7 - 10 July 2014   |   Barcelona, Spain

Session presentations and videos.

Most of our session videos and presentations are available below. Click on the “+” sign next to the track to reveal all the sessions below, then click on the session title to access the video or presentation material.


Track 1: Self-Service Visual Data Discovery for Everyone

Introduction to Self-Service Data Visualization in MicroStrategy: Concepts, Capabilities, and Paths for Growth
Decision makers are increasingly looking for user-friendly tools that help them analyze data without expert assistance. IT departments are struggling to meet that demand without compromising security and reliability of their data. This session will introduce you to MicroStrategy's newest release, MicroStrategy Analytics Desktop – and demonstrate how the platform's data visualization capabilities can fulfill the demand for self-service while giving IT the right tools to protect the data and ensure users trust their results.

Download presentation slides

Best Practices in Data Visualization
Presenting data to an audience of decision-makers involves more than simply assembling different charts into a dashboard. In order to effectively convey your message, it is important to choose the right chart type for your data and understand how different formatting techniques can impact your presentation. In this introductory-level session you will learn best practices for conveying insights with visualizations by understanding how people process information. Understand how patterns, trends, and outliers in data can be exposed or obscured by a graph's design and how certain graph types are better for specific analyses.

Download presentation slides

Best Practices: How to Broadly Deploy Trusted, Governed Self-Service Analytics to Business Users (And Why You Can't Do it with Tableau or Qlik)
Data visualization tools have become popular because they allow business people to transform their data into insightful visualizations without expert assistance; however, not all tools are created equal. As your organization evolves and requirements grow, some can even generate serious security risks and lack of trust in the data. Learn how MicroStrategy delivers the necessary governance mechanisms for establishing formal accountability through roles, responsibilities and system monitoring to ensure a more transparent, secure, and trusted environment.

Download presentation slides

A Deep Dive Into Self-Service Data Discovery in MicroStrategy
Self-service visual analytics increase productivity by turning report consumers into data explorers and shifting the responsibility of building dashboards away from IT. This session is ideal for existing MicroStrategy customers and prospects interested in delivering self-service capabilities to their end users. Understand how features like Data Import and Visual Insight let users access data without architecting a project and build dashboards on their own using interactive and insightful visualizations. Then learn what steps you need to take to enable self-service within your existing MicroStrategy environment.

Download presentation slides

Track 2: Enterprise Business Intelligence

Design Principles for Next-Generation Dashboards and Information-Driven Apps
Your business users are surrounded by stunning, immersive apps in their personal lives. From Flipboard to Mint.com, cutting-edge applications seamlessly blend analytics, action, and news into a beautiful user experience. On the other hand, most enterprise dashboards are still drab combinations of grids and graphs. To create transformative applications that are embraced by users, you need to rethink and reimagine your analytic applications. You need to build information-driven apps. In this session you will learn the five keys to building transformative dashboards and information-driven apps: Information density, guided actionable workflows, Mobility, Mass personalized distribution, and real-time updates.

Download presentation slides

Customizing MicroStrategy: Using the MicroStrategy SDK for Superior Integration and Enhancement
Out-of-the-box MicroStrategy user interfaces have been designed and perfected by our experts to meet the vast majority of analytics requirements: however, each organization and each application is unique, and with the MicroStrategy Web SDK, customers have been able to easily extend, change, and integrate the way MicroStrategy Web works in their environments to better fulfill their particular business needs. In this session you will discover how to integrate MicroStrategy with existing business environments, implement custom authentication scenarios, and deploy custom visualizations to expand the vast library already available out-of-the-box and display your data in new, attractive ways to your business users.

Download presentation slides

Track 3: Big Data and Advanced Analytics

Transforming Your Organization Using Advanced Analytics You Never Knew You Had with MicroStrategy
Advanced analytics have the power to transform any organization, especially when they are made simple and understandable for people on the front lines.  MicroStrategy makes it easier than ever before to create and deploy advanced analytics that empower the analytical amateur in all of us.  Every MicroStrategy user has access to deep native analytics that can be used to solve the most common business problems.  Thanks to the innovative integration with R, objectives requiring beyond out-of-the-box analytics can be deployed easily to any user, anywhere in the BI ecosystem.  This presentation is intended for anyone interested in using MicroStrategy for Advanced Analytics, especially those new to the MicroStrategy platform or anyone who plans to participate in one of the Thursday morning Hands-on Workshops focused on Advanced Analytics.

Download presentation slides

Tapping Into Hadoop and NoSQL Data Sources with MicroStrategy
Virtually all Big Data initiatives involve working with one or multiple Hadoop and NoSQL data systems. Learn how MicroStrategy can harness the power of commercial Hadoop distributions, Apache Hadoop, and MongoDB to help analyze big and unstructured datasets. This session will cover the different integration points that MicroStrategy has with the Big Data ecosystem such as, analyzing text using MicroStrategy’s text analytics module and visualization capabilities for Big Data use cases. Also a sneak peek into our upcoming big data initiatives. 

Download presentation slides

Track 4: Get to Know Your MicroStrategy Analytics Platform

Easily Federate and Analyze Data from Multiple Sources with Governance and Reusability
MicroStrategy allows data federation from relational, multidimensional, operational, and Hadoop & NOSQL sources. This session explores how to set up governance on heterogeneous data from multiple sources using common business attributes, metrics and relationships. This session will also cover how MicroStrategy gives business people the option to blend data in-memory for self-service data mashups and insightful visualizations without prior data modeling.

Download presentation slides

Track 5: Maximizing Performance, Scalability, and Deployment Speed: Cloud, PRIME, and More

MicroStrategy PRIME: High-Performance, In-Memory Analytics at Multi-Terabyte Scale
MicroStrategy PRIME breaks new ground by tightly coupling a state-of-the art visualization and dashboarding engine with an innovative massively parallel in-memory data store. This architecture allows companies to rapidly build and deploy powerful information-driven apps that deliver analytics to hundreds of thousands of users in a fraction of the time and cost of other approaches. In this session you will learn about how customers are using MicroStrategy PRIME, and take a peek behind the curtains at the technology powering it.

Download presentation slides

Track 6: Mobile Apps for Business

Mobile Security: The Seven Habits of State-of-the-Art Mobile App Security
Enterprise mobile apps, by their very nature, live outside the corporate firewall. As such, securing them must be a part of your mobile strategy. New mobile app developers often realize the need for security too late in the process as many tools and techniques used to develop apps do not take security issues into consideration. MicroStrategy mobile apps include a wide range of security mechanisms that you can utilize out-of-the box to keep your apps and data secure. Attend this session to learn about how MicroStrategy’s latest security features help to mitigate security risk – without impacting app capabilities or user experience – and to save you the headache of learning the security lesson the hard way

Download presentation slides

Mobile User Monitoring: Configuring and Using Client-Side Monitoring
Every MicroStrategy Mobile-powered app can capture personalized analyses every time a user taps on an app screen. Statistics are gathered on time spent on each app screen, exploration paths, GPS location, app usage, device type, operating system version, cache usage, and more. With this capability and information, app developers can track engagement KPIs; discover user-chosen navigation paths; monitor the health of their deployment; and gain insight on where users are located and which devices they use. Learn how MicroStrategy enables a new generation of apps that are developed and maintained leveraging real-world user data.

Download presentation slides

Track 7: Mobile Apps for Business

Supporting BYOD with MicroStrategy Mobile to Cut Costs and Securely Deploy to Thousands
Advances in technology have driven phones and computing devices to become smaller, smarter, and more affordable, driving adoption of these devices in the consumer marketplace at an exponential rate. As availability of these devices has increased due to consumer demand, so has the demand increased for utilizing the personal electronic device (PED) as a productivity tool within the corporate workplace. Corporations are challenged with the decision on how or whether to support the use of PED’s within their technology infrastructure. Industry analysts now recommend companies develop and implement a Bring Your Own Device (BYOD) program in order to catch up to the mobile device marketplace and address the many challenges of incorporating PED’s into the IT infrastructure. Attend this session to learn about how MicroStrategy’s technology platform can not only help support your BYOD program but become an integral component to device monitoring, security, and management. Incorporating MicroStrategy into your BYOD program can add value and insight unparalleled with any other technology in the industry.

Download presentation slides

Mobile App Performance: The Tips and Tricks to Building Lightning-fast Apps
Performance requirements for mobile dashboards are more rigorous than those running on MicroStrategy Web or desktop clients. The difference can be attributed to the fact that mobile clients must compensate for slower Wifi and cellular networks and device-side memory constraints. Due to these limitations, MicroStrategy recommends implementing the performance tuning strategies outlined in this session to deliver high performing mobile apps to your end users.

Download presentation slides

Track 8: Hands-on Workshops: Analytics

Intro to Self-Service Visual Analytics: Import and Blend Data, Create Visualizations, and Share Dashboards in Minutes
This session is a hands-on workshop in which participants will use MicroStrategy to build dashboards effortlessly using interactive data visualizations. The workshop is designed for business and IT users regardless of technical skill or prior expertise with business analytics software. Members of the MicroStrategy team will be on hand to answer questions.

Laptops will be available on a first-come, first-served basis.

Download presentation slides

Intro to Self-Service Visual Analytics: Import and Blend Data, Create Visualizations, and Share Dashboards in Minutes
This session is a hands-on workshop in which participants will use MicroStrategy to build dashboards effortlessly using interactive data visualizations. The workshop is designed for business and IT users regardless of technical skill or prior expertise with business analytics software. Members of the MicroStrategy team will be on hand to answer questions.

Laptops will be available on a first-come, first-served basis.

Download presentation slides

Maximizing Sales Productivity: From Sales Operations Analysis to Mobile Sales Rep Empowerment
Try your hand at analyzing sales data in this hand-on workshop. Use the latest Microstrategy technology to create compelling, insightful analytical dashboards that can help organizations efficiently manage sales processes and increase win rates. See how easy it is to deliver dashboards to mobile devices, so sales reps have the latest analytics at their fingertips. The workshop is designed for business and IT users regardless of technical skill or prior expertise with business analytics software. Members of the MicroStrategy team will be on hand to answer questions.

Laptops will be available on a first-come, first-served basis.

Download presentation slides

Track 9: Hands-on Workshops: Mobile, Enterprise BI and Mobile Identity

Mobile App Design: Learn Brilliant Yet Simple Design Rules
Mobile consumer apps have raised the bar on all application design. They exhibit qualities in graphical layout, fit and finish, and ease-of-use that are superior to any previous application model. These same standards can apply to business apps too. This session will focus on how to apply simple design techniques to provide your users with exciting and compelling enterprise apps, which can be on par with the very best apps in the app stores. 



Download presentation slides

Guide to Building Information-Driven Apps - Concept and Prototyping
Traditionally, the hardest part of building an information app has been the design of the app. Using a combination of Visual Insight and report services, participants in this hands on lab will learn how to quickly prototype an app using visual data discovery, and convert it to a professional production dashboard and application. Members of the MicroStrategy team will be on hand to answer questions.

Laptops will be available on a first-come, first serve basis.

Download presentation slides

Guide to Building Information-Driven Apps - Designing Engaging Analytical Apps with Multimedia and Transactional Features
Users need to analyze and consume information from a variety of sources, both structured and unstructured, and both real time and historical. Traditional dashboards have focused on analysis of structured, historical data. In this hands-on workshop session, participants will use MicroStrategy to add real-time, multimedia and unstructured information to dashboards. Data sources include Twitter, videos, images, and documents. Members of the MicroStrategy team will be on hand to answer questions.

Laptops will be available on a first-come, first serve basis.


Download presentation slides

Track 10: Mobile Identity Platform

Overview of the Usher Mobile Identity Platform
Traditional forms of identity, such as ID badges, passwords, tokens, and cards, fail to protect users from fraud, cybercrime, and theft, causing billions of dollars in losses to governments, businesses, and individuals each year. The Usher Identity Platform eliminates these vulnerabilities by replacing traditional forms of identity with mobile identity that lets users validate one other’s identity, log in to applications, unlock entryways, and authorize transactions— all from their smartphones. Usher also gives administrators global visibility into system threat activity and the actions of their end users. Discover how Usher revolutionizes identity by delivering secure personal identification to every application and business process across the enterprise.

Download presentation slides

Mobile Identity for Government Institutions
Government institutions provide a multitude of public services that require accurate identity validation, including health care, welfare, education, law enforcement, and public safety. Unfortunately, the forms of identity used to access or administer these services are prone to fraud and theft. Join this session to learn how the Usher Mobile Identity Platform utilizes smartphones to deliver validated identity that enhances the security of government processes, as well as reduces operational costs, while increasing constituent satisfaction. 

Download presentation slides

Streamlining Business Processes through Mobile Identity
Establishing identity is a critical step in all customer and employee interactions with each other and with the systems we provide them.  However, identifying people using physical forms of identity are error prone, time consuming, and easily defrauded, causing organizations to over-engineer business process and insert time-consuming steps that waste time, money, and productivity. Come to this session to find out how usher mobile identity can be applied to diverse business processes from across the enterprise to make them more secure and faster. 

Download presentation slides

Overview of the Usher Mobile Identity Platform
Traditional forms of identity, such as ID badges, passwords, tokens, and cards, fail to protect users from fraud, cybercrime, and theft, causing billions of dollars in losses to governments, businesses, and individuals each year. The Usher Identity Platform eliminates these vulnerabilities by replacing traditional forms of identity with mobile identity that lets users validate one other’s identity, log in to applications, unlock entryways, and authorize transactions— all from their smartphones. Usher also gives administrators global visibility into system threat activity and the actions of their end users. Discover how Usher revolutionizes identity by delivering secure personal identification to every application and business process across the enterprise.

Download presentation slides

Mobile Identity for Loyalty and Payment Card Solutions
As consumers increasingly rely on their smartphones, the demand for brand loyalty programs based on mobile phones has never been greater. Meanwhile, massive payment data breaches at premier retailers highlight the need for a solution that protects companies and their customers from cyber attacks and the subsequent damage to their brand image. Fortunately, your company can completely recast its approach to customer loyalty and payment security by establishing a high-bandwidth channel directly to customer smartphones through MicroStrategy’s Identity and Loyalty platforms.

Attend this session to learn how MicroStrategy’s powerful capabilities, including personalized promotions, mobile payments, social loyalty, and geo-fencing can help your organization build a dynamic and secure connection to mobile consumers. MicroStrategy’s Identity and Loyalty Platforms combine to deliver state of the art payment security features and provide a superlative customer experience to increase engagement, accelerate sales, and reduce the risk of payment fraud.

Download presentation slides

Usher Identity Platform Security Architecture
Every year, companies lose millions of dollars to cybercrime and fraud, incurring lasting damage to their reputations and loss of customer confidence. The Usher Identity Platform protects company resources against unauthorized access and usage, by leveraging a sophisticated array of techniques orchestrated across the Usher infrastructure and mobile app. Learn how the Usher Identity Platform security features ensure the protection of business resources and brand equity, all while enhancing the user experience.

Download presentation slides

Some extras.

Twitter