Modeling Pattern Awareness
|
|
- Jessica Wade
- 5 years ago
- Views:
Transcription
1 Modeling Pattern Awareness Modeling Pattern Awareness 2014 Authored by: Hans Hultgren
2 Modeling Pattern Awareness The importance of knowing your pattern Forward Over the past decade Ensemble Modeling has been steadily becoming the preferred method for modeling the data warehouse. More recently we have also seen a rise in the schemaless alternatives associated with many of the big data deployments. Where we once had to choose between 3NF and Dimensional modeling, we now have a dynamic range of alternatives (and flavors) that translate into an expanding set of possible patterns. As we move forward in this new world of modeling possibilities, it becomes increasingly important to know and understand your modeling pattern. When discussing the options, strategies and considerations related to your design pattern it becomes clear that there are no strictly right or wrong choices. The only choice that is inherently wrong is to proceed without defining or understanding your modeling pattern. 1
3 Index FORWARD...1 INDEX...2 MODELING THE DATA WAREHOUSE...3 MODELING PATTERN FLAVORS AND ALTERNATIVES...3 SCHEMA-LESS ALTERNATIVES...4 DEPLOYMENT AND ARCHITECTURE ALTERNATIVES...4 DETERMINING YOUR PATTERN...5 MODELING PATTERN AWARENESS...5 WANT TO LEARN MORE?...5 LINKS AND RESOURCES...6 ABOUT HANS HULTGREN...6 APPENDIX: TYPES OF ENSEMBLE INFOGRAPHIC...7 2
4 Modeling the Data Warehouse Today the modeling of an Enterprise Data Warehousing (EDW) is moving towards using Ensemble Modeling approaches. These approaches specifically address the data warehouse requirements of agility, traceability, historization and low latency performance. The Data Vault modeling approach leads this group of Ensemble Modeling methods but there are several others in the group including 2G, Anchor, Focal Point, Head & Version, Temporal and 6NF. From a high level perspective the main modeling choices for the DW are now 3NF, Dimensional, and Ensemble modeling. However there are two factors that expand these choices into a broader array of possibilities. First is the growing list of modeling pattern flavors and alternatives that are available today, and Second is the pool of Big Data driven schema-less alternatives. Modeling Pattern Flavors and Alternatives The flavors of Ensemble modeling begin with the approaches mentioned above (See also the Appendix: Types of Ensemble Infographic). But within each one of these flavors there are also more choices that define a particular modeling pattern. For example, within the Data Vault modeling approach some of the more defining alternatives include a) Abstracted Concepts, b) Typed Relationships, c) Multi-Active or Multi-Valued Satellites, d) Raw vs Business Vault, e) Peg-Leg Links, f) Transactional Links, g) Link:Link relationships, h) Composite vs Concatenated BK, i) Stand-Alone Reference Tables, j) Standard Attribute Clusters, k) Unit Of Work and mixed cardinality Links, l) End Dating Alternatives, and etc. These alternatives lead to the definition of dozens of different patterns. Within the traditional approaches of 3NF and Dimensional modeling there are also several defining alternatives to consider. For example, with Dimensional modeling you will need to make active decisions concerning a) Historization, b) Level of Conformity, c) Abstracted Dimensions, d) Outliers, e) Star vs Snow Flaking, f) Factless Facts, g) Mini-Dimensions, h) Scope and Number of Facts, i) Bridging, j) Hierarchies, k) Persisted versus In Memory, l) Key Integration, and etc. In all cases, the choices you make for each of these alternatives will define your specific pattern. While these choices provide you with a great deal of freedom and flexibility, it is critical that you actively make these decisions and then define and document your final pattern. This is because pattern consistency and predictability are major critical success factors for your data warehousing team. Without a predictable standard your automation strategies will not be effective. Without consistency the agility of your team will be greatly compromised. The alternatives covered thus far are related to schema-based modeling techniques and approaches. The other paradigm we need to consider is the schema-less techniques. 3
5 Schema-less Alternatives The explosive growth of the Big Data movement has brought with it a great deal of public awareness of our industry. At the same time it has contributed to some misunderstandings and confusion. From the highest level we can look at Big Data as the data we could not manage given the standard tools and techniques we had available. The categories for this type of data include a) it is too big, b) it comes at us too fast, c) it changes shape too fast, or d) it lacks structure. Today we have attacked Big Data primarily from the technical direction using Hadoop paired with cloud based services. But from a modeling perspective the primary delineator is probably best described as schema-on-read versus schema-onwrite. With Schema-less, we store the data before we have it aligned with a specific schema and then apply the schema at the time we read the data. If you introduce schema-on-read modeling alternatives into your pattern then you have additional choices to make. For example, in Data Vault modeling you may consider using Name-Value Pair (NVP, and also key-value pair) as an alternative pattern for your Satellites. This means that you would not need to design and model the context attributes (that define a core concept) in advance of loading the data. Each attribute would be stored as data alongside its corresponding value. Looking at the model there would be no schema to tell you which attributes you might expect (employee, address, city, state, zip, phone, hire date, height, etc.). To see which context attribute exist you would need to read the data and grab the tags (the Names in the NVP) associated with each value (schema-on-read). This leads to a set of generic modeling alternatives that you can mix into your specific modeling pattern. Examples of these include a) Hyper-Agility modeling which uses the backbone of Data Vault modeling with NVP Satellites, and b) Focal Point modeling which is an Ensemble modeling method along the lines of Data Vault and Anchor but uses a combination of attributed Satellites for core static context and groupings of NVP Satellites for expanded and dynamic context. Deployment and Architecture Alternatives Beyond the modeling patterns themselves there are also deployment and architecture alternatives to consider. Here we have been discussing the enterprise data warehouse (EDW) deployments. However you may be working with other flavors of data integration initiatives such as a) Operational Integration, b) Operational Data Store or ODS, c) Regional or Subject Area DW, d) Analytical Applications, e) Raw DW only, f) BDW only, and etc. Your goals and requirements may or may not include full auditability, enterprise integration or full historization. These variables will have a big impact on your architecture and your modeling pattern. Just as with the modeling pattern, the alternatives we have represent a high degree of freedom; but in the end you will need to determine and define the characteristics of your specific deployment. This includes the requirements, goals, architecture and modeling pattern. 4
6 Determining Your Pattern The road to defining your modeling pattern begins with an open mind, a willingness to learn, and the time and resources for analysis and education. Since many of the alternatives are new and evolving you should consider attending training courses and seminars to learn these techniques. In the end you should be comfortable with the mechanics and implications (the pros and cons) of each modeling pattern decision you make. As with all initiatives the goals should be defined by business requirements. As you move to these modeling decisions they too are most often driven by some form of business-driven criteria. Constant communications with business stakeholders is perhaps the number one contributor to the success of your data warehouse program. Modeling Pattern Awareness The only consistently bad modeling decision is the uninformed decision. Knowing your requirement and goals, knowing the alternatives available to you, knowing the implications of each alternative, and selecting the one you think is best will always result in the best possible solution. And there is no modeling police force that will arrest you for applying exceptions to your modeling pattern. Modeling exceptions are inevitable. The only modeling pattern exception that is always wrong is the one you don t know is an exception. If you are unaware that you are blending patterns, mixing paradigms, deploying exceptions, then you will not have a consistent, predictable and effective modeling pattern. The resulting modeling mash-up will not result in an agile data warehouse program. Awareness leads to consistency, which leads to standardization and repeatable patterns, which leads to efficiency and effective automation, which leads to an agile data warehouse program. Want to Learn More? The Data Vault Ensemble is the predominant Ensemble Modeling technique in the world today. Understanding the full benefits of the Data Vault Ensemble starts with getting your certification. This process is facilitated by Genesee Academy along with regional partners throughout the world. The course includes materials, online video lessons, two (2) days in the classroom with lectures, labs and group modeling exercises. On the last day there is an exam which results in the certified data vault data modeler (CDVDM) designation. Please visit GeneseeAcademy.com for more information on course schedules and registration. In Sweden please visit TopofMinds.se for course schedules and special events. 5
7 Links and Resources For more free information and other resources please visit these links on Twitter, Blogspot, WordPress, LinkedIN and YouTube. About Hans Hultgren Hans Patrik Hultgren is President of Genesee Academy and a Principal at TopOfMinds AB. Hans is a Data Warehousing and Business Intelligence educator, author, trainer, advisor and consultant. He is currently working on Business Intelligence and Enterprise Data Warehousing (EDW) with a focus on Data Vault. Primarily in Stockholm, Amsterdam, Denver and NYC. Hans recently published a book Modeling the Agile Data Warehouse with Data Vault which is available on Amazon websites. Specialties include EDW, Ensemble Modeling, Data Vault, Agile Data Warehousing, Big Data Integration, Education, Training, e-learning, and Entrepreneurship. 6
8 Appendix: Types of Ensemble Infographic 7
Modeling Pattern Characteristics
Modeling Pattern Characteristics Analyzing Modeling Pattern Characteristics & Approaches GENESEE ACADEMY, LLC 2013 Authored by: Hans Hultgren Index INDEX...1 FORWARD...2 CHARACTERISTICS...2 CHARACTERISTICS
More informationDATA VAULT MODELING GUIDE
DATA VAULT MODELING GUIDE Introductory Guide to Data Vault Modeling GENESEE ACADEMY, LLC 2012 Authored by: Hans Hultgren DATA VAULT MODELING GUIDE Introductory Guide to Data Vault Modeling Forward Data
More informationIntroductory Guide to Data Vault Modeling GENESEE ACADEMY, LLC
Introductory Guide to Data Vault Modeling GENESEE ACADEMY, LLC 2016 Authored by: Hans Hultgren Introductory Guide to Data Vault Modeling Forward Data Vault modeling is most compelling when applied to an
More informationDATA VAULT CDVDM. Certified Data Vault Data Modeler Course. Sydney Australia December In cooperation with GENESEE ACADEMY, LLC
DATA VAULT CDVDM Certified Data Vault Data Modeler Course Sydney Australia December 3-5 2012 In cooperation with GENESEE ACADEMY, LLC Course Description and Outline DATA VAULT CDVDM Certified Data Vault
More informationComparing Anchor Modeling with Data Vault Modeling
PLACE PHOTO HERE, OTHERWISE DELETE BOX Comparing Anchor Modeling with Data Vault Modeling Lars Rönnbäck & Hans Hultgren SUMMER 2013 lars.ronnback@anchormodeling.com www.anchormodeling.com Hans@GeneseeAcademy.com
More informationModeling the. Agile. with Data Vault. Data Warehouse. Hans Hultgren
Agile Modeling the Data Warehouse with Data Vault Hans Hultgren Contents FORWARD 4 ABOUT THE AUTHOR 7 ACKNOWLEDGEMENTS 8 CHAPTER 1 DATA VA ULT DEF IN ED 19 1.1 data Vault is a Data Modeling Approach 20
More informationWhat about Transactional Links?
What about Transactional Links? Transactional Links By: Hans Hultgren Links in the Data Vault modeling pattern are used to model the relationships between entities in our model. Entities are the Persons,
More informationKent Graziano
Agile Data Warehouse Modeling: Introduction to Data Vault Modeling Kent Graziano Twitter @KentGraziano Agenda Bio What is a Data Vault? Where does it fit in an DW/BI architecture? How to design a Data
More informationDecision Guidance. Data Vault in Data Warehousing
Decision Guidance Data Vault in Data Warehousing DATA VAULT IN DATA WAREHOUSING Today s business environment requires data models, which are resilient to change and enable the integration of multiple data
More informationTop of Minds Report series Data Warehouse The six levels of integration
Top of Minds Report series Data Warehouse The six levels of integration Recommended reading Before reading this report it is recommended to read ToM Report Series on Data Warehouse Definitions for Integration
More informationData Vault Brisbane User Group
Data Vault Brisbane User Group 26-02-2013 Agenda Introductions A brief introduction to Data Vault Creating a Data Vault based Data Warehouse Comparisons with 3NF/Kimball When is it good for you? Examples
More informationTDWI Data Modeling. Data Analysis and Design for BI and Data Warehousing Systems
Data Analysis and Design for BI and Data Warehousing Systems Previews of TDWI course books offer an opportunity to see the quality of our material and help you to select the courses that best fit your
More informationCloud Essentials for Architects using OpenStack
Cloud Essentials for Architects using OpenStack Course Overview Start Date 5th March 2015 Duration 2 Days Location Dublin Course Code SS15-13 Programme Overview Cloud Computing is gaining increasing attention
More informationFIVE BEST PRACTICES FOR ENSURING A SUCCESSFUL SQL SERVER MIGRATION
FIVE BEST PRACTICES FOR ENSURING A SUCCESSFUL SQL SERVER MIGRATION The process of planning and executing SQL Server migrations can be complex and risk-prone. This is a case where the right approach and
More informationSD-WAN. Enabling the Enterprise to Overcome Barriers to Digital Transformation. An IDC InfoBrief Sponsored by Comcast
SD-WAN Enabling the Enterprise to Overcome Barriers to Digital Transformation An IDC InfoBrief Sponsored by Comcast SD-WAN Is Emerging as an Important Driver of Business Results The increasing need for
More informationEMC ACADEMIC ALLIANCE
EMC ACADEMIC ALLIANCE Preparing the next generation of IT professionals for careers in virtualized and cloud environments. Equip your students with the broad and deep knowledge required in today s complex
More informationBUYING SERVER HARDWARE FOR A SCALABLE VIRTUAL INFRASTRUCTURE
E-Guide BUYING SERVER HARDWARE FOR A SCALABLE VIRTUAL INFRASTRUCTURE SearchServer Virtualization P art 1 of this series explores how trends in buying server hardware have been influenced by the scale-up
More informationISO9001:2015 LEAD IMPLEMENTER & LEAD AUDITOR
ISO9001:2015 LEAD IMPLEMENTER & LEAD AUDITOR JPCANN ASSOCIATES LTD #58 NSAWAM ROAD, AVENOR JUNCTION, KOKOMLEMLE-ACCRA Office lines: +233 302 242 573 / +233 302 974 302 Mobile: +233 501 335 818 20 www.corptrainghana.com
More informationAnchor Modeling A Technique for Information under Evolution
Anchor Modeling A Technique for Information under Evolution Lars Rönnbäck @Ordina 6/12, 2011 Anchor Modeling... Pitches has a solid theoretical foundation. is based on well known principles. shortens implementation
More informationData Vault Modeling & Methodology. Technical Side and Introduction Dan Linstedt, 2010,
Data Vault Modeling & Methodology Technical Side and Introduction Dan Linstedt, 2010, http://danlinstedt.com Technical Definition The Data Vault is a detail oriented, historical tracking and uniquely linked
More informationAssociation for International PMOs. Expert. Practitioner. Foundation PMO. Learning.
AIPMO Association for International PMOs Expert Practitioner Foundation www.pmolearning.co.uk PMO Learning The Leading Standard and Certification for People Working in PMO Today Understand the Value of
More informationDATA WAREHOUSE 03 COMMON DWH ARCHITECTURES ANDREAS BUCKENHOFER, DAIMLER TSS
A company of Daimler AG LECTURE @DHBW: DATA WAREHOUSE 03 COMMON DWH ARCHITECTURES ANDREAS BUCKENHOFER, DAIMLER TSS ABOUT ME Andreas Buckenhofer Senior DB Professional andreas.buckenhofer@daimler.com Since
More informationUsing the Network to Optimize a Virtualized Data Center
Using the Network to Optimize a Virtualized Data Center Contents Section I: Introduction The Rise of Virtual Computing. 1 Section II: The Role of the Network. 3 Section III: Network Requirements of the
More informationUNLEASHING THE VALUE OF THE TERADATA UNIFIED DATA ARCHITECTURE WITH ALTERYX
UNLEASHING THE VALUE OF THE TERADATA UNIFIED DATA ARCHITECTURE WITH ALTERYX 1 Successful companies know that analytics are key to winning customer loyalty, optimizing business processes and beating their
More informationSAP CERTIFIED APPLICATION ASSOCIATE - SAP HANA 2.0 (SPS01)
SAP EDUCATION SAMPLE QUESTIONS: C_HANAIMP_13 SAP CERTIFIED APPLICATION ASSOCIATE - SAP HANA 2.0 (SPS01) Disclaimer: These sample questions are for self-evaluation purposes only and do not appear on the
More informationEvolving Corporate Networks and the Business Case for SD-WAN
Evolving Corporate Networks and the Business Case for SD-WAN Until recently, corporate networking has been a fairly stable component of enterprise IT. Its return to prominence goes hand-in-hand with changes
More informationWorking with the Business to Build Effective Dimensional Models
Working with the Business to Build Effective Dimensional Models Laura L. Reeves Co-Founder & Principal April, 2009 Copyright 2009 StarSoft Solutions, Inc. Slide 1 Instructor Information: Laura L. Reeves,
More informationAdvanced Security Tester Course Outline
Advanced Security Tester Course Outline General Description This course provides test engineers with advanced skills in security test analysis, design, and execution. In a hands-on, interactive fashion,
More informationUnit 1.
Unit 1 1 UNIT 1 Introduction to Data Warehousing: Introduction, Necessity, Framework of the datawarehouse, options, developing datawarehouses, end points. Data Warehousing Design Consideration and Dimensional
More informationTop 4 considerations for choosing a converged infrastructure for private clouds
Top 4 considerations for choosing a converged infrastructure for private clouds Organizations are increasingly turning to private clouds to improve efficiencies, lower costs, enhance agility and address
More informationCTL.SC4x Technology and Systems
in Supply Chain Management CTL.SC4x Technology and Systems Key Concepts Document This document contains the Key Concepts for the SC4x course, Weeks 1 and 2. These are meant to complement, not replace,
More informationCisco Gains Real-time Visibility in the Business with SAP HANA
Cisco Gains Real-time Visibility in the Business with SAP HANA What You Will Learn When an organization attempts to run itself without real-time visibility into the right data, the results can be lost
More informationAssociation for International PMOs. Expert. Practitioner. Foundation PMO. Learning.
AIPM Association for International PMOs Expert Practitioner Foundation www.pmolearning.co.uk PMO The Leading Standard and Certification for PMO Professionals Today Understand the Value of High-Performing
More informationTest Automation: Agile Enablement for Business Intelligence Teams
Test Automation: Agile Enablement for Business Intelligence Teams Lynn Winterboer Agile Analytics Educator & Coach @AgileLynn www.winterboeragileanalytics.com Lynn Winterboer Colorado Native Guest Ranch
More informationCOURSE LISTING. Courses Listed. Training for Database & Technology with Modeling in SAP HANA. 20 November 2017 (12:10 GMT) Beginner.
Training for Database & Technology with Modeling in SAP HANA Courses Listed Beginner HA100 - SAP HANA Introduction Advanced HA300 - SAP HANA Certification Exam C_HANAIMP_13 - SAP Certified Application
More informationHelping shape your future
www.pwc.com/pwcacademyme Helping shape your future Project Management Professional (PMP ) PwC s Academy 2016-2017 Contents Welcome to PwC s Academy 1 About Project Management Professional (PMP ) 2 Getting
More informationWhat s a BA to do with Data? Discover and define standard data elements in business terms
What s a BA to do with Data? Discover and define standard data elements in business terms Susan Block, Lead Business Systems Analyst The Vanguard Group Discussion Points Discovering Business Data The Data
More informationMicrosoft Core Solutions of Microsoft SharePoint Server 2013
1800 ULEARN (853 276) www.ddls.com.au Microsoft 20331 - Core Solutions of Microsoft SharePoint Server 2013 Length 5 days Price $4290.00 (inc GST) Version B Overview This course will provide you with the
More informationSales Presentation Case 2018 Dell EMC
Sales Presentation Case 2018 Dell EMC Introduction: As a member of the Dell Technologies unique family of businesses, Dell EMC serves a key role in providing the essential infrastructure for organizations
More informationFor DBAs and LOB Managers: Using Flash Storage to Drive Performance and Efficiency in Oracle Databases
For DBAs and LOB Managers: Using Flash Storage to Drive Performance and Efficiency in Oracle Databases WHITE PAPER Table of Contents The Benefits of Flash Storage for Oracle Databases...2 What DBAs Need
More informationModern Data Warehouse The New Approach to Azure BI
Modern Data Warehouse The New Approach to Azure BI History On-Premise SQL Server Big Data Solutions Technical Barriers Modern Analytics Platform On-Premise SQL Server Big Data Solutions Modern Analytics
More informationReasons to Deploy Oracle on EMC Symmetrix VMAX
Enterprises are under growing urgency to optimize the efficiency of their Oracle databases. IT decision-makers and business leaders are constantly pushing the boundaries of their infrastructures and applications
More informationIntroduction to Device Trust Architecture
Introduction to Device Trust Architecture July 2018 www.globalplatform.org 2018 GlobalPlatform, Inc. THE TECHNOLOGY The Device Trust Architecture is a security framework which shows how GlobalPlatform
More informationTDWI strives to provide course books that are contentrich and that serve as useful reference documents after a class has ended.
Previews of TDWI course books offer an opportunity to see the quality of our material and help you to select the courses that best fit your needs. The previews cannot be printed. TDWI strives to provide
More informationturning data into dollars
turning data into dollars Tom s Ten Data Tips November 2012 Data warehouse automation Data warehouse (DWH) automation is a relatively new and burgeoning field. Design patterns have emerged that enable
More information20331B: Core Solutions of Microsoft SharePoint Server 2013
20331B: Core Solutions of Microsoft SharePoint Server 2013 Course Details Course Code: Duration: Notes: 20331B 5 days This course syllabus should be used to determine whether the course is appropriate
More informationHow to succeed with data centre migration
How to succeed with data centre migration Presented by Robert Sternberg Tuesday 12 April 2016 2016, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Cloudreach AWS Services Cloudreach
More informationJAVASCRIPT CHARTING. Scaling for the Enterprise with Metric Insights Copyright Metric insights, Inc.
JAVASCRIPT CHARTING Scaling for the Enterprise with Metric Insights 2013 Copyright Metric insights, Inc. A REVOLUTION IS HAPPENING... 3! Challenges... 3! Borrowing From The Enterprise BI Stack... 4! Visualization
More informationProceedings of the IE 2014 International Conference AGILE DATA MODELS
AGILE DATA MODELS Mihaela MUNTEAN Academy of Economic Studies, Bucharest mun61mih@yahoo.co.uk, Mihaela.Muntean@ie.ase.ro Abstract. In last years, one of the most popular subjects related to the field of
More information5 KEYS TO A WINNING TECHNOLOGY PARTNERSHIP
CHECKLIST: 5 KEYS TO A WINNING The leadership at FRONTEO, a litigation consulting and ediscovery solutions company that processes terabytes of sensitive client data daily, recognized that their existing
More informationThis course contains the subject matter to prepare candidates for the ivanti Certified Service Desk 2017 Administrator exam.
Course Overview The Service Desk Administration 2017 course is a five-day training course covering topics for both administrative and design functions within the Service Desk 2017. Students will learn
More informationCourse Catalogue
Course Catalogue 2018 www.preparationinfo.com About Us PreparationInfo is one of the best World s Leading Certification Training Provider in various on demand courses in multiple domains. We partner with
More informationSensitive Data Loss is NOT Inevitable
Sensitive Data Loss is NOT Inevitable Dan Geer, CISO In-Q-Tel Featured Speaker Heidi Shey, Security Analyst, Forrester Research Agenda Introduction Time for a Change Dan Geer, In-Q-Tel How to Overcome
More informationExtended TDWI Data Modeling: An In-Depth Tutorial on Data Warehouse Design & Analysis Techniques
: An In-Depth Tutorial on Data Warehouse Design & Analysis Techniques Class Format: The class is an instructor led format using multiple learning techniques including: lecture to present concepts, principles,
More informationWHITE PAPER. The Many Different Types of DBAs. Craig Mullins
BI/Analytics Applications Databases WHITE PAPER The Many Different Types of DBAs AUTHOR: Craig Mullins ABSTRACT: Although DBAs, at a high level, are tasked with managing and assuring the efficiency of
More informationWelcome to the HP Institute
Welcome to the HP Institute How HP is working with education to develop tomorrow s IT workforce today Capability Business need for speed The rate of business is increasing exponentially 2020 2T devices
More informationturning data into dollars
turning data into dollars Tom s Ten Data Tips December 2008 ETL ETL stands for Extract, Transform, Load. This process merges and integrates information from source systems in the data warehouse (DWH).
More informationEvolution For Enterprises In A Cloud World
Evolution For Enterprises In A Cloud World Foreword Cloud is no longer an unseen, futuristic technology that proves unattainable for enterprises. Rather, it s become the norm; a necessity for realizing
More informationSecurity Challenges: Integrating Apple Computers into Windows Environments
Integrating Apple Computers into Windows Environments White Paper Parallels Mac Management for Microsoft SCCM 2018 Presented By: Table of Contents Environments... 3 Requirements for Managing Mac Natively
More informationPractical MySQL Performance Optimization. Peter Zaitsev, CEO, Percona July 02, 2015 Percona Technical Webinars
Practical MySQL Performance Optimization Peter Zaitsev, CEO, Percona July 02, 2015 Percona Technical Webinars In This Presentation We ll Look at how to approach Performance Optimization Discuss Practical
More informationMicroservices Smaller is Better? Eberhard Wolff Freelance consultant & trainer
Microservices Smaller is Better? Eberhard Wolff Freelance consultant & trainer http://ewolff.com Why Microservices? Why Microservices? Strong modularization Replaceability Small units Sustainable Development
More informationComposite Software Data Virtualization The Five Most Popular Uses of Data Virtualization
Composite Software Data Virtualization The Five Most Popular Uses of Data Virtualization Composite Software, Inc. June 2011 TABLE OF CONTENTS INTRODUCTION... 3 DATA FEDERATION... 4 PROBLEM DATA CONSOLIDATION
More informationSecuring Digital Transformation
September 4, 2017 Securing Digital Transformation DXC Security Andreas Wuchner, CTO Security Innovation Risk surface is evolving and increasingly complex The adversary is highly innovative and sophisticated
More informationIntermedia s Private Cloud Exchange
Intermedia s Private Cloud Exchange This is a practical guide to implementing Intermedia s Private Cloud Exchange on AWS. Intermedia, the world s independent provider of Hosted Exchange, and AWS, the leading
More informationChapter 6. Foundations of Business Intelligence: Databases and Information Management VIDEO CASES
Chapter 6 Foundations of Business Intelligence: Databases and Information Management VIDEO CASES Case 1a: City of Dubuque Uses Cloud Computing and Sensors to Build a Smarter, Sustainable City Case 1b:
More informationBRINGING CLARITY TO THE CLOUD
BRINGING CLARITY TO THE CLOUD OpenSky Networks discusses the complexities of the cloud market by distinguishing the difference between true cloud solutions and rebranded services; and how knowing that
More informationData Virtualization Implementation Methodology and Best Practices
White Paper Data Virtualization Implementation Methodology and Best Practices INTRODUCTION Cisco s proven Data Virtualization Implementation Methodology and Best Practices is compiled from our successful
More information5 Things to Know About Certification
5 Things to Know About Certification 5 Things to Know About Certification If you re thinking about a profession in allied health, or you re already in the field and ready to advance your career, you ve
More informationPractical Guide to Securing the SDLC
Practical Guide to Securing the SDLC Branko Ninkovic Dragonfly Technologies Founder Agenda Understanding the Threats Software versus Security Goals Secure Coding and Testing A Proactive Approach to Secure
More information.NET JAVA C ASE. Certified. Certified. Application Security Engineer.
.NET C ASE Certified Application Security Engineer JAVA C ASE Certified Application Security Engineer Certified Application Security Engineer www.eccouncil.org EC-Council Course Description The Certified
More informationConfiguring Advanced Windows Server 2012 Services
Configuring Advanced Windows Server 2012 Services Course 20412D - Five days - Instructor-led - Hands-on Introduction Get hands-on instruction and practice configuring advanced Windows Server 2012, including
More informationMETHODOLOGY This program will be conducted with interactive lectures, PowerPoint presentations, discussions and practical exercises.
CENTER OF KNOWLEDGE, PATH TO SUCCESS Website: IDENTITY WITH WINDOWS SERVER 2016 Course 20742: 5 days; Instructor-Led INTRODUCTION This five-day instructor-led course teaches IT Pros how to deploy and configure
More informationTraining 24x7 DBA Support Staffing. MCSA:SQL 2016 Business Intelligence Development. Implementing an SQL Data Warehouse. (40 Hours) Exam
MCSA:SQL 2016 Business Intelligence Development Implementing an SQL Data Warehouse (40 Hours) Exam 70-767 Prerequisites At least 2 years experience of working with relational databases, including: Designing
More informationMAPR DATA GOVERNANCE WITHOUT COMPROMISE
MAPR TECHNOLOGIES, INC. WHITE PAPER JANUARY 2018 MAPR DATA GOVERNANCE TABLE OF CONTENTS EXECUTIVE SUMMARY 3 BACKGROUND 4 MAPR DATA GOVERNANCE 5 CONCLUSION 7 EXECUTIVE SUMMARY The MapR DataOps Governance
More informationMigrate from Netezza Workload Migration
Migrate from Netezza Automated Big Data Open Netezza Source Workload Migration CASE SOLUTION STUDY BRIEF Automated Netezza Workload Migration To achieve greater scalability and tighter integration with
More informationRSDs vs Dossiers Best Practices on When and Where to use them
RSDs vs Dossiers Best Practices on When and Where to use them Matthew Hannagan, Principal Consultant, United Kingdom Copyright 2017 MicroStrategy Incorporated. All Rights Reserved. Safe Harbor Notice This
More informationData Management and Security in the GDPR Era
Data Management and Security in the GDPR Era Franck Hourdin; Vice President, EMEA Security Russ Lowenthal; Director, Database Security Product Management Mike Turner; Chief Operating Officer, Capgemini
More informationWhite Paper. The Evolution of RBAC Models to Next-Generation ABAC: An Executive Summary
White Paper The Evolution of RBAC Models to Next-Generation ABAC: An Executive Summary 2 Overview: IT security has gone through major changes. Enterprises today are facing a rapid expansion of diverse
More informationNext-generation IT Platforms Delivering New Value through Accumulation and Utilization of Big Data
Next-generation IT Platforms Delivering New Value through Accumulation and Utilization of Big Data 46 Next-generation IT Platforms Delivering New Value through Accumulation and Utilization of Big Data
More informationShri Vaishnav Vidyapeeth Vishwavidyalaya, Indore Shri Vaishnav Institute of Information Technology
B.Tech. in Computer Science & Engineering with Specialization in Enterprise System (In association with Red Hat Academy) About Program Enterprise systems (ES) are large-scale application software packages
More informationTransform your bottom line: 5G Fixed Wireless Access
Transform your bottom line: 5G Fixed Wireless Access Transform Your Bottom Line: 5G Fixed Wireless Access 1 Seizing the opportunity of 5G with Fixed Wireless Access To get a sense of the future of broadband,
More informationAgile Certification Options Primer. Presented by: Tom McGraw, CSM VP of Public Sales
Agile Certification Options Primer Presented by: Tom McGraw, CSM VP of Public Sales Presentation Agenda What is Agile High-Level Look High level Model for Agile and the flavors that drive implementations
More informationA Road Map for Advancing Your Career. Distinguish yourself professionally. Get an edge over the competition. Advance your career with CBIP.
TDWI Certification A Road Map for Advancing Your Career Distinguish yourself professionally. Get an edge over the competition. Advance your career with CBIP. www.tdwi.org/cbip TDWI s Certified Business
More informationIBM Security Systems. IBM X-Force 2012 & CISO Survey. Cyber Security Threat Landscape IBM Corporation IBM Corporation
IBM X-Force 2012 & CISO Survey Cyber Security Threat Landscape 1 2012 IBM Corporation IBM X-Force 2011 Trend and Risk Report Highlights The mission of the IBM X-Force research and development team is to:
More informationSIEM: Five Requirements that Solve the Bigger Business Issues
SIEM: Five Requirements that Solve the Bigger Business Issues After more than a decade functioning in production environments, security information and event management (SIEM) solutions are now considered
More informationWindows Server : Configuring Advanced Windows Server 2012 Services R2. Upcoming Dates. Course Description.
Windows Server 2012 20412: Configuring Advanced Windows Server 2012 Services R2 Gain the skills and knowledge necessary to perform advanced management and provisioning of services within Windows Server
More informationCOURSE LISTING. Courses Listed. with SAP HANA. 15 February 2018 (05:18 GMT) HA100 - SAP HANA. HA250 - Migration to SAP HANA using DMO
with SAP HANA COURSE LISTING Courses Listed HA100 - SAP HANA HA240 -, SAP HANA HA250 - Migration to SAP HANA using DMO C_HANATEC_13 - SAP Certified Technology Associate - SAP HANA 2.0 HA200 - SAP HANA
More informationSECURITY TRAINING SECURITY TRAINING
SECURITY TRAINING SECURITY TRAINING Addressing software security effectively means applying a framework of focused activities throughout the software lifecycle in addition to implementing sundry security
More information<Insert Picture Here> Enterprise Data Management using Grid Technology
Enterprise Data using Grid Technology Kriangsak Tiawsirisup Sales Consulting Manager Oracle Corporation (Thailand) 3 Related Data Centre Trends. Service Oriented Architecture Flexibility
More informationThe EDW: An Overview For Foothill-De Anza Community College District
The EDW: An Overview For Foothill-De Anza Community College District R. Joanne Keys, SunGard Higher Education October, 2009 1 The Agenda Objective: Set the stage for a successful implementation of the
More informationModernizing Healthcare IT for the Data-driven Cognitive Era Storage and Software-Defined Infrastructure
Modernizing Healthcare IT for the Data-driven Cognitive Era Storage and Software-Defined Infrastructure An IDC InfoBrief, Sponsored by IBM April 2018 Executive Summary Today s healthcare organizations
More informationLow Friction Data Warehousing WITH PERSPECTIVE ILM DATA GOVERNOR
Low Friction Data Warehousing WITH PERSPECTIVE ILM DATA GOVERNOR Table of Contents Foreword... 2 New Era of Rapid Data Warehousing... 3 Eliminating Slow Reporting and Analytics Pains... 3 Applying 20 Years
More informationSeven Decision Points When Considering Containers
Market Guide Seven Decision Points When Considering Containers A Continuum of Deployment Choices More than ever, developers and systems architects have a range of choices when it comes to deploying applications,
More informationITM DEVELOPMENT (ITMD)
ITM Development (ITMD) 1 ITM DEVELOPMENT (ITMD) ITMD 361 Fundamentals of Web Development This course will cover the creation of Web pages and sites using HTML, CSS, Javascript, jquery, and graphical applications
More informationDDN Annual High Performance Computing Trends Survey Reveals Rising Deployment of Flash Tiers & Private/Hybrid Clouds vs.
DDN Annual High Performance Computing Trends Survey Reveals Rising Deployment of Flash Tiers & Private/Hybrid Clouds vs. Public for HPC HPC End Users Cite Mixed I/O as the Most Difficult Performance Challenge
More informationSALESFORCE CERTIFIED SALES CLOUD CONSULTANT
Certification Exam Guide SALESFORCE CERTIFIED SALES CLOUD CONSULTANT Summer 18 2018 Salesforce.com, inc. All rights reserved. S ALESFORCE CERTIFIED SALES CLOUD CONSULTANT CONTENTS About the Salesforce
More informationMigrate from Netezza Workload Migration
Migrate from Netezza Automated Big Data Open Netezza Source Workload Migration CASE SOLUTION STUDY BRIEF Automated Netezza Workload Migration To achieve greater scalability and tighter integration with
More informationUp and Running Software The Development Process
Up and Running Software The Development Process Success Determination, Adaptative Processes, and a Baseline Approach About This Document: Thank you for requesting more information about Up and Running
More informationBest practices for building a Hadoop Data Lake Solution CHARLOTTE HADOOP USER GROUP
Best practices for building a Hadoop Data Lake Solution CHARLOTTE HADOOP USER GROUP 07.29.2015 LANDING STAGING DW Let s start with something basic Is Data Lake a new concept? What is the closest we can
More informationTDWI strives to provide course books that are content-rich and that serve as useful reference documents after a class has ended.
Previews of TDWI course books are provided as an opportunity to see the quality of our material and help you to select the courses that best fit your needs. The previews can not be printed. TDWI strives
More information