Flylib.com
List of Tables
Previous page
Table of content
Next page
Introduction
Table 1: The Core Kimball Data Warehouse Toolkit Titles
Chapter 1: Defining Business Requirements
Table 1.1: Adventure Works Cycles Product Orders by Category
Table 1.2: Adventure Works Cycles Product Orders by Country/Region
Table 1.3: Adventure Works Cycles Product Orders by Sales Channel
Table 1.4: Adventure Works Cycles Customers by Sales Channel Snapshot
Table 1.5: Business Processes Derived from Brian Welkers Interview
Chapter 2: Designing the Business Process Dimensional Model
Table 2.1: Example Customer Dimension Table Row as of Jan 1, 2006
Table 2.2: Example Order Fact Table Rows for Jane Rider as of Feb 22, 2006
Table 2.4: Updated Order Fact Table Rows for Jane Rider as of Feb 22, 2006
Table 2.3: Example Customer Dimension Table Row as of Jan 2, 2006 with a Type 2 Change
Table 2.5: Major Participants in Creating the Dimensional Model
Chapter 9: Building the BI Application in Reporting Services
Table 9.1: User Requirements and Functional Implications
Chapter 10: Incorporating Data Mining
Table 10.1: Examples of Business Tasks and Associated Algorithms
Table 10.2: The Primary Data Mining Datasets
Table 10.3: The City Economic Data Training Set After Data Preparation
Table 10.4: City Economic Data Listed by Cluster
Table 10.5: Additional Transformations Used to Create the Example Case Set
Table 10.6: Recommendations Model Validation Data Points
Chapter 12: Security
Table 12.1: Summary of Approaches for Implementing Data Access Security
Chapter 13: Metadata Plan
Table 13.1: Metadata Sources and Stores in the SQL Server 2005 BI Platform
Chapter 16: Managing Growth
Table 16.1: BI System Stakeholders and Engagement Tools
Chapter 17: Real-Time Business Intelligence
Table 17.1: Methods for Delivering Real-Time Data
Table 17.2: Methods for Receiving Notification of Data Changes
Previous page
Table of content
Next page
The MicrosoftВ Data Warehouse Toolkit: With SQL ServerВ 2005 and the MicrosoftВ Business Intelligence Toolset
ISBN: B000YIVXC2
EAN: N/A
Year: 2006
Pages: 125
Authors:
Joy Mundy
,
Warren Thornthwaite
,
Ralph Kimball
BUY ON AMAZON
CISSP Exam Cram 2
Multiple-Choice Question Format
Physical Security Risks
Failure States
Ethical Hacking
Exam Prep Questions
Cisco IOS Cookbook (Cookbooks (OReilly))
Adjusting Timers
Controlling Congestion with WRED
Limiting the Impact of IP Helper Addresses
Defining DHCP Configuration Options
Rewriting the Network Prefix
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century: Prevention and Detection for the Twenty-First Century
Tcpdump
IDS and IPS Internals
Cisco Secure IDS
Incident Response
Laws, Standards, and Organizations
Oracle SQL*Plus: The Definitive Guide (Definitive Guides)
Running SQL Queries
Table Security
Error Handling
Tuning and Timing
Improving on EXPLAIN PLAN Results
MPLS Configuration on Cisco IOS Software
Cell-Mode MPLS
Inter-Provider VPNs
Case Study-Inter-AS Implementing Route-Reflector and BGP Confederation in Provider Networks
Implementing VPNs with Layer 2 Tunneling Protocol Version 3
Case Study 4: Implementing Layer 3 VPNs over Layer 2 VPN Topologies and Providing L2 VPN Redundancy
Microsoft Visual Basic .NET Programmers Cookbook (Pro-Developer)
Strings and Regular Expressions
Windows Services
ADO.NET
Web Services
Useful COM Interop
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies