Flylib.com
List of Sidebars
Previous page
Table of content
Introduction
BETTER LATE THAN NEVER
Chapter 1: Defining Business Requirements
ENTERPRISE VERSUS PROJECT
BUSINESS PROCESS: THE DW/BI SYSTEM UNIT OF WORK
A CREDIBILITY BOOSTER
ALTERNATIVES TO INDIVIDUAL INTERVIEWS
THE HISTORY OF ADVENTURE WORKS
THE NAME GAME IN ACTION
Chapter 2: Designing the Business Process Dimensional Model
THE POWER OF DIMENSIONS
HOW SLOW IS SLOW?
RECURSIVE CAPABILITIES
DATA-DRIVEN MODELS VERSUS BUSINESS REQUIREMENTSDRIVEN MODELS
TREAD LIGHTLY
TRACKING HISTORYONCE MORE WITH FEELING
Chapter 3: The Toolset
USE BOTH RELATIONAL AND OLAP DATA STORES
INTEGRATE DEVELOPMENT DATABASES EARLY
EDITIONS AND FEATURES OF SQL SERVER 2005
Chapter 4: Setup and Physical Design
COMPARING DATABASE SIZES
HOW POWERFUL SHOULD DEVELOPMENT AND TEST SYSTEMS BE?
SQL SERVER 2000/2005 CHANGE: ANALYSIS SERVICES METADATA
INDEXING VERY LARGE DIMENSIONS
PSEUDO-PARTITION CHARACTERISTICS
PARTITIONED TABLE LIMITATIONS
Chapter 5: Designing the ETL System
SQL SERVER 2000/2005 CHANGE: DATA TRANSFORMATION SERVICES
SORTING AND AGGREGATING LARGE DATASETS
A CAUTIONARY TALE
THE IDEAL PACKAGED BI MODULE
THE SAP .NET PROVIDER
ANOTHER CAUTIONARY TALE
STAGE FACT DATA FOR RECOVERABILITY
Chapter 6: Developing the ETL System
SCRIPTS WITH MULTIPLE INPUTS OR OUTPUTS
ITS NOT OUR PROBLEM
SIMILARITY VERSUS CONFIDENCE
INTEGRATION SERVICES RAW FILES
MORE ON THE OLE DB COMMAND TRANSFORM
PRECEDENCE CONSTRAINT CONDITIONS
ADVANCED TOPIC: LATE ARRIVING FACTS
PARTITIONED FACT TABLES
AN EVEN SIMPLER AUDITING SYSTEM
Chapter 7: Designing the Analysis Services OLAP Database
WHATS NEW IN ANALYSIS SERVICES 2005 OLAP ENGINE?
STARTING THE ANALYSIS SERVICES SERVER
RUNNING THE CUBE WIZARD: THE ONE-CLICK CUBE
ANALYSIS SERVICES DIMENSION TERMINOLOGY
BUILD THE DIMENSION WITHOUT USING A DATA SOURCE
CONFORMED DIMENSIONS
ATTRIBUTE HIERARCHIES
ANALYSIS SERVICES CUBE TERMINOLOGY
THOSE PESKY ATTRIBUTE RELATIONSHIPS AGAIN
WHERE TO GO FOR HELP
CUBE PHYSICAL STORAGE TERMINOLOGY
Chapter 8: Business Intelligence Applications
VIPS
THE DANGER OF DASHBOARDS
THE BASIC BUSINESS ANALYSIS CYCLE
Chapter 9: Building the BI Application in Reporting Services
LEARNING REPORTING SERVICES
REPORT DEFINITION LANGUAGE
REPORT BUILDER
THE LIMITS OF SECURITY
REPORTING SERVICES WORKAROUNDS
TWEAKING THE REPORT LAYOUT
TABLE-DRIVEN REPORT DISTRIBUTION
Chapter 10: Incorporating Data Mining
THE POWER OF NAMING
ADDITIONAL INFORMATION ON THE DATA MINING PROCESS
SECURITY
WORKING WITH THE TREE VIEWER
Chapter 12: Security
UNEXPECTED VALUE OF OPEN ACCESS
DATA ACCESS POLICY
SAMPLE DATA SENSITIVITY DOCUMENT
SOME COMMENTS ON THE SCALABILITY OF DIMENSION SECURITY
SPECIAL PRIVILEGES FOR POWER USERS
Chapter 13: Metadata Plan
IN THEIR OWN WORDS
METADATA, META DATA, OR META-DATA?
THE METADATA SCHEMA AND THE ENHANCEMENT PROCESS
Chapter 14: Deployment
USING INTEGRATION SERVICES CONFIGURATIONS
BE EXTRA CAREFUL WITH ANALYSIS SERVICES DEPLOYMENTS
REPORT DEPLOYMENT PROCESS
INTRODUCTORY ONE-DAY AD HOC QUERY COURSE OUTLINE
Chapter 15: Operations and Maintenance
REMOTE PACKAGE EXECUTION
INCREMENTAL BACKUPS
Chapter 16: Managing Growth
THE COMPETITIVE SPIRIT
STEALTH MARKETING
Chapter 17: Real-Time Business Intelligence
LOCATION OF THE REAL-TIME LAYER
WHY USE BUSINESS KEYS IN THE REAL-TIME LAYER?
REVIEW OF STORAGE MODE (MOLAP, HOLAP, ROLAP)
RECOMMENDED STORAGE MODE
WHATS ALL THIS ABOUT CACHING?
SAMPLE POLLING AND PROCESSING QUERIES
Previous page
Table of content
The MicrosoftВ Data Warehouse Toolkit: With SQL ServerВ 2005 and the MicrosoftВ Business Intelligence Toolset
ISBN: B000YIVXC2
EAN: N/A
Year: 2006
Pages: 125
Authors:
Joy Mundy
,
Warren Thornthwaite
,
Ralph Kimball
BUY ON AMAZON
Cisco IOS in a Nutshell (In a Nutshell (OReilly))
IOS User Modes
Command-Line Editing Keys
Interface Commands
Interior and Exterior Gateway Protocols
OSPF
Introduction to 80x86 Assembly Language and Computer Architecture
String Operations
Bit Manipulation
Floating-Point Arithmetic
Appendix C MASM 6.11 Reserved Words
Appendix D 80x86 Instructions (by Mnemonic)
101 Microsoft Visual Basic .NET Applications
Working with the Microsoft Visual Basic .NET Language
Data Access
Working with the .NET Framework
Advanced .NET Framework
Securing Applications
Google Maps Hacks: Tips & Tools for Geographic Searching and Remixing
Hack 1. Get Around http://maps.google.com
Hack 27. Add Google Maps to Any Web Site
Hack 46. Browse Photography by Shooting Location
Hack 51. Make a Fullscreen Map the Right Way
Hack 57. Do a Local Zoom with GxMagnifier
MPLS Configuration on Cisco IOS Software
Configuring L2TPv3 Dynamic Tunnels
L2 VPN-Any to Any Interworking
MPLS QoS Operating Modes
Case Study 1: Implementing Multicast Support for MPLS VPNs
Case Study 5: Implementing Dynamic Layer 3 VPNs Using mGRE Tunnels
Python Programming for the Absolute Beginner, 3rd Edition
Pipes
Launching Programs on Windows
Sending Files to Clients and Servers
Administrative Tools
Strategies for Parsing Text in Python
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies