Uncategorized

Do You Have Control of Your Data – Pt 2?

Webcast: Agile Business Intelligence – Proven Techniques that move BI Development into the Agile World
As more and more organizations embrace agile development methodologies, tools and agile processes are becoming more mainstream and almost transparent to the developer; however, the problem of embracing agile development is still an issue for those working on Business Intelligence projects. This problem is exacerbated by the fact that tools for BI development haven’t quite caught up to the unique problems presented by Business Intelligence development. This session will discuss Agile techniques as they relate to Business Intelligence Projects, with a particular focus on Microsoft SQL Server Integration Services (SSIS) and Microsoft SQL Server Analysis Services (SSAS) development. Attendees will learn how to adapt the Microsoft Solutions Framework (MSF) for Agile process template for Business Intelligence, and will show how to integrate Visual Studio Team System and Team Foundation Server into your agile BI projects. Attendees will leave this session with a good understanding of how agile can apply to the BI world.

Presented by: Ted Malone

> Register Now
> Live date: 10/27/2010 at 12:00 Pacific

Featured Article(s)
SQL Server Log Shipping (Part 1 of 2)
In this session, were going to go a little bit deep in log shipping, well talk about what log shipping really is, kind of explain from a high-level perspective of log shipping and then just discuss the internals in terms of how the system works, what steps are required to configure log shipping, what roles happen behind the scenes in terms of whats going on when log shipping is working, the jobs that are initiated from a SQL agent perspective, talk a little bit about the architecture.

Featured Script
dba3_REBUILD_LOG
Rebuild a transaction log (for problem databases only!) put the DB into bypass recovery mode then drop all TL extents, and cr… (read more)

Do You Have Control of Your Data – Pt 2?

Yesterday I talked about some of the control issues that arise with tools such as Power Pivot in the hands of the business community. Users can consume data, manipulate it, or allow it to go stale. Decisions made on this inaccurate data may result in less than optimal business decisions.

In contrast to user activity I wanted to talk about access control supporting user self help. With users extracting their own data into a mining tool the impact on the data store is much different than that of a canned report. No longer do you have the ability to predict user criteria. Depending on the data needed for a user query, the impact on the database server or analysis services may be rather heavy. In fact, the load can predictably bring the data server to its knees. When, why; still to be determined.

So, you as a database storage administrator, are going to need help in predicting, detecting and solving the as yet unknown needs of your users. You no longer have a clear contained knowledge of what queries need to be run. This is a good thing.

In addition, access controls to your data become more important. Perhaps you are going to require vertical or horizontal partitioning…not for performance, but to enforce data restrictions and visibility. Perhaps you are going to integrate data access with active directory in order to simplify data access controls. this is the flip side to what I talked about yesterday. Yesterday we talked about end users sharing data they were able to access with persons who are not granted access. In this case, you are required to share the same data repository with multiple users each having different access levels.

For example, you have persons from the HR department and department managers requiring access to salary and bonus information. Department managers should only see data for their department. On the other hand, you have the average user who want the company directory, requiring no salary information. In this case you need to filter data based on end user roles. And your systems need to be flexible enough to work with different rows or columns based on the different clients.

OK, this is pretty basic. But, do you have a plan to implement and maintain complex data requirements? Can you meet rapidly changing data access and security needs quickly? How do you do it? Share with our readers your thoughts and experiences. Send you email to btaylor@sswug.org.

Cheers,

Ben