Security in Data Warehousing
#1


Presented by:
Rajalakshmi
Janani. S

[attachment=6638]


Introduction:
Data warehouse – an integrated repository.
Process involved- read, clean, aggregate and store.
Varied number of applications
Tools to access the warehouse

Characteristics of DW Data
Subject-oriented:
Data is organized around subjects or business dimensions, such as sales, customers, orders, claims, accounts, employees, etc.
Integrated:
Data is collected from several transactional databases, and integrated in a way to provide a unified picture of each subject over time.
Data from different databases is transformed into a common schema, measurement, code, data type.
Aggregated:
Data stored is not transaction-level, but aggregated by products, regions, months/years, or some other business dimension.
Reply
#2


to get information about the topic "data warehouse computer science"full report ppt and related topic refer the page link bellow

http://studentbank.in/report-dbms-data-m...arehousing

http://studentbank.in/report-integration...ng-systems

http://studentbank.in/report-a-survey-of...on-and-lib
Reply
#3
hi
i want ieee seminar topics belongs to data warehousing
this is ranga swamy
Reply
#4

To get full information or details of Security in Data Warehousing please have a look on the pages

http://studentbank.in/report-security-in...arehousing

if you again feel trouble on Security in Data Warehousing please reply in that page and ask specific fields in Security in Data Warehousing
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: projects on warehousing, warehousing project, warehousing, projects topics on warehousing, warehousing of deodorants, project report warehousing, warehousing forshampoo**gram,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  network security seminars report computer science technology 14 20,494 24-11-2018, 01:19 AM
Last Post:
  Block Chain and Data Science jntuworldforum 0 8,037 06-10-2018, 12:15 PM
Last Post: jntuworldforum
  Data Encryption Standard (DES) seminar class 2 9,353 20-02-2016, 01:59 PM
Last Post: seminar report asees
  Skin Tone based Secret Data hiding in Images seminar class 9 7,016 23-12-2015, 04:18 PM
Last Post: HelloGFS
Brick XML Data Compression computer science crazy 2 2,386 07-10-2014, 09:26 PM
Last Post: seminar report asees
  Bluetooth Security Full Download Seminar Report and Paper Presentation computer science crazy 21 26,137 07-08-2014, 11:32 PM
Last Post: [email protected]
  Data Security in Local Network using Distributed Firewalls computer science crazy 10 14,915 30-03-2014, 04:40 AM
Last Post: Guest
  GREEN CLOUD -A Data Center Approach computer topic 0 1,536 25-03-2014, 10:13 PM
Last Post: computer topic
  3D-OPTICAL DATA STORAGE TECHNOLOGY computer science crazy 3 8,507 12-09-2013, 08:28 PM
Last Post: Guest
  E-COMPILER FOR JAVA WITH SECURITY EDITOR smart paper boy 7 11,843 27-07-2013, 01:06 PM
Last Post: computer topic

Forum Jump: