A Workaround for Column Security in the SQL Server Analysis Services BISM Tabular Model

An often needed feature in the SSAS BISM Tabular Model is the ability to restrict users from viewing certain columns.  Perspectives enable a better user experience but are not meant to be used as a security feature, as users can still access the underlying cube.  Tabular models enable flexible row filtering, but do not provide any functionality for column or perspective security.…

Read More

Terminating Water in Detroit: Poor Business Practices Lead to Human Rights Allegations

Last week, three United Nations experts responded to appeals from Detroit residents that terminating water service for nonpayment is a violation of the human right to water. Delinquency is not an issue unique to Detroit; many municipally-owned water utilities struggle to keep customer accounts current. As the United States’ water infrastructure ages and is upgraded through costly programs...

Read More

Opportunities for Efficiency in Homeowners Insurance Property Inspections

As an industry, Insurance is traditionally less progressive when it comes to technology and innovation. It is still common to see carriers using antiquated systems that lack enterprise data and functional integration capabilities. In fact, only recently have major Insurance carriers taken into consideration the fact that there is a steady shift of consumer preference to online channels.…

Read More

Big Data: Small targets

In the 2000 film, The Patriot, Mel Gibson taught his sons the lesson of “Aim small, miss small” when using their rifles. The idea being that the error associated with a given shot is minimized if you focus on a smaller target.  With the onset of the Big Data revolution, companies should be taking this message to heart.…

Read More

Financial Services Salesforce.com Solutions: Pricing Desk in the Cloud

In a previous blog, “Customizing Salesforce.com for Better Business Results,” I described a customized Salesforce solution configured for a financial services organization to help realize the greatest possible return from its Salesforce.com investment. After seeing the initial value the platform delivered for its business, the institution wanted to expand its use of Salesforce.com to solve...

Read More

Data Warehouse Architecture: Inmon CIF, Kimball Dimensional or Linstedt Data Vault?

Corporate Information Factory (CIF) data warehouse architecture was pioneered by Bill Inmon. It is also referred to as top-down approach because it represent complete view of enterprise data. Data is stored in 3rd normal form (3NF) closely resembling source system structures. To capture historic data changes timestamps are added to each table key columns.…

Read More

Chipping Away at Credit Card Fraud

During the holiday season, the high-profile security breaches at Target and Neiman Marcus were covered extensively in the news.  The Target breach alone affected up to 70 million Americans.  There have been dozens of reported cyber-attacks in the last several years, but the sheer number of people affected in these events and the timing around Christmas put information security in the spotlight...

Read More

Converting Transactional History Data into Snapshot Data (Part 1)

There are several scenarios where a developer may want to convert transactional history data into snapshot data. Sometimes an existing transactional solution has been storing transaction history data for years, requiring a migration to snapshot data for reporting purposes. Some customers may be paying a recurring service fee for disk storage and might want to keep disk space consumption down...

Read More

The “5 Keys” to Data Security Management

This post is the sixth in my “5 Keys” series, covering the core principles of data management.  Check out the others: 1 – Introduction to the “5 Keys” Series 2 – The “5 Keys” to Data Governance 3 – The “5 Keys” to Data Architecture Management 4 – The “5 Keys” to Data Development 5 – The “5 Keys” to Database Operations Management This time we are looking at data...

Read More
The “5 Keys” to Database Operations Management

The “5 Keys” to Database Operations Management

This post is the fifth in my “5 Keys” to EIM series, covering the core principles of data management.  Please check out the others: 1 – Introduction to the “5 Keys” Series 2 – The “5 Keys” to Data Governance 3 – The “5 Keys” to Data Architecture Management 4 – The “5 Keys” to Data Development This time I’m looking at database operations management. …

Read More
Phone: 312-602-4000
Email: marketing@westmonroepartners.com
222 W. Adams
Chicago, IL 60606
Show Buttons
Share On Facebook
Share On Twitter
Share on LinkedIn
Hide Buttons