Posts

Showing posts from 2012
Basics Formal / Neutral Informal Name Dear Mr/Ms/Mrs Dupuis Dear Mary Hi/Hello Mary Mary,... (or no name at all) Previous contact Thank you for your email of ... Further to your last email, ... I apologize for not getting in contact with you before now. Thanks for your email. Re your email, ... Sorry I haven’t written for ages, but I’ve been really busy. Reason for writing I am writing in connection with ... I am writing with regard to ... In reply to your email, here are ... Your name was given to me by ... We would like to point out that ... Just a short note about ... I’m writing about ... Here’s the ... you wanted. I got your name from ... Please note that ... Giving information I’m writing to let you know that ... We are able to confirm that ... I am delighted to tel...

Modeling patterns for dynamic security

To create a model for dynamic security: 1. Create a two-column security table in the relational data source. In the first column, specify the list of Windows user names or custom data values. In the second column, specify the data values that you want to allow users to access for a column in a given table. 2. Import the security table into the tabular model using the Import Wizard. 3. Using the Import Wizard, create a one column table that contains the user names or custom data values for the model. The values in this table must be unique. This table does not need to be materialized in the relational data source; instead, it can be constructed in the Import Wizard by querying the security table for the unique user names or custom data values. 4. Create a relationship between the security table and the column that is being secured. 5. Create a relationship between the bridge table created in step 3 and the security table created in step 2. 6. [optio...

Modeling patterns for dynamic security

To create a model for dynamic security: 1. Create a two-column security table in the relational data source. In the first column, specify the list of Windows user names or custom data values. In the second column, specify the data values that you want to allow users to access for a column in a given table. 2. Import the security table into the tabular model using the Import Wizard. 3. Using the Import Wizard, create a one column table that contains the user names or custom data values for the model. The values in this table must be unique. This table does not need to be materialized in the relational data source; instead, it can be constructed in the Import Wizard by querying the security table for the unique user names or custom data values. 4. Create a relationship between the security table and the column that is being secured. 5. Create a relationship between the bridge table created in step 3 and the security table created in step 2. 6. [optional] Add...

Microsoft White Papers - SQL Server 2008 R2

Microsoft White Papers - SQL Server 2008 R2 Link:  http://msdn.microsoft.com/en-us/library/ee410014(v=sql.105)

Master Data Services in SQL Server 2012

Master Data Services in SQL Server 2012 Use the following resources to help understand, install, configure, manage, and troubleshoot Master Data Services (MDS) in SQL 2012. What is MDS? How do I use MDS? Resources for an MDS Deployment Frequently Asked Questions Additional Resources What is MDS? Master Data Services Overview What's New for Master Data Services 2012 How Do I Use MDS? MDS One-Day Course Topic  Material Duration Master Data Services Overview Video  |  Slides 45 min Managing Data Warehousing Dimensions with MDS, Part 1 Video  |  Slides 15 min Managing Data Warehousing Dimensions with MDS, Part 2 Video 15 min Data Loading via Entity Based Staging (EBS) Video  |  Slides 30 min MDS Hierarchies and Collections Video  |  Slides 30 min Business Rules and Workflow in MDS Video  |  Slides 30 min MDS Model Migration and Upgrade Video  |  Slides 30 min Security Features a...

Top Five New Features in SQL Server 2012

Top Five New Features in SQL Server 2012 Microsoft recently released the first Community Technical Preview (CTP) of the newest version of SQL Server, code-named Denali.  Three years after the release of SQL Server 2008, this new version of the popular database platform promises several exciting new features. 1. SQL Server AlwaysOn Technology The new High Availability and Disaster Recovery (HADR) features of Denali will offer a vast improvement over the database mirroring capabilities of SQL Server 2008.  AlwaysOn allows you to create availability groups of databases that can be failed over simultaneously.  This is especially important when you wish to fail over interdependent applications that rely upon more than one database.  AlwaysOn also allows you to create active secondary servers, making use of the redundant databases for part of your read workload. 2. Ad Hoc Query Paging The ad hoc query paging enhancements to TSQL add the OFFSET an...

SBI Domestic Term Deposits

The revised interest rates for  Domestic Term Deposits  ‘Below Rupees One Crore’ effective from the  8 th    June 2012 would be as under:                                                   (All figures in % per annum)         Tenor Below Rs.15 Lakhs Rs.15 lakhs to less than Rs. 1 Cr Existing Rates w.e.f. 24.04.2012 Revised rates w.e.f. 08.06.2012 Existing Rates w.e.f. 24.04.2012 Unchanged 7 days to 90 days 7.25 7.00 8.00 8.00 91 days to 179 days 7.25 7.00 8.00 8.00 180 days 7.25 7.00 8.00 8.00 181 days to 240 days 7.50 7.25 8.00 8.00 241 days to less than 1 year 7.50 7.50 8.00 8.00 1 year to less ...