Our Blogs

WE LOVE TO SHARE

So here are our latest blogs sharing what we have learnt lately, we hope it will make your life easier.
Training in the future

Training in the future

I had the privilege of attending an instructor lead SAS Viya 3.3 administration course recently.  I have attended many in-person classroom based courses in the past, plus the odd webinar but this was my first Web Class or online course where participants could engage...

Don't start your project with code

Don't start your project with code

Ever needed to make sense of 13 million files?  Shaun did.  Where to start?  Start by thinking about the business, rather than the data.  Think about Who in the business Does What? My brief I was given complete discretion on how to turn millions of files into useful...

OptimalBI turns 10!

OptimalBI turns 10!

Happy birthday to us!  It doesn't seem like that long ago that I first joined the Optimal Bunch, I was in the first 'big' round of recruitment, back in 2012.  Since then we've evolved like any small business, so it's time to look back and see everything that has...

Supporting the Business

Supporting the Business

Hello, business leader!  How does your business grow?  Where are the weeds hiding?  Do you know?  Is this information that your business intelligence is providing?  Maybe not.  What needs to happen so that you will know?  Keep reading and I'll give you my thoughts. By...

Happy Holidays – see you in 2017!

Happy Holidays – see you in 2017!

2016 was a pretty busy one for us! When the end of the year comes, it's a good time to look back at the year that was to reflect on the good times, remember the lessons, and to wonder that 2017 will bring. Here's some photos of OptimalBI's 2016.  If you want to know...

Data. It’s a requirement Jim, but not as we know it.

Data. It’s a requirement Jim, but not as we know it.

Data requirements aren’t like other functional requirements. Non-data functional requirements can be relatively easily defined; ‘Registered users will be able to login to the system by providing a username and password’. They also fit easily into a prioritisation...