Flylib.com
List of Sidebars
Previous page
Table of content
Introduction
BETTER LATE THAN NEVER
Chapter 1: Defining Business Requirements
ENTERPRISE VERSUS PROJECT
BUSINESS PROCESS: THE DW/BI SYSTEM UNIT OF WORK
A CREDIBILITY BOOSTER
ALTERNATIVES TO INDIVIDUAL INTERVIEWS
THE HISTORY OF ADVENTURE WORKS
THE NAME GAME IN ACTION
Chapter 2: Designing the Business Process Dimensional Model
THE POWER OF DIMENSIONS
HOW SLOW IS SLOW?
RECURSIVE CAPABILITIES
DATA-DRIVEN MODELS VERSUS BUSINESS REQUIREMENTSDRIVEN MODELS
TREAD LIGHTLY
TRACKING HISTORYONCE MORE WITH FEELING
Chapter 3: The Toolset
USE BOTH RELATIONAL AND OLAP DATA STORES
INTEGRATE DEVELOPMENT DATABASES EARLY
EDITIONS AND FEATURES OF SQL SERVER 2005
Chapter 4: Setup and Physical Design
COMPARING DATABASE SIZES
HOW POWERFUL SHOULD DEVELOPMENT AND TEST SYSTEMS BE?
SQL SERVER 2000/2005 CHANGE: ANALYSIS SERVICES METADATA
INDEXING VERY LARGE DIMENSIONS
PSEUDO-PARTITION CHARACTERISTICS
PARTITIONED TABLE LIMITATIONS
Chapter 5: Designing the ETL System
SQL SERVER 2000/2005 CHANGE: DATA TRANSFORMATION SERVICES
SORTING AND AGGREGATING LARGE DATASETS
A CAUTIONARY TALE
THE IDEAL PACKAGED BI MODULE
THE SAP .NET PROVIDER
ANOTHER CAUTIONARY TALE
STAGE FACT DATA FOR RECOVERABILITY
Chapter 6: Developing the ETL System
SCRIPTS WITH MULTIPLE INPUTS OR OUTPUTS
ITS NOT OUR PROBLEM
SIMILARITY VERSUS CONFIDENCE
INTEGRATION SERVICES RAW FILES
MORE ON THE OLE DB COMMAND TRANSFORM
PRECEDENCE CONSTRAINT CONDITIONS
ADVANCED TOPIC: LATE ARRIVING FACTS
PARTITIONED FACT TABLES
AN EVEN SIMPLER AUDITING SYSTEM
Chapter 7: Designing the Analysis Services OLAP Database
WHATS NEW IN ANALYSIS SERVICES 2005 OLAP ENGINE?
STARTING THE ANALYSIS SERVICES SERVER
RUNNING THE CUBE WIZARD: THE ONE-CLICK CUBE
ANALYSIS SERVICES DIMENSION TERMINOLOGY
BUILD THE DIMENSION WITHOUT USING A DATA SOURCE
CONFORMED DIMENSIONS
ATTRIBUTE HIERARCHIES
ANALYSIS SERVICES CUBE TERMINOLOGY
THOSE PESKY ATTRIBUTE RELATIONSHIPS AGAIN
WHERE TO GO FOR HELP
CUBE PHYSICAL STORAGE TERMINOLOGY
Chapter 8: Business Intelligence Applications
VIPS
THE DANGER OF DASHBOARDS
THE BASIC BUSINESS ANALYSIS CYCLE
Chapter 9: Building the BI Application in Reporting Services
LEARNING REPORTING SERVICES
REPORT DEFINITION LANGUAGE
REPORT BUILDER
THE LIMITS OF SECURITY
REPORTING SERVICES WORKAROUNDS
TWEAKING THE REPORT LAYOUT
TABLE-DRIVEN REPORT DISTRIBUTION
Chapter 10: Incorporating Data Mining
THE POWER OF NAMING
ADDITIONAL INFORMATION ON THE DATA MINING PROCESS
SECURITY
WORKING WITH THE TREE VIEWER
Chapter 12: Security
UNEXPECTED VALUE OF OPEN ACCESS
DATA ACCESS POLICY
SAMPLE DATA SENSITIVITY DOCUMENT
SOME COMMENTS ON THE SCALABILITY OF DIMENSION SECURITY
SPECIAL PRIVILEGES FOR POWER USERS
Chapter 13: Metadata Plan
IN THEIR OWN WORDS
METADATA, META DATA, OR META-DATA?
THE METADATA SCHEMA AND THE ENHANCEMENT PROCESS
Chapter 14: Deployment
USING INTEGRATION SERVICES CONFIGURATIONS
BE EXTRA CAREFUL WITH ANALYSIS SERVICES DEPLOYMENTS
REPORT DEPLOYMENT PROCESS
INTRODUCTORY ONE-DAY AD HOC QUERY COURSE OUTLINE
Chapter 15: Operations and Maintenance
REMOTE PACKAGE EXECUTION
INCREMENTAL BACKUPS
Chapter 16: Managing Growth
THE COMPETITIVE SPIRIT
STEALTH MARKETING
Chapter 17: Real-Time Business Intelligence
LOCATION OF THE REAL-TIME LAYER
WHY USE BUSINESS KEYS IN THE REAL-TIME LAYER?
REVIEW OF STORAGE MODE (MOLAP, HOLAP, ROLAP)
RECOMMENDED STORAGE MODE
WHATS ALL THIS ABOUT CACHING?
SAMPLE POLLING AND PROCESSING QUERIES
Previous page
Table of content
The MicrosoftВ Data Warehouse Toolkit: With SQL ServerВ 2005 and the MicrosoftВ Business Intelligence Toolset
ISBN: B000YIVXC2
EAN: N/A
Year: 2006
Pages: 125
Authors:
Joy Mundy
,
Warren Thornthwaite
,
Ralph Kimball
BUY ON AMAZON
A Practitioners Guide to Software Test Design
State-Transition Testing
Section III - Testing Paradigms
Exploratory Testing
Section V - Some Final Thoughts
Appendix B Stateless University Registration System Case Study
Cisco IOS in a Nutshell (In a Nutshell (OReilly))
Setting the Routers Time
Naming and Numbering Interfaces
Types of Access Lists
Multicast Routing
Switches and VLANs
The Complete Cisco VPN Configuration Guide
IPsec Standards
PPTP and L2TP Remote Access
VPN Client GUI Options
Configuring the VPN 3000 Concentrator
Company Profile
Lotus Notes Developers Toolbox: Tips for Rapid and Successful Deployment
Installing the Designer Client
Working with Conditional Branching
An Introduction to LotusScript
Create an Attach File Button
Managing Database Access
Cisco ASA: All-in-One Firewall, IPS, and VPN Adaptive Security Appliance
Managing Licenses
Configuring Quality of Service
Additional IPS Features
Remote Access VPN
Configuring Basic AIP-SSM Settings
Python Programming for the Absolute Beginner, 3rd Edition
The Greps of Wrath
Time Tools, Threads, and Animation
Python Restricted Execution Mode
Windows Web Scripting Extensions
See Jack Hack. Hack, Jack, Hack
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies