How To Run An Enterprise Discovery

Size: px
Start display at page:

Download "How To Run An Enterprise Discovery"

Transcription

1 Enterprise Discovery Best Practices Informatica Corporation. No part of this document may be reproduced or transmitted in any form, by any means (electronic, photocopying, recording or otherwise) without prior consent of Informatica Corporation. All other company and product names may be trade names or trademarks of their respective owners and/or copyrighted materials of such owners.

2 Abstract This article describes the best practice guidelines that you can follow when you perform enterprise discovery for different use cases. An enterprise discovery profile runs multiple data discovery tasks on many data sources and generates a consolidated summary of the profile results. Supported Versions Data Quality Table of Contents Introduction Sampling Options Profile Functions Conclusion Introduction Enterprise discovery is a process that finds column profile statistics, data domains, primary keys, and foreign keys in many data sources spread across multiple connections or schemas. You can use enterprise discovery to solve use cases ranging from analyzing tables for specific properties to performing the entire data discovery analysis. You need to consider the cost impact and benefits before you extend the profile operation from a single table to a schema, especially because the tables in the schema might vary considerably in the number of column and rows. To meet this challenge, make sure that you choose the design-time and run-time parameters for enterprise discovery. Enterprise discovery has the following steps: 1. Column profile that discovers the basic column data. 2. Data domain discovery that discovers the functional meaning or semantics of column data. 3. Primary key profile that discovers the key structure of a table. 4. Foreign key profile that discovers table relationships in the schema. You can choose to run one or more steps when you run the enterprise discovery profile. How you choose the right parameters for each step of the enterprise discovery depends on the use case. The two primary use cases include screening summary profile statistics where enterprise discovery derives the results from a sample and complete analysis where the profile statistics come from the entire data set. Screening Versus Complete Analysis Use the screening use case to scan the tables in the schema for specific statistics and take the required actions. The most common use case is to screen a schema for specific data domains or patterns. Generally, you set the parameter values to reduce the total time for the profile run. There might be use cases where you apply aggressive sampling to prioritize accuracy over profile run time. To make aggressive sampling effective, the assumption is that the data is consistent in each table. If this assumption of data consistency does not hold, you must run a column profile on the entire data set. The complete analysis use case prioritizes complete and accurate information over the profile run time. One way to reduce the profile run time is to provide more hardware resources for profiling, such as additional cores or machines. This approach of adding more resources works because profiling is scalable. 2

3 Sampling Options You can use profiling to try different sampling techniques with differing trade-offs. Not all profiling steps support all the sampling options. The sampling options are as follows: Complete Selects all the rows in the data set for analysis. First N Rows Selects the first N rows of the data set, or the entire data set if the number of rows are fewer than N. This option is the fastest method because the Data Integration Service stops processing source rows after reading the first N from the source. However, if the data source changes over a period of time, this option might not select a representative source sample. Random N Rows Selects the specified number of rows randomly throughout the data set. First, profiling determines the number of rows in the data set to compute the percentage of rows to sample. Determining the number of rows might be costly for those data sources that do not keep track of this metric. Then, profiling reads the entire data set discarding those rows that are not in the sample. This step generally takes more time than sampling the first N rows. Random Sample (Auto) Uses the database to return a sample of rows based on more efficient sampling techniques that are specific to each database type. If a database does not support sampling push down, profiling uses a random sample of about 100,000 rows. For profiling the enterprise discovery, the first two sampling options are available at the EDD job level. These techniques are applied to all the data objects when the EDD job is created. If you require the Random N Rows or the Random Sample (Auto) option, go to each source object in the EDD profile and change it. When the EDD profile runs, the profile picks up the manually changed sampling options. When you run an enterprise discovery profile, the profile can use the Complete and First N Rows sampling options at the profile job level. When the profile first creates the enterprise discovery job, the profile applies the sampling techniques to all the data objects. Based on the requirement of other sampling techniques, the profile applies those sampling techniques to individual data objects. When the enterprise discovery job runs, the job uses the newer sampling parameters. The following table describes the sampling options that each profile type supports: Sampling Option Column Profile Data Domain Discovery Primary Key Profile Foreign Key Profile EDD Default Complete Yes Yes - Yes Column profiling, Foreign key profiling First N Rows Yes Yes Yes - Data domain discovery, Primary key profiling Random N Rows Yes Random Sample (Auto) Yes Sample Size After you decide to use a sampling option, the next logical question is what is the right sample size. If you have a data source that has a population fully contained in the data set, you can use any number of the available calculators. These calculators determine the random sample size based on the level of acceptable error. The following image depicts the number of rows that you can select based on the data set size for 95% and 99% accuracy levels. A general guideline is to select 1000 rows if 5% error is acceptable and 17,000 rows for 1% error. 3

4 When you use the First N Rows sampling technique, you can treat it as a random sample if there is no correlation between the rows. In this case, the general recommendation of 1000 row sample for 5% error and 17,000 row sample for 1% error applies. Otherwise, you can use your best judgment to determine an appropriate sample size. Note that the column profile and data domain discovery are optimized for processing sample sizes of 100,000 rows or fewer. Filtering Filtering is another way to sample the data source. You must apply filtering to individual tables because filtering is specific to the columns in the table. Use filtering to select the rows that meet the specific criteria or goals. Note: It is outside the scope of this document to make filter recommendations. Profile Functions The specific recommendations for each profiling function within an enterprise discovery profile vary based on the screening and complete analysis use cases. Data Domain Discovery Data domain discovery uses data rules to discover the semantic content of a column. If a data value matches the data rule in a data domain, it adds to the count that conforms to the data domain. A null represents a missing value and does not add to the count because it does not give any information about the data domain. For most columns, the data is consistent throughout the table. In these situations, if a data domain matches the column, it matches with all parts of the table including the initial rows. Therefore, the recommendation is to sample the first 1000 rows. This recommendation is also applicable for the screening analysis use case. You might have a use case that mandates a data domain to be inferred if a single row matches its data rule. For these use cases, set the minimum conformance percent to zero and the sampling option to All Rows. In the Analyst and Developer tools, you have a Verify option for data domain discovery. You can click Verify to get the counts of the conforming and non-conforming rows. You can also drill down into either set of rows. For interactive use cases, you can follow this approach with a small sample size for a quick and effective analysis. The small sample size provides for a quick profile. Then, use the Verify option only for those inferred data domains that require further investigation based on any unusual results. 4

5 Column Profiling The majority of the use cases for Column Profiling require you to select all rows for the analysis. These use cases require you to know the exact number of rows in the data source and the aggregate numbers. The general recommendation is to run a column profile on all rows of all the tables in the enterprise discovery profile. There are a few use cases where you do not need to compute the aggregate statistics on the entire data source. These use cases include the screening use case and interactive use case. For screening, you might want to compute and analyze aggregates such as the percentage null, patterns, and data type. If the profile results for a column display unusual values, you can run a profile on the column that uses the entire data set. For the interactive use case, you might know the approximate row count of a table. If the table has a high row count, instead of profiling all the rows, use a sample to identify the problems in the data set. After the initial inspection, you can decide whether to run a profile for the entire data set or not. If you apply any of the sampling options, the recommendation is to use a sample size less than or equal to 100,000 rows. This size makes sure that the sample is processed entirely within the DIS in one pass. This process is faster than splitting the work between the DIS and database. Primary Key Profiling Primary key profiling requires a sample of the data set because the algorithm consumes many resources when the profile runs on the entire data set. Even with aggressive sampling, the primary key profiling algorithm can run for a long time based on the complexity of the data. The general recommendation is to use a sample size equal to the square of the number of columns. For example, if the table has 50 columns, you can use a sample size of 2500 (502). Primary key profile results might display too many candidate primary keys or false positives. You can reduce the false positives in the following ways: Increasing the number of rows reduces false positives by increasing the probability that the extra rows might violate the false positives. The assumption is that a small sample might support these false positives. The recommendation is that when you increase the number of rows, verify that there are resources to accommodate the computation required by the algorithm. It is best to run primary key profiling first to get a baseline for the table before increasing the number of rows in the sample. Increasing the Minimum Percent Conformance or decreasing the Maximum Violation Rows reduces the false positives when there is a strong primary for the table. This action reduces false positives by aggressively eliminating the false positives by a small violation threshold. Decreasing the Max Key Columns might reduce the number of false positives by reducing the potential number of column combinations. When you allow more potential columns in a key, the probability of source data supporting the false positive key might be more. You can follow this method if the schema does not contain any table with a many primary key columns. Setting the Exclude data objects with parameter to exclude the documented, user-defined, and approved keys. You can use this parameter if the data source enforces primary keys. When you review the primary key profile results, you can use the Verify option to get the exact conformance of the key. All the duplicate rows and key columns that contain nulls count towards the number of violating rows. Foreign Key Profiling Foreign key profiling does not require sampling because the profile uses all of the data for each source. When you run a foreign key profile for the first time, the profile computes the signatures, which is an expensive operation. Subsequent profiles compute the signatures for new tables. Therefore, after the initial computation, the foreign key profiles run faster because the signature computation is complete. The exception to the reuse of the signatures is when you change some of the parameters to the foreign key profile. The parameters include using a different data type classification, case sensitivity, and trimming whitespace. When you change any of these parameters or when you select the Regenerate Signature option, the signatures are recomputed because these signatures take the preceding parameters into consideration. 5

6 Conclusion Enterprise discovery, by default, is configured for the screening use case. You can use sampling to reduce the overall cost of profiling a schema. You can tune the default parameters to enable the exact computation of all the profiling results. If you have to use sampling options in profiles, you can verify specific results to compute the exact values. Authors Jeff Millman Development Architect 6

Data Domain Profiling and Data Masking for Hadoop

Data Domain Profiling and Data Masking for Hadoop Data Domain Profiling and Data Masking for Hadoop 1993-2015 Informatica LLC. No part of this document may be reproduced or transmitted in any form, by any means (electronic, photocopying, recording or

More information

Data Domain Discovery in Test Data Management

Data Domain Discovery in Test Data Management Data Domain Discovery in Test Data Management 1993-2016 Informatica Corporation. No part of this document may be reproduced or transmitted in any form, by any means (electronic, photocopying, recording

More information

Cloud MDM Person Accounts

Cloud MDM Person Accounts Cloud MDM Person Accounts 2013 Informatica Corporation. No part of this document may be reproduced or transmitted in any form, by any means (electronic, photocopying, recording or otherwise) without prior

More information

Enterprise Performance Tuning: Best Practices with SQL Server 2008 Analysis Services. By Ajay Goyal Consultant Scalability Experts, Inc.

Enterprise Performance Tuning: Best Practices with SQL Server 2008 Analysis Services. By Ajay Goyal Consultant Scalability Experts, Inc. Enterprise Performance Tuning: Best Practices with SQL Server 2008 Analysis Services By Ajay Goyal Consultant Scalability Experts, Inc. June 2009 Recommendations presented in this document should be thoroughly

More information

Secure Agent Quick Start for Windows

Secure Agent Quick Start for Windows Secure Agent Quick Start for Windows 1993-2015 Informatica Corporation. No part of this document may be reproduced or transmitted in any form, by any means (electronic, photocopying, recording or otherwise)

More information

WhatsVirtual for WhatsUp Gold v16.0 User Guide

WhatsVirtual for WhatsUp Gold v16.0 User Guide WhatsVirtual for WhatsUp Gold v16.0 User Guide Contents Welcome Welcome to WhatsVirtual... 1 Using WhatsVirtual Discovering virtual devices... 2 Viewing discovery output... 4 Manage and monitor virtual

More information

An Oracle White Paper October 2013. Oracle Data Integrator 12c New Features Overview

An Oracle White Paper October 2013. Oracle Data Integrator 12c New Features Overview An Oracle White Paper October 2013 Oracle Data Integrator 12c Disclaimer This document is for informational purposes. It is not a commitment to deliver any material, code, or functionality, and should

More information

Using Temporary Tables to Improve Performance for SQL Data Services

Using Temporary Tables to Improve Performance for SQL Data Services Using Temporary Tables to Improve Performance for SQL Data Services 2014- Informatica Corporation. No part of this document may be reproduced or transmitted in any form, by any means (electronic, photocopying,

More information

Endpoint Security Console. Version 3.0 User Guide

Endpoint Security Console. Version 3.0 User Guide Version 3.0 Table of Contents Summary... 2 System Requirements... 3 Installation... 4 Configuring Endpoint Security Console as a Networked Service...5 Adding Computers, Groups, and Users...7 Using Endpoint

More information

Pipeliner CRM Phaenomena Guide Sales Target Tracking. 2015 Pipelinersales Inc. www.pipelinersales.com

Pipeliner CRM Phaenomena Guide Sales Target Tracking. 2015 Pipelinersales Inc. www.pipelinersales.com Sales Target Tracking 05 Pipelinersales Inc. www.pipelinersales.com Sales Target Tracking Learn how to set up Sales Target with Pipeliner Sales CRM Application. CONTENT. Setting up Sales Dynamic Target

More information

IBM Endpoint Manager for Software Use Analysis Version 9 Release 0. Customizing the software catalog

IBM Endpoint Manager for Software Use Analysis Version 9 Release 0. Customizing the software catalog IBM Endpoint Manager for Software Use Analysis Version 9 Release 0 Customizing the software catalog IBM Endpoint Manager for Software Use Analysis Version 9 Release 0 Customizing the software catalog

More information

Business User driven Scorecards to measure Data Quality using SAP BusinessObjects Information Steward

Business User driven Scorecards to measure Data Quality using SAP BusinessObjects Information Steward September 10-13, 2012 Orlando, Florida Business User driven Scorecards to measure Data Quality using SAP BusinessObjects Information Steward Asif Pradhan Learning Points SAP BusinessObjects Information

More information

Lab 02 Working with Data Quality Services in SQL Server 2014

Lab 02 Working with Data Quality Services in SQL Server 2014 SQL Server 2014 BI Lab 02 Working with Data Quality Services in SQL Server 2014 Jump to the Lab Overview Terms of Use 2014 Microsoft Corporation. All rights reserved. Information in this document, including

More information

Microsoft Office Live Meeting Events User s Guide

Microsoft Office Live Meeting Events User s Guide Microsoft Office Live Meeting Events User s Guide Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the companies,

More information

Configure an ODBC Connection to SAP HANA

Configure an ODBC Connection to SAP HANA Configure an ODBC Connection to SAP HANA 2013 Informatica Corporation. No part of this document may be reproduced or transmitted in any form, by any means (electronic, photocopying, recording or otherwise)

More information

Big Data and Analytics by Seema Acharya and Subhashini Chellappan Copyright 2015, WILEY INDIA PVT. LTD. Introduction to Pig

Big Data and Analytics by Seema Acharya and Subhashini Chellappan Copyright 2015, WILEY INDIA PVT. LTD. Introduction to Pig Introduction to Pig Agenda What is Pig? Key Features of Pig The Anatomy of Pig Pig on Hadoop Pig Philosophy Pig Latin Overview Pig Latin Statements Pig Latin: Identifiers Pig Latin: Comments Data Types

More information

www.dotnetsparkles.wordpress.com

www.dotnetsparkles.wordpress.com Database Design Considerations Designing a database requires an understanding of both the business functions you want to model and the database concepts and features used to represent those business functions.

More information

BizTalk Server 2006. Business Activity Monitoring. Microsoft Corporation Published: April 2005. Abstract

BizTalk Server 2006. Business Activity Monitoring. Microsoft Corporation Published: April 2005. Abstract BizTalk Server 2006 Business Activity Monitoring Microsoft Corporation Published: April 2005 Abstract This paper provides a detailed description of two new Business Activity Monitoring (BAM) features in

More information

Running a Workflow on a PowerCenter Grid

Running a Workflow on a PowerCenter Grid Running a Workflow on a PowerCenter Grid 2010-2014 Informatica Corporation. No part of this document may be reproduced or transmitted in any form, by any means (electronic, photocopying, recording or otherwise)

More information

MS SQL Performance (Tuning) Best Practices:

MS SQL Performance (Tuning) Best Practices: MS SQL Performance (Tuning) Best Practices: 1. Don t share the SQL server hardware with other services If other workloads are running on the same server where SQL Server is running, memory and other hardware

More information

SyAM Software Management Utilities. Performing a Power Audit

SyAM Software Management Utilities. Performing a Power Audit SyAM Software Management Utilities Performing a Power Power or How it Works Systems are discovered on the network, and organized into groups. For each group of systems a range of hours is defined to specify

More information

Configuring Email Notification for Business Glossary

Configuring Email Notification for Business Glossary Configuring Email Notification for Business Glossary 1993-2016 Informatica LLC. No part of this document may be reproduced or transmitted in any form, by any means (electronic, photocopying, recording

More information

Managing Latency in IPS Networks

Managing Latency in IPS Networks Application Note Revision B McAfee Network Security Platform Managing Latency in IPS Networks Managing Latency in IPS Networks McAfee Network Security Platform provides you with a set of pre-defined recommended

More information

Guide to Performance and Tuning: Query Performance and Sampled Selectivity

Guide to Performance and Tuning: Query Performance and Sampled Selectivity Guide to Performance and Tuning: Query Performance and Sampled Selectivity A feature of Oracle Rdb By Claude Proteau Oracle Rdb Relational Technology Group Oracle Corporation 1 Oracle Rdb Journal Sampled

More information

SAP HANA PLATFORM Top Ten Questions for Choosing In-Memory Databases. Start Here

SAP HANA PLATFORM Top Ten Questions for Choosing In-Memory Databases. Start Here PLATFORM Top Ten Questions for Choosing In-Memory Databases Start Here PLATFORM Top Ten Questions for Choosing In-Memory Databases. Are my applications accelerated without manual intervention and tuning?.

More information

Enterprise Reporter Report Library

Enterprise Reporter Report Library Enterprise Reporter Overview v2.5.0 This document contains a list of the reports in the Enterprise Reporter. Active Directory Reports Change History Reports Computer Reports File Storage Analysis Reports

More information

WebSphere Business Monitor

WebSphere Business Monitor WebSphere Business Monitor Monitor models 2010 IBM Corporation This presentation should provide an overview of monitor models in WebSphere Business Monitor. WBPM_Monitor_MonitorModels.ppt Page 1 of 25

More information

Mitigating Risks and Monitoring Activity for Database Security

Mitigating Risks and Monitoring Activity for Database Security The Essentials Series: Role of Database Activity Monitoring in Database Security Mitigating Risks and Monitoring Activity for Database Security sponsored by by Dan Sullivan Mi tigating Risks and Monitoring

More information

ORACLE ENTERPRISE MANAGER 10 g CONFIGURATION MANAGEMENT PACK FOR ORACLE DATABASE

ORACLE ENTERPRISE MANAGER 10 g CONFIGURATION MANAGEMENT PACK FOR ORACLE DATABASE ORACLE ENTERPRISE MANAGER 10 g CONFIGURATION MANAGEMENT PACK FOR ORACLE DATABASE CONFIGURATION MANAGEMENT PACK FEATURES Automated discovery of dependency relationships between services, systems and Oracle

More information

ORACLE SERVICE CLOUD GUIDE: HOW TO IMPROVE REPORTING PERFORMANCE

ORACLE SERVICE CLOUD GUIDE: HOW TO IMPROVE REPORTING PERFORMANCE ORACLE SERVICE CLOUD GUIDE: HOW TO IMPROVE REPORTING PERFORMANCE Best Practices to Scale Oracle Service Cloud Analytics for High Performance ORACLE WHITE PAPER MARCH 2015 Table of Contents Target Audience

More information

AssetTrack. Overview: AMI AssetTrack Integration for HP Asset Manager. Mobile Forms/Scanners. Web Forms CMYK: 62 42 73 25

AssetTrack. Overview: AMI AssetTrack Integration for HP Asset Manager. Mobile Forms/Scanners. Web Forms CMYK: 62 42 73 25 Overview: AMI AssetTrack Integration for HP Asset Manager AssetTrack is an enterprise barcode asset tracking solution for HP Asset Manager that enables Asset Manager customers to use handheld barcode scanners

More information

SQL Server An Overview

SQL Server An Overview SQL Server An Overview SQL Server Microsoft SQL Server is designed to work effectively in a number of environments: As a two-tier or multi-tier client/server database system As a desktop database system

More information

Columnstore Indexes for Fast Data Warehouse Query Processing in SQL Server 11.0

Columnstore Indexes for Fast Data Warehouse Query Processing in SQL Server 11.0 SQL Server Technical Article Columnstore Indexes for Fast Data Warehouse Query Processing in SQL Server 11.0 Writer: Eric N. Hanson Technical Reviewer: Susan Price Published: November 2010 Applies to:

More information

Create a Balanced Scorecard

Create a Balanced Scorecard Create a Balanced Scorecard SharePoint Business Intelligence Content Team Summary: Learn how to create scorecards and strategy maps across various measurements and display them in one dashboard by using

More information

Server Consolidation with SQL Server 2008

Server Consolidation with SQL Server 2008 Server Consolidation with SQL Server 2008 White Paper Published: August 2007 Updated: July 2008 Summary: Microsoft SQL Server 2008 supports multiple options for server consolidation, providing organizations

More information

SQL Server 2012 Performance White Paper

SQL Server 2012 Performance White Paper Published: April 2012 Applies to: SQL Server 2012 Copyright The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the date of publication.

More information

How to Create User-Defined Fields and Tables

How to Create User-Defined Fields and Tables SAP Business One How-To Guide PUBLIC How to Create User-Defined Fields and Tables Applicable Release: SAP Business One 8.8 All Countries English July 2009 Table of Contents Creating User-Defined Fields

More information

Installing and Configuring a SQL Server 2014 Multi-Subnet Cluster on Windows Server 2012 R2

Installing and Configuring a SQL Server 2014 Multi-Subnet Cluster on Windows Server 2012 R2 Installing and Configuring a SQL Server 2014 Multi-Subnet Cluster on Windows Server 2012 R2 Edwin Sarmiento, Microsoft SQL Server MVP, Microsoft Certified Master Contents Introduction... 3 Assumptions...

More information

Mapping Analyst for Excel Guide

Mapping Analyst for Excel Guide Mapping Analyst for Excel Guide Informatica PowerCenter (Version 8.6.1) Informatica Mapping Analyst for Excel Guide Version 8.6.1 March 2009 Copyright (c) 1998 2009 Informatica Corporation. All rights

More information

SuccessFactors Learning: Scheduling Management

SuccessFactors Learning: Scheduling Management SuccessFactors Learning: Scheduling Management Classroom Guide v 6.4 For SuccessFactors Learning v 6.4 Last Modified 08/30/2011 2011 SuccessFactors, Inc. All rights reserved. Execution is the Difference

More information

Improving Performance of Microsoft CRM 3.0 by Using a Dedicated Report Server

Improving Performance of Microsoft CRM 3.0 by Using a Dedicated Report Server Improving Performance of Microsoft CRM 3.0 by Using a Dedicated Report Server January 2006 Downloaded from http://www.sonomapartners.com/ - 1 - Information in this document, including URL and other Internet

More information

Chapter 5 More SQL: Complex Queries, Triggers, Views, and Schema Modification

Chapter 5 More SQL: Complex Queries, Triggers, Views, and Schema Modification Chapter 5 More SQL: Complex Queries, Triggers, Views, and Schema Modification Copyright 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 5 Outline More Complex SQL Retrieval Queries

More information

Exclaimer Email Alias Manager for Exchange Deployment Guide - Exclaimer Email Alias Manager for Exchange Outlook Add-In

Exclaimer Email Alias Manager for Exchange Deployment Guide - Exclaimer Email Alias Manager for Exchange Outlook Add-In Exclaimer Email Alias Manager for Exchange Deployment Guide - Exclaimer Email Alias Manager for Exchange Outlook Add-In www.exclaimer.com Contents About This Guide...3 System Requirements...4 Software...4

More information

An Oracle White Paper June 2012. Creating an Oracle BI Presentation Layer from Imported Oracle OLAP Cubes

An Oracle White Paper June 2012. Creating an Oracle BI Presentation Layer from Imported Oracle OLAP Cubes An Oracle White Paper June 2012 Creating an Oracle BI Presentation Layer from Imported Oracle OLAP Cubes Introduction Oracle Business Intelligence Enterprise Edition version 11.1.1.5 and later has the

More information

CA Nimsoft Monitor. Probe Guide for Active Directory Response. ad_response v1.6 series

CA Nimsoft Monitor. Probe Guide for Active Directory Response. ad_response v1.6 series CA Nimsoft Monitor Probe Guide for Active Directory Response ad_response v1.6 series Legal Notices This online help system (the "System") is for your informational purposes only and is subject to change

More information

When to consider OLAP?

When to consider OLAP? When to consider OLAP? Author: Prakash Kewalramani Organization: Evaltech, Inc. Evaltech Research Group, Data Warehousing Practice. Date: 03/10/08 Email: erg@evaltech.com Abstract: Do you need an OLAP

More information

Assets, Groups & Networks

Assets, Groups & Networks Complete. Simple. Affordable Copyright 2014 AlienVault. All rights reserved. AlienVault, AlienVault Unified Security Management, AlienVault USM, AlienVault Open Threat Exchange, AlienVault OTX, Open Threat

More information

Optimizing Performance. Training Division New Delhi

Optimizing Performance. Training Division New Delhi Optimizing Performance Training Division New Delhi Performance tuning : Goals Minimize the response time for each query Maximize the throughput of the entire database server by minimizing network traffic,

More information

Control Costs with a 4-Speed SACM Transmission

Control Costs with a 4-Speed SACM Transmission WHITE PAPER: Control Costs with a 4-Speed SACM Transmission Brent J. Knipfer Director ITSM Product Management CompuCom May 2012 Executive Summary IT executives are clamoring for more control over the physical

More information

Data Modeling Basics

Data Modeling Basics Information Technology Standard Commonwealth of Pennsylvania Governor's Office of Administration/Office for Information Technology STD Number: STD-INF003B STD Title: Data Modeling Basics Issued by: Deputy

More information

MDM Multidomain Edition (Version 9.6.0) For Microsoft SQL Server Performance Tuning

MDM Multidomain Edition (Version 9.6.0) For Microsoft SQL Server Performance Tuning MDM Multidomain Edition (Version 9.6.0) For Microsoft SQL Server Performance Tuning 2014 Informatica Corporation. No part of this document may be reproduced or transmitted in any form, by any means (electronic,

More information

JD Edwards EnterpriseOne Tools. 1 Understanding JD Edwards EnterpriseOne Business Intelligence Integration. 1.1 Oracle Business Intelligence

JD Edwards EnterpriseOne Tools. 1 Understanding JD Edwards EnterpriseOne Business Intelligence Integration. 1.1 Oracle Business Intelligence JD Edwards EnterpriseOne Tools Embedded Business Intelligence for JD Edwards EnterpriseOne Release 8.98 Update 4 E21426-02 March 2011 This document provides instructions for using Form Design Aid to create

More information

Data Warehouse and Business Intelligence Testing: Challenges, Best Practices & the Solution

Data Warehouse and Business Intelligence Testing: Challenges, Best Practices & the Solution Warehouse and Business Intelligence : Challenges, Best Practices & the Solution Prepared by datagaps http://www.datagaps.com http://www.youtube.com/datagaps http://www.twitter.com/datagaps Contact contact@datagaps.com

More information

Software that writes Software Stochastic, Evolutionary, MultiRun Strategy Auto-Generation. TRADING SYSTEM LAB Product Description Version 1.

Software that writes Software Stochastic, Evolutionary, MultiRun Strategy Auto-Generation. TRADING SYSTEM LAB Product Description Version 1. Software that writes Software Stochastic, Evolutionary, MultiRun Strategy Auto-Generation TRADING SYSTEM LAB Product Description Version 1.1 08/08/10 Trading System Lab (TSL) will automatically generate

More information

SAS Marketing Automation 5.1. User s Guide

SAS Marketing Automation 5.1. User s Guide SAS Marketing Automation 5.1 User s Guide The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2007. SAS Marketing Automation 5.1: User s Guide. Cary, NC: SAS Institute

More information

Dell InTrust 11.0 Best Practices Report Pack

Dell InTrust 11.0 Best Practices Report Pack Complete Product Name with Trademarks Version Dell InTrust 11.0 Best Practices Report Pack November 2014 Contents About this Document Auditing Domain Controllers Auditing Exchange Servers Auditing File

More information

AlienVault. Unified Security Management (USM) 5.x Policy Management Fundamentals

AlienVault. Unified Security Management (USM) 5.x Policy Management Fundamentals AlienVault Unified Security Management (USM) 5.x Policy Management Fundamentals USM 5.x Policy Management Fundamentals Copyright 2015 AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault,

More information

Qlik REST Connector Installation and User Guide

Qlik REST Connector Installation and User Guide Qlik REST Connector Installation and User Guide Qlik REST Connector Version 1.0 Newton, Massachusetts, November 2015 Authored by QlikTech International AB Copyright QlikTech International AB 2015, All

More information

Test Generator. Creating Tests

Test Generator. Creating Tests Test Generator Creating Tests Table of Contents# Cognero Overview... 1 Cognero Basic Terminology... 2 Logging On to Cognero... 3 Test Generator Organization... 4 Question Sets Versus Tests... 4 Editing

More information

A Practitioner s View

A Practitioner s View Hexaware Business Intelligence & Analytics Blogs Guide to A Practitioner s View Latest Trends and Information on BI/ DW Technologies for 2012 Actionable Intelligence Enabled TOC Trim Tabs in Business Intelligence

More information

Management Reporter Integration Guide for Microsoft Dynamics GP

Management Reporter Integration Guide for Microsoft Dynamics GP Microsoft Dynamics Management Reporter Integration Guide for Microsoft Dynamics GP July 2013 Find updates to this documentation at the following location: http://go.microsoft.com/fwlink/?linkid=162565

More information

Distributed File System Replication Management Pack Guide for System Center Operations Manager 2007

Distributed File System Replication Management Pack Guide for System Center Operations Manager 2007 Distributed File System Replication Management Pack Guide for System Center Operations Manager 2007 Microsoft Corporation Published: October 2009 Send suggestions and comments about this document to mpgfeed@microsoft.com.

More information

Windows Small Business Server 2003 Upgrade Best Practices

Windows Small Business Server 2003 Upgrade Best Practices Windows Small Business Server 2003 Upgrade Best Practices Microsoft Corporation Published: May 2005 Version: 1 Abstract To ensure a successful upgrade from the Microsoft Windows Small Business Server 2003

More information

L Impatto della SOA sulle competenze e l organizzazione ICT di Fornitori e Clienti

L Impatto della SOA sulle competenze e l organizzazione ICT di Fornitori e Clienti L Impatto della SOA sulle competenze e l organizzazione ICT di Fornitori e Clienti Francesco Maselli Technical Manager Italy Milano, 6 Maggio 2008 Aula magna di SIAM CONFIDENTIALITY STATEMENT AND COPYRIGHT

More information

Performance Tuning Guidelines for PowerExchange for Microsoft Dynamics CRM

Performance Tuning Guidelines for PowerExchange for Microsoft Dynamics CRM Performance Tuning Guidelines for PowerExchange for Microsoft Dynamics CRM 1993-2016 Informatica LLC. No part of this document may be reproduced or transmitted in any form, by any means (electronic, photocopying,

More information

HP Operations Smart Plug-in for Virtualization Infrastructure

HP Operations Smart Plug-in for Virtualization Infrastructure HP Operations Smart Plug-in for Virtualization Infrastructure for HP Operations Manager for Windows Software Version: 1.00 Deployment and Reference Guide Document Release Date: October 2008 Software Release

More information

Chapter 6 Basics of Data Integration. Fundamentals of Business Analytics RN Prasad and Seema Acharya

Chapter 6 Basics of Data Integration. Fundamentals of Business Analytics RN Prasad and Seema Acharya Chapter 6 Basics of Data Integration Fundamentals of Business Analytics Learning Objectives and Learning Outcomes Learning Objectives 1. Concepts of data integration 2. Needs and advantages of using data

More information

2009 Braton Groupe sarl, All rights reserved.

2009 Braton Groupe sarl, All rights reserved. D A T A B A S E M A N A G E R U S E R M A N U A L The information in this manual is not binding and may be modified without prior notice. Supply of the software described in this manual is subject to a

More information

Business Intelligence Tool Migration. Title: Domain: Client: Location:

Business Intelligence Tool Migration. Title: Domain: Client: Location: Business Intelligence Tool Migration Title: Domain: Client: Location: Business Objects to MicroStrategy Conversion Payment Services Major Payments Processing Services Provider Northville, MI Project Description

More information

StreamLink 5.0. StreamLink Configuration XML Reference. November 2009 C O N F I D E N T I A L

StreamLink 5.0. StreamLink Configuration XML Reference. November 2009 C O N F I D E N T I A L StreamLink Configuration XML Reference November 2009 C O N F I D E N T I A L Contents Contents 1 Preface... 1 1.1 1.2 1.3 1.4 1.5 1.6 What... this document contains 1 About... Caplin document formats 1

More information

Proactive Performance Management for Enterprise Databases

Proactive Performance Management for Enterprise Databases Proactive Performance Management for Enterprise Databases Abstract DBAs today need to do more than react to performance issues; they must be proactive in their database management activities. Proactive

More information

ASAV Configuration Advanced Spam Filtering

ASAV Configuration Advanced Spam Filtering ASAV Configuration Advanced Spam Filtering Step 1: Login to http://asav.mediaring.sg/ using the login credentials supplied in the Spam, Virus (ASAV) activation email. Step 2: Configuring Protection Level

More information

Pipeliner CRM Phaenomena Guide Sales Pipeline Management. 2015 Pipelinersales Inc. www.pipelinersales.com

Pipeliner CRM Phaenomena Guide Sales Pipeline Management. 2015 Pipelinersales Inc. www.pipelinersales.com Sales Pipeline Management 2015 Pipelinersales Inc. www.pipelinersales.com Sales Pipeline Management Learn how to manage sales opportunities with Pipeliner Sales CRM Application. CONTENT 1. Configuring

More information

Physical Design. Meeting the needs of the users is the gold standard against which we measure our success in creating a database.

Physical Design. Meeting the needs of the users is the gold standard against which we measure our success in creating a database. Physical Design Physical Database Design (Defined): Process of producing a description of the implementation of the database on secondary storage; it describes the base relations, file organizations, and

More information

UPGRADE. Upgrading Microsoft Dynamics Entrepreneur to Microsoft Dynamics NAV. Microsoft Dynamics Entrepreneur Solution.

UPGRADE. Upgrading Microsoft Dynamics Entrepreneur to Microsoft Dynamics NAV. Microsoft Dynamics Entrepreneur Solution. UPGRADE Microsoft Dynamics Entrepreneur Solution Upgrading Microsoft Dynamics Entrepreneur to Microsoft Dynamics NAV White Paper June 2008 The information contained in this document represents the current

More information

Configuring Hadoop Distributed File Service as an Optimized File Archive Store

Configuring Hadoop Distributed File Service as an Optimized File Archive Store Configuring Hadoop Distributed File Service as an Optimized File Archive Store 2013 Informatica Corporation. No part of this document may be reproduced or transmitted in any form, by any means (electronic,

More information

VMware vcenter Log Insight User's Guide

VMware vcenter Log Insight User's Guide VMware vcenter Log Insight User's Guide vcenter Log Insight 1.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition.

More information

ORACLE OPS CENTER: VIRTUALIZATION MANAGEMENT PACK

ORACLE OPS CENTER: VIRTUALIZATION MANAGEMENT PACK ORACLE OPS CENTER: VIRTUALIZATION MANAGEMENT PACK KEY FEATURES LIFECYCLE MANAGEMENT OF VIRTUALIZATION TECHNOLOGIES MADE SIMPLE Automation of lifecycle management reduces costs and errors while improving

More information

Step-by-Step Guide for Monitoring in Windows HPC Server 2008 Beta 2

Step-by-Step Guide for Monitoring in Windows HPC Server 2008 Beta 2 Step-by-Step Guide for Monitoring in Windows HPC Server 2008 Beta 2 Microsoft Corporation Published: May 2008 Abstract This guide provides procedures and guidance for monitoring compute nodes in Windows

More information

TIM 50 - Business Information Systems

TIM 50 - Business Information Systems TIM 50 - Business Information Systems Lecture 15 UC Santa Cruz March 1, 2015 The Database Approach to Data Management Database: Collection of related files containing records on people, places, or things.

More information

Performance rule violations usually result in increased CPU or I/O, time to fix the mistake, and ultimately, a cost to the business unit.

Performance rule violations usually result in increased CPU or I/O, time to fix the mistake, and ultimately, a cost to the business unit. Is your database application experiencing poor response time, scalability problems, and too many deadlocks or poor application performance? One or a combination of zparms, database design and application

More information

Achieving High Oracle Performance

Achieving High Oracle Performance Achieving High Oracle Performance Advanced Performance Management for Today s Complex, Critical Databases Abstract DBAs today need better tools than ever, because they are being asked to manage increasingly

More information

CA Service Desk Manager

CA Service Desk Manager PRODUCT BRIEF: CA SERVICE DESK MANAGER CA Service Desk Manager CA SERVICE DESK MANAGER IS A VERSATILE, COMPREHENSIVE IT SUPPORT SOLUTION THAT HELPS YOU BUILD SUPERIOR INCIDENT AND PROBLEM MANAGEMENT PROCESSES

More information

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief RSA Solution Brief Streamlining Security Operations with Managing RSA the Lifecycle of Data Loss Prevention and Encryption RSA envision Keys with Solutions RSA Key Manager RSA Solution Brief 1 Who is asking

More information

EnterGroup offers multiple spam fighting technologies so that you can pick and choose one or more that are right for you.

EnterGroup offers multiple spam fighting technologies so that you can pick and choose one or more that are right for you. CONFIGURING THE ANTI-SPAM In this tutorial you will learn how to configure your anti-spam settings using the different options we provide like Challenge/Response, Whitelist and Blacklist. EnterGroup Anti-Spam

More information

Data Quality Assessment. Approach

Data Quality Assessment. Approach Approach Prepared By: Sanjay Seth Data Quality Assessment Approach-Review.doc Page 1 of 15 Introduction Data quality is crucial to the success of Business Intelligence initiatives. Unless data in source

More information

Batch and Import Guide

Batch and Import Guide Batch and Import Guide 020411 Enterprise CRM, version 2.9 US 2011 Blackbaud, Inc. This publication, or any part thereof, may not be reproduced or transmitted in any form or by any means, electronic, or

More information

Creating a Secure Web Service In Informatica Data Services

Creating a Secure Web Service In Informatica Data Services Creating a Secure Web Service In Informatica Data Services 2013 Informatica Corporation. No part of this document may be reproduced or transmitted in any form, by any means (electronic, photocopying, recording

More information

Writers: Joanne Hodgins, Omri Bahat, Morgan Oslake, and Matt Hollingsworth

Writers: Joanne Hodgins, Omri Bahat, Morgan Oslake, and Matt Hollingsworth SQL Server Technical Article Writers: Joanne Hodgins, Omri Bahat, Morgan Oslake, and Matt Hollingsworth Technical Reviewer: Dan Jones Published: August 2009 Applies to: SQL Server 2008 R2, August CTP Summary:

More information

StarWind SMI-S Agent: Storage Provider for SCVMM April 2012

StarWind SMI-S Agent: Storage Provider for SCVMM April 2012 StarWind SMI-S Agent: Storage Provider for SCVMM April 2012 TRADEMARKS StarWind, StarWind Software, and the StarWind and StarWind Software logos are trademarks of StarWind Software that may be registered

More information

2012 Teklynx Newco SAS, All rights reserved.

2012 Teklynx Newco SAS, All rights reserved. D A T A B A S E M A N A G E R DMAN-US- 01/01/12 The information in this manual is not binding and may be modified without prior notice. Supply of the software described in this manual is subject to a user

More information

Chapter 2 The Data Table. Chapter Table of Contents

Chapter 2 The Data Table. Chapter Table of Contents Chapter 2 The Data Table Chapter Table of Contents Introduction... 21 Bringing in Data... 22 OpeningLocalFiles... 22 OpeningSASFiles... 27 UsingtheQueryWindow... 28 Modifying Tables... 31 Viewing and Editing

More information

Pattern Insight Clone Detection

Pattern Insight Clone Detection Pattern Insight Clone Detection TM The fastest, most effective way to discover all similar code segments What is Clone Detection? Pattern Insight Clone Detection is a powerful pattern discovery technology

More information

CDC UNIFIED PROCESS PRACTICES GUIDE

CDC UNIFIED PROCESS PRACTICES GUIDE Purpose The purpose of this document is to provide guidance on the practice of Modeling and to describe the practice overview, requirements, best practices, activities, and key terms related to these requirements.

More information

DocAve 4.1 Backup User Guide

DocAve 4.1 Backup User Guide September 2007 DocAve 4.1 Backup User Guide Additional user guides available at http://www.avepoint.com/support AvePoint DocAve TM 4.1 Enterprise Backup User Guide 1 Copyright 2001-2007 AvePoint, Inc.

More information

Deploying the Workspace Application for Microsoft SharePoint Online

Deploying the Workspace Application for Microsoft SharePoint Online Microsoft Dynamics GP Deploying the Workspace Application for Microsoft SharePoint Online Microsoft Dynamics GP Workspace is a method to enable Microsoft Excel-based dashboards for SharePoint Online. This

More information

Traffic Engineering Management Concepts

Traffic Engineering Management Concepts 3 CHAPTER This chapter includes an overview of Cisco Prime Fulfillment and of some of the concepts used in this guide. This chapter includes the following sections: Prime Fulfillment TEM Overview, page

More information

Enhance visibility into and control over software projects IBM Rational change and release management software

Enhance visibility into and control over software projects IBM Rational change and release management software Enhance visibility into and control over software projects IBM Rational change and release management software Accelerating the software delivery lifecycle Faster delivery of high-quality software Software

More information

Pipeliner CRM Phaenomena Guide Administration & Setup. 2015 Pipelinersales Inc. www.pipelinersales.com

Pipeliner CRM Phaenomena Guide Administration & Setup. 2015 Pipelinersales Inc. www.pipelinersales.com Administration & Setup 05 Pipelinersales Inc. www.pipelinersales.com Administration & Setup Learn how to manage your sales team with Pipeliner Sales CRM Application. CONTENT. Managing Pipeliner s Users

More information

Kaseya 2. User Guide. Version 1.1

Kaseya 2. User Guide. Version 1.1 Kaseya 2 Directory Services User Guide Version 1.1 September 10, 2011 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations.

More information