Logo

Data Modeling Techniques for Data Warehousing

Large book cover: Data Modeling Techniques for Data Warehousing

Data Modeling Techniques for Data Warehousing
by

Publisher: IBM Redbooks
ISBN/ASIN: 0738402451
ISBN-13: 9780738402451
Number of pages: 216

Description:
This redbook gives detail coverage to the topic of data modeling techniques for data warehousing, within the context of the overall data warehouse development process. The process of data warehouse modeling, including the steps required before and after the actual modeling step, is discussed. Detailed coverage of modeling techniques is presented in an evolutionary way through a gradual, but well-managed, expansion of the content of the actual data model. Coverage is also given to other important aspects of data warehousing that affect, or are affected by, the modeling process. These include architecting the warehouse and populating the data warehouse. Guidelines for selecting a data modeling tool that is appropriate for data warehousing are presented.

Download or read it online for free here:
Download link
(1.3MB, PDF)

Similar books

Book cover: Databases, Types, and The Relational Model: The Third ManifestoDatabases, Types, and The Relational Model: The Third Manifesto
by - Addison Wesley
This is a book on database management based on an earlier book by the same authors. It can be seen as an abstract blueprint for the design of a DBMS and the language interface to such a DBMS. It serves as a basis for a model of type inheritance.
(6980 views)
Book cover: Data Mining Desktop Survival GuideData Mining Desktop Survival Guide
by - Togaware Pty Ltd
Data mining is about building models from data. We build models to gain insights into the world and how the world works. A data miner, in building models, deploys many different data analysis and model building techniques.
(27014 views)
Book cover: Internet AdvertisingInternet Advertising
by - arXiv
A comprehensive survey on Internet advertising, discussing the research issues, identifying the recent technologies, and suggesting its future directions. We start with a brief history, introduction, and classification of the industry.
(15178 views)
Book cover: Forensic Analysis of Database TamperingForensic Analysis of Database Tampering
by - University of Arizona
The text on detection via cryptographic hashing. The authors show how to determine when the tampering occurred, what data was tampered, and who did the tampering. Four successively more sophisticated forensic analysis algorithms are presented.
(21322 views)