1. The document discusses physical design considerations for Microsoft Analysis Services including hardware recommendations, dimensional modeling best practices, and performance tuning techniques.
2. It provides guidance on structuring dimensions and facts in relational database terms by treating them differently, handling nulls and slowly changing dimensions, and choosing appropriate keys and indexes.
3. The document also covers fact table partitioning strategies, storage options, and proactive caching techniques to optimize query performance.
This is a presentation about the financial state of Microsoft of the second quarter of 2012. The values of the second quarter of 2012 are compared with those of 2011
Frokostseminar mai 2010 solr open source cominvent asCominvent AS
Slides fra frokostseminar om Open Souce søk med Apache Lucene/Solr i Oslo mai 2010. Dette var et arrangement av Cominvent AS og FindWise AB.
Presentation is in Norwegian language
Badges, Badgers, Mushrooms, and a Snakenniiccoollee
This presentation includes an explanation, exploration, and discussion of digital badges for use in community building, professional development, and skills/academic achievement. The first part of the presentation will define issuers, badges and criteria, and earners. The second part of the presentation includes a live demonstration and walk-through for creating and issuing a badge using the Cred.ly platform.
Session attendants will earn a badge for their participation and have the opportunity to create their own badges during this part of the session. The third and final part of the presentation will include a panel discussion with representatives from instructional technology, human resources, and others to consider potential uses of digital badges and their overall credibility and desirability.
This is a presentation about the financial state of Microsoft of the second quarter of 2012. The values of the second quarter of 2012 are compared with those of 2011
Frokostseminar mai 2010 solr open source cominvent asCominvent AS
Slides fra frokostseminar om Open Souce søk med Apache Lucene/Solr i Oslo mai 2010. Dette var et arrangement av Cominvent AS og FindWise AB.
Presentation is in Norwegian language
Badges, Badgers, Mushrooms, and a Snakenniiccoollee
This presentation includes an explanation, exploration, and discussion of digital badges for use in community building, professional development, and skills/academic achievement. The first part of the presentation will define issuers, badges and criteria, and earners. The second part of the presentation includes a live demonstration and walk-through for creating and issuing a badge using the Cred.ly platform.
Session attendants will earn a badge for their participation and have the opportunity to create their own badges during this part of the session. The third and final part of the presentation will include a panel discussion with representatives from instructional technology, human resources, and others to consider potential uses of digital badges and their overall credibility and desirability.
Oslo Enterprise MeetUp May 12th 2010 - Jan HøydahlCominvent AS
Presentation held at Oslo Enterprise MeetUp in May, pitched towards an audience who come from the FAST ESP side and have some existing FAST knowledge. Check out one of my other presentations if you're most familiar with Lucene/Solr.
Polskie Sklepy Internetowe Raport Okazje.Info I OpineoSławomir Stańczuk
Polskie sklepy internetowe – raport
Okazje.info i Opineo
grudzień 2009
Rankingi udzielają odpowiedzi na pytania:
które sklepy, według klientów, oferują najwyższą jakość usług
które sklepy cieszą się ich największym zaufaniem
oferty których sklepów są najchętniej wybierane przez internautów
Analiza rozwoju portali społecznościowych w InternecieSławomir Stańczuk
Publikacja bezpłatna
Publikacja powstała w ramach projektu „Uruchomienie wielofunkcyjnej
platformy komunikacji internetowej wspierającej realizację działań 8.1 i 8.2
PO IG”, realizowanego przez Polską Agencję Rozwoju Przedsiębiorczości,
współfinansowanego ze środków Unii Europejskiej w ramach Europejskiego
Funduszu Rozwoju Regionalnego
in web development we're dealing with mutliple client side technologies. newbies usually feel confused about relations and differences between them. This presentation illustrate the relations and meanings of HTML, XHTML, CSS, Javascript, DOM and DHTML
VSSML17 L5. Basic Data Transformations and Feature EngineeringBigML, Inc
Valencian Summer School in Machine Learning 2017 - Day 2
Lecture 5: Basic Data Transformations and Feature Engineering. By Poul Petersen (BigML).
https://bigml.com/events/valencian-summer-school-in-machine-learning-2017
Why BI ?
Performance management
Identify trends
Cash flow trend
Fine-tune operations
Sales pipeline analysis
Future projections
business Forecasting
Decision Making Tools
Convert data into information
How to Think ?
What happened?
What is happening?
Why did it happen?
What will happen?
What do I want to happen?
It's a well-known fact, that although the database performance is great, and each query is executed in milliseconds, the overall application response time maybe slow, making the users wait for response for an extended periods of time. We know that the problem is not the database, but the way the application developers communicate with the database. Specifically, we are talking about ORMs - Object-Relational Mappers. Database developers hate them, but application developers love them, because they allow to develop applications without any knowledge of database internals. As a result, the system performance is often unacceptably slow.
The only way to change this behavior is to provide application developers with a tool, which is as easy to use, as an ORM, but which will allow to escape the common ORM pitfalls. That's why we developed NORM - No-ORM Framework. During this presentation, we will go over examples of code from https://github.com/hettie-d/NORM repo and learn how to build "transport objects" for efficient data transfer between applications and databases.
Oslo Enterprise MeetUp May 12th 2010 - Jan HøydahlCominvent AS
Presentation held at Oslo Enterprise MeetUp in May, pitched towards an audience who come from the FAST ESP side and have some existing FAST knowledge. Check out one of my other presentations if you're most familiar with Lucene/Solr.
Polskie Sklepy Internetowe Raport Okazje.Info I OpineoSławomir Stańczuk
Polskie sklepy internetowe – raport
Okazje.info i Opineo
grudzień 2009
Rankingi udzielają odpowiedzi na pytania:
które sklepy, według klientów, oferują najwyższą jakość usług
które sklepy cieszą się ich największym zaufaniem
oferty których sklepów są najchętniej wybierane przez internautów
Analiza rozwoju portali społecznościowych w InternecieSławomir Stańczuk
Publikacja bezpłatna
Publikacja powstała w ramach projektu „Uruchomienie wielofunkcyjnej
platformy komunikacji internetowej wspierającej realizację działań 8.1 i 8.2
PO IG”, realizowanego przez Polską Agencję Rozwoju Przedsiębiorczości,
współfinansowanego ze środków Unii Europejskiej w ramach Europejskiego
Funduszu Rozwoju Regionalnego
in web development we're dealing with mutliple client side technologies. newbies usually feel confused about relations and differences between them. This presentation illustrate the relations and meanings of HTML, XHTML, CSS, Javascript, DOM and DHTML
VSSML17 L5. Basic Data Transformations and Feature EngineeringBigML, Inc
Valencian Summer School in Machine Learning 2017 - Day 2
Lecture 5: Basic Data Transformations and Feature Engineering. By Poul Petersen (BigML).
https://bigml.com/events/valencian-summer-school-in-machine-learning-2017
Why BI ?
Performance management
Identify trends
Cash flow trend
Fine-tune operations
Sales pipeline analysis
Future projections
business Forecasting
Decision Making Tools
Convert data into information
How to Think ?
What happened?
What is happening?
Why did it happen?
What will happen?
What do I want to happen?
It's a well-known fact, that although the database performance is great, and each query is executed in milliseconds, the overall application response time maybe slow, making the users wait for response for an extended periods of time. We know that the problem is not the database, but the way the application developers communicate with the database. Specifically, we are talking about ORMs - Object-Relational Mappers. Database developers hate them, but application developers love them, because they allow to develop applications without any knowledge of database internals. As a result, the system performance is often unacceptably slow.
The only way to change this behavior is to provide application developers with a tool, which is as easy to use, as an ORM, but which will allow to escape the common ORM pitfalls. That's why we developed NORM - No-ORM Framework. During this presentation, we will go over examples of code from https://github.com/hettie-d/NORM repo and learn how to build "transport objects" for efficient data transfer between applications and databases.
Enterprise Serverless Adoption. An Experience ReportSheenBrisals
The popularity of Serverless is growing strong every day. Though it is gaining strength in the industry, its adoption in larger enterprises is not on par with others. Unlike start-ups, large organizations look for a systematic and carefully planned approach to adopt serverless. The experience is not readily available nor shared with the larger community. This talk aims to fill in the gaps by sharing a unique serverless adoption story at the LEGO Group. It will take you through the evolution of serverless adoption, ways to grow serverless teams, best practices, and achieving sustainability with serverless.
Strata Software Architecture NY: The Data DichotomyBen Stopford
Ben Stopford is an engineer and architect working on the Apache Kafka Core Team at Confluent (the company behind Apache Kafka). A specialist in data, both from a technology and an organizational perspective, Ben previously spent five years leading data integration at a large investment bank, using a central streaming database. His earlier career spanned a variety of projects at Thoughtworks and UK-based enterprise companies. He writes at Benstopford.com.
Data Warehouse Design and Best PracticesIvo Andreev
A data warehouse is a database designed for query and analysis rather than for transaction processing. An appropriate design leads to scalable, balanced and flexible architecture that is capable to meet both present and long-term future needs. This session covers a comparison of the main data warehouse architectures together with best practices for the logical and physical design that support staging, load and querying.
Traditional approaches in anti-money laundering involve simple matching algorithms and a lot of human review. However, in recent years this approach has proven to not scale well with the ever increasingly strict regulatory environment. We at Bayard Rock have had much success at applying fancier approaches, including some machine learning, to this problem. In this talk I walk you through the general problem domain and talk about some of the algorithms we use. I’ll also dip into why and how we leverage typed functional programming for rapid iteration with a small team in order to out-innovate our competitors.
Bayard Rock, LLC, is a private research and software development company with headquarters in the Empire State Building. It is a leader in the filed in the research and development of tools for improving the state of the art in anti-money laundering and fraud detection. As you might imagine, these tools rely heavily on mathematics and graph algorithms. In this talk, Richard Minerich will discuss the research activities of Bayard Rock and its approaches to build tools to find the “bad guys”. Richard Minerich is Bayard Rock’s Director of Research and Development. Rick has expertise in F#, C#, C, C++, C++/CLI,. NET (1.1, 2.0, 3.0, 3.5, 4.0, and 4.5), Object Oriented Design, Functional Design, Entity Resolution, Machine Learning, Concurrency, and Image Processing. He is interested in working on algorithmically, mathematically complex projects and remains open to explore new ideas.
Rick holds 2 patents. The first one, co-invented with a colleague, is titled “Method of Image Analysis Using Sparse Hough Transform.” The other independently held is known as “Method for Document to Template Alignment.”
IBM THINK 2019 - What? I Don't Need a Database to Do All That with SQL?Torsten Steinbach
You don't necessarily have to set up a relational database, tables and load data in order to use a surprisingly rich set of SQL capabilities on your data in the cloud. IBM SQL Query lets you analyze terabytes of distributed data of heterogeneous formats with a complete ANSI SQL dialect in a completely serverless usage model, elegantly ETL data between formats and partitioning layouts as needed, and run complex time series transformations, analysis and correlations with advanced built-in timeseries SQL algorithms that are differentiating in the entire industry. It also support a complete PostGIS compliant geospatial SQL function set. Come explore the stunningly advanced world of SQL without a database in IBM Cloud.
Clonetab’s Advanced Data Scrambling (ADS) is an irreversible process that it is used to obfuscate or nullify sensitive data with a wide range of algorithms supported based on the datatype of the column from the database. It is defined to support both E-Business Suite and Database Columns Scrambling.
• For Oracle e-Business Suite & Database
• Data Scrambling for SAP S/4HANA for SAP BTP or on-Premise
• Multiple algorithms for different needs
• Integrated with cloning or standalone.
• With Compliance Manager role
• High-speed scrambling
For more information visit https://clonetab.com
or send an email to info@clonetab.com.
Similar to Microsoft Analysis Services Physical Design (20)
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
5. Hardware
SQL Server Fast Track Data Warehouse
www.microsoft.com/sqlserver/2008/en/us/fasttrack.aspx
Pre-tested hardware configurations
Specific disk, filegroup, layouts
Minimal indexing
To feed CPU at maximum capacity
6. Dimensions vs Facts
Dimension
Small (relatively)
Repeating data
Fact
Large
Numeric data + keys
Treat them differently
7. Dimensions in Relational Terms
Customer
Table structure
Full Name
Keys Post Code
City
Indexes State
Country
Null handling Gender
Occupation
Managing change Customer
Marital Status
Geography
Email Address
Processing
1. Country
2. State
3. City
4. Post Code
5. Full Name
8. Star vs. Snowflake Schemas
dbo.Customer
dbo.Customer CustomerKey
CustomerKey GeographyKey
FullName FullName
PostCode Gender
City Occupation
State MaritalStatus
OR
Country EmailAddress
Gender
Occupation
MaritalStatus dbo.Geography
EmailAddress
GeographyKey
PostCode
City
NB: both are denormalized, State
one more than the other Country
9. Primary Keys
Use smallest possible integer as surrogate
primary key
Primary key is a “row identifier”
Multiple row “versions” are possible
“None” and “Unknown” special values are useful
Do NOT use business/source system keys
Clustered primary key is OK for dimensions
10. Dimension Indexes
Dimension processing queries of the form:
SELECT DISTINCT .... FROM ....
WHERE (filter) clauses never used
WHERE (join) clauses are used in snowflake
dimensions
Non-processing queries may end up in SQL
ROLAP dimensions
Direct to SQL queries
11. Null Handling in Dimensions
By default NULL converts to 0 or an empty
string
NULL attribute keys can invoke special
“Unknown Member” handling
Prefer to create a specific “Unknown” row
CustomerKey FullName City Country
-1 Unknown Unknown Unknown
-2 None None None
1243 John Smith London United Kingdom
1244 Mary Jones Glasgow United Kingdom
12. Dimension Attributes
Attributes have keys, names (and values)
Integer attribute keys are smaller and faster
Keys must be unique
Attribute Key Name (Value)
Year 2009 CY 2009 2009
Month 4 April 4
Month of Year 20090400 April 2009 4
SELECT [Month] as [Month],
[Month] + „ „ + [Year] as [Month of Year]
FROM dbo.Time
13. Slowly Changing Dimensions
PK = row identifier dbo.Customer
CustomerKey
Multiple rows = FullName
multiple versions PostCode
City
State
Country
Add effective dating Gender
columns Occupation
MaritalStatus
Which can be exposed EmailAddress
as new dimensional
EffectiveFrom (smalldatetime)
attributes
EffectiveTo (smalldatetime)
CurrentFlag (tinyint)
14. Facts in Relational Terms
Keys
Internet Sales
Indexing Sales Amount
Order Quantity
Partitioning Tax Amount
Unit Price
Processing Transaction Count
Consider Row and Page compression
15. Fact Keys and Indexes
Is a surrogate/primary key required?
Beware the clustered index/primary key
Prefer the date FK as the clustered index
Add NO CHECK to foreign keys
Indexes are usually not useful
Unless processing degenerate dimensions
Or servicing ROLAP/direct to SQL queries
16. Fact Partitioning – Why?
Parallel processing
Only process most recent data
Multiple storage engine threads during query
Archive off data
Multiple aggregation strategies
NB: Partitions require Enterprise Edition
17. Fact Partitioning – Guidelines
Partition when fact tables are 50-100GB+
Ideal partition size 2M-20M rows
Less than 1000 partitions per measure group
This wins over partition size
Prefer to partition over time
Can not aggregate higher than partition grain
Align AS and SQL partitions!
Calculated time keys become very useful
18. Fact Storage
MOLAP, ROLAP or HOLAP
Source Data Facts Aggregations
Relational Multidimensional
19. Proactive Caching
Cube = “Cache”
Automatic invalidation of cube
Automatic rebuild of cube
Query
SQL Query Valid? Valid?
20. Quick Storage Engine Tuning
Ensure attribute relations are implemented
Turn on query log
Run Usage Based Optimisation (UBO) wizard