Monday, August 20, 2012

Source System Analysis

Step – 1 - Go through the BRS or business requirement specification and then:-
1. Determine whatever attributes business is asking to be in datawarehouse is already existing in datawarehouse or not. Sometimes it happens that you might be extracting that attribute in the datawarehouse.
2. Determine what can be your most relevant source. Most of the times, you are supposed to get the required attributes from a single source or some from source A and some from source B. But sometimes you may find that some attributes can be extracted from source A as well as source B.At that time you need to consider which source you are going to use. You may consider that some source is already existing in your dawarehouse to use that.

Step – 2 – Meet the source system to know the following:-
1. What are the source tables needed. Primary key of the table. If more than one tables needed to fetch data of a specfic flow what is the relation between the table ( PK-FK).
2. The total data volume the source get in the source tables. Is there any update of not. What is determining column to know whether a record in that table is an update/insert. What is the data field to know when that insertion/updation happened.
3. What will be volume of data in datawarehouse in case of incremental load or in case of initial load.
4. What is the retention period of the table data for source system?
5. Know the business meanings of the entities. Collect the data dictionary of they have. Find our the list of values if any.
6. Do they get batch.

Step – 3 – Check back with your requirement which are :-
1. Did you get all the attributes from source system as per the business requirement specification? If not, complete the step -1 once again and when you are satisfied with the meeting with the source system that there is nothing more information to extract from source system you can send your gap analysis to the business team. Gap analysis tells about some attributes which are not present in the source system so that business personals are aware what they are expecting to get.

Step – 4 – Hands on the table and attributes.
1. Get the access of the source tables from where you are to extract from source system DBAs.
2. Do some random check on data like duplicates in date columns.
3. How much nulls or junks in some attributes.Are the attributes from the LOVs or not etc.
4. Relationship among tables. It is basically verifying whatever information you have got from the source system is correct or not. In case of any doubt anywhere perform step 2 and step 3 again.

Step -5 – Start High Level design of Staging Tables:-
1. At first, determine whether you require new staging table or you can accomodate the new attributes to some existing tables.
2. If you are going the ammend the new attributes in some existing table
3. In case of new staging table:-
a. Are you about to truncate and re-load?
b. Or the table will be append only?
c. Which datatype you prefer for the fields?
d. Do you want any constraint to there?
e. What about pk/fk or indexes?
f. Are you going to pull all columns as is from source or only fields you need as per BRS.
g. Did you think about surrogate key?
Recommended: Keep you staging table as similar as the source flat data/table.

Step -6 – Start High Level design of DW Tables:-
1. Put all the columns which will be more accessed at the beginning.
2. Try to put the date columns together in date format.
3. Try always to assign some default values instead of leaving a column value as NULL.
4. Determine your partitioning and index strategy as per the query to be performed on this table.
5. Determine the retention time for the table.
6. To make DW table with richer information and easier reporting/BI, replace any coded values to LOV.

Labels:

Sunday, January 11, 2009

HowToGeneral:- Internet Connection Sharing

If you have wireless connection with a USB Modem.And you want your computer to act as a router and wish other can also connect to internet through your computer,read the following article:-

Practically Networked

Labels:

Wednesday, September 21, 2005

To Loade Adobe Acrobat Reader Fast ( But its only for versions previous that 6.0)

Adobe reader takes a lot of times in older systems having less amount of RAM.To get rid from this just go to the adobe reader folder in the program files.And rename the plug_ins folder.It will be opened faster.

Labels:

Thursday, June 16, 2005

How To Remove Azesearch Bar

My today is wasted behind the damnnnnn Azesearch.Wat this malware does is its removes teh GOOGLE SEARCH BAR.Its lowers down ur PC performance.Dumps a lot of porno,casino,cheap sites under ur bookmarks.Worst is it redirects u to some different palces where u can get anything.Searching in google becomes painful.It just sends u to the hell "404".And it makes u frightful putting a horrible webpage on your desktop.It puts its own searchbar named AZESEARCH under the addressbar in IE and ofcourse its of no help..I tried to find out why azesearch is so mad on google.But i dint get.Wat I got is that-people loves google.And those who confronted azesearch started hating it.Its really a curse.

I got it when I was finding for a key in net.I got a message to download an activeX component.Becoming confident bout my PC i downloaded it.And its gone.In fact a file named azesearch.ocx gets downloaded into System32 folder.Its the main culprit.Yah,bombarding on it wont help bcz it already done a lot of changes in ur PC.Till then it will make www.azesearch.com as the homepage and also many changes.Even it changes the "host" file in registry.Thats why it can redirects to any "404" pages when we need to open google or yahoo actually.It makes 3-4 dll files also.It creates a XML file in System32 folder which consists the site URL`s which comes under ur bookmark.

To get rid of it i downloaded HijackThis which takes all the changes made in ur account.Then deleted all the items i thought suspicious.But in fact this is for experts only.

For the common users its better to download LAVASOFTS ADWARE program.It will take care of the rest.

Well.The resources to get rid of this nuisance ar below:

** This page describe details how to get rid of it--

http://www.geekstogo.com/forum/You_Must_Read_This_Before_Posting_A_Hijackthis_Log-t2852.html

** These two pages are the EPIC on azesearch bar:
http://www3.ca.com/securityadvisor/pest/pest.aspx?id=453094055
http://www3.ca.com/securityadvisor/pest/pest.aspx?id=453094055

In fact its a very common malware nowadays.in various forums u can get hot discussions on this.But for all those who are yet unaffected,I can suggest to use FIREFOX instead of IE.

M.A.Hasim

Labels:

Tuesday, April 19, 2005

Schema in XML and its benifit?

Schema in XML and its benifit?

Its a file which describes the structure of a XML document.
Most popular schema is DTD schema.



hasim
MCAI


matin
MCAII


mamnoon
MCAIII


The DTD for the above XML will be as follows.





It specifies four tags (namely hostel,student,name and class) and further specifies which tags are required to occur in which place.It gives a hierchical structure of the XML file.

From the first line it tells that all elements shud muct b inside the hostel element and there can b more than one student element inside this hostel element( as + sign is there).In the second line it tells that there will be two elements inside the student tag namely name and class.In the third and fourth line it tells that inside the name and class there will be parse data.

Wats the benifit of schema?
--------------------------

If a xml file is attached with a proper DTD schema,we no need to look for children and parents however big the xml file may be.

This post is not working fine..If still have curiosity bout it,then click..
SUPPLEMENT XML FILE

Labels: