3 12, 2015

Applying user rights in Jedox (1): System-based security

By | 2016-12-09T11:42:34+00:00 December 3rd, 2015|How To|

When designing a BI or CPM solution with Jedox we often deal with a wide variety of users with different roles and responsibilities in their business domain. The security structure should therefore mirror these roles and responsibilities in order to restrict the users, if necessary, in their accessibility of data and capability of data entry. In order to realize a

5 06, 2014

SQL vs NoSQL

By | 2016-12-09T11:43:17+00:00 June 5th, 2014|Jedox Ecosystem|

The Relational vs. Non-Relational Database Debate Over the past couple years, I’ve heard the SQL vs. NoSQL argument numerous times.  Is the argument even valid?  Regardless of your opinion, the term SQL is often used loosely. Technically speaking, SQL is a query language used against relational databases. There are other ways to access and query information from relational databases, thus,

5 05, 2014

Business Intelligence, Unpacked

By | 2016-12-09T11:43:23+00:00 May 5th, 2014|Trends|

Demystifying the world of technology and decision making Since individuals have varying job functions and unique professional experiences, their definitions of business intelligence will vary. This is a not bad thing – in fact, I’m suggesting that understanding the alternative perspectives can only make your personal definition of BI stronger. My goal (and a lofty one at that) is to

25 04, 2014

Advantages Of An In-Memory Database

By | 2016-12-09T11:43:24+00:00 April 25th, 2014|Trends|

For users of large (big) databases, having all your data on a slow spinning hard disk can make it difficult to do analysis in a timely manner. Your sales numbers, inventory, customer information and other performance data can be better accessed and analyzed when it is stored on special high-speed memory chips, or an In-Memory Database. Ashlee Vance of Bloomberg

15 11, 2013

Introduction to Security in Jedox

By | 2016-12-09T11:43:42+00:00 November 15th, 2013|Data Modeling|

Jedox has a robust security model. You can allocate permissions down to cell level if required. All of its security objects are held within cubes and dimensions so it is pretty straightforward to set up and apply security. Its user security is group and role based, which means that users are members of groups and groups have certain characteristics defined