Describe the different format for the etl

Assignment Help Management Information Sys
Reference no: EM131689394

Problem

Our database folks have suggested we use a different format for the ETL if I'm so interested in growth. It's copied below. It's the exact same data, just a little differently arranged. What do you think of it? Bobby, one of my IT people, thinks a data mart with this layout is a brilliant answer to the growth question. But Susie, another one of my IT people, has concerns that this data layout will make it hard to query on any other dimension, such as whether a particular product is doing well or poorly in a given region, regardless of year, or monthly seasonal trends. Am I missing anything here? What do you recommend? If we had to go with just one layout of our data mart, which layout should it be?"

Reference no: EM131689394

Questions Cloud

Overlapping queries from such databases : 1.) What is a statistical database? Why might it be necessary to deny certain overlapping queries from such databases?
Research starbucks organizational culture : Evaluate Starbucks' ability to achieve long-term sustainability as a global leader in the coffee industry without the organization's CEO, Howard Shultz.
Explain and draw architecture of web-based data warehousing : Explain how decision style can effect on the decision makers think and react to a problem? Explain and draw the architecture of web-based data warehousing.
What is a multi-event signature : What is a multi-event signature? Provide at least two examples of multi-event signature activities or patterns that might be monitored with an intrusion?
Describe the different format for the etl : Our database folks have suggested we use a different format for the ETL if I'm so interested in growth.
Defining and investigating the concept of steganography : Write one page paper defining and investigating the concept of "Steganography" what is it?how does it differ from "Cryptography"
Discuss should animals be used in research : Should Animals Be Used in Research, lot of psychological research has been based on findings derived from observing animal behavior
Security management perspective : From a security Management perspective When management is developing a plan for emergency evacuations, what things need to be considered?
Perform systems project evaluation and review : Why is it crucial to perform systems project evaluation and review? When should this be accomplished?

Reviews

Write a Review

Management Information Sys Questions & Answers

  Prepare the dataset for data mining techniques

Prepare the dataset for data mining techniques of supervised learning by creating partitions using XLMiner's data partitionining utility.

  Analyze at least one major advantage of private networks

Analyze at least one major advantage of private networks and the impact it creates for a communication technology organization.

  What is a multimedia framework

Have a coding or scripting language to handle user interaction and internal logic. It might have its own "easy to learn" language, or a platform neutral language (e.g. C)

  A number of web based firms offer

A number of web based firms offer what they describe as a free online security check of your PC or network. Some require download of executable software for the check. Would you trust such an offer? Why or why not?

  Definitions of cyber terrorism

From the second e-Activity, among the three (3) definitions of cyber terrorism, give your opinion as to the one (1) definition that is the most accurate with regard to information security and infrastructure protection

  What are the advantages of cloud computing dr solutions

What are the advantages of cloud computing DR solutions? What are the disadvantages and risks?

  Using a summary of the six business activities for perfect

data flow diagramusing a summary of the six business activities for perfect pizza as follows create 1 a context diagram

  Information security explained in this answerinformation

information security explained in this answerinformation security is an expensive and difficult undertaking at best.

  Compare and contrast the dyb and gyb strategies

Compare and contrast the DYB and GYB strategies in terms of the ability to sustain a business in the marketplace over the long term, to be competitive against rivals, and profitability.

  Lester and koehler talk about the time

Lester and Koehler talk about the time it takes to get information. This has changed greatly in the last few years. Does this change how we use information or what we expect from information?

  What is the difference between a project risk and an issue

Define the difference between Business Process Re-engineering (BPR) and Business Process Management (BPM) concepts. What are the advantages and disadvantages of BPM? How do "value chain" principles apply to BPR and BPM? Why should an IT manager kn..

  Brute force user id and password attacks

Users or employees unaware of the risks, threats, and dangers of the Internet and shard WI-FI or broadband Internet Access.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd