Data Warehousing related part 3 What is your preferred Data Warehouse Implementa
ID: 3716079 • Letter: D
Question
Data Warehousing related part 3
What is your preferred Data Warehouse Implementation Methodology and Why? (Kimball or Inmon) (This is not a “trick” question.)
(Short, but thoughtful Answer is fine)
What is your personal favorite Database Management System Vendor for implementing a Data Warehouse and why? (This is not a “trick” question.)
(Short, but thoughtful Answer is fine)
What is the biggest threat to your newly installed Data Warehouse System and how will you address this issue?
List the areas of the Business Intelligence / Data Maturity Model.
Name four major Cloud vendors who are currently competing for Cloud Computing Services along with one example each of the service and category of service that they provide:
Example:
Yahoo, Yahoo E-Mail, SaaS
What is your preferred Data Warehouse Implementation Methodology and Why? (Kimball or Inmon) (This is not a “trick” question.)
(Short, but thoughtful Answer is fine)
What is your personal favorite Database Management System Vendor for implementing a Data Warehouse and why? (This is not a “trick” question.)
(Short, but thoughtful Answer is fine)
What is the biggest threat to your newly installed Data Warehouse System and how will you address this issue?
List the areas of the Business Intelligence / Data Maturity Model.
Name four major Cloud vendors who are currently competing for Cloud Computing Services along with one example each of the service and category of service that they provide:
Example:
Yahoo, Yahoo E-Mail, SaaS
Explanation / Answer
All the questions have been answered. Please "like" if this helped. Good luck!
What is your preferred Data Warehouse Implementation Methodology and Why? (Kimball or Inmon) (This is not a “trick” question.)(Short, but thoughtful Answer is fine)
Answer:
The two major Data Warehouse Implementation Methodologies are Kimball and Inmon. These two have their own advantages and differentiating factors. The enterprises continue to use either of these.
In Ralph Kimball’s dimensional design approach (the bottom-up design), the data marts facilitating reports and analysis are created first. These are then combined together to create a broad data warehouse.
In Bill Inmon’s enterprise data warehouse approach (the top-down design), a normalised data model is designed first. And then the dimensional data marts are created from the data warehouse. These contain data required for specific business processes or specific departments.
The preference depends on the business objectives of the organisation, nature of the business, time and cost involved, and also the level of dependencies between various functions.
I would prefer the Inmon’s approach as it is suitable for stable businesses that can afford the time taken for designing and the cost involved. They do not change the design for every change in the business condition. They accommodate these into the existing model.
However, if a local optimisation is good enough for the organization and the focus is on a quick win, it is better to go for Kimball’s approach.
What is your personal favorite Database Management System Vendor for implementing a Data Warehouse and why? (This is not a “trick” question.)(Short, but thoughtful Answer is fine)
Answer:
There is a huge choice of Database Management Systems(DBMS), which includes packaged as well as open source database suites. The main suppliers include Fujitsu, Hewlett-Packard, Hitachi, IBM, Microsoft, NCR Teradata, Oracle, Progress, SAS Institute and Sybase.
Among them, my personal favorite is Oracle.
The Oracle database versions in use are Oracle 7, Oracle 8, Oracle 8i, Oracle 9i and Oracle 10g. The Oracle Database 11g is in beta phase. For Oracle, the database is a key part of its applications platform. It is also possible to use rival databases with Oracle's business software.
Several versions of the Oracle database are available, with different pricing and features. The standard edition contains the basic database functionality and is mostly used on servers running between one and four processors.
The users running the Oracle database on servers with more than four CPUs must convert it to an Enterprise licence. This is because the Enterprise Edition has more features than the Standard Edition in the areas of performance and security.
The Express Edition can be used for running on Windows. The Linux Personal Edition is an enterprise version with a single usage licence and Database Lite, which runs on mobile devices.
Enterprise Edition has no memory limits and can utilise clustering via Oracle Real Application Clusters software.
What is the biggest threat to your newly installed Data Warehouse System and how will you address this issue?
Answer:
The major threat found in front-end information system applications is regarding the input validation. The first thing an intruder will do is to look for information leakage. It may be any clue that could help in making a successful attack. The most easiest place to look is in the Web pages themselves. The HTML and JavaScript comments often reveal many useful information such as application version numbers, hidden variables, code or links that have been commented out but still function if they are called.
Consider an example in which a product reveals the full directory path of where data files were stored. This enables an attacker to use another exploit to download them directly, bypassing application-level checks.
Parameter manipulation: Every piece of information and every parameter sent by the browser to the server can be manipulated. The parameters being changed are typically found in URLs. One of the most threatening security attacks, called the cross-site scripting (CSS), results in an attacker’s ability to execute the JavaScript code on another user’s browser.
There are applications which allow users to enter SQL queries. The applications that do not support SQL queries are designed to append a user’s input to SQL queries directly. Both these actions help the attacker to perform SQL injection. SQL injection attacks find ways to insert SQL code into applications. This helps them gain the control of a system. The SQL may not be the only code executed on the database. There may be running executable already present on the database server itself. This can lead to further points of attack.
This issue can be taken care of only by ensuring that no parameters are easily available in the URLs. The normal users should be forbid from accessing or using the parametric values in the url. All the comments should be taken care of and no important data should be easily available in the navigation urls.
List the areas of the Business Intelligence / Data Maturity Model.
Answer:
Limited Business Intelligence/ Spreadsheet:
A Spreadsheet is a computer application that simulates an accounting paper worksheet. It displays multiple cells that together make up a grid consisting of rows and columns, each cell containing alphanumeric text, numeric values or formulas.
Operational Reports:
Operational reports are pre-designed business reports that focus on the listings of data at the detailed level in a highly-structured format. The operational reports enable organizations to present data in a logical format and are designed to support the day-to-day activities of an organization at the transaction level.
Query and Analysis Solutions and Environment:
The query and analysis solutions enable business users and analysts to rapidly generate business queries and reports from enterprise data based upon business question of the data. It is also known as ad-hoc querying.
Dashboard management:
Dashboard management systems are used to facilitate and support the information and decision-making needs of management. This is done by providing easy access to key business information in a highly graphical and intuitive format.
On-line analytical processing (OLAP):
OLAP systems allow users to rapidly view and analyze data from many perspectives or dimensions and allows the users to conduct advanced analysis.
Data mining and Predictive analysis:
The data mining is the process of analyzing large data sets in order to find patterns that can help to isolate key variables to build the predictive models for management decision making.
Name four major Cloud vendors who are currently competing for Cloud Computing Services along with one example each of the service and category of service that they provide: Example:Yahoo, Yahoo E-Mail, SaaS
Answer:
The four major cloud vendors along with their service and the category of services are given below respectively:
1. Amazon Web Services - Security, Identity and Compliance - Amazon Shield
2. Microsoft Azure - Networking - VPN Gateway
3. Google Cloud Platform - BigData - BigQuery
4. IBM Cloud - Developer Tools - Cloud CLI
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.