...Assignment 3: Business Intelligence and Data Warehouses Kevin Sloley Professor Dammlash Gebre CIS-111 Intro to Related Database Management Systems Due March, 2016 Outline the main differences between the structure of a relational database optimized for online transactions versus a data warehouse optimized for processing and summarizing large amounts of data. The primary difference between your application database and a data warehouse is that while the former is designed (and optimized) to record, the latter has to be designed (and optimized) to respond to analysis questions that are critical for your business. Application databases are OLTP (On-Line Transaction Processing) systems where every transaction has to be recorded, and super-fast at that. Consider the scenario where a bank ATM has disbursed cash to a customer but was unable to record this event in the bank records. If this started happening frequently, the bank wouldn't stay in business for too long. So the banking system is designed to make sure that every trasaction gets recorded within the time you stand before the ATM machine. This system is write-optimized, and you shouldn't crib if your analysis query (read operation) takes a lot of time on such a system. A Data Warehouse (DW) on the other end, is a database (yes, you are right, it's a database) that is designed for facilitating querying and analysis. Often designed as OLAP (On-Line Analytical Processing) systems, these databases contain read-only...
Words: 1350 - Pages: 6
...computing, middleware, and industry standards as relating to the enterprise data repository. Data warehousing, data mining, and data marts are covered from an enterprise perspective. Policies Faculty and students will be held responsible for understanding and adhering to all policies contained within the following two documents: • • University policies: You must be logged into the student website to view this document. Instructor policies: This document is posted in the Course Materials forum. University policies are subject to change. Be sure to read the policies at the beginning of each class. Policies may be slightly different depending on the modality in which you attend class. If you have recently changed modalities, read the policies governing your current class modality. Course Materials Coronel, C., Morris, S., & Rob, P. (2011). Database systems: Design, implementation and management (9th ed.). Mason, OH: Cengage Learning. Eckerson, W. W. (2011). Performance dashboards: Measuring, monitoring, and managing your business (2nd ed.). Hoboken, NJ: John Wiley & Sons, Inc. Hoffer, J. A., Ramesh, V., & Topi, H. (2011). Modern database management (10th ed.). Upper Saddle River, NJ: Pearson. Linoff, G. S., & Berry, M. J. A. (2011). Data mining techniques: For marketing, sales, and customer relationship management (3rd ed.). Indianapolis, IN: Wiley Publishing, Inc. Ponniah, P. (2010). Data warehousing: Fundamentals for IT professionals (2nd ed.). Hoboken, NJ:...
Words: 2603 - Pages: 11
...Instructions Sr. Subjects Lect/ No 1 Information and Network Security Middleware and Enterprise Integration Technologies Software Engineering Data Base Technologies Programming for Mobile and Remote Computers Information Technology for Management of Enterprise TOTAL Week 4 Scheme of Examinations Theory T/W Practical Oral Total Hours Marks Marks Marks Marks Marks 3 100 25 -25 150 Pract/ Week 2 Tut/ Week -- 2 4 2 -- 3 100 25 -- 25 150 3 4 5 4 4 4 2 2 2 ---- 3 3 3 100 100 100 25 25 25 --25 25 25 -- 150 150 150 6 4 24 10 1 1 3 -- 100 600 25 150 -25 25 125 150 900 INFORMATION AND NETWORK SECURITY CLASS T.E. ( INFORMATION TECHNOLOGY) HOURS PER LECTURES : WEEK TUTORIALS : PRACTICALS EVALUATION SYSTEM: THEORY PRACTICAL ORAL TERM WORK : SEMESTER VI 04 -02 HOURS 3 ---- MARKS 100 25 25 1. Introduction What is Information Security? Security Goals. 2. Cryptography Crypto Basic, Classic Cryptography, Symmetric Key Cryptography: Stream Ciphers, A5/1, RC4, Block Ciphers, Feistel Cipher, DES, Triple DES, AES, Public Key Cryptography: Kanpsack, RSA, Defiie-Hellman, use of public key crypto- Signature and Non-repudiation, Confidentiality and Non-repudiation, Public Key Infrastructure, Hash Function: The Birthday Problem, MD5, SHA-1, Tiger Hash, Use of Hash Function. 3. Access control - Authentication and Authorization Authentication Methods, Passwords, Biometric, Single – sign on, Authentication Protocol...
Words: 3868 - Pages: 16
...most frequently used methods in modeling and analyzing business and economic problems. The process of abstracting and model building, and the role of various types of models in description and decision making. OIM 320 Quality Management - Quality control concepts including: fundamental computer and statistical concepts: Statistical Process Control (SPC) using control charts; methods for quality improvement; acceptance sampling; industrial experimentation and reliability. OIM 321 Business Process Simulation - Computer simulation presented for carrying out trial-and-error experiments on computer approximations of real, management systems. The goal is to 1) validate a new idea quickly, 2) diagnose potential product design problems, 3) optimize performance of complex systems, and 4) learn about something complex. The Arena environment, based on the SIMAN language, used to build models and video game-like animations. Prerequisites: (FINOPMGT 347 or OIM 301) and (FINOPMGT 353 or OIM 310) OIM 322 Business Forecasting - Introduction to the uses, limitations, and shortcomings of various short-term and long-term forecasting techniques. Problems selected from accounting, finance, management and marketing. Prerequisite: upper-level Isenberg School of Management standing. OIM 410 Business Process Optimization OIM 412 Supply Chain Management - Integrated supply chain constitutes a core firm competency, spanning most business functions required to deliver products and services...
Words: 709 - Pages: 3
...Enterprise Data Warehouse Edward M. Leonard Marquette University Recommended Citation Leonard, Edward M., "Design and Implementation of an Enterprise Data Warehouse" (2011). Master's Theses (2009 -). Paper 119. http://epublications.marquette.edu/theses_open/119 DESIGN AND IMPLEMENTATION OF AN ENTERPRISE DATA WAREHOUSE By Edward M. Leonard, B.S. A Thesis submitted to the Faculty of the Graduate School, Marquette University, in Partial Fulfillment of the Requirements for the Degree of Master of Science Milwaukee, Wisconsin December 2011 ABSTRACT DESIGN AND IMPLEMTATION OF AN ENTERPRISE DATA WAREHOUSE Edward M. Leonard, B.S. Marquette University, 2011 The reporting and sharing of information has been synonymous with databases as long as there have been systems to host them. Now more than ever, users expect the sharing of information in an immediate, efficient, and secure manner. However, due to the sheer number of databases within the enterprise, getting the data in an effective fashion requires a coordinated effort between the existing systems. There is a very real need today to have a single location for the storage and sharing of data that users can easily utilize to make improved business decisions, rather than trying to traverse the multiple databases that exist today and can do so by using an enterprise data warehouse. The Thesis involves a description of data warehousing techniques, design, expectations, and challenges regarding data cleansing and...
Words: 20485 - Pages: 82
...Before you begin this assignment, be sure you: 1. Have completed all previously assigned readings, particularly those assigned in Weeks 3 and 4 of the class. 2. Re-read the “UMUC Haircuts Case Study" and the Stage 1 & 2 assignments, and review the “Walmart Example.” 3. Review Instructor feedback from previous assignment submissions. Purpose of this Assignment This assignment gives you the opportunity to apply your knowledge of the course concepts to develop IT requirements for a technology solution. This assignment specifically addresses the following course outcomes to enable you to: * analyze internal and external business processes to identify information systems requirements * identify and plan IT solutions that meet business objectives Purpose of this Assignment This assignment gives you the opportunity to apply your knowledge of the course concepts to develop IT requirements for a technology solution. This assignment specifically addresses the following course outcomes to enable you to: * analyze internal and external business processes to identify information systems requirements * identify and plan IT solutions that meet business objectives Overview of IT Requirements for a System to Improve the Process at UMUC Haircuts For your Case Study Stage 1 assignment, you performed a Five Forces Analysis and justified Myra's chosen strategy for competitive advantage and the business process that she would like to improve through the application...
Words: 2090 - Pages: 9
...Oracle® Business Intelligence Applications Installation Guide for Informatica PowerCenter Users Release 7.9.6.4 E35271-01 November 2012 Provides the steps to install and set up Oracle Business Intelligence Applications Release 7.9.6.4. Oracle Business Intelligence Applications Installation Guide for Informatica PowerCenter Users, Release 7.9.6.4 E35271-01 Copyright © 2009, 2012, Oracle and/or its affiliates. All rights reserved. Primary Author: P Brownbridge This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, the following notice is applicable: U.S. GOVERNMENT END USERS: Oracle programs, including any operating system, integrated software, any programs installed...
Words: 60905 - Pages: 244
...BUS211f(2) ANALYZING BIG DATA I1 Spring 2014—MW 8:00–9:20 am Location: Sachar 116 (International Hall) Prof. Bharatendra Rai 313-282-8309 (mobile) brai@brandeis.edu Office: Sachar 1C Hours: MW, 9:30 – 10:15 and by appointment TA: TBD This is a two credit module that examines the opportunities and industry disruption in an era of massive, high velocity, unstructured data and new developments in data analytic. We treat some strategic, ethical, and technical dimensions of big data. The technical foci of the course include data structures, data warehousing, Structured Query Language (SQL), and high-impact visual displays. The principal objective of the course is to help students build understanding of data as an essential competitive resource, and acquire advanced computer skills through cases and hands-on applications. Assignments and classroom time will be devoted to both to analysis of current developments in analytics and to gaining experience with current tools. Davenport , Thomas H. and Harris, Jeanne G. Competing on Analytics: The New Science of Winning. Cambridge: Harvard Business School Press, 2007. ISBN 978-1422103326. Available for purchase at the bookstore. There is a required on-line course pack available for purchase at the Harvard Business Publishing website at this URL: https://cb.hbsp.harvard.edu/cbmp/access/23455671 This link is also available on LATTE . See last page of Syllabus for course pack contents. Other readings as posted on LATTE site. Learning Goals...
Words: 2130 - Pages: 9
...UNIVERSITY OF MUMBAI Bachelor of Engineering Information Technology (Third Year – Sem. V & VI) Revised course (REV- 2012) from Academic Year 2014 -15 Under FACULTY OF TECHNOLOGY (As per Semester Based Credit and Grading System) University of Mumbai, Information Technology (semester V and VI) (Rev-2012) Page 1 Preamble To meet the challenge of ensuring excellence in engineering education, the issue of quality needs to be addressed, debated and taken forward in a systematic manner. Accreditation is the principal means of quality assurance in higher education. The major emphasis of accreditation process is to measure the outcomes of the program that is being accredited. In line with this Faculty of Technology of University of Mumbai has taken a lead in incorporating philosophy of outcome based education in the process of curriculum development. Faculty of Technology, University of Mumbai, in one of its meeting unanimously resolved that, each Board of Studies shall prepare some Program Educational Objectives (PEO‟s) and give freedom to affiliated Institutes to add few (PEO‟s) and course objectives and course outcomes to be clearly defined for each course, so that all faculty members in affiliated institutes understand the depth and approach of course to be taught, which will enhance learner‟s learning process. It was also resolved that, maximum senior faculty from colleges and experts from industry to be involved while revising the curriculum. I am happy to state...
Words: 10444 - Pages: 42
...BUS211f(2) ANALYZING BIG DATA I1 Spring 2014—MW 8:00–9:20 am Location: Sachar 116 (International Hall) Prof. Bharatendra Rai 313-282-8309 (mobile) brai@brandeis.edu Office: Sachar 1C Hours: MW, 9:30 – 10:15 and by appointment TA: TBD This is a two credit module that examines the opportunities and industry disruption in an era of massive, high velocity, unstructured data and new developments in data analytic. We treat some strategic, ethical, and technical dimensions of big data. The technical foci of the course include data structures, data warehousing, Structured Query Language (SQL), and high-impact visual displays. The principal objective of the course is to help students build understanding of data as an essential competitive resource, and acquire advanced computer skills through cases and hands-on applications. Assignments and classroom time will be devoted to both to analysis of current developments in analytics and to gaining experience with current tools. Davenport , Thomas H. and Harris, Jeanne G. Competing on Analytics: The New Science of Winning. Cambridge: Harvard Business School Press, 2007. ISBN 978-1422103326. Available for purchase at the bookstore. There is a required on-line course pack available for purchase at the Harvard Business Publishing website at this URL: https://cb.hbsp.harvard.edu/cbmp/access/23455671 This link is also available on LATTE . See last page of Syllabus for course pack contents. Other readings as posted on LATTE site. Learning Goals...
Words: 2130 - Pages: 9
...Semester One Mid-semester Examinations, 2015 MGTS1201 Computer-based Information Systems Venue Seat Number ________ Student Number |__|__|__|__|__|__|__|__| Family Name This exam paper must not be removed from the venue ____________________ _____________________ First Name _____________________ School of Business EXAMINATION Semester One Mid-semester Examinations, 2015 MGTS1201 Computer-based Information Systems This paper is for St Lucia Campus students. Examination Duration: 60 minutes Reading Time: 10 minutes Exam Conditions: For Examiner Use Only Question Mark This is a School Examination This is a Closed Book Examination - specified materials permitted During reading time - write only on the rough paper provided This examination paper will NOT be released to the Library Materials Permitted In The Exam Venue: (No electronic aids are permitted e.g. laptops, phones) An unmarked Bilingual dictionary is permitted Calculators - No calculators permitted Materials To Be Supplied To Students: 1 x Multiple Choice Answer Sheet Rough Paper Instructions To Students: Please answer all multiple choice questions (MCQ) in the MCQ answer sheet provided. Please answer all short answer questions in the space provided within the examination paper. Please ensure you write your student number and name on the MCQ answer sheet...
Words: 2471 - Pages: 10
...Chapter 12 Business Intelligence and Decision Support Systems Goals of the Chapter The primary objective of this chapter is to recognize the importance of data, the management issues that relate to it, and its life cycle. Other objectives include relating data management to multimedia and document management, explaining the concept of data warehousing, data mining, analytical processing, and knowledge discovery management. An Overview Section 12.1 – The Need for Business Intelligence – The section serves as an overview of Business Intelligence and its use in business. It discusses the problems associated with disparate data stores where data are not integrated into a single reporting system. The section discusses the technologies involved in Business Intelligence and the vendors involved. It also talks about predictive analytics, alerts and decision support. Section 12.2 – BI Architecture, Reporting and Performance Management – This section discusses the modes of data extraction and integration into a standardized, usable and trustworthy one. It also discusses the different types of reporting systems available to organizations, data mining, query and analysis. The section provides an insight into Business Performance Management (BPM) as a way for business managers to know if their organizations are achieving their strategic goals Section 12.3 – Data, Text and Web Mining and BI Search – This section discusses data mining technology, tools, and techniques. Information types...
Words: 5712 - Pages: 23
...CSE- 401 DISTRIBUTED SYSTEMS [3 1 0 4] 1. Distributed System Models: Introduction , Examples , Architecture models , Fundamental models (1.1,1.2,1.4, 2.1-2.3 of Text1 ) ..2hrs 2. Interprocess Communication, Distributed Objects and Remote Invocation: Introduction , External data representation and marshalling, Communication models, Communication between distributed objects , Remote procedure call Case study: Interprocess communication in UNIX, Java RMI . (4.1-4.6, 5.1-5.5 of Text1) ..6hrs 3. Operating System Introduction , Operating system layer, Processes and threads, Communication and invocation, Architecture (6.1-6.6 of Text1) ..4hrs. 4. Distributed File Systems and Name Services: Introduction , File service architecture, Name services, Domain Name System, Directory and directory services. Case study: Sun network file system, Global name service. (8.1-8.3, 9.1-9.4 of Text1) …6hrs 5. Synchronization: Clock Synchronization, Physical clocks, Logical clocks, Global state (5.1-5.3 of Text2) ..5hrs 6. Transactions&...
Words: 5050 - Pages: 21
...Running Head: DATA MINING Assignment 4: Data Mining Submitted by: Submitted to: Course: Introduction Data Mining is also called as Knowledge Discovery in Databases (KDD). It is a powerful technology which has great potential in helping companies to focus on the most important information they have in their data base. Due to the increased use of technologies, interest in data mining has increased speedily. Data mining can be used to predict future behavior rather than focus on past events. This is done by focusing on existing information that may be stored in their data warehouse or information warehouse. Companies are now utilizing data mining techniques to assess their database for trends, relationships, and outcomes to improve their overall operations and discover new ways that may permit them to improve their customer services. Data mining provides multiple benefits to government, businesses, society as well as individual persons (Data Mining, 2011). Benefits of data mining to the businesses when employing Advantages of data mining from business point of view is that large sizes of apparently pointless information have been filtered into important and valuable business information to the company, which could be stored in data warehouses. While in the past, the responsibility was on marketing utilities and services, products, the center of attention is now on customers- their choices, preferences, dislikes and likes, and possibly data mining is one of the most important tools...
Words: 1302 - Pages: 6
...Week 1 Assignment - POPULAR BUSINESS JOURNALS to: | | from: | | subject: | SUCCESSFUL BI IMplEMENTATIONS – INSURANCE INDUSTRY | date: | January 11, 2015 | | | | | Over the past decade due to increased competition, product commoditization and price pressure, insurance companies are seeking to create differentiated value propositions in their products, while reducing losses and improving efficiencies. Business people in functions such as sales, marketing, finance, underwriting, and claims all drive the bottom line. Profitability depends on ensuring everyone in the insurance company makes optimal decisions. Three such leading insurers that applied Business Intelligence solutions successfully to acquire the aforementioned are below. EMC Insurance Companies struggled with pinpointing the right amount of money to hold in reserve against potential case payouts; holding back either too much or too little could be disadvantageous to the firm’s bottom line. The company selected PolyVista, advanced data analytics software built on Microsoft SQL Server Analysis Services, to uncover anomalies, correlations, relationships, and patterns hidden within the firm’s warehouse of claim data. After deploying the solution, EMC was able to improve financial reserve management, identify claims requiring special attention, improve data quality, support executive decision making with improved analysis, and better manage expenses. GEICO uses MicroStrategy to analyze over 20 terabytes of customer...
Words: 877 - Pages: 4