World-Class Functionality For All Business Users' Needs
World-Class Functionality For All Business Users' Needs
World-Class Functionality For All Business Users' Needs
Supply Chain Management Vendor Performance Analysis Sales Analysis Operations Analysis
• Inventory Analysis • Service Level Agreement • Store / Geographic Analysis • Productivity Reporting
• Fulfillment Analysis • Chargeback Analysis • Sales Pipeline Reporting • HR Reporting
• Distribution Cost Analysis • Relative Sales Analysis • Sales Performance/Quota Reporting • Web Commerce Analysis
Packaged BI
Applications
Databases
Data Integration
& ETL
Operational
Systems
CONFIDENTIAL
The Information Contained In This Presentation Is Confidential And Proprietary To MicroStrategy. The Recipient Of This
3 Document Agrees That They Will Not Disclose Its Contents To Any Third Party Or Otherwise Use This Presentation For Any
Purpose Other Than An Evaluation Of MicroStrategy's Business Or Its Offerings. Reproduction or Distribution Is Prohibited.
% & ! ' % (
" %
REPORT
Operational Reports Report The Detailed Information
Financial Reports
Performance Reports Needed By Everyone For Day-to-day
Decision Making
CORPORATE
Analyze Data to Uncover Root Causes
PERFORMANCE and Trends in Business Performance
IMPROVEMENT Using Simple Yet Powerful Techniques
MONITOR CYCLE ANALYZE
Dashboards Root Causes
Real-time Alerts Exceptions
Scorecards Trends
CONFIDENTIAL
The Information Contained In This Presentation Is Confidential And Proprietary To MicroStrategy. The Recipient Of This
4 Document Agrees That They Will Not Disclose Its Contents To Any Third Party Or Otherwise Use This Presentation For Any
Purpose Other Than An Evaluation Of MicroStrategy's Business Or Its Offerings. Reproduction or Distribution Is Prohibited.
+
2. Revolutionizing “Interactive
Reporting”
$ % &
' ( &
CONFIDENTIAL
The Information Contained In This Presentation Is Confidential And Proprietary To MicroStrategy. The Recipient Of This
5 Document Agrees That They Will Not Disclose Its Contents To Any Third Party Or Otherwise Use This Presentation For Any
Purpose Other Than An Evaluation Of MicroStrategy's Business Or Its Offerings. Reproduction or Distribution Is Prohibited.
+ %
• , - !
• $ . # & / !
• ! ! 0 % (
!
• ( % * &
• & 1
• ! ! !
" #
$
• "
•
• " !
CONFIDENTIAL
The Information Contained In This Presentation Is Confidential And Proprietary To MicroStrategy. The Recipient Of This
6 Document Agrees That They Will Not Disclose Its Contents To Any Third Party Or Otherwise Use This Presentation For Any
Purpose Other Than An Evaluation Of MicroStrategy's Business Or Its Offerings. Reproduction or Distribution Is Prohibited.
+ , -. '
% ! /
Report Designer
REPORT
IDEA
Starting Point Using
Other Reporting Tools
Design Metrics
Design Filters
Design Prompts
Design Custom Groupings
Design Access Control
Design Security Filters
Select Attributes & Metrics
Lay Out Objects on Template
Add Subtotals, Ranking
Time Transformations
Add Calculations
Fine Formatting and Layout
Execute Report
FINAL
REPORT
Changes to Content Tuning Visual
Business Person & Presentation Appeal
CONFIDENTIAL
The Information Contained In This Presentation Is Confidential And Proprietary To MicroStrategy. The Recipient Of This
7 Document Agrees That They Will Not Disclose Its Contents To Any Third Party Or Otherwise Use This Presentation For Any
Purpose Other Than An Evaluation Of MicroStrategy's Business Or Its Offerings. Reproduction or Distribution Is Prohibited.
+ , -. '
% ! $
REPORT
IDEA
Starting Point Using
Other Reporting Tools
in Re-Usable Metadata
Design Metrics Starting Point Using
Design Filters MicroStrategy
Design Prompts Report Designer
Design Custom Groupings
Design Access Control Select All Report Objects A Few Designers Create the Basic
Design Security Filters Reports Using Powerful Design-mode
Lay Out Objects on Template
Select Attributes & Metrics
Lay Out Objects on Template
Add Subtotals, Ranking Add Subtotals, Ranking
WYSIWYG-Mode
CONFIDENTIAL
The Information Contained In This Presentation Is Confidential And Proprietary To MicroStrategy. The Recipient Of This
8 Document Agrees That They Will Not Disclose Its Contents To Any Third Party Or Otherwise Use This Presentation For Any
Purpose Other Than An Evaluation Of MicroStrategy's Business Or Its Offerings. Reproduction or Distribution Is Prohibited.
+ $ . # 0
'
" " ! # $ #
% & # # # # # #
CONFIDENTIAL
The Information Contained In This Presentation Is Confidential And Proprietary To MicroStrategy. The Recipient Of This
9 Document Agrees That They Will Not Disclose Its Contents To Any Third Party Or Otherwise Use This Presentation For Any
Purpose Other Than An Evaluation Of MicroStrategy's Business Or Its Offerings. Reproduction or Distribution Is Prohibited.
+ $ ) ( / )
(
Division Directorate
Department Group
Staff
CONFIDENTIAL
The Information Contained In This Presentation Is Confidential And Proprietary To MicroStrategy. The Recipient Of This
10 Document Agrees That They Will Not Disclose Its Contents To Any Third Party Or Otherwise Use This Presentation For Any
Purpose Other Than An Evaluation Of MicroStrategy's Business Or Its Offerings. Reproduction or Distribution Is Prohibited.
+
3. Set Analysis
% #
" 0 ! " 0 !
CONFIDENTIAL
The Information Contained In This Presentation Is Confidential And Proprietary To MicroStrategy. The Recipient Of This
11 Document Agrees That They Will Not Disclose Its Contents To Any Third Party Or Otherwise Use This Presentation For Any
Purpose Other Than An Evaluation Of MicroStrategy's Business Or Its Offerings. Reproduction or Distribution Is Prohibited.
+ $ $ ) 2' $ '
. 3
# 0 (
4557
&
1
# $
4556 9 8 4557
!
.$
& # (
3 4556 3 4557
& 85 #
Single-click OLAP Manipulations Allow Relational OLAP Architecture Allows People To ‘Drill
People To Slice-and-Dice a Subset of Anywhere’ in The Entire Relational Database –
Data To View It from Many Different Across All Dimensions and From Summary Level To
Perspectives Transactional-level Detail
CONFIDENTIAL
The Information Contained In This Presentation Is Confidential And Proprietary To MicroStrategy. The Recipient Of This
12 Document Agrees That They Will Not Disclose Its Contents To Any Third Party Or Otherwise Use This Presentation For Any
Purpose Other Than An Evaluation Of MicroStrategy's Business Or Its Offerings. Reproduction or Distribution Is Prohibited.
+$ 3 # 0 3
!
0 ! : 0 ! : 0 ! : 0 $! # :
- ; <855= - ; <855= - ; <855= 0 !
" >5 " >5 " >5 ; <855=
.' # .? .' # .? " >5
.' ! 0 @ ' .' # .?
.' ! 0 @ '
1 , +, , , ! * +, , , ! 3,, ! 4, $ !
CONFIDENTIAL
The Information Contained In This Presentation Is Confidential And Proprietary To MicroStrategy. The Recipient Of This
13 Document Agrees That They Will Not Disclose Its Contents To Any Third Party Or Otherwise Use This Presentation For Any
Purpose Other Than An Evaluation Of MicroStrategy's Business Or Its Offerings. Reproduction or Distribution Is Prohibited.
+ $ $ $
CONFIDENTIAL
The Information Contained In This Presentation Is Confidential And Proprietary To MicroStrategy. The Recipient Of This
14 Document Agrees That They Will Not Disclose Its Contents To Any Third Party Or Otherwise Use This Presentation For Any
Purpose Other Than An Evaluation Of MicroStrategy's Business Or Its Offerings. Reproduction or Distribution Is Prohibited.
+ $
#
# ' ! #
# " ( 9! # ) " ( 9!
# #
)
5 6 $ !
0 7 '
!
" &
CONFIDENTIAL
The Information Contained In This Presentation Is Confidential And Proprietary To MicroStrategy. The Recipient Of This
15 Document Agrees That They Will Not Disclose Its Contents To Any Third Party Or Otherwise Use This Presentation For Any
Purpose Other Than An Evaluation Of MicroStrategy's Business Or Its Offerings. Reproduction or Distribution Is Prohibited.
+
• =! - &
• $)
CONFIDENTIAL
The Information Contained In This Presentation Is Confidential And Proprietary To MicroStrategy. The Recipient Of This
16 Document Agrees That They Will Not Disclose Its Contents To Any Third Party Or Otherwise Use This Presentation For Any
Purpose Other Than An Evaluation Of MicroStrategy's Business Or Its Offerings. Reproduction or Distribution Is Prohibited.
+ $ 4 (
) (: #
• ( $ - 1 '
• , ' $
$ #
• %
• ' ' , 1 A$
!
" #
• $#
& &
• -
B
CONFIDENTIAL
The Information Contained In This Presentation Is Confidential And Proprietary To MicroStrategy. The Recipient Of This
17 Document Agrees That They Will Not Disclose Its Contents To Any Third Party Or Otherwise Use This Presentation For Any
Purpose Other Than An Evaluation Of MicroStrategy's Business Or Its Offerings. Reproduction or Distribution Is Prohibited.
+ $ 5, -3 5 / %
%
& # #
Alerts Triggered Based on Reports and Alerts are Sent to the Users Can Get More Detail
Scouring Data from Schedules, Events, or Preferred Device by Opening Attachments or
All Sources Business Rules of Each User Clicking on Web Links
Personalized Information
Radar Continuously
Scours Databases
CONFIDENTIAL
The Information Contained In This Presentation Is Confidential And Proprietary To MicroStrategy. The Recipient Of This
18 Document Agrees That They Will Not Disclose Its Contents To Any Third Party Or Otherwise Use This Presentation For Any
Purpose Other Than An Evaluation Of MicroStrategy's Business Or Its Offerings. Reproduction or Distribution Is Prohibited.
+ # $
" $ "
! ( :
• " $ '
• $ * *(
• $ %
! % !
" $ " !
"
• ( '
%
• & , "
$#
• - 2 ! : $ *! *
* *" * !
CONFIDENTIAL
The Information Contained In This Presentation Is Confidential And Proprietary To MicroStrategy. The Recipient Of This
19 Document Agrees That They Will Not Disclose Its Contents To Any Third Party Or Otherwise Use This Presentation For Any
Purpose Other Than An Evaluation Of MicroStrategy's Business Or Its Offerings. Reproduction or Distribution Is Prohibited.
World-class Functionality for All
Business Users’ Needs