We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy

See Pricing

What's Your Topic?

Hire a Professional Writer Now

The input space is limited by 250 symbols

What's Your Deadline?

Choose 3 Hours or More.
Back
2/4 steps

How Many Pages?

Back
3/4 steps

Sign Up and See Pricing

"You must agree to out terms of services and privacy policy"
Back
Get Offer

Data Analysis Methods

Hire a Professional Writer Now

The input space is limited by 250 symbols

Deadline:2 days left
"You must agree to out terms of services and privacy policy"
Write my paper

OLAP (On Line Analytical Processing) is used for business reports for companies using a number of protocols. Organisations can analyse data in a number of different ways i. e. budgeting, planning, data warehouse reporting, simulation and trend analysis. One of the main benefits of OLAP is the skill to make multidimensional calculations especially used for large businesses. This process will be complete in seconds There are many components of OLAP tools. In this report I will discuss and compare four OLAP tools and identify there strength and weaknesses.

Four OLAP tools: Cognos Pentaho Hyperion Spagobi

Don't use plagiarized sources. Get Your Custom Essay on
Data Analysis Methods
Just from $13,9/Page
Get custom paper

Cognos capabilities include Building reports, OLAP cubes, dashboards and scorecards using all data sources Cognos core products are Query studio, analysis studio and report studio the 3 web front ends cognos and BI offers for reporting and analysis Key areas evaluated include server platform, component integration, offline support and aspects of the front end functionality such as analysis, reporting and charting capabilities Business Intelligence users distribute all the dashboards, tactical, strategic, and operational to help them achieve, monitor and sustain corporate governance IBM Cognos 8 Business Intelligence applications

There are several applications used by IBM Cognos and Business Intelligence: ? Query Studio – Is a tool to create unplanned reports.

Users are able to create one 1-page report at a time. This application may be used by Query Authors and Report Authors. http://www. cognos-bi. info/cognos8. html Because security was the main concern, Cognos chose to add Salesforce’s data security features, Cognos is now 24/7 support for all users Cognos enjoys end-to-end visibility, tracking leads through to closed opportunities http://www. salesforce. com/eu/customers/hi-tech-software/cognos. sp {draw:frame} The following chart contains Cognos License: http://www. itap. purdue. edu/ea/files/ExplanationOfSoftwareToolsAndUsers. pdf Architecture of Cognos IBM Cognos 8 has a many dimensions architecture. It is divided into three dimensions Web server, applications, and data. The dimensions are based on business function. IBM Cognos 8 user interfaces e. g. PowerPlay Studio is on above the three tiers. {draw:frame} http://publib. boulder. ibm. com/infocenter/c8bi/v8r4m0/topic/com. ibm. swg. im. cognos. ug_search. 8. 4. 0. doc/images/crn_arch_struc-1. jpg Cognos 8 security involves the following: • Cognos Application Firewall Cognos authentication services • Content Manager authorization services • Cryptographic services Cognos Application Firewall Cognos Application Firewall features include request validation, Secure Error, and parameter Signing. It also has a flexible architecture that can be updated to keep your Cognos 8 security posture current. Cognos Application Firewall is an essential component of Cognos 8 security, helping to provide protection against penetration vulnerabilities such as cross-site scripting. Disabling the Cognos Application Firewall will remove this protection, and should not be done under normal circumstances.

Cognos Authentication Services Authentication is the process of identifying individuals before allowing them to log on. Authentication in Cognos 8 is third-party authentication providers. Authentication providers access users, groups, and roles used for authentication. User names, IDs, passwords, regional settings, and personal preferences are some examples of information stored in the authentication source accessed by the provider. To set up authentication for Cognos 8, you must configure Cognos 8 using one or more of these authentication providers: • LDAP Windows NT LAN Manager (NTLM) • Microsoft Active Directory • Cognos 7 namespaces created using Cognos 7 Access Manager and available with other Cognos products • Netegrity SiteMinder • Custom Java provider Cognos Namespace Cognos 8 has its own namespace, which is in addition to the external namespaces that represent third-party authentication providers. This practice can add value to groups and roles by reorganizing them for Cognos 8 without changing them in your authentication provider. You can use the Cognos namespace to set up security that links easily with client security systems.

For more information, see the Administration and Security Guide. Single Signon You can configure Cognos 8 for single signon. Users can sign on once to an environment that includes Cognos 8 and other programs, without having to sign on each time they move between programs. Implementation of a single sign on solution depends on the environment and authentication provider configuration. Content Manager Authorization Services Authorization is the process of giving or denying access to data, and specifying the actions that can be performed on that data, based on a user identity.

For example, Cognos 8 administrators can set up folders in which reports are stored. They can then secure those folders so that only authorized users can view, change, or perform other tasks using the reports in the folder. Distributed Administration The Cognos 8 security model supports the distribution of security administration. Because objects in Content Manager, such as folders and groups, can be secured separately, security administration can be assigned to individuals in separate functional areas of the organization.

Security administration does not have to be centralized with an Information Technology Permissions Permissions are related to the users, groups, and roles defined in third-party Permissions show access rights to objects, such as directories, folders, and other content, for each user, group, or role. Permissions also define the activities that can be performed with these objects. Cognos 8 authorization assigns permissions to • groups and roles created in the Cognos namespace in the Content Manager for Cognos 8.

These groups and roles are referred to as Cognos groups and Cognos roles. • Entire namespaces, users, groups, and roles created in third-party authentication providers. Users A user entry is created and maintained in a third-party authentication source to identify an account belonging to a person or a computer. You cannot create user entries in Cognos 8. The user entry stored in the authentication source may include information such as first and last names, passwords, IDs, locales, and email addresses.

However, Cognos 8 may require additional information, such as the location of the users’ personal folders or their format preferences for viewing reports in the portal. This additional information is stored in Cognos 8. You can assign users to groups and roles defined in the authentication provider and in Cognos 8. A user can belong to one or more groups or roles. If users are members of more than one group, Their access permissions are merged. Cryptographic Services Cryptographic services ensure that Cognos 8 communications and sensitive data are secure.

Encryption is used to secure • static data • Temporary data • Transient data Proactive administration: System metrics and custom thresholds reduce the time you need to troubleshoot, identify differences and resolve performance issues before they off put impact system performance or the user experience http://www-01. ibm. com/software/data/cognos/solutions/cognos-8-platform/deploy-and-manage. html Products: Hyperion Intelligence (comprising products formerly offered by Brio Technology, acquired in 2003) Hyperion Master Data Management draw:frame} http://www. enterprise-dashboard. com/img/hyperion-9-bi-workspace-dashboard-graphs. jpg http://www. brovanture. com/Oracle_Hyperion/downloads/hyperion-performance-scorecard-datasheet. pdf 3) Pentaho Pentaho is one of the open source Business Intelligence capabilities. Pentaho has produced has produced the most popular open BI suite in the world by highly experienced teams. Pentaho’s mission is to bring innovative, high quality technology and professional support to the BI market. Pentaho owns and sponsors projects like Mondrian, JFreeReport and Kettle.

It has great technology support from sales, customer analysis and financial reporting. Pentaho includes the following: reporting,- analysis, dashboards, data mining, data integration, http://www. pentaho. com/news/releases/20070419_pentaho_adds_reporting_solution_to_openoffice. php PLATFORMS: Pentaho BI Suite Enterprise Edition is positioned on Dell servers running CentOS, Apache, the Tomcat application server and the PostgreSQL database http://www. information-management. com/issues/2007_58/-10015320-1. html Components Pentaho analysis consists of the BI server and Client tools and add-ons text:list-item} {text:list-item} {text:list-item} {text:list-item} {text:list-item} Pentaho licensing The Pentaho BI Suite uses various licenses to allocate software and paper work, to receive regular contributions from individuals and corporations, and to accept larger grants of existing software products Pentaho architecture and administration The Pentaho platform was built to be open and flexible, and to allow developers to bring third-party components. As such, it is easy (depending on how smart you are) or at least possible to plug in other components or applications using our published interface.

Developers who implement these interfaces to other products are welcome to contribute them back to the project. Workflow is a key architectural component that drives many of the control and solution monitoring features built into the BI platform. Workflow also provides a layer of abstraction that serves to bridge the integration gaps between internal and external layers of the platform. To a user the workflow is transparent, but a solution builder can create rich end-to-end BI applications. Anyone who needs to solve enterprise class business problems can use the platform to implement solutions.

Total cost of ownership is dramatically lower; resources can be invested in developing the business logic, reports and workflows that implement the solution. This provides tremendous benefits to end-user organizations, consultants, ISVs and OEMs. Now that I think about it – the only people that don’t benefit are commercial vendors selling overpriced BI tools to unsuspecting customers Key areas to the architecture are technical whitepaper describes the architecture of the Pentaho BI Platform. The following chart shows the architecture of Pentaho http://images. google. ie/imgres? mgurl=http://www. cleverbee. com/web/cs/obrazky/pentaho_functional_architecture. jpg=http://www. cleverbee. com/web/de/losungen/business_intelligence. jsp=__wCUy7MYPDTv7kVrJfA-h0QHoYaM==406=416=63=en=1=1=1=U0XZ6G_EQ5un8M:=122=125=/images%3Fq%3Dpentaho%2Barchitecture%26hl%3Den%26sa%3DN%26um%3D1 Prices of Pentaho Pentaho BI Framework uses Acegi Security for a pluggable framework to implement and combine multiple authentication schemes and credential stores and CAS for platform-neutral single sign-on (SSO Pentaho Open BI Suite olution consists of 5 basic modules: Spagobi SpagoBI is the unified Free Platform for the development of Business Intelligence solutions at enterprise level. ,SpagoBI supports day-to-day and strategic business, both at the decision-making and operational level. SpagoBI offers many ways of reporting, the multidimensional analysis, the interactive dashboards, the geographic and graphic analysis, the management and presentation of a KPIs model, the free inquiry, the datas mining, and the collaboration for the informative enrichment. SpagoBI has got 5 modules: SpagoBI Studio, an integrated development environment;

SpagoBI SDK, the layer of integration for using SpagoBI in external applications and SpagoBI_ Applications_, to hold all the analytical vertical models developed with SpagoBI {draw:frame} Architecture of spagobi http://www. spagoworld. org/xwiki/bin/view/SpagoBI/Architecture Administration The Health care system collects data in his database all data generated during their elaboration while SpagoBI for Areas is the basic tool allowing to reduce the necessary information to support the strategic, tactical and operational decisions that the health centres have to take daily.

Therefore SpagoBI for Areas realizes the analytical component that provides to the different needed areas an extended intelligence layer able to support not only the decision-making managerial process (Business Intelligence), but the administrative and clinical managerial processes (Clinical Intelligence, HR Intelligence) too. Here is the list of SpagoBI components: Core: application that can be deployed as a collections of portlets or as a stand-alone web application; it contains base functionalities. It is mandatory for any application using SpagoBI.

BirtReportEngine: it is an implementation of a report engine integrating the Birt solution. GeoEngine: it is an implementation of a map engine. JasperReportEngine: it is an implementation of a report engine integrating the JasperReport solution. JPaloEngine: it is an implementation of an OLAP engine based on the JPalo. JPivotEngine: it is an implementation of an OLAP engine based on the JPivot/Mondrian solution. WekaEngine: it is an implementation of a data mining engine based on the Weka solution.

QbeEngine: engine based on Query-by-example, that is a visual mode for data inquiring. TalendEngine: engine for ETL jobs designed with Talend Open Studio. Demo: it is a SpagoBI platform demo version. Licenses SpagoWorld projects are released under the GNU Lesser General Public License (LGPL). Briefly, it means that anyone who receives a SpagoWorld solution, they receive all the license rights and duties as well. SpagoWorld projects documentation is free and licensed under the Creative Commons Attribution-ShareAlike License http://www. pagoworld. org/xwiki/bin/view/SpagoWorld/Licenses Website References: http://www. salesforce. com/eu/customers/hi-tech-software/cognos. jsp http://www. itap. purdue. edu/ea/files/ExplanationOfSoftwareToolsAndUsers. pdf http://www. cognos-bi. info/cognos8. html http://publib. boulder. ibm. com/infocenter/c8bi/v8r4m0/topic/com. ibm. swg. im. cognos. ug_search. 8. 4. 0. doc/images/crn_arch_struc-1. jpg http://www-01. ibm. com/software/data/cognos/solutions/cognos-8-platform/deploy-and-manage. tml http://www. enterprise-dashboard. com/img/hyperion-9-bi-workspace-dashboard-graphs. jpg http://www. brovanture. com/Oracle_Hyperion/downloads/hyperion-performance-scorecard-datasheet. pdf http://www. pentaho. com/news/releases/20070419_pentaho_adds_reporting_solution_to_openoffice. php http://www. information-management. com/issues/2007_58/-10015320-1. html http://www. pentaho. com/license/ http://images. google. ie/imgres? imgurl=http://www. cleverbee. com/web/cs/obrazky

Cite this Data Analysis Methods

Data Analysis Methods. (2018, Feb 28). Retrieved from https://graduateway.com/olap-tools/

Show less
  • Use multiple resourses when assembling your essay
  • Get help form professional writers when not sure you can do it yourself
  • Use Plagiarism Checker to double check your essay
  • Do not copy and paste free to download essays
Get plagiarism free essay

Search for essay samples now

Haven't found the Essay You Want?

Get my paper now

For Only $13.90/page