Security and compliance
Security and compliance has many different aspects. In the list below, I try to provide an overview on these aspects. We have seen: Authentication. Is the person really the person…
Security and compliance has many different aspects. In the list below, I try to provide an overview on these aspects. We have seen: Authentication. Is the person really the person…
Yet another checklist Regularly, one comes across an assignment whereby one has to assess a data warehouse. (at least in my type of work). I found a nice checklist that…
Quite often, I have to write a functional design. Such a design can be a tedious job. Part of time is spent is spent on how to represent the findings.…
In a previous post, I showed that costs data may be allocated to other departments or levels of granularity to enable cost analysis. The allocated cost data are artificial data:…
In most organisations, cost data are collected on a different level of granularity or attached to another dimension as we would like to see the cost data. Two examples. Cost…
It is possible to store XML records in an Oracle table. This is one (of the many) way to retrieve XML information from an Oracle environment. It is actually quite…
I recently encountered a nice model on product types that I would like to share. A product type can be understood as an concept of a product, much like the…
Several possibilities exist to read XML files. One such possibility is to have it read via XSLT. This procedure is composed of three elements: The XML file that is to…
I know that lots and lots of possibilities exist whereby an XML file can be read. One set of possibilities is to use a Javascript. One then stores a script…