ISOL 536 CU W7 Business analytics and business intelligence essay

Description

Consider the data flow “octopus,” as shown in Figure 8.1. How can the analysis system gather data from all these sources that, presumably, are protected themselves?