DPI) engine relies on wire data to provide real-time, contextual analysis of network and service performance, availability and quality. With these insights, nGeniusONE can provide customers end-to-end visibility in complex physical, virtualized, and cloud-based deployments, allowing enterprises to regain visibility into business critical applications and services even in difficult to instrument locations.</span>\r\n\r\n<span style=\"font-weight: bold;\">Main features:</span>\r\n<ul><li><span class=\"jlqj4b\"><span lang=\"EN-US\">Next Generation platform for network and application visibility, monitoring, analytics, reporting, and troubleshooting</span></span></li><li><span class=\"jlqj4b\"><span lang=\"EN-US\">Patented and scalable ASI technology based on wire data increases the integrity, fidelity, and quality of analysis</span></span></li><li><span class=\"jlqj4b\"><span lang=\"EN-US\">Provides insight into the performance of all infrastructure and application components involved in service delivery</span></span></li><li><span class=\"jlqj4b\"><span lang=\"EN-US\">Supports Unified Communications & Collaboration service features including call setup/teardown and call quality analysis</span></span></li><li><span class=\"jlqj4b\"><span lang=\"EN-US\">Dashboard, Service and Traffic Monitors with contextual Session Analysis and Packet Analysis drill downs</span></span></li><li><span class=\"jlqj4b\"><span lang=\"EN-US\">Real-time proactive alerting notifies of problems before they become service impacting, user affecting events</span></span></li><li><span class=\"jlqj4b\"><span lang=\"EN-US\">Customizable reporting module provides day- to-day business and operational reports which can be scheduled for daily, weekly and monthly delivery</span></span></li><li><span class=\"jlqj4b\"><span lang=\"EN-US\">Scalable, enterprise-class architecture supports large scale geographically distributed deployments in physical, virtualized, hybrid, or cloud-based environments with single pane of glass</span></span></li></ul>","shortDescription":"The nGeniusONE Service Assurance platform provides real-time visibility into the performance of business-critical applications such as web-based applications, voice and video communications, database","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Netscout nGeniusONE","keywords":"","description":"<span lang=\"EN-US\">The nGeniusONE Service Assurance platform provides real-time visibility into the performance of business-critical applications such as web-based applications, voice and video communications, database, financial, or other services by analyz i","og:title":"Netscout nGeniusONE","og:description":"<span lang=\"EN-US\">The nGeniusONE Service Assurance platform provides real-time visibility into the performance of business-critical applications such as web-based applications, voice and video communications, database, financial, or other services by analyz i"},"eventUrl":"","translationId":6749,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":223,"title":"Data Access, Analysis, and Delivery Software","alias":"data-access-analysis-and-delivery-software","description":" Data access, analysis and delivery software are end-user oriented tools for ad hoc data access, analysis and reporting as well as production reporting. These products are most commonly used by information consumers or power users rather than professional programmers.\r\nThe processing and analysis of group data is a flexible, iterative method for processing and analyzing data to efficiently provide predictive analytics solutions and intelligent applications. This allows you to improve learning and teamwork. It contains selected recommendations and structures from Microsoft and other developers in the industry that ensure the successful implementation of data processing and analysis solutions. All this is to help companies take full advantage of their analytics software.","materialsDescription":"<span style=\"font-weight: bold; \">Data access</span>\r\nData access is a generic term referring to a process which has both an IT-specific meaning and other connotations involving access rights in a broader legal and/or political sense. In the former it typically refers to software and activities related to storing, retrieving, or acting on data housed in a database or other repository. Two fundamental types of data access exist:\r\n<ol><li>sequential access (as in magnetic tape, for example)</li><li>random access (as in indexed media)</li></ol>\r\nData access crucially involves authorization to access different data repositories. Data access can help distinguish the abilities of administrators and users. For example, administrators may have the ability to remove, edit and add data, while general users may not even have "read" rights if they lack access to particular information.\r\nHistorically, each repository (including each different database, file system, etc.), might require the use of different methods and languages, and many of these repositories stored their content in different and incompatible formats.\r\nOver the years standardized languages, methods, and formats, have developed to serve as interfaces between the often proprietary, and always idiosyncratic, specific languages and methods. Such standards include SQL (1974- ), ODBC (ca 1990- ), JDBC, XQJ, ADO.NET, XML, XQuery, XPath (1999- ), and Web Services.\r\nSome of these standards enable translation of data from unstructured (such as HTML or free-text files) to structured (such as XML or SQL).\r\nStructures such as connection strings and DBURLs[1] can attempt to standardise methods of connecting to databases.\r\n<span style=\"font-weight: bold; \">A program for data analysis</span>\r\nA data analysis program is a specially developed software that can analyze any information. This is usually a database program. It is within the database that you can store any information in any amount. A functional program allows incoming and stored data to analyze. Software development can be done for any tasks, which means that the program for data analysis can be customized for any activity. If, for example, you have a trade organization, then your data analysis program will analyze products, customers, funds, product balance, and more.\r\n<span style=\"font-weight: bold;\">On-demand software delivery</span>\r\nA type of software delivery service where the software is provided to the customer through a network (such as the Internet) as a service. On-demand software delivery is also called software on-demand. The terms on-demand software and Software as a Service (SaaS) are often used interchangeably.\r\nData access, analysis and delivery software are end-user oriented tools for ad hoc data access, analysis and reporting as well as production reporting. These products are most commonly used by information consumers or power users rather than professional programmers.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/Data_Access__Analysis__and_Delivery_Software1.png"},{"id":225,"title":"End-User Query, Reporting, and Analysis","alias":"end-user-query-reporting-and-analysis","description":" Class systems of Query & Reporting are designed to form queries to information systems in user terms, as well as their execution, integration of data from different sources, viewing data with the possibilities of detailing and summarizing and building full-fledged reports, both on-screen and printed. Visualization of query results can be presented to the user in various forms - flat or multidimensional tables, graphs, charts, various specialized interfaces.\r\nEnd-user tools for querying and building reports are delivered in two ways:\r\n<ul><li>as part of OLAP-systems</li><li>in the form of specialized Query & Reporting</li></ul>\r\nVirtually every OLAP class system is equipped with Query & Reporting. These funds can be either embedded in the main product or separated into a separate product.\r\nThere are also specialized systems for generating and distributing reports. At the same time, these systems incorporate their own OLAP-means. Therefore, to draw a clear line between OLAP-systems and systems of class Query & Reporting is almost impossible.","materialsDescription":" <span style=\"font-weight: bold; \">What are the reporting tools?</span>\r\nReporting tools are widely used to support decision making and to measure organizational and team performance. Companies use them for financial consolidation, for evaluation of strategies and policies and often just for plain reporting. Today most of these tools are integrated with Business Intelligence tools.\r\n<span style=\"font-weight: bold; \">What are the advantages of these tools for your organization?</span>\r\nReporting tools allow companies to create attractive reports easily. In tabular or graphical format. With data from Excel, a data warehouse or the organization’s ERP system. With the reports containing the right information, people are able to manage and improve the business processes more easily.\r\n<span style=\"font-weight: bold; \">Which reporting tools are available in the market?</span>\r\nThere are many Business Intelligence Reporting tools in the market available. This list of reporting tools shows you a complete overview of all the major tools currently available and thoroughly studied by our industry analysts. To name a few: Cognos Query and reporting, Oracle Enterprise Reporting, Crystal Reports, Microsoft Reporting Services (SSRS), etc.\r\n<span style=\"font-weight: bold; \">Is there a difference between reporting tools and BI tools?</span>\r\nAlmost every company, large or small, needs a reporting tool or they have already one in place. But, what is the difference between reporting software and Business Intelligence tools? They are not the same. In general reporting tools tell us where we have been but are not very good at analyzing data (at real time) and telling us where we are going (predictive).\r\n<span style=\"font-weight: bold;\">What is the difference between a query and a report?</span>\r\nA query is a way to create a list of accounts or journal entries that match your criteria. Requests serve as an advanced search engine that finds and groups accounts or journal entries and can only create a list.\r\nA report is a detailed report of a group of accounts or journal entries. Reports analyze data and are designed to calculate and present data in a more formal form.\r\nTypically, a query finds information in the database for you, and a report is a more powerful way to display and analyze information about the accounts or log entries you want to view.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/End-User_Query__Reporting__and_Analysis.png"},{"id":325,"title":"Performance Management Software","alias":"performance-management-software","description":" <span style=\"font-weight: bold; \">Performance management software </span>— also referred to as a <span style=\"font-weight: bold; \">performance management system</span>— helps a company track, analyze, and evaluate its employees’ performance. is designed to improve business performance by spurring employee productivity. It works to ensure individual employees and teams are engaged and in alignment with organizational goals. Employee review software replaces an annual performance review process with real-time performance tracking, goal setting and feedback.\r\nPerformance management software systems are overseen by the HR department. They fit under the umbrella of <span style=\"font-style: italic; \">talent management systems.</span>\r\nAs next-generation HR software, performance management tools help companies address the modern goals of continually monitoring performance while giving employees feedback and support. Performance review software can track individual contributions to a team, as well as that team's ability to meet business objectives, thus tying performance into the company's bottom line.\r\nImproving employee engagement is another goal of performance management software. An employee can see current individual performance goals and their progress toward meeting them. This includes tracking efforts on specific projects. Managers measure individual performance against goals, and employees get a better idea of where they stand.\r\nThese systems use dashboards for quick and collaborative reviews. They can report individual performance, as well as project and team performance. The systems may also include employee ranking.\r\nAn effective performance management program must interact with other tools - in particular, workforce analytics. Data can be analyzed, for instance, against reporting from financial management systems and sales performance management systems.","materialsDescription":"<h1 class=\"align-center\">Why Implement Performance Management Software?</h1>\r\n<ul><li><span style=\"font-weight: bold; \">Easily-Navigable Dashboard </span></li></ul>\r\nThe top advantage to performance management tools are their ability to bring all key data and performance into one, organized location. Award-winning business performance management software do that. They make it easy to navigate the data and information and help leaders make better decisions for their workforce. \r\n<ul><li><span style=\"font-weight: bold; \">Performance Review Cycles </span></li></ul>\r\nTraditional annual review cycle or not, performance management system software can help coordinate, organize, schedule and store review information. The software will send reminders to leaders, manage permissions as leadership changes and provide structure to the overall process, including scripts based on company values and the employee’s role.\r\n<ul><li><span style=\"font-weight: bold; \">360 Degree and Peer Reviews </span></li></ul>\r\nPerformance and talent management tool can help ensure the process goes smoothly by providing structured and anonymous assessments. In some cases, there might be more than a few people involved in the performance review of one employee, so the software can track the progress of feedback to ensure each manager or leader has provided necessary input in a timely manner.\r\n<ul><li><span style=\"font-weight: bold; \">Customizable Review and Assessment Scripts </span></li></ul>\r\nIt is best practice to base performance on the unique values and goals of your organization, which means the annual review script should be different for a manager than it is for an executive, and nothing like the script of another organization. \r\n<ul><li><span style=\"font-weight: bold; \">Goal and Performance Tracking </span></li></ul>\r\nContinuous performance and goal tracking allows leadership to see the progress of projects clearly while keeping in mind which employees are hitting the mark and which need guidance. And because automated performance management system available to the employee as well, everyone will be on the same page and aligned to the work being done, even between departments in real-time.\r\n<ul><li><span style=\"font-weight: bold; \">Development & Succession Planning </span></li></ul>\r\nEmployees need continuous support in order to become effective contributors to the organization, especially in the long run. With performance management tools, you can track development progress, assign long term goals and ensure you understand the direction of talent and the business as a whole.\r\n\r\n","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Performance_Management_Software.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":5736,"logoURL":"https://old.roi4cio.com/fileadmin/content/DCU_2.0_-_2.png","logo":true,"scheme":false,"title":"Data Capture Unit (DCU)","vendorVerified":0,"rating":"0.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":1,"alias":"data-capture-unit-dcu","companyTitle":"Siemens","companyTypes":["vendor"],"companyId":2795,"companyAlias":"siemens","description":"<p class=\"MsoNormal\" style=\"margin-left: 42.55pt;\"><span style=\"mso-ansi-language: EN-US;\">Industrial data diode designed to deliver the highest level of security to OT networks like industrial control systems (ICS) and safety critical infrastructure via physical isolation when there’s a need to connect them to a lower security network (IT Networks or Internet) for replication or analytics. </span></p>\r\n<p class=\"MsoNormal\" style=\"margin-left: 42.55pt;\"><span style=\"mso-ansi-language: EN-US;\"> </span></p>\r\n<p class=\"MsoNormal\" style=\"margin-left: 42.55pt;\"><span style=\"mso-ansi-language: EN-US;\">The DCU is designed and manufactured in Germany, its chip design forces data to flow one-way only using a unique electromagnetic induction design, to collect data and guarantee that there’s no physical path for remote access to the OT Network.</span></p>\r\n<p class=\"MsoNormal\" style=\"margin-left: 42.55pt;\"><span style=\"mso-ansi-language: EN-US;\"> </span></p>\r\n<p class=\"MsoNormal\" style=\"margin-left: 42.55pt;\"><span style=\"mso-ansi-language: EN-US;\">The DCU has a software complement called, OWG (One-way gateway) software, its two agents, a OWG sender capable of data collection of several protocols (FTP, OPC UA, Syslog), filtering and aggregating data in the OT network (Edge) to then push it thru the DCU and a OWG receiver, which receives data from the DCU and can be configured to send it directly to the cloud (AWS or MindSphere) or to another computer in the IT network.</span></p>\r\n<p class=\"MsoNormal\" style=\"margin-left: 42.55pt;\"><span style=\"mso-ansi-language: EN-US;\"> </span></p>\r\n<p class=\"MsoNormal\" style=\"margin-left: 42.55pt;\"><span style=\"mso-ansi-language: EN-US;\">The DCU and OWG are vendor neutral and support Windows or Linux systems.</span></p>","shortDescription":"The DCU enables secure data transfer to IT networks or cloud without compromising the security of OT networks like industrial control systems (ICS) and critical infrastructure.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":5,"sellingCount":5,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Data Capture Unit (DCU)","keywords":"","description":"<p class=\"MsoNormal\" style=\"margin-left: 42.55pt;\"><span style=\"mso-ansi-language: EN-US;\">Industrial data diode designed to deliver the highest level of security to OT networks like industrial control systems (ICS) and safety critical infrastructure via physi","og:title":"Data Capture Unit (DCU)","og:description":"<p class=\"MsoNormal\" style=\"margin-left: 42.55pt;\"><span style=\"mso-ansi-language: EN-US;\">Industrial data diode designed to deliver the highest level of security to OT networks like industrial control systems (ICS) and safety critical infrastructure via physi","og:image":"https://old.roi4cio.com/fileadmin/content/DCU_2.0_-_2.png"},"eventUrl":"","translationId":5736,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":471,"title":"Hardware","alias":"hardware","description":" Computer hardware includes the physical, tangible parts or components of a computer, such as the cabinet, central processing unit, monitor, keyboard, computer data storage, graphics card, sound card, speakers and motherboard. By contrast, software is instructions that can be stored and run by hardware. Hardware is so-termed because it is "hard" or rigid with respect to changes or modifications; whereas software is "soft" because it is easy to update or change. Intermediate between software and hardware is "firmware", which is software that is strongly coupled to the particular hardware of a computer system and thus the most difficult to change but also among the most stable with respect to consistency of interface. The progression from levels of "hardness" to "softness" in computer systems parallels a progression of layers of abstraction in computing.\r\nHardware is typically directed by the software to execute any command or instruction. A combination of hardware and software forms a usable computing system, although other systems exist with only hardware components.\r\nThe template for all modern computers is the Von Neumann architecture, detailed in a 1945 paper by Hungarian mathematician John von Neumann. This describes a design architecture for an electronic digital computer with subdivisions of a processing unit consisting of an arithmetic logic unit and processor registers, a control unit containing an instruction register and program counter, a memory to store both data and instructions, external mass storage, and input and output mechanisms. The meaning of the term has evolved to mean a stored-program computer in which an instruction fetch and a data operation cannot occur at the same time because they share a common bus. This is referred to as the Von Neumann bottleneck and often limits the performance of the system.","materialsDescription":" <span style=\"font-weight: bold; \">What does Hardware (H/W) mean?</span>\r\nHardware (H/W), in the context of technology, refers to the physical elements that make up a computer or electronic system and everything else involved that is physically tangible. This includes the monitor, hard drive, memory and CPU. Hardware works hand-in-hand with firmware and software to make a computer function.\r\n<span style=\"font-weight: bold; \">What are the types of computer systems?</span>\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Personal computer</span></span>\r\nThe personal computer, also known as the PC, is one of the most common types of computer due to its versatility and relatively low price. Laptops are generally very similar, although they may use lower-power or reduced size components, thus lower performance.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Case</span></span>\r\nThe computer case encloses and holds most of the components of the system. It provides mechanical support and protection for internal elements such as the motherboard, disk drives, and power supplies, and controls and directs the flow of cooling air over internal components. The case is also part of the system to control electromagnetic interference radiated by the computer, and protects internal parts from electrostatic discharge. Large tower cases provide extra internal space for multiple disk drives or other peripherals and usually stand on the floor, while desktop cases provide less expansion room. All-in-one style designs include a video display built into the same case. Portable and laptop computers require cases that provide impact protection for the unit. A current development in laptop computers is a detachable keyboard, which allows the system to be configured as a touch-screen tablet. Hobbyists may decorate the cases with colored lights, paint, or other features, in an activity called case modding.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Power supply</span></span>\r\nA power supply unit (PSU) converts alternating current (AC) electric power to low-voltage direct current (DC) power for the internal components of the computer. Laptops are capable of running from a built-in battery, normally for a period of hours. The PSU typically uses a switched-mode power supply (SMPS), with power MOSFETs (power metal–oxide–semiconductor field-effect transistors) used in the converters and regulator circuits of the SMPS.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Motherboard</span></span>\r\nThe motherboard is the main component of a computer. It is a board with integrated circuitry that connects the other parts of the computer including the CPU, the RAM, the disk drives (CD, DVD, hard disk, or any others) as well as any peripherals connected via the ports or the expansion slots. The integrated circuit (IC) chips in a computer typically contain billions of tiny metal–oxide–semiconductor field-effect transistors (MOSFETs).\r\nComponents directly attached to or to part of the motherboard include:\r\n<ul><li><span style=\"font-weight: bold; \">The CPU (central processing unit)</span>, which performs most of the calculations which enable a computer to function, and is referred to as the brain of the computer which get a hold of program instruction from random-access memory (RAM), interprets and processes it and then send it backs to computer result so that the relevant components can carry out the instructions. The CPU is a microprocessor, which is fabricated on a metal–oxide–semiconductor (MOS) integrated circuit (IC) chip. It is usually cooled by a heat sink and fan, or water-cooling system. Most newer CPU include an on-die graphics processing unit (GPU). The clock speed of CPU governs how fast it executes instructions, and is measured in GHz; typical values lie between 1 GHz and 5 GHz. Many modern computers have the option to overclock the CPU which enhances performance at the expense of greater thermal output and thus a need for improved cooling.</li><li><span style=\"font-weight: bold; \">The chipset</span>, which includes the north bridge, mediates communication between the CPU and the other components of the system, including main memory; as well as south bridge, which is connected to the north bridge, and supports auxiliary interfaces and buses; and, finally, a Super I/O chip, connected through the south bridge, which supports the slowest and most legacy components like serial ports, hardware monitoring and fan control.</li><li><span style=\"font-weight: bold; \">Random-access memory (RAM)</span>, which stores the code and data that are being actively accessed by the CPU. For example, when a web browser is opened on the computer it takes up memory; this is stored in the RAM until the web browser is closed. It is typically a type of dynamic RAM (DRAM), such as synchronous DRAM (SDRAM), where MOS memory chips store data on memory cells consisting of MOSFETs and MOS capacitors. RAM usually comes on dual in-line memory modules (DIMMs) in the sizes of 2GB, 4GB, and 8GB, but can be much larger.</li><li><span style=\"font-weight: bold; \">Read-only memory (ROM)</span>, which stores the BIOS that runs when the computer is powered on or otherwise begins execution, a process known as Bootstrapping, or "booting" or "booting up". The ROM is typically a nonvolatile BIOS memory chip, which stores data on floating-gate MOSFET memory cells.</li><li><span style=\"font-weight: bold; \">The BIOS (Basic Input Output System)</span> includes boot firmware and power management firmware. Newer motherboards use Unified Extensible Firmware Interface (UEFI) instead of BIOS.</li><li><span style=\"font-weight: bold; \">Buses</span> that connect the CPU to various internal components and to expand cards for graphics and sound.</li><li><span style=\"font-weight: bold; \">The CMOS</span> (complementary MOS) battery, which powers the CMOS memory for date and time in the BIOS chip. This battery is generally a watch battery.</li><li><span style=\"font-weight: bold; \">The video card</span> (also known as the graphics card), which processes computer graphics. More powerful graphics cards are better suited to handle strenuous tasks, such as playing intensive video games or running computer graphics software. A video card contains a graphics processing unit (GPU) and video memory (typically a type of SDRAM), both fabricated on MOS integrated circuit (MOS IC) chips.</li><li><span style=\"font-weight: bold; \">Power MOSFETs</span> make up the voltage regulator module (VRM), which controls how much voltage other hardware components receive.</li></ul>\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Expansion cards</span></span>\r\nAn expansion card in computing is a printed circuit board that can be inserted into an expansion slot of a computer motherboard or backplane to add functionality to a computer system via the expansion bus. Expansion cards can be used to obtain or expand on features not offered by the motherboard.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Storage devices</span></span>\r\nA storage device is any computing hardware and digital media that is used for storing, porting and extracting data files and objects. It can hold and store information both temporarily and permanently, and can be internal or external to a computer, server or any similar computing device. Data storage is a core function and fundamental component of computers.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Fixed media</span></span>\r\nData is stored by a computer using a variety of media. Hard disk drives (HDDs) are found in virtually all older computers, due to their high capacity and low cost, but solid-state drives (SSDs) are faster and more power efficient, although currently more expensive than hard drives in terms of dollar per gigabyte, so are often found in personal computers built post-2007. SSDs use flash memory, which stores data on MOS memory chips consisting of floating-gate MOSFET memory cells. Some systems may use a disk array controller for greater performance or reliability.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Removable media</span></span>\r\nTo transfer data between computers, an external flash memory device (such as a memory card or USB flash drive) or optical disc (such as a CD-ROM, DVD-ROM or BD-ROM) may be used. Their usefulness depends on being readable by other systems; the majority of machines have an optical disk drive (ODD), and virtually all have at least one Universal Serial Bus (USB) port.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Input and output peripherals</span></span>\r\nInput and output devices are typically housed externally to the main computer chassis. The following are either standard or very common to many computer systems.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Input</span></span>\r\nInput devices allow the user to enter information into the system, or control its operation. Most personal computers have a mouse and keyboard, but laptop systems typically use a touchpad instead of a mouse. Other input devices include webcams, microphones, joysticks, and image scanners.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Output device</span></span>\r\nOutput devices display information in a human readable form. Such devices could include printers, speakers, monitors or a Braille embosser.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Mainframe computer</span></span>\r\nA mainframe computer is a much larger computer that typically fills a room and may cost many hundreds or thousands of times as much as a personal computer. They are designed to perform large numbers of calculations for governments and large enterprises.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Departmental computing</span></span>\r\nIn the 1960s and 1970s, more and more departments started to use cheaper and dedicated systems for specific purposes like process control and laboratory automation.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Supercomputer</span></span>\r\nA supercomputer is superficially similar to a mainframe, but is instead intended for extremely demanding computational tasks. As of June 2018, the fastest supercomputer on the TOP500supercomputer list is the Summit, in the United States, with a LINPACK benchmarkscore of 122.3 PFLOPS Light, by around 29 PFLOPS.\r\nThe term supercomputer does not refer to a specific technology. Rather it indicates the fastest computations available at any given time. In mid 2011, the fastest supercomputers boasted speeds exceeding one petaflop, or 1 quadrillion (10^15 or 1,000 trillion) floating point operations per second. Supercomputers are fast but extremely costly, so they are generally used by large organizations to execute computationally demanding tasks involving large data sets. Supercomputers typically run military and scientific applications. Although costly, they are also being used for commercial applications where huge amounts of data must be analyzed. For example, large banks employ supercomputers to calculate the risks and returns of various investment strategies, and healthcare organizations use them to analyze giant databases of patient data to determine optimal treatments for various diseases and problems incurring to the country. ","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Hardware.jpg"},{"id":461,"title":"Data Diode","alias":"data-diode","description":"A unidirectional network (also referred to as a unidirectional gateway or data diode) is a network appliance or device that allows data to travel in only one direction. Data diodes can be found most commonly in high-security environments, such as defense, where they serve as connections between two or more networks of differing security classifications. Given the rise of Industrial IoT and Digitization, this technology can now be found at the industrial control level for such facilities as nuclear power plants, power generation and safety-critical systems like railway networks.<br />After years of development, the use of data diodes has increased, creating two variations:\r\n<ul><li>Data Diode: more often used to refer to the simple hardware version that physically enforces data to flow in only one direction.</li><li>Unidirectional Gateway: Used to describe a more sophisticated device that typically has a computer on both its critical and open side. Unidirectional gateways are a combination of hardware and software. The hardware (data diode) permits data to flow from one network to another but is physically unable to send any information at all back into the source network. The software replicates databases and emulates protocol servers and devices, enabling compatibility with existing network protocols, allowing organizations to gain their benefits without changes to their existing systems.</li></ul>\r\nOnce only commonly found in high-security military environments, unidirectional gateways are now becoming widely spread in sectors like Oil & Gas, water/wastewater, airplanes (between flight control units and in-flight entertainment systems), manufacturing and cloud connectivity for Industrial IoT primarily as a result of new regulations, increased demand and big industrial powerhouses. These industries/sectors and betting on this technology, which has had the effect of lowering the technology's core cost.","materialsDescription":"<span style=\"font-weight: bold;\">What Is Data Diode Technology & How Does It Work?</span>\r\nToday's business environment is increasingly digital and more vulnerable than ever to a cyber attack. Because of this, various network security technologies have been developed to protect organizational data and infrastructures. One of the most effective of these modern technologies is the data diode. Although it is one of the most effective network security tools available, you may not have heard of this technology and know little of what it does. Below, you'll find a description of what data diode technology is and how it works.\r\n<span style=\"font-weight: bold;\">What Is Data Diode Technology?</span>\r\nA data diode is a communication device that enables the safe, one-way transfer of data between segmented networks. Intelligent data diode design maintains physical and electrical separation of source and destination networks, establishing a non-routable, completely closed one-way data transfer protocol between networks. Intelligent data diodes effectively eliminate external points of entry to the sending system, preventing intruders and contagious elements from infiltrating the network. Securing all of a network’s data outflow with data diodes makes it impossible for an insecure or hostile network to pass along malware, access your system, or accidentally make harmful changes.\r\nData diodes allow companies to send process data in real time to information management systems for use in financial, customer service, and management decisions — without compromising the security of your network. This protects valuable information and network infrastructure from theft, destruction, tampering, and human error, mitigating the potential loss of thousands of dollars and countless hours of work.\r\n<span style=\"font-weight: bold;\">How Does Data Diode Technology Work?</span>\r\nA "diode" is an electronic component that only allows current to flow in one direction. Similarly, data diode technology lets information flow safely in only one direction, from secure areas to less secure systems, without permitting reverse access. A data diode also creates a physical barrier or “air gap” between the two points. This one-way connection prevents data leakage, eliminates the threat of malware, and fully protects the process control network. Moreover, a single data diode can handle data transfers from multiple servers or devices simultaneously, without bottlenecking.\r\n<span style=\"font-weight: bold;\">Where is it used?</span>\r\nIt’s typically used to guarantee information security or protection of critical digital systems, such as industrial control systems, from cyber attacks. While the use of these devices is common in high-security environments such as defense, where they serve as connections between two or more networks of differing security classifications, the technology is also being used to enforce one-way communications outbound from critical digital systems to untrusted networks connected to the Internet.\r\nThe physical nature of unidirectional networks only allows data to pass from one side of a network connection to another, and not the other way around. This can be from the "low side" or untrusted network to the "high side" or trusted network or vice versa. In the first case, data in the high side network is kept confidential and users retain access to data from the low side. Such functionality can be attractive if sensitive data is stored on a network which requires connectivity with the Internet: the high side can receive Internet data from the low side, but no data on the high side is accessible to Internet-based intrusion. In the second case, a safety-critical physical system can be made accessible for online monitoring, yet be insulated from all Internet-based attacks that might seek to cause physical damage. In both cases, the connection remains unidirectional even if both the low and the high network are compromised, as the security guarantees are physical in nature.\r\nThere are two general models for using unidirectional network connections. In the classical model, the purpose of the data diode is to prevent the export of classified data from a secure machine while allowing the import of data from an insecure machine. In the alternative model, the diode is used to allow export of data from a protected machine while preventing attacks on that machine.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Data_Diode.png"},{"id":532,"title":"Software","alias":"software","description":" Computer software, or simply software, is a collection of data or computer instructions that tell the computer how to work. This is in contrast to physical hardware, from which the system is built and actually performs the work. In computer science and software engineering, computer software is all information processed by computer systems, programs, and data. Computer software includes computer programs, libraries and related non-executable data, such as online documentation or digital media. Computer hardware and software require each other and neither can be realistically used on its own.\r\nAt the lowest programming level, executable code consists of machine language instructions supported by an individual processor — typically a central processing unit (CPU) or a graphics processing unit (GPU). A machine language consists of groups of binary values signifying processor instructions that change the state of the computer from its preceding state. For example, an instruction may change the value stored in a particular storage location in the computer—an effect that is not directly observable to the user. An instruction may also invoke one of many input or output operations, for example displaying some text on a computer screen; causing state changes that should be visible to the user. The processor executes the instructions in the order they are provided, unless it is instructed to "jump" to a different instruction, or is interrupted by the operating system. As of 2015, most personal computers, smartphone devices, and servers have processors with multiple execution units or multiple processors performing computation together, and computing has become a much more concurrent activity than in the past.\r\nThe majority of software is written in high-level programming languages. They are easier and more efficient for programmers because they are closer to natural languages than machine languages. High-level languages are translated into machine language using a compiler or an interpreter or a combination of the two. Software may also be written in a low-level assembly language, which has strong correspondence to the computer's machine language instructions and is translated into machine language using an assembler.","materialsDescription":" <span style=\"font-weight: bold; \">What is software?</span>\r\nSometimes abbreviated as SW and S/W, software is a collection of instructions that enable the user to interact with a computer, its hardware, or perform tasks. Without software, most computers would be useless. For example, without your Internet browser software, you could not surf the Internet or read this page. Without an operating system, the browser could not run on your computer. The picture shows a Microsoft Excel box, an example of a spreadsheet software program.\r\n<span style=\"font-weight: bold; \">How do you get software?</span>\r\nSoftware can be purchased at a retail computer store or online and come in a box containing all the disks (floppy diskette, CD, DVD, or Blu-ray), manuals, warranty, and other documentation.\r\nSoftware can also be downloaded to a computer over the Internet. Once downloaded, setup files are run to start the installation process on your computer.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Free software</span></span>\r\nThere are also a lot of free software programs available that are separated into different categories.\r\n<ul><li>Shareware or trial software is software that gives you a few days to try the software before you have to buy the program. After the trial time expires, you'll be asked to enter a code or register the product before you can continue to use it.</li><li>Freeware is completely free software that never requires payment, as long as it is not modified.</li><li>Open-source software is similar to freeware. Not only is the program given away free, but the source code used to make the program is also, allowing anyone to modify the program or view how it was created.</li></ul>\r\n<span style=\"font-weight: bold; \">How do you use computer software?</span>\r\nOnce the software is installed on the computer hard drive, the program can be used anytime by finding the program on the computer. On a Windows computer, a program icon is added to the Start menu or Start screen, depending on your version of Windows.\r\n<span style=\"font-weight: bold;\">How to maintain software?</span>\r\nAfter the software is installed on your computer, it may need to be updated to fix any found errors. Updating a program can be done using software patches. Once updates are installed, any problems that may have been experienced in the program will no longer occur.\r\n<span style=\"font-weight: bold;\">How is software created and how does it work?</span>\r\nA computer programmer (or several computer programmers) writes the instructions using a programming language, defining how the software should operate on structured data. The program may then be interpreted or compiled into machine code.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Software.png"},{"id":223,"title":"Data Access, Analysis, and Delivery Software","alias":"data-access-analysis-and-delivery-software","description":" Data access, analysis and delivery software are end-user oriented tools for ad hoc data access, analysis and reporting as well as production reporting. These products are most commonly used by information consumers or power users rather than professional programmers.\r\nThe processing and analysis of group data is a flexible, iterative method for processing and analyzing data to efficiently provide predictive analytics solutions and intelligent applications. This allows you to improve learning and teamwork. It contains selected recommendations and structures from Microsoft and other developers in the industry that ensure the successful implementation of data processing and analysis solutions. All this is to help companies take full advantage of their analytics software.","materialsDescription":"<span style=\"font-weight: bold; \">Data access</span>\r\nData access is a generic term referring to a process which has both an IT-specific meaning and other connotations involving access rights in a broader legal and/or political sense. In the former it typically refers to software and activities related to storing, retrieving, or acting on data housed in a database or other repository. Two fundamental types of data access exist:\r\n<ol><li>sequential access (as in magnetic tape, for example)</li><li>random access (as in indexed media)</li></ol>\r\nData access crucially involves authorization to access different data repositories. Data access can help distinguish the abilities of administrators and users. For example, administrators may have the ability to remove, edit and add data, while general users may not even have "read" rights if they lack access to particular information.\r\nHistorically, each repository (including each different database, file system, etc.), might require the use of different methods and languages, and many of these repositories stored their content in different and incompatible formats.\r\nOver the years standardized languages, methods, and formats, have developed to serve as interfaces between the often proprietary, and always idiosyncratic, specific languages and methods. Such standards include SQL (1974- ), ODBC (ca 1990- ), JDBC, XQJ, ADO.NET, XML, XQuery, XPath (1999- ), and Web Services.\r\nSome of these standards enable translation of data from unstructured (such as HTML or free-text files) to structured (such as XML or SQL).\r\nStructures such as connection strings and DBURLs[1] can attempt to standardise methods of connecting to databases.\r\n<span style=\"font-weight: bold; \">A program for data analysis</span>\r\nA data analysis program is a specially developed software that can analyze any information. This is usually a database program. It is within the database that you can store any information in any amount. A functional program allows incoming and stored data to analyze. Software development can be done for any tasks, which means that the program for data analysis can be customized for any activity. If, for example, you have a trade organization, then your data analysis program will analyze products, customers, funds, product balance, and more.\r\n<span style=\"font-weight: bold;\">On-demand software delivery</span>\r\nA type of software delivery service where the software is provided to the customer through a network (such as the Internet) as a service. On-demand software delivery is also called software on-demand. The terms on-demand software and Software as a Service (SaaS) are often used interchangeably.\r\nData access, analysis and delivery software are end-user oriented tools for ad hoc data access, analysis and reporting as well as production reporting. These products are most commonly used by information consumers or power users rather than professional programmers.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/Data_Access__Analysis__and_Delivery_Software1.png"},{"id":59,"title":"SCADA - Supervisory Control And Data Acquisition","alias":"scada-supervisory-control-and-data-acquisition","description":"<span style=\"font-weight: bold; \">SCADA</span> stands for <span style=\"font-weight: bold; \">Supervisory Control and Data Acquisition</span>, a term which describes the basic functions of a SCADA system. Companies use SCADA systems to control equipment across their sites and to collect and record data about their operations. SCADA is not a specific technology, but a type of application. Any application that gets operating data about a system in order to control and optimise that system is a SCADA application. That application may be a petrochemical distillation process, a water filtration system, a pipeline compressor, or just about anything else.\r\nSCADA solutions typically come in a combination of software and hardware elements, such as programmable logic controllers (PLCs) and remote terminal units (RTUs). Data acquisition in SCADA starts with PLCs and RTUs, which communicate with plant floor equipment such as factory machinery and sensors. Data gathered from the equipment is then sent to the next level, such as a control room, where operators can supervise the PLC and RTU controls using human-machine interfaces (HMIs). HMIs are an important element of SCADA systems. They are the screens that operators use to communicate with the SCADA system.\r\n<p class=\"align-center\"><span style=\"font-weight: bold; \">The major components of a SCADA technology include:</span></p>\r\n<ul><li><span style=\"font-weight: bold;\">Master Terminal Unit (MTU).</span> It comprises a computer, PLC and a network server that helps MTU to communicate with the RTUs. MTU begins communication, collects and saves data, helps to interface with operators and to communicate data to other systems.</li><li><span style=\"font-weight: bold;\">Remote Terminal Unit (RTU).</span> RTU is used to collect information from these sensors and further sends the data to MTU. RTUs have the storage capacity facility. So, it stores the data and transmits the data when MTU sends the corresponding command.</li><li><span style=\"font-weight: bold;\">Communication Network (defined by its network topology).</span> In general, network means connection. When you tell a SCADA communication network, it is defined as a link between RTU in the field to MTU in the central location. The bidirectional wired or wireless communication channel is used for the networking purpose. Various other communication mediums like fiber optic cables, twisted pair cables, etc. are also used.</li></ul>\r\n<p class=\"align-center\"><span style=\"font-weight: bold; \">Objectives of Supervisory Control and Data Acquisition system</span></p>\r\n<ul><li><span style=\"font-weight: bold;\">Monitor:</span> SCADA control system continuously monitors the physical parameters</li><li><span style=\"font-weight: bold;\">Measure:</span> It measures the parameter for processing</li><li><span style=\"font-weight: bold;\">Data Acquisition:</span> It acquires data from RTU, data loggers, etc</li><li><span style=\"font-weight: bold;\">Data Communication:</span> It helps to communicate and transmit a large amount of data between MTU and RTU units</li><li><span style=\"font-weight: bold;\">Controlling:</span> Online real-time monitoring and controlling of the process</li><li><span style=\"font-weight: bold;\">Automation:</span> It helps for automatic transmission and functionality</li></ul>\r\n\r\n","materialsDescription":"<h1 class=\"align-center\">Who Uses SCADA?</h1>\r\nSCADA systems are used by industrial organizations and companies in the public and private sectors to control and maintain efficiency, distribute data for smarter decisions, and communicate system issues to help mitigate downtime. Supervisory control systems work well in many different types of enterprises because they can range from simple configurations to large, complex installations. They are the backbone of many modern industries, including:\r\n<ul><li>Energy</li><li>Food and beverage</li><li>Manufacturing</li><li>Oil and gas</li><li>Power</li><li>Recycling</li><li>Transportation</li><li>Water and waste water</li><li>And many more</li></ul>\r\nVirtually anywhere you look in today's world, there is some type of SCADA monitoring system running behind the scenes: maintaining the refrigeration systems at the local supermarket, ensuring production and safety at a refinery, achieving quality standards at a waste water treatment plant, or even tracking your energy use at home, to give a few examples. Effective SCADA systems can result in significant savings of time and money. Numerous case studies have been published highlighting the benefits and savings of using a modern SCADA software.\r\n<h1 class=\"align-center\">Benefits of using SCADA software</h1>\r\nUsing modern SCADA software provides numerous benefits to businesses, and helps companies make the most of those benefits. Some of these advantages include:\r\n<span style=\"font-weight: bold; \">Easier engineering:</span> An advanced supervisory control application such provides easy-to-locate tools, wizards, graphic templates and other pre-configured elements, so engineers can create automation projects and set parameters quickly, even if they don't have programming experience. In addition, you can also easily maintain and expand existing applications as needed. The ability to automate the engineering process allows users, particularly system integrators and original equipment manufacturers (OEM), to set up complex projects much more efficiently and accurately.\r\n<span style=\"font-weight: bold; \">Improved data management:</span> A high-quality SCADA system makes it easier to collect, manage, access and analyze your operational data. It can enable automatic data recording and provide a central location for data storage. Additionally, it can transfer data to other systems such as MES and ERP as needed. \r\n<span style=\"font-weight: bold; \">Greater visibility:</span> One of the main advantages of using SCADA software is the improvement in visibility into your operations. It provides you with real-time information about your operations and enables you to conveniently view that information via an HMI. SCADA monitoring can also help in generating reports and analyzing data.\r\n<span style=\"font-weight: bold; \">Enhanced efficiency:</span> A SCADA system allows you to streamline processes through automated actions and user-friendly tools. The data that SCADA provides allows you to uncover opportunities for improving the efficiency of the operations, which can be used to make long-term changes to processes or even respond to real-time changes in conditions.\r\n<span style=\"font-weight: bold; \">Increased usability:</span> SCADA systems enable workers to control equipment more quickly, easily and safely through an HMI. Rather than having to control each piece of machinery manually, workers can manage them remotely and often control many pieces of equipment from a single location. Managers, even those who are not currently on the floor, also gain this capability.\r\n<span style=\"font-weight: bold; \">Reduced downtime:</span> A SCADA system can detect faults at an early stage and push instant alerts to the responsible personnel. Powered by predictive analytics, a SCADA system can also inform you of a potential issue of the machinery before it fails and causes larger problems. These features can help improve the overall equipment effectiveness (OEE) and reduce the amount of time and cost on troubleshooting and maintenance.\r\n<span style=\"font-weight: bold;\">Easy integration:</span> Connectivity to existing machine environments is key to removing data silos and maximizing productivity. \r\n<span style=\"font-weight: bold;\">Unified platform:</span>All of your data is also available in one platform, which helps you to get a clear overview of your operations and take full advantage of your data. All users also get real-time updates locally or remotely, ensuring everyone on your team is on the same page.<br /><br />","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/SCADA__-_Supervisory_Control_And_Data_Acquisition.png"},{"id":840,"title":"ICS/SCADA Cyber Security","alias":"icsscada-cyber-security","description":"SCADA security is the practice of protecting supervisory control and data acquisition (SCADA) networks, a common framework of control systems used in industrial operations. These networks are responsible for providing automated control and remote human management of essential commodities and services such as water, natural gas, electricity and transportation to millions of people. They can also be used to improve the efficiencies and quality in other less essential (but some would say very important!) real-world processes such as snowmaking for ski resorts and beer brewing. SCADA is one of the most common types of industrial control systems (ICS).\r\nThese networks, just like any other network, are under threat from cyber-attacks that could bring down any part of the nation's critical infrastructure quickly and with dire consequences if the right security is not in place. Capital expenditure is another key concern; SCADA systems can cost an organization from tens of thousands to millions of dollars. For these reasons, it is essential that organizations implement robust SCADA security measures to protect their infrastructure and the millions of people that would be affected by the disruption caused by an external attack or internal error.\r\nSCADA security has evolved dramatically in recent years. Before computers, the only way to monitor a SCADA network was to deploy several people to each station to report back on the state of each system. In busier stations, technicians were stationed permanently to manually operate the network and communicate over telephone wires.\r\nIt wasn't until the introduction of the local area network (LAN) and improvements in system miniaturization that we started to see advances in SCADA development such as the distributed SCADA network. Next came networked systems that were able to communicate over a wide area network (WAN) and connect many more components together.\r\nFrom local companies to federal governments, every business or organization that works with SCADA systems are vulnerable to SCADA security threats. These threats can have wide-reaching effects on both the economy and the community. Specific threats to SCADA networks include the following:\r\n<span style=\"font-weight: bold;\">Hackers.</span> Individuals or groups with malicious intent could bring a SCADA network to its knees. By gaining access to key SCADA components, hackers could unleash chaos on an organization that can range from a disruption in services to cyber warfare.\r\n<span style=\"font-weight: bold;\">Malware.</span> Malware, including viruses, spyware and ransomware can pose a risk to SCADA systems. While malware may not be able to specifically target the network itself, it can still pose a threat to the key infrastructure that helps to manage the SCADA network. This includes mobile SCADA applications that are used to monitor and manage SCADA systems.\r\n<span style=\"font-weight: bold;\">Terrorists.</span> Where hackers are usually motivated by sordid gain, terrorists are driven by the desire to cause as much mayhem and damage as possible.\r\n<span style=\"font-weight: bold;\">Employees.</span> Insider threats can be just as damaging as external threats. From human error to a disgruntled employee or contractor, it is essential that SCADA security addresses these risks.\r\nManaging today's SCADA networks can be a challenge without the right security precautions in place. Many networks are still without the necessary detection and monitoring systems and this leaves them vulnerable to attack. Because SCADA network attacks exploit both cyber and physical vulnerabilities, it is critical to align cybersecurity measures accordingly.","materialsDescription":"<span style=\"font-weight: bold;\">What is the difference between ICS/SCADA cybersecurity and information security?</span>\r\nAutomated process control systems (SCADA) have a lot of differences from “traditional” corporate information systems: from the destination, specific data transfer protocols and equipment used and ending with the environment in which they operate. In corporate networks and systems, as a rule, the main protected resource is information that is processed, transmitted and stored in automated systems, and the main goal is to ensure its confidentiality. In ICS, the protected resource, first of all, is the technological process itself, and the main goal is to ensure its continuity (accessibility of all nodes) and integrity (including information transmitted between the nodes of the ICS). Moreover, the field of potential risks and threats to ICS, in comparison with corporate systems, expands with risks of potential damage to life and health of personnel and the public, damage to the environment and infrastructure. That is why it is incorrect to talk about “information security” in relation to ICS/SCADA. In English sources, the term “cybersecurity” is used for this, a direct translation of which (cybersecurity) is increasingly found in our market in relation to the protection of process control systems.\r\n<span style=\"font-weight: bold;\">Is it really necessary?</span>\r\nIt is necessary. There are a number of myths about process control systems, for example: “process control systems are completely isolated from the outside world”, “process control systems are too specific for someone to crack”, “process control systems are reliably protected by the developer”, or even “No one will ever try us, hacking us is not interesting. ” All this is no longer true. Many modern distributed process control systems have one or another connection with the corporate network, even if the system owners are unaware of this. Communication with the outside world greatly simplifies the task of the attacker, but does not remain the only possible option. Automated process control software and data transfer protocols are, as a rule, very, very insecure against cyber threats. This is evidenced by numerous articles and reports of experts involved in the study of the protection of industrial control systems and penetration tests. The PHDays III section on hacking automated process control systems impressed even ardent skeptics. Well, and, of course, the argument “they have NOT attacked us, therefore they will not” - can hardly be considered seriously. Everyone has heard about Stuxnet, which dispelled almost all the myths about the safety of ICS at once.\r\n<span style=\"font-weight: bold;\">Who needs this?</span>\r\nWith the phrase ICS/SCADA, most imagine huge plants, automated CNC machines or something similar. However, the application of process control systems is not limited to these objects - in the modern age of automation, process control systems are used everywhere: from large production facilities, the oil and gas industry, transport management to smart home systems. And, by the way, with the protection of the latter, as a rule, everything can be much worse, because the developer silently and imperceptibly shifts responsibility to the shoulders of the user.\r\nOf course, some of the objects with automated process control systems are more interesting for attackers, others less. But, given the ever-growing number of vulnerabilities discovered and published in the ICS, the spread of "exclusive" (written for specific protocols and ICS software) malware, considering your system safe "by default" is unreasonable.\r\n<span style=\"font-weight: bold;\">Are ICS and SCADA the same thing?</span>\r\nNo. SCADA systems (supervisory control and data acquisition, supervisory control and data collection) are part of the control system. Usually, a SCADA system means centralized control and management systems with the participation of a person as a whole system or a complex of industrial control systems. SCADA is the central link between people (human-machine interfaces) and PLC levels (programmable logic controller) or RTU (remote terminal unit).\r\n<span style=\"font-weight: bold;\">What is ICS/SCADA cybersecurity?</span>\r\nIn fact, ICS cybersecurity is a process similar to “information security” in a number of properties, but very different in details. And the devil, as you know, lies in them. ICS/SCADA also has similar information security-related processes: asset inventory, risk analysis and assessment, threat analysis, security management, change management, incident response, continuity, etc. But these processes themselves are different.<br />The cyber security of ICSs has the same basic target qualities - confidentiality, integrity and accessibility, but the significance and point of application for them are completely different. It should be remembered that in ICS/SCADA we, first of all, protect the technological process. Beyond this - from the risks of damage to human health and life and the environment.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_SCADA_Cyber_Security.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":3207,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/NXLog_logo.png","logo":true,"scheme":false,"title":"NXLog Log Collection Solutions","vendorVerified":0,"rating":"0.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"nxlog-log-collection-solutions","companyTitle":"NXLog","companyTypes":["vendor"],"companyId":5102,"companyAlias":"nxlog","description":"We offer superior log collection technology that works on all major operating systems, is compatible with most SIEM and log analytics products, and can handle data sources that other tools cannot cope with giving you more visibility into your systems and operations.\r\n<span style=\"font-weight: bold;\">Log Collection Solutions:</span>\r\n<span style=\"font-weight: bold;\">The NXLog Community Edition</span> is an open source log collection tool available at no cost. It is available for various platforms including Windows and GNU/Linux. The NXLog Community Edition is used by thousands worldwide from small startup companies to large security enterprises and has over 70,000 downloads to date. Its flexibility allows it to be utilized in various setups and can be used both as a log collector agent and as a log server.\r\n<span style=\"font-weight: bold;\">NXLog Enterprise Edition.</span> In addition to the features that our NXLog Community Edition users love such as the flexibility, low memory footprint and high performance, the NXLog Enterprise Edition contains dozens of enhancements and additional features which can be useful in enterprise deployments. These features are enhanced reliability, support for additional log sources such as CheckPoint LEA, NetFlow and SNMP events, agent management and monitoring capabilities, remote Windows EventLog collection, ODBC input and output modules to read/write data into databases (e.g. Microsoft SQL Server) and many more.\r\n<span style=\"font-weight: bold;\">NXLog Manager.</span> Managing and monitoring a large number of log collector agents can be tough, especially if you have a lot of servers in different roles with multiple teams in charge. NXLog Manager can remotely manage and monitor NXLog Enterprise Edition instances using a centralized web-based management console.\r\n<span style=\"font-weight: bold;\">NXLog Extras.</span> We offer a number of add-on products to collect logs from various solution and services such as Salesforce, Box, Okta, Microsoft Exchange, and Microsoft Azure and Office356:\r\n<ul><li><span style=\"font-weight: bold;\">NXLog Office 365</span> is an add-on product to collect logs from Microsoft Azure and Office 365 cloud services.</li><li><span style=\"font-weight: bold;\">NXLog Salesforce</span> is an add-on product to collect logs from the Salesforce cloud service.</li><li><span style=\"font-weight: bold;\">NXLog Exchange</span> is an add-on product to collect audit logs from Microsoft Exchange Server.</li><li><span style=\"font-weight: bold;\">NXLog Box</span> is a cloud-based file sharing and content management service. NXLog Box is an add-on product to collect logs from the Box cloud service.</li><li><span style=\"font-weight: bold;\">NXLog Okta</span> is an add-on product to collect logs from the cloud service Okta.</li></ul>\r\n\r\nNXLog is trusted by thousands of users and organizations across the globe and is used and recommended by MSSPs and IT security professionals. ","shortDescription":"We offer superior log collection technology that works on all major operating systems, is compatible with most SIEM and log analytics products.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":11,"sellingCount":3,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"NXLog Log Collection Solutions","keywords":"","description":"We offer superior log collection technology that works on all major operating systems, is compatible with most SIEM and log analytics products, and can handle data sources that other tools cannot cope with giving you more visibility into your systems and opera","og:title":"NXLog Log Collection Solutions","og:description":"We offer superior log collection technology that works on all major operating systems, is compatible with most SIEM and log analytics products, and can handle data sources that other tools cannot cope with giving you more visibility into your systems and opera","og:image":"https://old.roi4cio.com/fileadmin/user_upload/NXLog_logo.png"},"eventUrl":"","translationId":3208,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":223,"title":"Data Access, Analysis, and Delivery Software","alias":"data-access-analysis-and-delivery-software","description":" Data access, analysis and delivery software are end-user oriented tools for ad hoc data access, analysis and reporting as well as production reporting. These products are most commonly used by information consumers or power users rather than professional programmers.\r\nThe processing and analysis of group data is a flexible, iterative method for processing and analyzing data to efficiently provide predictive analytics solutions and intelligent applications. This allows you to improve learning and teamwork. It contains selected recommendations and structures from Microsoft and other developers in the industry that ensure the successful implementation of data processing and analysis solutions. All this is to help companies take full advantage of their analytics software.","materialsDescription":"<span style=\"font-weight: bold; \">Data access</span>\r\nData access is a generic term referring to a process which has both an IT-specific meaning and other connotations involving access rights in a broader legal and/or political sense. In the former it typically refers to software and activities related to storing, retrieving, or acting on data housed in a database or other repository. Two fundamental types of data access exist:\r\n<ol><li>sequential access (as in magnetic tape, for example)</li><li>random access (as in indexed media)</li></ol>\r\nData access crucially involves authorization to access different data repositories. Data access can help distinguish the abilities of administrators and users. For example, administrators may have the ability to remove, edit and add data, while general users may not even have "read" rights if they lack access to particular information.\r\nHistorically, each repository (including each different database, file system, etc.), might require the use of different methods and languages, and many of these repositories stored their content in different and incompatible formats.\r\nOver the years standardized languages, methods, and formats, have developed to serve as interfaces between the often proprietary, and always idiosyncratic, specific languages and methods. Such standards include SQL (1974- ), ODBC (ca 1990- ), JDBC, XQJ, ADO.NET, XML, XQuery, XPath (1999- ), and Web Services.\r\nSome of these standards enable translation of data from unstructured (such as HTML or free-text files) to structured (such as XML or SQL).\r\nStructures such as connection strings and DBURLs[1] can attempt to standardise methods of connecting to databases.\r\n<span style=\"font-weight: bold; \">A program for data analysis</span>\r\nA data analysis program is a specially developed software that can analyze any information. This is usually a database program. It is within the database that you can store any information in any amount. A functional program allows incoming and stored data to analyze. Software development can be done for any tasks, which means that the program for data analysis can be customized for any activity. If, for example, you have a trade organization, then your data analysis program will analyze products, customers, funds, product balance, and more.\r\n<span style=\"font-weight: bold;\">On-demand software delivery</span>\r\nA type of software delivery service where the software is provided to the customer through a network (such as the Internet) as a service. On-demand software delivery is also called software on-demand. The terms on-demand software and Software as a Service (SaaS) are often used interchangeably.\r\nData access, analysis and delivery software are end-user oriented tools for ad hoc data access, analysis and reporting as well as production reporting. These products are most commonly used by information consumers or power users rather than professional programmers.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/Data_Access__Analysis__and_Delivery_Software1.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":3978,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/canary.png","logo":true,"scheme":false,"title":"Canary","vendorVerified":0,"rating":"0.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"canary","companyTitle":"Canary","companyTypes":["supplier","vendor"],"companyId":6175,"companyAlias":"canary","description":"Watch crisp and clean video anywhere, anytime. Canary connects your home to your phone in HD video, 24/7. Canary automatically changes modes when you enter and leave your home. No complicated keypad codes to remember.\r\n<b>Away Mode </b>\r\nWhen all members are away, Canary monitors for activity and sends notifications. \r\n<b>Home Mode </b>\r\nWhen a member is home, Canary automatically disarms itself based on your settings. \r\n<b>Night Mode </b>\r\nSchedule Canary to monitor for activity and send you notifications while you sleep. \r\n<b>Privacy </b>\r\nWhen set to private, Canary’s camera and microphone are fully disabled. \r\n<i>Features:</i>\r\n<ul> <li><b>Intelligent Notifications.</b> When motion is detected, Canary records HD video and audio and sends it to your phone, with a mobile alert. </li> <p> </p> <li><b>Emergency Actions.</b> In an emergency, sound the 90 decibel siren or connect with local police right from the Canary app. If it's just the cat being mischievous, now you have all the evidence you need. </li> <p> </p> <li><b>Timeline.</b> Everything Canary captures is preserved and presented on your timeline. From recorded videos to Member status and mode changes, it’s all there waiting for you. </li> <p> </p> <li><b>HomeHealth Technology.</b> Canary monitors air quality, temperature, and humidity and sends alerts to your phone if conditions become abnormal. </li> <p> </p> <li><b>One App for All.</b> Canary and Canary Flex devices come together in the app so you can easily swipe from room to room and view all recorded activity within a single timeline. The more the merrier. </li> <p> </p> </ul>","shortDescription":"Whether checking in, or responding to an alert, the Canary app gives you live and direct access to your Canary or Canary Flex from anywhere","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":19,"sellingCount":2,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Canary","keywords":"","description":"Watch crisp and clean video anywhere, anytime. Canary connects your home to your phone in HD video, 24/7. Canary automatically changes modes when you enter and leave your home. No complicated keypad codes to remember.\r\n<b>Away Mode </b>\r\nWhen all members are a","og:title":"Canary","og:description":"Watch crisp and clean video anywhere, anytime. Canary connects your home to your phone in HD video, 24/7. Canary automatically changes modes when you enter and leave your home. No complicated keypad codes to remember.\r\n<b>Away Mode </b>\r\nWhen all members are a","og:image":"https://old.roi4cio.com/fileadmin/user_upload/canary.png"},"eventUrl":"","translationId":3977,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":229,"title":"Spatial Information Management Software","alias":"spatial-information-management-software","description":" A spatial database is a database that is optimized for storing and querying data that represents objects defined in a geometric space. Most spatial databases allow the representation of simple geometric objects such as points, lines and polygons. Some spatial databases handle more complex structures such as 3D objects, topological coverages, linear networks, and TINs. While typical databases have developed to manage various numeric and character types of data, such databases require additional functionality to process spatial data types efficiently, and developers have often added geometry or feature data types. The Open Geospatial Consortium (OGC) developed the Simple Features specification (first released in 1997) and sets standards for adding spatial functionality to database systems. The SQL/MM Spatial ISO/IEC standard is a part the SQL/MM multimedia standard and extends the Simple Features standard with data types that support circular interpolations.\r\nA geodatabase (also geographical database and geospatial database) is a database of geographic data, such as countries, administrative divisions, cities, and related information. Such databases can be useful for websites that wish to identify the locations of their visitors for customization purposes.\r\nDatabase systems use indexes to quickly look up values; however, this way of indexing data is not optimal for spatial queries. Instead, spatial databases use a spatial index to speed up database operations.\r\nIn addition to typical SQL queries such as SELECT statements, spatial databases can perform a wide variety of spatial operations. The following operations and many more are specified by the Open Geospatial Consortium standard:\r\n<ul><li>Spatial Measurements: Computes line length, polygon area, the distance between geometries, etc.</li><li>Spatial Functions: Modify existing features to create new ones, for example by providing a buffer around them, intersecting features, etc.</li><li>Spatial Predicates: Allows true/false queries about spatial relationships between geometries. Examples include "do two polygons overlap" or 'is there a residence located within a mile of the area we are planning to build the landfill?'</li><li>Geometry Constructors: Creates new geometries, usually by specifying the vertices (points or nodes) which define the shape.</li><li>Observer Functions: Queries which return specific information about a feature such as the location of the center of a circle.</li></ul>\r\nSome databases support only simplified or modified sets of these operations, especially in cases of NoSQL systems like MongoDB and CouchDB.","materialsDescription":"<span style=\"font-weight: bold;\">What is the spatial index?</span>\r\nSpatial indices are used by spatial databases (databases which store information related to objects in space) to optimize spatial queries. Conventional index types do not efficiently handle spatial queries such as how far two points differ, or whether points fall within a spatial area of interest. Common spatial index methods include:\r\n<ul><li>Geohash</li><li>HHCode</li><li>Grid (spatial index)</li><li>Z-order (curve)</li><li>Quadtree</li><li>Octree</li><li>UB-tree</li><li>R-tree: Typically the preferred method for indexing spatial data.[citation needed] Objects (shapes, lines and points) are grouped using the minimum bounding rectangle (MBR). Objects are added to an MBR within the index that will lead to the smallest increase in its size.</li><li>R+ tree</li><li>R* tree</li><li>Hilbert R-tree</li><li>X-tree</li><li>kd-tree</li><li>m-tree – an m-tree index can be used for the efficient resolution of similarity queries on complex objects as compared using an arbitrary metric.</li><li>Binary space partitioning (BSP-Tree): Subdividing space by hyperplanes.</li></ul>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/Spatial_Information_Management_Software.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1084,"logoURL":"https://old.roi4cio.com/fileadmin/content/OmReports.png","logo":true,"scheme":false,"title":"omReports®","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"omreportsr","companyTitle":"Omilia","companyTypes":["supplier","vendor"],"companyId":3998,"companyAlias":"omilia-conversational-intelligence","description":"<p style=\"text-align: justify;\">Просмотр ключевых показателей и статистических данных о производительности системы, что позволяет легко анализировать взаимодействие пользователей и определять области для повышения автоматизации.</p>\r\n<p style=\"text-align: justify;\">Функции omReports®</p>\r\n<ul> <li>Просмотр итогов взаимодействия для каждого канала</li> <li>Отчеты, выпущенные на ежедневной, недельной и ежемесячной основе</li> <li>Определите области для повышения автоматизации</li> <li>Применить дополнительные критерии поиска, чтобы сузить результаты и анализ</li> </ul>","shortDescription":"Omilia - веб-модуль автоматического создания отчетов, в котором представлены статистические данные об использовании приложения, что позволяет анализировать взаимодействие пользователей и измерять KPI","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":9,"sellingCount":10,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"omReports®","keywords":"области, повышения, omReports®, автоматизации, Просмотр, недельной, ежемесячной, основе","description":"<p style=\"text-align: justify;\">Просмотр ключевых показателей и статистических данных о производительности системы, что позволяет легко анализировать взаимодействие пользователей и определять области для повышения автоматизации.</p>\r\n<p style=\"text-align: just","og:title":"omReports®","og:description":"<p style=\"text-align: justify;\">Просмотр ключевых показателей и статистических данных о производительности системы, что позволяет легко анализировать взаимодействие пользователей и определять области для повышения автоматизации.</p>\r\n<p style=\"text-align: just","og:image":"https://old.roi4cio.com/fileadmin/content/OmReports.png"},"eventUrl":"","translationId":7052,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":225,"title":"End-User Query, Reporting, and Analysis","alias":"end-user-query-reporting-and-analysis","description":" Class systems of Query & Reporting are designed to form queries to information systems in user terms, as well as their execution, integration of data from different sources, viewing data with the possibilities of detailing and summarizing and building full-fledged reports, both on-screen and printed. Visualization of query results can be presented to the user in various forms - flat or multidimensional tables, graphs, charts, various specialized interfaces.\r\nEnd-user tools for querying and building reports are delivered in two ways:\r\n<ul><li>as part of OLAP-systems</li><li>in the form of specialized Query & Reporting</li></ul>\r\nVirtually every OLAP class system is equipped with Query & Reporting. These funds can be either embedded in the main product or separated into a separate product.\r\nThere are also specialized systems for generating and distributing reports. At the same time, these systems incorporate their own OLAP-means. Therefore, to draw a clear line between OLAP-systems and systems of class Query & Reporting is almost impossible.","materialsDescription":" <span style=\"font-weight: bold; \">What are the reporting tools?</span>\r\nReporting tools are widely used to support decision making and to measure organizational and team performance. Companies use them for financial consolidation, for evaluation of strategies and policies and often just for plain reporting. Today most of these tools are integrated with Business Intelligence tools.\r\n<span style=\"font-weight: bold; \">What are the advantages of these tools for your organization?</span>\r\nReporting tools allow companies to create attractive reports easily. In tabular or graphical format. With data from Excel, a data warehouse or the organization’s ERP system. With the reports containing the right information, people are able to manage and improve the business processes more easily.\r\n<span style=\"font-weight: bold; \">Which reporting tools are available in the market?</span>\r\nThere are many Business Intelligence Reporting tools in the market available. This list of reporting tools shows you a complete overview of all the major tools currently available and thoroughly studied by our industry analysts. To name a few: Cognos Query and reporting, Oracle Enterprise Reporting, Crystal Reports, Microsoft Reporting Services (SSRS), etc.\r\n<span style=\"font-weight: bold; \">Is there a difference between reporting tools and BI tools?</span>\r\nAlmost every company, large or small, needs a reporting tool or they have already one in place. But, what is the difference between reporting software and Business Intelligence tools? They are not the same. In general reporting tools tell us where we have been but are not very good at analyzing data (at real time) and telling us where we are going (predictive).\r\n<span style=\"font-weight: bold;\">What is the difference between a query and a report?</span>\r\nA query is a way to create a list of accounts or journal entries that match your criteria. Requests serve as an advanced search engine that finds and groups accounts or journal entries and can only create a list.\r\nA report is a detailed report of a group of accounts or journal entries. Reports analyze data and are designed to calculate and present data in a more formal form.\r\nTypically, a query finds information in the database for you, and a report is a more powerful way to display and analyze information about the accounts or log entries you want to view.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/End-User_Query__Reporting__and_Analysis.png"},{"id":152,"title":"Contact Center","alias":"contact-center","description":"A contact center is a central point from where you can contact.\r\nThe contact center typically includes one or more call centers but may include other types of customer contact, as well. A contact center is generally part of an enterprise's overall customer relationship management (CRM) strategy.<br />Contact centers and call centers are both centers for customer service, and the two terms are often used interchangeably, but a contact center supports more services than a typical call center.\r\nContact centers offer omnichannel customer support, including email, chat, voice over IP (VoIP) and website support. A call center typically uses phones as the main channel of communication and can handle a mass volume of calls.<br />Contact centers are used for inbound communication, outbound communication or a hybrid of both. Contact center agents also interact with customers via web chat, phone, email or other communication channels.\r\nThe contact center infrastructure that is necessary to support communications may be located on the same premises as the contact center, or it can be located externally.\r\nIn an on-premises scenario, the company that owns the contact center also owns and manages its own hardware and software. This requires staffing and IT investments that some companies choose to forgo by outsourcing those tasks to cloud providers or hosting companies.","materialsDescription":" <span style=\"font-weight: bold;\">What is a Call Center?</span>\r\nTraditionally, a call center is an office where a large number of call center agents provide customer service over the telephone. Inbound call centers receive calls for customer support and often serve as a knowledge base for tech support, billing questions, and other customer service issues. These call centers focus on quick call resolution times and agent productivity. In outbound call centers, agents make calls rather than receive them. These could be sales calls, marketing offers, surveys, fundraising requests, or debt collection, for example.\r\nThe term “call center” conjures an image for many people of waiting on perpetual hold or being routed through an endless IVR that never gives them what they need. Because so many consumers have had a dreadful customer service experience along these lines, call centers have developed a bad rap. But as legacy phone systems give way to newer digital technologies, call centers are evolving.\r\n<span style=\"font-weight: bold;\">What is a Contact Center?</span>\r\nThe term "contact center" (or “contact centre”) reflects the modern reality that there are many other ways to connect with a customer these days besides by telephone. The combined trends of increased customer expectations and newer technologies that allow for many channels of communication are creating a shift in the traditional call center model which has existed for decades. Consumers want more ways to reach businesses, and businesses are looking for new ways to improve customer experience.\r\nWhile call center agents generally focus on inbound and outbound calls, either on traditional phone lines or over VoIP, contact center agents handle a wide variety of communications. In a modern multichannel contact center, technical support might be delivered over in-app chat or video, while order status updates are delivered via SMS, event promotions are sent as push notifications, surveys are deployed over Facebook Messenger, and sales inquiries received by email are sent directly to an agent to connect by phone. Call centers handle voice communications, contact centers handle all communications.\r\nA company’s contact center is usually integrated with their customer relationship management (CRM) system, where all interactions between the organization and the public are tracked, coordinated, and managed. Depending on the infrastructure and ecosystem, it could be comprised of an alphabet soup of complex components. Many companies have purchased off-the-shelf systems or a highly customized network of technologies from multiple vendors. Some companies have adopted a cloud-based solution or two, but they remain siloed from the rest of their systems and can’t talk to each other.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/Contact_Center1.png"},{"id":186,"title":"VoIP - Voice over Internet Protocol","alias":"voip-voice-over-internet-protocol","description":"<span style=\"font-weight: bold;\">Voice over Internet Protocol </span>(Voice over IP, VoIP) is a methodology and group of technologies for the delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks, such as the Internet. Other terms commonly associated with VoIP solutions are IP telephony, Internet telephony, broadband telephony, and broadband phone service.\r\nThe term Internet telephony specifically refers to the provisioning of communications services (voice, fax, SMS, voice-messaging) over the public Internet, rather than via the public switched telephone network (PSTN). The steps and principles involved in originating VoIP telephone calls are similar to traditional digital telephony and involve signaling, channel setup, digitization of the analog voice signals, and encoding.\r\nInstead of being transmitted over a circuit-switched network, however, the digital information is packetized, and transmission occurs as IP packets over a packet-switched network. Such transmission entails careful considerations about resource management different from time-division multiplexing (TDM) networks.\r\n\r\n\r\n\r\n","materialsDescription":"<h1 class=\"align-center\"> What are the benefits of VoIP?</h1>\r\n VoIP technology can facilitate tasks and deliver services that might be cumbersome or costly to implement when using traditional PSTN: \r\n<ul><li>More than one phone call can be transmitted on the same broadband phone line. This way, VoIP system can facilitate the addition of telephone lines to businesses without the need for additional physical lines.</li><li>Features that are usually charged extra by telecommunication companies, such as call forwarding, caller ID or automatic redialing, are simple with voice over internet technology.</li><li>Unified Communications are secured with VoIP technology, as it allows integration with other services available on the internet such as video conversation, messaging, etc. </li></ul>\r\n<h1 class=\"align-center\">VoIP programs </h1>\r\nThere are four main types of VoIP technology. Each option has varying levels of complexity which can impact ease of implementation and maintenance.\r\n <span style=\"font-weight: bold;\">Integrated Access</span>\r\nIntegrated access is the VoIP service that most mimics the traditional phone line. With integrated access VoIP, businesses integrate VoIP software and existing, legacy phone systems. This approach lets the business keep its old number and equipment while also gaining access to advanced telecommunications features. \r\n<span style=\"font-weight: bold;\">SIP Trunks</span>\r\n Session Initial Protocol (SIP) transmits voice and video information across a data network, letting VoIP users take advantage of shared lines and increase their communications flexibility. Because all data is sent over a network, businesses can use SIP trunks to replace traditional analog phone networks or use a VoIP gateway to integrate SIP trunking with legacy phone systems. \r\n<span style=\"font-weight: bold;\">Hosted IP PBX</span>\r\n What most people envision when they think of VoIP, this VoIP solution sees a vendor host and operate the private branch exchange, offering unified communications solutions. The business connects to a hosted cloud-based PBX network via its IP network. Phone system hardware is maintained off-site by the hosted IP PBX vendor, and all responsibility for the hardware, software, maintenance, security and upgrades all falls on the hosted PBX provider. \r\n <span style=\"font-weight: bold;\">Managed IP PBX </span>\r\nSimilar to Hosted IP PBX, this version of the unified communication solution is outsourced to a third party that takes care of all management requirements, but instead of phone hardware being off-site, the equipment is housed on-premise by the business. \r\nUnderstanding these different services of VoIP communication can help a business determine the system that best suits its needs. SIP Trunks, for instance, are more attractive to those who want to install their own technology and manage it themselves, while still connecting to VoIP features.\r\n On the other hand, managed IP PBX is a good option for those who don’t have the resources to buy and operate their own VoIP systems. The Hosted IP PBX solution frees the business to select the VoIP management software that works for them and liberates them from the cost and administrative headache of maintaining both voice and data lines and the related carrier partnerships. ","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/VoIP_-_Voice_over_Internet_Protocol.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":441,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/SAS_Fraud_Framework_for_Insurance.jpg","logo":true,"scheme":false,"title":"SAS Fraud Framework for Insurance","vendorVerified":0,"rating":"1.40","implementationsCount":1,"suppliersCount":0,"supplierPartnersCount":0,"alias":"sas-fraud-framework-for-insurance","companyTitle":"SAS","companyTypes":["vendor"],"companyId":2904,"companyAlias":"sas","description":"<div style=\"text-align: justify; \"><span style=\"font-family: Arial, Helvetica, sans-serif; font-size: 15px; font-weight: bold;\">Benefits</span>\r\n<span style=\"font-family: Arial, Helvetica, sans-serif; font-size: 15px; \"><br /></span>\r\n<span style=\"font-family: Arial, Helvetica, sans-serif; font-size: 15px; \">Detect more fraudulent activity.</span>\r\n<span style=\"font-family: Arial, Helvetica, sans-serif; font-size: 15px; \">SAS gives you a broader view by processing all data through advanced analytics models and combining it with rules engines. You’ll be able to detect previously unknown schemes with customized anomaly detection methods, and spot linked entities and crime rings to stem larger losses.</span>\r\n<span style=\"font-family: Arial, Helvetica, sans-serif; font-size: 15px; \"><br /></span>\r\n<span style=\"font-family: Arial, Helvetica, sans-serif; font-size: 15px; \">Prevent fraud losses before settlement.</span>\r\n<span style=\"font-family: Arial, Helvetica, sans-serif; font-size: 15px; \">Real-time daily batch scoring catches fraud immediately. Find loss padding in similar claims. Identify repeat offenders and uncover insider or collusive fraud by integrating staff data and audit records, and applying risk- and value-based scoring models to prioritize output for investigators.</span>\r\n<span style=\"font-family: Arial, Helvetica, sans-serif; font-size: 15px; \"><br /></span>\r\n<span style=\"font-family: Arial, Helvetica, sans-serif; font-size: 15px; \">Lower loss-adjustment expenses.</span>\r\n<span style=\"font-family: Arial, Helvetica, sans-serif; font-size: 15px; \">You can greatly reduce false positives using our sophisticated fraud scoring engine. Improve investigator efficiency and ROI with advanced case management tools and by prioritizing higher value networks and conducting more efficient and accurate investigations. Capture all claims settlement amounts within the system to reuse with similar claims in the future.</span>\r\n<span style=\"font-family: Arial, Helvetica, sans-serif; font-size: 15px; \"><br /></span>\r\n<span style=\"font-family: Arial, Helvetica, sans-serif; font-size: 15px; \">Get a consolidated view of fraud risk.</span>\r\n<span style=\"font-family: Arial, Helvetica, sans-serif; font-size: 15px; \">Identify cross-brand/product fraud by seeing customer claims and policies for all lines of business. Continuously improve models and adapt the system as needed to address changes in fraud trends. Understand new claim threats and prevent substantial losses early using social network diagrams and sophisticated data mining techniques.</span>\r\n<span style=\"font-family: Arial, Helvetica, sans-serif; font-size: 15px; \"><br /></span>\r\n<span style=\"font-family: Arial, Helvetica, sans-serif; font-size: 15px; \">Gain a greater competitive advantage.</span>\r\n<span style=\"font-family: Arial, Helvetica, sans-serif; font-size: 15px; \">Generate fewer false positives to gain greater satisfaction of legitimate customers. More diligent, effective fraud detection methods can actually discourage fraudsters from targeting your organization. And satisfy regulatory requirements by better managing fraud.</span>","shortDescription":"SAS Fraud Framework for Insurance - Detect, prevent and manage claims fraud across all lines of business","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":16,"sellingCount":6,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"SAS Fraud Framework for Insurance","keywords":"fraud, with, claims, scoring, data, models, losses, using","description":"<div style=\"text-align: justify; \"><span style=\"font-family: Arial, Helvetica, sans-serif; font-size: 15px; font-weight: bold;\">Benefits</span>\r\n<span style=\"font-family: Arial, Helvetica, sans-serif; font-size: 15px; \"><br /></span>\r\n<span style=\"font-family:","og:title":"SAS Fraud Framework for Insurance","og:description":"<div style=\"text-align: justify; \"><span style=\"font-family: Arial, Helvetica, sans-serif; font-size: 15px; font-weight: bold;\">Benefits</span>\r\n<span style=\"font-family: Arial, Helvetica, sans-serif; font-size: 15px; \"><br /></span>\r\n<span style=\"font-family:","og:image":"https://old.roi4cio.com/fileadmin/user_upload/SAS_Fraud_Framework_for_Insurance.jpg"},"eventUrl":"","translationId":442,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":227,"title":"Advanced Analytics Software","alias":"advanced-analytics-software","description":" <span style=\"font-weight: bold;\">Advanced analytics</span> is a part of data science that uses high-level methods and tools to focus on projecting future trends, events, and behaviors. This gives organizations the ability to perform advanced statistical models such as ‘what-if’ calculations, as well as future-proof various aspects of their operations.\r\nThe term is an umbrella for several sub-fields of analytics that work together in their predictive capabilities.\r\nThe major areas that make up advanced analytics are predictive data analytics, big data, and data mining. The process of advanced analytics includes all three areas at various times.\r\n<span style=\"font-weight: bold;\">Data mining</span> is a key aspect of advanced analytics, providing the raw data that will be used by both big data and predictive analytics. <span style=\"font-weight: bold;\">Big data analytics</span> are useful in finding existing insights and creating connections between data points and sets, as well as cleaning data.\r\nFinally, <span style=\"font-weight: bold;\">predictive analytics</span> can use these clean sets and existing insights to extrapolate and make predictions and projections about future activity, trends, and consumer behaviors.\r\nAdvanced analytics also include newer technologies such as machine learning and artificial intelligence, semantic analysis, visualizations, and even neural networks. Taken together, they help advanced analytics software create an accurate enough canvas to make reliable predictions and generate actionable BI insights on a deeper level.","materialsDescription":"<h1 class=\"align-center\">A list of tips on how to manage the process of building an advanced analytics program</h1>\r\n<ul><li>Start with a proof-of-concept project to demonstrate the potential business value of analytics applications.</li><li>Take training seriously. New data management and analytics skills likely will be needed, especially if big data platforms and tools like SAS advanced analytics tools are involved.</li><li>Develop processes to ensure that business units are ready to act on analytical findings so the work of data scientists and other analysts doesn't go to waste.</li><li>Monitor and assess advanced and predictive analytics software on a regular basis to make sure the data being analyzed is still relevant and the analytical models being run against it are still valid.</li></ul>\r\n<h1 class=\"align-center\">Advanced analytics tools</h1>\r\nThere are a variety of advanced analytics tools to choose from that offer different advantages based on the use case. They generally break down into two categories: open source and proprietary.\r\nOpen source tools have become a go-to option for many data scientists doing machine learning and prescriptive analytics. They include programming languages, as well as computing environments, including Hadoop and Spark. Users typically say they like open source advanced analytics tools because they are generally inexpensive to operate, offer strong functionality and are backed by a user community that continually innovates the tools.\r\nOn the proprietary side, vendors including Microsoft, IBM and the SAS Institute all offer advanced analytics tools. Most require a deep technical background and understanding of mathematical techniques.\r\nIn recent years, however, a crop of self-service analytics tools has matured to make functionality more accessible to business users. Tableau, in particular, has become a common tool. While its functionality is more limited than deeper technical tools, it does enable users to conduct cluster analyses and other advanced analyses.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/Advanced_Analytics_Software.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":479,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/SAS_Cost_and_Profitability_Management.png","logo":true,"scheme":false,"title":"SAS Cost and Profitability Management","vendorVerified":0,"rating":"1.40","implementationsCount":1,"suppliersCount":0,"supplierPartnersCount":0,"alias":"sas-cost-and-profitability-management","companyTitle":"SAS","companyTypes":["vendor"],"companyId":2904,"companyAlias":"sas","description":"SAS Cost and Profitability Management is an analytic application that models business processes to accurately determine process, product and customer cost and profitability. With this solution, you can make informed decisions to streamline processes, deliver revenue growth and reduce costs across the organization.\r\n\r\n<span style=\"font-weight: bold;\">Benefits</span>\r\nEvolve the way you do business.\r\nGain insights into cost accumulation in a way that management, marketing and operations personnel – not just finance experts – can understand and act on. Tie financial results and KPIs to strategy by measuring profitability at the division, department, channel and individual product and customer levels.\r\nManage shared service cost allocations.\r\nGet a more accurate reflection of true costs and profitability by managing how shared service costs and IT chargebacks get allocated to products, customers, channels and services. Create more accurate budgets and workforce plans.\r\nImprove processes by identifying activities that don’t add value.\r\nIdentify cost bottlenecks, rework and non-value-added activity. Use what-if analysis to model and simulate how changes in driver volumes affect costs, profit and resource requirements.\r\nUnderstand the effects of cost and process variations on performance.\r\nHigh-performance in-memory modeling quickly identifies issues and provides insight into weak links in the supply chain, underutilized capacity and opportunities for cross sell and up sell. Complex models that used to take hours or overnight to update can now be run in a fraction of the time.\r\n\r\n<span style=\"font-weight: bold;\">Features</span>\r\nCost and profitability measurement\r\nModeling\r\nAnalysis and reporting\r\nData integration","shortDescription":"SAS Cost and Profitability Management (the new name for SAS Activity-Based Management) is an analytic application that determines cost and profitability by modeling business processes as cost flows among accounts. Typical accounts include resource, activity, and cost-object accounts. Cost flows between accounts are modeled by various kinds of drivers including evenly-assigned, percentage, and calculated drivers. With this solution, organizations can make informed decisions that streamline processes, deliver revenue growth and reduce costs across the organization.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":11,"sellingCount":17,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"SAS Cost and Profitability Management","keywords":"cost, that, profitability, costs, Cost, processes, sell, more","description":"SAS Cost and Profitability Management is an analytic application that models business processes to accurately determine process, product and customer cost and profitability. With this solution, you can make informed decisions to streamline processes, deliver r","og:title":"SAS Cost and Profitability Management","og:description":"SAS Cost and Profitability Management is an analytic application that models business processes to accurately determine process, product and customer cost and profitability. With this solution, you can make informed decisions to streamline processes, deliver r","og:image":"https://old.roi4cio.com/fileadmin/user_upload/SAS_Cost_and_Profitability_Management.png"},"eventUrl":"","translationId":480,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":227,"title":"Advanced Analytics Software","alias":"advanced-analytics-software","description":" <span style=\"font-weight: bold;\">Advanced analytics</span> is a part of data science that uses high-level methods and tools to focus on projecting future trends, events, and behaviors. This gives organizations the ability to perform advanced statistical models such as ‘what-if’ calculations, as well as future-proof various aspects of their operations.\r\nThe term is an umbrella for several sub-fields of analytics that work together in their predictive capabilities.\r\nThe major areas that make up advanced analytics are predictive data analytics, big data, and data mining. The process of advanced analytics includes all three areas at various times.\r\n<span style=\"font-weight: bold;\">Data mining</span> is a key aspect of advanced analytics, providing the raw data that will be used by both big data and predictive analytics. <span style=\"font-weight: bold;\">Big data analytics</span> are useful in finding existing insights and creating connections between data points and sets, as well as cleaning data.\r\nFinally, <span style=\"font-weight: bold;\">predictive analytics</span> can use these clean sets and existing insights to extrapolate and make predictions and projections about future activity, trends, and consumer behaviors.\r\nAdvanced analytics also include newer technologies such as machine learning and artificial intelligence, semantic analysis, visualizations, and even neural networks. Taken together, they help advanced analytics software create an accurate enough canvas to make reliable predictions and generate actionable BI insights on a deeper level.","materialsDescription":"<h1 class=\"align-center\">A list of tips on how to manage the process of building an advanced analytics program</h1>\r\n<ul><li>Start with a proof-of-concept project to demonstrate the potential business value of analytics applications.</li><li>Take training seriously. New data management and analytics skills likely will be needed, especially if big data platforms and tools like SAS advanced analytics tools are involved.</li><li>Develop processes to ensure that business units are ready to act on analytical findings so the work of data scientists and other analysts doesn't go to waste.</li><li>Monitor and assess advanced and predictive analytics software on a regular basis to make sure the data being analyzed is still relevant and the analytical models being run against it are still valid.</li></ul>\r\n<h1 class=\"align-center\">Advanced analytics tools</h1>\r\nThere are a variety of advanced analytics tools to choose from that offer different advantages based on the use case. They generally break down into two categories: open source and proprietary.\r\nOpen source tools have become a go-to option for many data scientists doing machine learning and prescriptive analytics. They include programming languages, as well as computing environments, including Hadoop and Spark. Users typically say they like open source advanced analytics tools because they are generally inexpensive to operate, offer strong functionality and are backed by a user community that continually innovates the tools.\r\nOn the proprietary side, vendors including Microsoft, IBM and the SAS Institute all offer advanced analytics tools. Most require a deep technical background and understanding of mathematical techniques.\r\nIn recent years, however, a crop of self-service analytics tools has matured to make functionality more accessible to business users. Tableau, in particular, has become a common tool. While its functionality is more limited than deeper technical tools, it does enable users to conduct cluster analyses and other advanced analyses.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/Advanced_Analytics_Software.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":551,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/Oracle_Business_Intelligence.png","logo":true,"scheme":false,"title":"Oracle Business Intelligence","vendorVerified":0,"rating":"2.00","implementationsCount":1,"suppliersCount":0,"supplierPartnersCount":150,"alias":"oracle-business-intelligence","companyTitle":"Oracle","companyTypes":["supplier","vendor"],"companyId":164,"companyAlias":"oracle","description":"Scale Insights with Ease\r\n\r\nGain a comprehensive view of your business—in one place\r\nDeliver instant clarity through stunning visual analytics\r\nAdopt the cloud your own way, with in the cloud, hybrid, or on-premises deployment\r\n\r\n","shortDescription":"Oracle Business Intelligence. Foster a data-driven culture with powerful, visually stunning analytics. Explore new insights and empower people across the organization to make faster, more informed business decisions.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":6,"sellingCount":7,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Oracle Business Intelligence","keywords":"cloud, your, with, Adopt, analytics, through, stunning, visual","description":"Scale Insights with Ease\r\n\r\nGain a comprehensive view of your business—in one place\r\nDeliver instant clarity through stunning visual analytics\r\nAdopt the cloud your own way, with in the cloud, hybrid, or on-premises deployment\r\n\r\n","og:title":"Oracle Business Intelligence","og:description":"Scale Insights with Ease\r\n\r\nGain a comprehensive view of your business—in one place\r\nDeliver instant clarity through stunning visual analytics\r\nAdopt the cloud your own way, with in the cloud, hybrid, or on-premises deployment\r\n\r\n","og:image":"https://old.roi4cio.com/fileadmin/user_upload/Oracle_Business_Intelligence.png"},"eventUrl":"","translationId":552,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":225,"title":"End-User Query, Reporting, and Analysis","alias":"end-user-query-reporting-and-analysis","description":" Class systems of Query & Reporting are designed to form queries to information systems in user terms, as well as their execution, integration of data from different sources, viewing data with the possibilities of detailing and summarizing and building full-fledged reports, both on-screen and printed. Visualization of query results can be presented to the user in various forms - flat or multidimensional tables, graphs, charts, various specialized interfaces.\r\nEnd-user tools for querying and building reports are delivered in two ways:\r\n<ul><li>as part of OLAP-systems</li><li>in the form of specialized Query & Reporting</li></ul>\r\nVirtually every OLAP class system is equipped with Query & Reporting. These funds can be either embedded in the main product or separated into a separate product.\r\nThere are also specialized systems for generating and distributing reports. At the same time, these systems incorporate their own OLAP-means. Therefore, to draw a clear line between OLAP-systems and systems of class Query & Reporting is almost impossible.","materialsDescription":" <span style=\"font-weight: bold; \">What are the reporting tools?</span>\r\nReporting tools are widely used to support decision making and to measure organizational and team performance. Companies use them for financial consolidation, for evaluation of strategies and policies and often just for plain reporting. Today most of these tools are integrated with Business Intelligence tools.\r\n<span style=\"font-weight: bold; \">What are the advantages of these tools for your organization?</span>\r\nReporting tools allow companies to create attractive reports easily. In tabular or graphical format. With data from Excel, a data warehouse or the organization’s ERP system. With the reports containing the right information, people are able to manage and improve the business processes more easily.\r\n<span style=\"font-weight: bold; \">Which reporting tools are available in the market?</span>\r\nThere are many Business Intelligence Reporting tools in the market available. This list of reporting tools shows you a complete overview of all the major tools currently available and thoroughly studied by our industry analysts. To name a few: Cognos Query and reporting, Oracle Enterprise Reporting, Crystal Reports, Microsoft Reporting Services (SSRS), etc.\r\n<span style=\"font-weight: bold; \">Is there a difference between reporting tools and BI tools?</span>\r\nAlmost every company, large or small, needs a reporting tool or they have already one in place. But, what is the difference between reporting software and Business Intelligence tools? They are not the same. In general reporting tools tell us where we have been but are not very good at analyzing data (at real time) and telling us where we are going (predictive).\r\n<span style=\"font-weight: bold;\">What is the difference between a query and a report?</span>\r\nA query is a way to create a list of accounts or journal entries that match your criteria. Requests serve as an advanced search engine that finds and groups accounts or journal entries and can only create a list.\r\nA report is a detailed report of a group of accounts or journal entries. Reports analyze data and are designed to calculate and present data in a more formal form.\r\nTypically, a query finds information in the database for you, and a report is a more powerful way to display and analyze information about the accounts or log entries you want to view.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/End-User_Query__Reporting__and_Analysis.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":623,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/IBM_LOGO.png","logo":true,"scheme":false,"title":"IBM Cognos Business Intelligence","vendorVerified":0,"rating":"2.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":100,"alias":"ibm-cognos-business-intelligence","companyTitle":"IBM","companyTypes":["supplier","vendor"],"companyId":177,"companyAlias":"ibm","description":"Basic components\r\nCognos Connection\r\nCognos Connection is the Web portal for IBM Cognos BI. It is the starting point for the browser-based access to all functions provided with the suite. With the help of the portal, content can be searched in the form of reports, scorecards and agents, it can be managed, structured and displayed. In addition, the portal is used for example to schedule and distribute reports, for creating tasks, administering the server and the access permissions to content available to different users. You can also create shortcuts, URLs and pages.\r\nQuery Studio\r\nQuery Studio allows simple queries and self-service reports to answer rather simple business questions. The report layout can be customized and data can be filtered and sorted, formatting and the creation of diagrams is also supported.\r\nReport Studio\r\nThe Report Studio is used to create management reports. It offers two different modes: The professional authoring mode enables users to access the full range of Report Studio functionality. In this mode, users can create any type of report, including charts, maps, lists, and repeat functions. In professional authoring mode all types of Data (relational or multidimensional) can be used, dynamic data can not be displayed.\r\nThe express authoring mode has a more simplified user interface, designed for non-technical users. It enables them to create traditional financial or management reports in a more focused user interface. In contrast to the professional authoring mode, the express authoring mode allows the use of dynamic data.\r\nAnalysis Studio\r\nOLAP-functionalities\r\nDrill-up and drill-down as example OLAP-functionalities\r\nUsers can create analyses of large data sources and search for background information about an event or action. Multidimensional analysis allows identifying trends and understanding of anomalies or deviations, which are not obvious in other types of reports. Drag-and-drop features, elements and key performance indicators can be included in the analysis, rows and columns can be switched, OLAP-functionalities like drill-up and drill-down can be used to get a deeper understanding about the sources of the information used in the analysis.\r\nEvent Studio\r\nThe Event Studio is a notification tool that informs about events within the enterprise in real time. Therefore, agents can be created to detect the occurrence of business events or exceptional circumstances, based on the change of specified event- or data conditions. A notification may be served by sending an e-mail, its publication in the portal, or by triggering reports. This can be used to handle failure with notification.It is very robust in nature.\r\nWorkspace\r\nIBM Cognos Workspace (formerly introduced in version 10.1 as IBM Cognos Business Insight and renamed in version 10.2.0) is a web-based interface that allows business users to use existing IBM Cognos content (report objects) to build interactive workspaces for insight and collaboration.\r\nWorkspace Advanced\r\nIBM Cognos Workspace Advanced (formerly introduced in version 10.1 as IBM Cognos Business Insight Advanced and renamed in version 10.2.0) is a web-based interface that allows business users to author/create reports and analyze information.","shortDescription":"IBM Cognos Business Intelligence is a web-based, integrated business intelligence suite by IBM. It provides a toolset for reporting, analysis, scorecarding, and monitoring of events and metrics. The software consists of several components to meet the different information requirements in a company.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":6,"sellingCount":6,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"IBM Cognos Business Intelligence","keywords":"Cognos, reports, Studio, users, mode, used, create, data","description":"Basic components\r\nCognos Connection\r\nCognos Connection is the Web portal for IBM Cognos BI. It is the starting point for the browser-based access to all functions provided with the suite. With the help of the portal, content can be searched in the form of repo","og:title":"IBM Cognos Business Intelligence","og:description":"Basic components\r\nCognos Connection\r\nCognos Connection is the Web portal for IBM Cognos BI. It is the starting point for the browser-based access to all functions provided with the suite. With the help of the portal, content can be searched in the form of repo","og:image":"https://old.roi4cio.com/fileadmin/user_upload/IBM_LOGO.png"},"eventUrl":"","translationId":624,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":69,"title":"Business Analytics","alias":"business-analytics","description":"Business Analytics is “the study of data through statistical and operations analysis, the formation of predictive models, application of optimization techniques, and the communication of these results to customers, business partners, and college executives.” Business Analytics requires quantitative methods and evidence-based data for business modeling and decision making; as such, Business Analytics requires the use of Big Data.\r\nSAS describes Big Data as “a term that describes the large volume of data – both structured and unstructured – that inundates a business on a day-to-day basis.” What’s important to keep in mind about Big Data is that the amount of data is not as important to an organization as the analytics that accompany it. When companies analyze Big Data, they are using Business Analytics to get the insights required for making better business decisions and strategic moves.\r\nCompanies use Business Analytics (BA) to make data-driven decisions. The insight gained by BA enables these companies to automate and optimize their business processes. In fact, data-driven companies that utilize Business Analytics achieve a competitive advantage because they are able to use the insights to:\r\n<ul><li>Conduct data mining (explore data to find new patterns and relationships)</li><li>Complete statistical analysis and quantitative analysis to explain why certain results occur</li><li>Test previous decisions using A/B testing and multivariate testing</li><li>Make use of predictive modeling and predictive analytics to forecast future results</li></ul>\r\nBusiness Analytics also provides support for companies in the process of making proactive tactical decisions, and BA makes it possible for those companies to automate decision making in order to support real-time responses.","materialsDescription":"<span style=\"font-weight: bold; \">What does Business Analytics (BA) mean?</span>\r\nBusiness analytics (BA) refers to all the methods and techniques that are used by an organization to measure performance. Business analytics are made up of statistical methods that can be applied to a specific project, process or product. Business analytics can also be used to evaluate an entire company. Business analytics are performed in order to identify weaknesses in existing processes and highlight meaningful data that will help an organization prepare for future growth and challenges.\r\nThe need for good business analytics has spurred the creation of business analytics software and enterprise platforms that mine an organization’s data in order to automate some of these measures and pick out meaningful insights.\r\nAlthough the term has become a bit of a buzzword, business analytics are a vital part of any business. Business analytics make up a large portion of decision support systems, continuous improvement programs and many of the other techniques used to keep a business competitive. Consequently, accurate business analytics like efficiency measures and capacity utilization rates are the first step to properly implementing these techniques.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/Business_Analytics.png"},{"id":225,"title":"End-User Query, Reporting, and Analysis","alias":"end-user-query-reporting-and-analysis","description":" Class systems of Query & Reporting are designed to form queries to information systems in user terms, as well as their execution, integration of data from different sources, viewing data with the possibilities of detailing and summarizing and building full-fledged reports, both on-screen and printed. Visualization of query results can be presented to the user in various forms - flat or multidimensional tables, graphs, charts, various specialized interfaces.\r\nEnd-user tools for querying and building reports are delivered in two ways:\r\n<ul><li>as part of OLAP-systems</li><li>in the form of specialized Query & Reporting</li></ul>\r\nVirtually every OLAP class system is equipped with Query & Reporting. These funds can be either embedded in the main product or separated into a separate product.\r\nThere are also specialized systems for generating and distributing reports. At the same time, these systems incorporate their own OLAP-means. Therefore, to draw a clear line between OLAP-systems and systems of class Query & Reporting is almost impossible.","materialsDescription":" <span style=\"font-weight: bold; \">What are the reporting tools?</span>\r\nReporting tools are widely used to support decision making and to measure organizational and team performance. Companies use them for financial consolidation, for evaluation of strategies and policies and often just for plain reporting. Today most of these tools are integrated with Business Intelligence tools.\r\n<span style=\"font-weight: bold; \">What are the advantages of these tools for your organization?</span>\r\nReporting tools allow companies to create attractive reports easily. In tabular or graphical format. With data from Excel, a data warehouse or the organization’s ERP system. With the reports containing the right information, people are able to manage and improve the business processes more easily.\r\n<span style=\"font-weight: bold; \">Which reporting tools are available in the market?</span>\r\nThere are many Business Intelligence Reporting tools in the market available. This list of reporting tools shows you a complete overview of all the major tools currently available and thoroughly studied by our industry analysts. To name a few: Cognos Query and reporting, Oracle Enterprise Reporting, Crystal Reports, Microsoft Reporting Services (SSRS), etc.\r\n<span style=\"font-weight: bold; \">Is there a difference between reporting tools and BI tools?</span>\r\nAlmost every company, large or small, needs a reporting tool or they have already one in place. But, what is the difference between reporting software and Business Intelligence tools? They are not the same. In general reporting tools tell us where we have been but are not very good at analyzing data (at real time) and telling us where we are going (predictive).\r\n<span style=\"font-weight: bold;\">What is the difference between a query and a report?</span>\r\nA query is a way to create a list of accounts or journal entries that match your criteria. Requests serve as an advanced search engine that finds and groups accounts or journal entries and can only create a list.\r\nA report is a detailed report of a group of accounts or journal entries. Reports analyze data and are designed to calculate and present data in a more formal form.\r\nTypically, a query finds information in the database for you, and a report is a more powerful way to display and analyze information about the accounts or log entries you want to view.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/End-User_Query__Reporting__and_Analysis.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":["Shortage of inhouse software developers","Shortage of inhouse IT resources","High costs of IT personnel","Shortage of inhouse IT engineers"],"materials":[],"useCases":[],"best_practices":[],"values":["Enhance Staff Productivity","Reduce Costs"],"implementations":[],"presenterCodeLng":"","productImplementations":[]}},"aliases":{},"links":{},"meta":{},"loading":false,"error":null,"useProductLoading":false,"sellProductLoading":false,"templatesById":{},"comparisonByTemplateId":{}},"filters":{"filterCriterias":{"loading":false,"error":null,"data":{"price":{"min":0,"max":6000},"users":{"loading":false,"error":null,"ids":[],"values":{}},"suppliers":{"loading":false,"error":null,"ids":[],"values":{}},"vendors":{"loading":false,"error":null,"ids":[],"values":{}},"roles":{"id":200,"title":"Roles","values":{"1":{"id":1,"title":"User","translationKey":"user"},"2":{"id":2,"title":"Supplier","translationKey":"supplier"},"3":{"id":3,"title":"Vendor","translationKey":"vendor"}}},"categories":{"flat":[],"tree":[]},"countries":{"loading":false,"error":null,"ids":[],"values":{}}}},"showAIFilter":false},"companies":{"companiesByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"implementations":{"implementationsByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"agreements":{"agreementById":{},"ids":{},"links":{},"meta":{},"loading":false,"error":null},"comparison":{"loading":false,"error":false,"templatesById":{},"comparisonByTemplateId":{},"products":[],"selectedTemplateId":null},"presentation":{"type":null,"company":{},"products":[],"partners":[],"formData":{},"dataLoading":false,"dataError":false,"loading":false,"error":false},"catalogsGlobal":{"subMenuItemTitle":""}}