יום שני, מרץ 13, 2017
Sql Server 2016 Tabular Architecture. Living On the Edge.
Join My session on Sql 2016 Extreme BI.
It will take place on 2017 APR 27.
This session will do a brief overview of Tabular Mode 2016 performance topics, and drill into some common methods for investigating performance issues.
Tabular performance and monitoring with Activity Viewer 2016 ( http://activityviewer2016.codeplex.com/releases)
Performance investigation tools: Profiler, XEvents, MDX, ETW Tuning Tabular Mode for high end hardware Common pitfalls for processing performance Formula engine performance.
Tabular Development LifeCycle Best Practice and +++
יום ראשון, מאי 22, 2016
Finally and as folowing the UserGroups request, I have updated the Assemblies for the SQL SERVER 2016 SSAS and TABULAR.
You can download the new Activity Viewer at https://activityviewer2016.codeplex.com/releases
please feel free to leave positive feedback :-)
יום ראשון, ינואר 20, 2013
In Excel 2013, you can create data models containing millions of rows, and then perform powerful data analysis against these models. Data models can be created with or without the PowerPivot add-in to support any number of PivotTables, charts, and Power View visualizations in the same workbook. Although you can easily build huge data models in Excel, there are several reasons not to. First, large models that contain multitudes of tables and columns are overkill for most analyses, and make for a cumbersome Field List. Second, large models use up valuable memory, negatively affecting other applications and reports that...
יום חמישי, דצמבר 27, 2012
Those of you who looked for pie chart in PowerPivot and could not find it, can fild it now. To use it, you should install SharePoint 2010 SP1 and Sql Server 2012 SP1. The steps for appropriate installation can be found here : http://msdn.microsoft.com/en-us/library/hh231687
יום ראשון, יולי 8, 2012
Impersonation is the ability of a server application, such as Analysis Services, to assume the identity of a client application. Analysis Services runs using a service account, however, when the server establishes a connection to a data source, it uses impersonation so that access checks for data import and processing can be performed. Credentials used for impersonation are different from the credentials of the user currently logged on. Logged on user credentials are used for particular client side operations when authoring a model. It is important to understand how impersonation credentials are specified and secured as well as the...