Data Otaku

A seemingly random collection of data- and database-related posts

Posts
  • Data Otaku

    Writeback to a Parent-Child Dimension

    • 0 Comments
    NOTE This is part of a series of entries on the topic of Building Writeback Applications with Analysis Services . Writeback to a parent-child dimension is handled using the ALTER CUBE MDX statement. This statement identifies the cube along with the...
  • Data Otaku

    Introducing Dimension Writeback

    • 0 Comments
    NOTE This is part of a series of entries on the topic of Building Writeback Applications with Analysis Services . Up to this point, we’ve focused exclusively on the update of measures using cell writeback. When we need to insert, update or delete...
  • Data Otaku

    Allocation across a Parent-Child Hierarchy

    • 0 Comments
    NOTE This is part of a series of entries onthe topic of Building Writeback Applications with Analysis Services . A parent-child hierarchy consists of members with which values are associated at various levels. A frequently cited example of such a hierarchy...
  • Data Otaku

    Understanding Allocations

    • 0 Comments
    NOTE This is part of a series of entries on the topic of Building Writeback Applications with Analysis Services . In my previous entries on this topic, I’ve been writing data to the Score measure at the intersection of an individual project and...
  • Data Otaku

    Sidebar: The MS IT Pattern for Custom Writeback Applications

    • 0 Comments
    NOTE This is part of a series of entries on the topic of Building a Writeback Application with Analysis Services . Writeback to cubes through Excel applications is used extensively within Microsoft to support a number of our internal processes, including...
  • Data Otaku

    Building a Custom Writeback Application

    • 0 Comments
    NOTE This is part of a series of entries on the topic of Building Writeback Applications with Analysis Services . If you have not read the other posts in this series, you will want to read A Technical Review of the Simple Demonstration before proceeding...
  • Data Otaku

    Building a Write-Enabled Cube

    • 0 Comments
    NOTE This is part of a series of entries on the topic of Building Writeback Applications with Analysis Services . To build a writeback application, you need a write-enabled cube and an application with which to interact with it. I’ll cover the...
  • Data Otaku

    A Technical Review of the Simple Demonstration

    • 0 Comments
    NOTE This is part of a series of entries on the topic of Building a Writeback Application with Analysis Services and makes direct reference to a previous post containing a simple demostration of what-if analysis . In the simple demonstration of writeback...
  • Data Otaku

    Sidebar: The Other What-If Analysis Options in Excel

    • 0 Comments
    NOTE This is part of a series of entries on the topic of Building a Writeback Application with Analysis Services . What-if analysis against Analysis Services is just one form of what-if analysis supported by Excel. Other forms focus on spreadsheet...
  • Data Otaku

    A Simple Demonstration of What-If Analysis

    • 0 Comments
    NOTE This is the second of a series of entries on the topic of Building a Writeback Application with Analysis Services . To demonstrate writeback with Analysis Services, I’ll leverage a simple model built around a project selection process that...
  • Data Otaku

    Understanding What-If Analysis

    • 0 Comments
    NOTE This is the first of a series of entries on the topic of Building Writeback Applications with Analysis Services . Business analysts frequently encounter questions focused on the impact of potential change: What if we raised our parts and...
  • Data Otaku

    Building a Writeback Application with Analysis Services

    • 3 Comments
    Recently, I delivered a presentation at the 2012 PASS SQL Rally titled Building a Writeback Application with Analysis Services. Based on feedback from that session, I’ve decided to address this topic in my blog, making this information accessible...
  • Data Otaku

    An Introduction to Big Data Concepts

    • 0 Comments
    The idea that data collected in computerized systems could be used to inform and thereby improve decision making has been around for quite some time. Over the last couple decades, ideas of how to assemble a decision support system have coalesced around...
  • Data Otaku

    An Introduction to BigData Concepts: My Disclaimer

    • 0 Comments
    Recently, Microsoft announced its plans around Hadoop and all of a sudden BigData is part of the mainstream conversation we are having with our customers. As a Business Intelligence practitioner, I couldn’t be more excited about this, but having...
  • Data Otaku

    Creating Your First FileTable in SQL Server Denali CTP3

    • 4 Comments
    With SQL Server Denali CTP3 now available , I'm starting to explore some of the new Database Engine capabilities. One that caught my attention is the FileTable . The FileTable builds upon FileStream storage which allows BLOB data to be stored as individual...
  • Data Otaku

    Virtualizing the SharePoint 2010 Database-Tier

    • 0 Comments
    Over the last few months, I’ve had a number of conversations with customers regarding the virtualization of SQL Server for the database-tier of SharePoint Server 2010 deployments. Historically, administrators have been hesitant to virtualize SQL...
  • Data Otaku

    Securing the Data Warehouse

    • 1 Comments
    After completing a series of posts on Building Secure Database Applications , the question of how the practices and features highlighted apply to data warehouses arose. In a traditional database application, the database is a behind-the-scenes element...
  • Data Otaku

    Regulate Network Connectivity

    • 2 Comments
    SQL Server accepts client connections over specific network protocols and (for lack of a better term) associated channels. The combination of network protocol, a channel, and the type of communication taking place over it is managed from within SQL Server...
  • Data Otaku

    Monitor & Enforce Security Policies

    • 0 Comments
    Once a security policy is defined, it then needs to be monitored and enforced to ensure compliance. SQL Server provides two features for this: policy-based management and audit. Policy-Based Management Introduced with SQL Server 2008, policy-based...
  • Data Otaku

    SQL Injection Demo

    • 0 Comments
    The purpose of this post is to demonstrate a simple SQL injection attack. For information on securing a database against SQL injection, please review this post . NOTE Implementing an actual SQL injection attack against a system for which you have not...
  • Data Otaku

    Defend against SQL Injection

    • 0 Comments
    SQL injection is an attack by which user input is used to modify the logic of a SQL statement. The attack may be used to disrupt the underlying database or bypass application logic but more typically it is used to extract additional information from the...
  • Data Otaku

    Transparent Data Encryption (TDE) Demo

    • 0 Comments
    This post demonstrates the use of Transparent Data Encryption (TDE) to protect database files including backups. To understand how this features can be employed to improve the security of database applications, please review this post . The first step...
  • Data Otaku

    Digital Signing Demo

    • 3 Comments
    This post demonstrates the use of a digital signing function to ensure data within a table is unaltered outside a given set of stored procs. To understand how these and other crytographic functions can be employed to improve the security of database applications...
  • Data Otaku

    Cryptographic Function Demo

    • 2 Comments
    This post demonstrates the use of a cryptographic function encrypt data within a table. To understand how the crytographic functions can be employed to improve the security of database applications, please review this post . The first step in the demonstration...
  • Data Otaku

    Encrypt the Data

    • 0 Comments
    SQL Server supports the encryption of data through a number of mechanisms. These include: Cryptographic functions for the encryption and signing of individual values, The Transparent Data Encryption (TDE) feature through which the data and log...
Page 2 of 3 (58 items) 123