עדכון מפגשי יולי ואוגוסט

23/07/2012

שלום לכולם, בשבוע האחרון קיבלנו פניות רבות של חברי הקבוצה  לדחות את מפגש יולי עקב חופשות והיעדרויות . היות שמפגש אוגוסט מתוכנן לשבוע האחרון של אוגוסטבו כבר חוזרים לבתי הספר,הוצע על ידי רוב הקבוצה לדחות את מפגש יולי ולקיים את מפגשאוגוסט. בסופו של דבר, הוחלט לקבל את ההצעה.מפגש יולי לא יתקיים עקב חופשות. מפגש אוגוסט יתקיים. על נושא מפגש אוגוסט נוציא הודעה מסודת.תודה לכולם על שיתוף הפעולה והעדכונים השוטפים!!! חופשה נעימה לכולם, 
תגיות: ,
אין תגובות

The advantages in deploying a model using DirectQuery mode

16/07/2012

There are many advantages to deploying a model using DirectQuery mode: It is possible to have a model over data sets that are too large to fit in memory on the Analysis Services server. The data is guaranteed to be up-to-date, and there is no extra management overhead of having to maintain a separate copy of the data. Changes to the underlying source data can be immediately reflected in queries against the data model. DirectQuery can take advantage of provider-side query acceleration, such as that provided by xVelocity memory optimized column indexes. Any security...
תגיות: , ,
תגובה אחת

Tabular Models with DirectQuery Mode

Tabular models are authored by using the model designer SQL Server Data Tools (SSDT). The model designer creates all models in memory, which means that when you are modeling, if your data is too large to fit into memory, you should import only a subset of data into the cache used by the workspace database. When you are ready to switch to DirectQuery mode, you can change a property that enables DirectQuery mode. For more information, see Enable DirectQuery Design Mode (SSAS Tabular). When you do this, the model designer automatically configures the workspace database to run in...
תגובה אחת

SSAS Tabular Impersonation (Sql2012)

08/07/2012

Impersonation is the ability of a server application, such as Analysis Services, to assume the identity of a client application. Analysis Services runs using a service account, however, when the server establishes a connection to a data source, it uses impersonation so that access checks for data import and processing can be performed. Credentials used for impersonation are different from the credentials of the user currently logged on. Logged on user credentials are used for particular client side operations when authoring a model. It is important to understand how impersonation credentials are specified and secured as well as the...
אין תגובות