You are here: Blog
  Objective: Overview of Essbase Studio Tool and building of OLAP Cube using Essbase Studio Tool with the presumption that the reader having basic understanding on Data warehousing concepts and Hyperion Tools Overview of EssbaseStudio Tool: In 2007, Oracle acquired Hyperion, a leading provider of Performance Management Software to provide…
X Path   XPath is a syntax used for selecting parts of an XML document   The way XPath describes paths to elements  is similar to the way an operating system describes paths to files   XPath is almost a small programming language; it has functions, tests, and expressions  …
HANDLING VERTICAL PAGE BREAK IN RTF TEMPLATES If the table columns expand horizontally across more than one page, we can define how many row heading columns to repeat on every page using Vertical Page Break  Use the following syntax to specify the number of columns to repeat.  <?horizontal-break-table:number?>  Where number…
RTF Sub Template A sub template is a piece of formatting functionality that can be defined once and used multiple times within a single layout template or across multiple layout template files. This piece of formatting can be an RTF file format or an XSL file format. RTF sub templates…
  OBIEE 11g Architecture & Security Domains in OBIEE Web Logic Server Domain •      J2EE App Server used across the board for all 11g BI applications •      Contains : –       Managed Server : Set of J2EE Applications used for “functioning” the BIEE system –     Admin Server : Set of J2EE…
OBIEE at Adiva ---------------------- I had a great training from Adiva Consulting on OBIEE 11g. The instructor was very knowledgeable and his teaching was easy to understand. They are very professional in their teaching and videos they gave us. The course was great and i was able to get two…
  OBIEE Multi User Development   What is MUD •      Facilitates the development of application metadata in enterprise-scale deployments •      Application metadata is stored in a centralized metadata repository (RPD) file •      Several developers work concurrently on subsets of the metadata and then merge these subsets back into a master…
OBIEE security consists of 2 parts: • Security Infrastructure setup (Done from WLS Console and EM) Here we define the Application roles and assign them privileges(that is associate Application role to a Application Policy) Application Role is created based on our security need and is used for grouping users, so…
Page 5 of 8