This tutorial shows you how to generate explanations for business problems by applying Intelligent Miner Modeling to corporate data. It also shows you how to display the results with Intelligent Miner Visualization. (R)
Other News
Specify scale for NUMBERs
Many developers do not specify a precision for NUMBER columns. This may be in order to minimize the work that would be needed to increase that precision should the application’s requirements change, but it is often just a matter of habit. And although it is possible using the undocumented (*,scale)
PRB: Long Running OLAP Queries do not Return Data When Connected Through HTTP
When you run a long running MDX query against an Analysis Services server through an HTTP or HTTPS connection, the client may never receive the results of the query. However, if you run the same query from a standard TCP/IP connection to the server, the results are returned to the client. This pr
A Bit About 64-bit
(Robert Pearl) I recently attended a seminar at MS NYC HQ, discussing in-depth, the release of Microsoft’s powerful 64-bit SQL Server, and wanted to share my thoughts with your readers. In what is being described as a watershed event, Microsoft is clearly aiming its sights on the enterprise clas
AlphaBlox deal anchors IBM’s BI strategy
(Ed Scannell and Tom Sullivan) After decades of being a technology used exclusively by IT administrators and professional researchers, IBM is trying to push business intelligence-based technologies out to the great gray mass of desktop users in a range of different commercial environments.
Store and Retrieve XML-based Business Objects with SQL Server and .NET (Part II)
(Evangelos Petroutsos) This is Part II of an article series that describes how to pass data into and out of SQL Server not as raw data or as DataSets, but as objects that represent business entities. Getting data out of SQL Server and into an object, a process described in detail in Part I of th
Encryption: XML Digital signatures in a nutshell
(XMLover) Digital signatures are widely used as security tokens, not just in XML. In this article, we look at how to create a digital signature and the way that digital signatures are constructed. We examine the current W3C XML digital signature and consider the effects of the structure of this X
Data Warehousing with IBM DB2 Clusters using an Intel-based Server Farm
IBM has long been a leader in parallel database technology with its Universal Database (UDB) DB2. Until recently, a special version of DB2 was required for those who wished to partition a database across multiple systems and allow those systems to work in parallel on a single database operation (suc
Building OracleAS Portlets Using Apache Struts
(Mark Rittman) A while ago I worked on an Oracle Portal project, that was based around a menu calling a number of Discoverer workbooks and other reports. The menu was a portlet that was located on the left-hand side and took up around a quarter of the page. The right-hand side was a portlet that con
Oracle Tip: How to use default values with database columns
When you create a database table, you have the option to specify a DEFAULT value. Using default values on database columns helps to insulate database design issues from application code. (R)
