dataware house(job scheduling strategy), Database Management System

Define a job scheduling strategy that will meet business requirement of reporting availability by 6am CST for the following cubes? Show the job scheduling dependencies in a pictorial form so that it is easy to understand.
a. Finance cube (3 hours to build)
b. Warranty cube (4 hours to build)
c. Order cube (2 hours to build)
d. Customer master data (30 min run time)
e. Vendor master data (60 min run time)
f. Product master data (60 min run time)
g. Other Master data (2 hour run time)
Finance and Order cubes cannot run together
Posted Date: 3/30/2013 6:01:00 AM | Location : USA

Related Discussions:- dataware house(job scheduling strategy), Assignment Help, Ask Question on dataware house(job scheduling strategy), Get Answer, Expert's Help, dataware house(job scheduling strategy) Discussions

Write discussion on dataware house(job scheduling strategy)
Your posts are moderated
Related Questions
What are the comparison operator in SQL?  Comparison operator in SQL are =, LIKE and BETWEEN

What is assertion? Mention the forms available. An assertion is a predicate expressing a condition that we wish the database always to satisfy. Domain integrity constraints.

What are the two statements regarding transaction? The two statements regarding transaction of the form are:- A)     Begin transaction B)      End transaction

lock and types of lock

Recovery Techniques: After Reading the types of failures and database errors, let us talk about how to recover from the failures. Recovery can be complete using/restoring the previ

what is attribute is attribute inheritance in dbms?

If one requires to access data using Logical Database , the use of events is unavoidable. Yes, if someone wants to access data using Logical database then the use of events

Design an EER schema for the following application and translate the EER schema into relational schemas (and constraints). It is possible that some requirements cannot be captured

Difference between Operating System and Database Security Security within the operating system can be executed at various levels ranging from passwords for access to system, t