job scheduling strategy, Database Management System

1) Define a job scheduling strategy that will meet business requirement of reporting availability by 6am CST for the following cubes? Show the job scheduling dependencies in a pictorial form so that it is easy to understand.
a. Finance cube (3 hours to build)
b. Warranty cube (4 hours to build)
c. Order cube (2 hours to build)
d. Customer master data (30 min run time)
e. Vendor master data (60 min run time)
f. Product master data (60 min run time)
g. Other Master data (2 hour run time)
Finance and Order cubes cannot run together.
Posted Date: 4/2/2013 12:02:45 PM | Location :







Related Discussions:- job scheduling strategy, Assignment Help, Ask Question on job scheduling strategy, Get Answer, Expert's Help, job scheduling strategy Discussions

Write discussion on job scheduling strategy
Your posts are moderated
Related Questions
What is a data dictionary?  A data dictionary is a data structure which keeps Meta data about the structure of the database i.e.  the schema of the database.

What is difference between TRUNCATE and DELETE? - Truncate can't be rolled back whereas Delete can be. - Truncate keeps the lock on table whereas Delete keeps the lock on ea

What are the advantages of using a DBMS? The benefits of using a DBMS are a) Controlling redundancy b) Restricting unauthorized access c) Giving multiple user interfac

What are three components of the schema architecture proposed by ANSI/SPARC? The three component schema architecture proposed by ANSI/SPARC is as given below: External sche

What is Asterisk in SQL? Asterisk (*): In SQL, the columns for all the tables and views in the FROM clause will be displayed.

What are the two methods for dealing deadlock problem? The two procedures for dealing deadlock problem is deadlock detection and deadlock recovery.

Describe Hashing in DBMS? Hashing: Hashing is a technique to store data within an array so which storing, searching, inserting and deleting data is fast (in theory it's O(1))

Explain recovery process after system failure using checkpoint. Ans: Checkpoint scheme or method is an extra component of the log based recovery system. This scheme is used to

Data Fragmentation "Fragmentation includes decomposing the data in relation to non-overlapping component relations". Why do we require fragmenting a relation?

Write short notes on relational constraints? Relational Constraints are: 1. NOT NULL 2. Unique 3. Primary key 4. Foreign key 5. Table check