Requirements analysis
Recently I read a very interesting book on requirements analysis “Mastering the Requirements Process: Getting Requirements Right” by Suzanne Robertson and James Robertson. They wrote a practical book that lead…
Recently I read a very interesting book on requirements analysis “Mastering the Requirements Process: Getting Requirements Right” by Suzanne Robertson and James Robertson. They wrote a practical book that lead…
I came accross a very nice technique that can be used to show the scope of a project. It is called the Context Diagramme. The idea is that the system…
I often come across checklists. Such checklists are used to assess the quality of, say, a database. See here for an example of such a checklist. In this case, we…
I currently work in an organisation that has a debate on whether to use MOLAP or ROLAP. But first of all: what is discussed here? ROLAP and MOLAP are two…
Teradata has a feature that is designed to increase the performance of queries. This feature is called the “join index”. Such a join index is a structure that stores the…
Teradata has the concept of “Soft RI”. In this concept, a foreign key is created but its restriction is not enforced. What happens in that situation? Let’s look at the…
Let us assume, we have a data warehouse in teradata. Let us suppose that this data warehouse is loaded with a set of scripts. In principle it could be done.…
Security and compliance has many different aspects. In the list below, I try to provide an overview on these aspects. We have seen: Authentication. Is the person really the person…
Yet another checklist Regularly, one comes across an assignment whereby one has to assess a data warehouse. (at least in my type of work). I found a nice checklist that…
Quite often, I have to write a functional design. Such a design can be a tedious job. Part of time is spent is spent on how to represent the findings.…