Enterprise Class Business Intelligence

To compete, today's organizations require Business Intelligence solutions which are powerful, easy to deploy, and easy to access. That's a start. However, they also require solutions which are scalable, secure, collaborative, and programmable. Data Applied provides zero footprint, Web-based, collaborative, rich Business Intelligence solutions - with the key scalability, security, collaboration, and programmability features required to unlock Enterprise scenarios.

Powerful

Data Applied includes rich reporting features and powerful data processing (ETL) capabilities. But Data Applied also provides advanced analysis and visualization techniques allowing users, among other things, to forecast time series, visualize large data sets, identify hidden associations, detect anomalies or abuse, pinpoint key influences, categorize records, and discover similarities.

Web-Based

Data Applied users access data and analysis results anywhere, anytime, using a simple Web browser. Because there is no custom ActiveX control to install, deployment & upgrades are effortless. Still, Data Applied's user interface allows for rich interactive exploratory analysis. Finally, Data Applied's XML Web API enables rapid, low footprint integration with third-parties.

Programmable

Data Applied offers a consistent, simple, secure XML Web API. All actions performed by the Web client can also be performed using the XML Web API. For example, a developer could easily develop an application which periodically upload new sales result, requests forecasting analysis, and downloads results. The API therefore makes it possible to automate repetitive tasks, or to enhance third-party applications with data mining capabilities. In the future, Data Applied may offer analysis plug-ins for systems such as SAP, SharePoint Server, etc.

Cost-Effective

Unlike most data mining solutions, Data Applied requires neither advanced degrees in statistics, nor costly user training. Data Applied's intuitive interface empowers users to extract the most insight from their data, without unnecessary complexity. Also, Data Applied's pricing model does not depend on the number of processors. Customers who have purchased expensive hardware should NOT have to pay twice to use it. Until now, data mining has remained out of reach because of excessive costs and complexity. We're changing the rules of the game.

Easy to Deploy

Because Data Applied is a Web-based application, clients only need a browser to access and analyze data. Below is a list of the compatible operating systems, databases, Web browsers, and recommended hardware. Note that all roles can be collapsed onto a single machine, or even run in a Virtual Machine. For detailed requirements, click here.

OS (server)
  • Windows 64 bit Server (with IIS) (preferred)
  • Windows 32 bit Server (with IIS)
  • Windows Vista 64 bit or higher (with IIS)
  • Windows Vista 32 bit or higher (with IIS)
Database (server)
  • MySQL 5.x+ with ODBC driver (can be remote)
  • SQL Server 2005+ (can be remote)
Browser (client)
  • Microsoft Internet Explorer 7+
  • Mozilla Firefox 3+
  • Google Chrome 1+
Hardware (server)
  • Dual 2+ Ghz processor
  • 4+ Gig memory
Hardware (client)
  • Single 2+ Ghz processor
  • 2+ Gig memory

Collaborative

We understand it takes team work to analyze data and reach actionable outcomes. Data Applied offers several user collaboration features. For example, workspaces and data sets can securely be shared between users. Analysis results can be searched, tagged using comments, downloaded as presentation-ready images, or exported to text files. The gallery feature also allows users to exchange and rate analysis results.

Searchable

Search has become a requirement for any modern application, and rightly so. Data Applied treats search as a first-class feature, allowings users to easily find, filter, sort, and export results. Pervasive search enables drill-down and refinement scenarios, which allow for exploratory second-level analysis. With search, users can interact with and explore both data and analysis results.

Open

Data Applied allows user to import data directly from CSV or Excel files. This means that most business files can be analyzed immediately. Conversely, users can export data and analysis results as Excel spreadsheet, or as presentation-ready images. In the future, Data Applied may include direct import of business data from third-parties such as SalesForce.com or Dynamics CRM. With our XML-based Web API, you are also never locked out of your data. What could be more open than a Web-based solution?

Distributed

Unlike several other data mining products, Data Applied does not assume all data and computations will fit in memory. Using Data Applied, users benefit from the latest advances in data mining research and from true scalability. Thanks to multi-processor aware implementations and streaming, users get answers faster. Optionally, Data Applied can also distribute workload to multiple back-end servers, and orchestrate parallel data processing. In addition, Data Applied automatically reduces client/server traffic using data compression and caching.

Flexible

All Data Applied visualizations can easily be embedded within any HTML web page. Not only can users easily share visualizations, they can also impose a set of usage restriction. For example, a user may share a visualization, but make the view expire after 3 days, or disallow retrieval of associated comments.

Secure

From the very start, Data Applied was designed and built with security in mind. Users can be granted different access levels to different workspaces and data sets (ex: read, write, manage). Security is enforced at the server level, so there is no way to bypass access checks. As a result, security is also enforced for any application using the XML Web API. In addition, both network communications and database content can be encrypted. Data Applied also implements a built-in logging mechanism to allow workspaces owners to review changes. Using secure delegation, users can securely allow third-party applications perform a specific set of operations on their behalf. Finally, the development process fully integrates security practices such as automated code inspection, penetration testing, threat modeling, SQL injection prevention, review of cryptographic primitives, etc.