List of Tables

List of Tables

Introduction

Table 1: The Core Kimball Data Warehouse Toolkit Titles

Chapter 1: Defining Business Requirements

Table 1.1: Adventure Works Cycles Product Orders by Category
Table 1.2: Adventure Works Cycles Product Orders by Country/Region
Table 1.3: Adventure Works Cycles Product Orders by Sales Channel
Table 1.4: Adventure Works Cycles Customers by Sales Channel Snapshot
Table 1.5: Business Processes Derived from Brian Welkers Interview

Chapter 2: Designing the Business Process Dimensional Model

Table 2.1: Example Customer Dimension Table Row as of Jan 1, 2006
Table 2.2: Example Order Fact Table Rows for Jane Rider as of Feb 22, 2006
Table 2.4: Updated Order Fact Table Rows for Jane Rider as of Feb 22, 2006
Table 2.3: Example Customer Dimension Table Row as of Jan 2, 2006 with a Type 2 Change
Table 2.5: Major Participants in Creating the Dimensional Model

Chapter 9: Building the BI Application in Reporting Services

Table 9.1: User Requirements and Functional Implications

Chapter 10: Incorporating Data Mining

Table 10.1: Examples of Business Tasks and Associated Algorithms
Table 10.2: The Primary Data Mining Datasets
Table 10.3: The City Economic Data Training Set After Data Preparation
Table 10.4: City Economic Data Listed by Cluster
Table 10.5: Additional Transformations Used to Create the Example Case Set
Table 10.6: Recommendations Model Validation Data Points

Chapter 12: Security

Table 12.1: Summary of Approaches for Implementing Data Access Security

Chapter 13: Metadata Plan

Table 13.1: Metadata Sources and Stores in the SQL Server 2005 BI Platform

Chapter 16: Managing Growth

Table 16.1: BI System Stakeholders and Engagement Tools

Chapter 17: Real-Time Business Intelligence

Table 17.1: Methods for Delivering Real-Time Data
Table 17.2: Methods for Receiving Notification of Data Changes

List of Examples

Chapter 6: Developing the ETL System

Hands-on Example
Hands-on Example
Hands-on Example
Hands-on Example
Hands-on Example
Hands-on Example
Example 6.1: Script transform to set end dates
Example 6.2: Sample stored procedure to insert an audit row

Chapter 12: Security

Example 12.1: Data definition for the UserPermissions_SalesRep table
Example 12.2: INSERT rows that define which employees Joy can see
Example 12.3: Define a view to provide row-level security
Example 12.4: Create a temporary user to test security roles

List of Sidebars

Introduction

BETTER LATE THAN NEVER

Chapter 1: Defining Business Requirements

ENTERPRISE VERSUS PROJECT
BUSINESS PROCESS: THE DW/BI SYSTEM UNIT OF WORK
A CREDIBILITY BOOSTER
ALTERNATIVES TO INDIVIDUAL INTERVIEWS
THE HISTORY OF ADVENTURE WORKS
THE NAME GAME IN ACTION

Chapter 2: Designing the Business Process Dimensional Model

THE POWER OF DIMENSIONS
HOW SLOW IS SLOW?
RECURSIVE CAPABILITIES
DATA-DRIVEN MODELS VERSUS BUSINESS REQUIREMENTSDRIVEN MODELS
TREAD LIGHTLY
TRACKING HISTORYONCE MORE WITH FEELING

Chapter 3: The Toolset

USE BOTH RELATIONAL AND OLAP DATA STORES
INTEGRATE DEVELOPMENT DATABASES EARLY
EDITIONS AND FEATURES OF SQL SERVER 2005

Chapter 4: Setup and Physical Design

COMPARING DATABASE SIZES
HOW POWERFUL SHOULD DEVELOPMENT AND TEST SYSTEMS BE?
SQL SERVER 2000/2005 CHANGE: ANALYSIS SERVICES METADATA
INDEXING VERY LARGE DIMENSIONS
PSEUDO-PARTITION CHARACTERISTICS
PARTITIONED TABLE LIMITATIONS

Chapter 5: Designing the ETL System

SQL SERVER 2000/2005 CHANGE: DATA TRANSFORMATION SERVICES
SORTING AND AGGREGATING LARGE DATASETS
A CAUTIONARY TALE
THE IDEAL PACKAGED BI MODULE
THE SAP .NET PROVIDER
ANOTHER CAUTIONARY TALE
STAGE FACT DATA FOR RECOVERABILITY

Chapter 6: Developing the ETL System

SCRIPTS WITH MULTIPLE INPUTS OR OUTPUTS
ITS NOT OUR PROBLEM
SIMILARITY VERSUS CONFIDENCE
INTEGRATION SERVICES RAW FILES
MORE ON THE OLE DB COMMAND TRANSFORM
PRECEDENCE CONSTRAINT CONDITIONS
ADVANCED TOPIC: LATE ARRIVING FACTS
PARTITIONED FACT TABLES
AN EVEN SIMPLER AUDITING SYSTEM

Chapter 7: Designing the Analysis Services OLAP Database

WHATS NEW IN ANALYSIS SERVICES 2005 OLAP ENGINE?
STARTING THE ANALYSIS SERVICES SERVER
RUNNING THE CUBE WIZARD: THE ONE-CLICK CUBE
ANALYSIS SERVICES DIMENSION TERMINOLOGY
BUILD THE DIMENSION WITHOUT USING A DATA SOURCE
CONFORMED DIMENSIONS
ATTRIBUTE HIERARCHIES
ANALYSIS SERVICES CUBE TERMINOLOGY
THOSE PESKY ATTRIBUTE RELATIONSHIPS AGAIN
WHERE TO GO FOR HELP
CUBE PHYSICAL STORAGE TERMINOLOGY

Chapter 8: Business Intelligence Applications

VIPS
THE DANGER OF DASHBOARDS
THE BASIC BUSINESS ANALYSIS CYCLE

Chapter 9: Building the BI Application in Reporting Services

LEARNING REPORTING SERVICES
REPORT DEFINITION LANGUAGE
REPORT BUILDER
THE LIMITS OF SECURITY
REPORTING SERVICES WORKAROUNDS
TWEAKING THE REPORT LAYOUT
TABLE-DRIVEN REPORT DISTRIBUTION

Chapter 10: Incorporating Data Mining

THE POWER OF NAMING
ADDITIONAL INFORMATION ON THE DATA MINING PROCESS
SECURITY
WORKING WITH THE TREE VIEWER

Chapter 12: Security

UNEXPECTED VALUE OF OPEN ACCESS
DATA ACCESS POLICY
SAMPLE DATA SENSITIVITY DOCUMENT
SOME COMMENTS ON THE SCALABILITY OF DIMENSION SECURITY
SPECIAL PRIVILEGES FOR POWER USERS

Chapter 13: Metadata Plan

IN THEIR OWN WORDS
METADATA, META DATA, OR META-DATA?
THE METADATA SCHEMA AND THE ENHANCEMENT PROCESS

Chapter 14: Deployment

USING INTEGRATION SERVICES CONFIGURATIONS
BE EXTRA CAREFUL WITH ANALYSIS SERVICES DEPLOYMENTS
REPORT DEPLOYMENT PROCESS
INTRODUCTORY ONE-DAY AD HOC QUERY COURSE OUTLINE

Chapter 15: Operations and Maintenance

REMOTE PACKAGE EXECUTION
INCREMENTAL BACKUPS

Chapter 16: Managing Growth

THE COMPETITIVE SPIRIT
STEALTH MARKETING

Chapter 17: Real-Time Business Intelligence

LOCATION OF THE REAL-TIME LAYER
WHY USE BUSINESS KEYS IN THE REAL-TIME LAYER?
REVIEW OF STORAGE MODE (MOLAP, HOLAP, ROLAP)
RECOMMENDED STORAGE MODE
WHATS ALL THIS ABOUT CACHING?
SAMPLE POLLING AND PROCESSING QUERIES