SharePoint 2010 Business Intelligence 24-Hour Trainer by Adam Jorgensen

By Adam Jorgensen

Written through a workforce of prime SharePoint and company Intelligence (BI) specialists, this exact e-book package deal indicates you ways to effectively construct and carry BI purposes utilizing SharePoint 2010. Assuming no prior SharePoint event, the authors carry a transparent clarification of what SharePoint will do on your BI and knowledge administration features. As you study most sensible practices for configuring and securing SharePoint 2010 BI functions and making plans and imposing your SharePoint BI venture plan, you may be good in your solution to gaining a superb origin of realizing and dealing with SharePoint 2010 and BI.

Show description

Read or Download SharePoint 2010 Business Intelligence 24-Hour Trainer PDF

Best enterprise applications books

Geometric Algebra for Computer Science (Revised Edition): An Object-Oriented Approach to Geometry (The Morgan Kaufmann Series in Computer Graphics)

It is a reliable publication, however the arithmetic is poorly handled, now not sufficient rigorous as will be anticipated.

Microsoft Dynamics AX 2009 Programming: Getting Started

This booklet takes you thru the real themes of Microsoft Dynamics AX with transparent factors and useful instance code. it truly is an easy-to-read, illustrated instructional with lots of step by step directions for AX improvement initiatives. This e-book is for builders at the Microsoft platform who are looking to boost and customise the Dynamics AX product.

Upgrading to Microsoft Office 2010

Organize your scholars to transition their Microsoft place of work 2007 abilities to the workplace 2010 software program with UPGRADING TO MICROSOFT place of work 2010. this can be the right consultant to assist your scholars simply comprehend the recent gains and talents in the workplace 2010 software program. abilities are offered in a hugely visible two-page unfold procedure.

Practical Planning. Extending the Classical AI Planning Paradigm

Making plans, or reasoning approximately activities, is a basic component to clever behavior--and person who synthetic intelligence has chanced on very tough to enforce. the main well-understood method of construction making plans platforms has been lower than refinement because the past due Sixties and has now reached a degree of adulthood the place there are stable clients for construction operating planners.

Additional info for SharePoint 2010 Business Intelligence 24-Hour Trainer

Sample text

Once you are there, change your view using the ribbon interface. Click Excel Services Application and you can see the types of options available under this new architecture. indd 20 11/18/2011 12:22:31 PM Try It 5. 6. x 21 Find the section of Central Administration where you manage the services on the server. Once you are there, change your view using the ribbon interface. Congratulations, you’ve just completed your exploration of the new SharePoint architecture. com/ go/spbi24vids to view the video that accompanies this lesson.

This book contains 31 lessons, which are broken into 7 sections. The lessons are usually only a few pages long and focus on the smallest unit of work in SharePoint 2010 Business Intelligence that we could work on. Each section has a large theme around a given section in SharePoint Business Intelligence: ‰ Section I: Getting Started with SharePoint 2010 — This section covers what’s new in SharePoint 2010, how to use the administration tools, and how basic security works. ‰ Section II: Configuring SharePoint for Business Intelligence — This section walks the reader through configuring the major service applications required for the cool projects you’ll be building soon.

Claims Based Authentication (CBA) is a big topic and is explored only at a summary level here. CBA delivers a common way for applications to get identity information from users, no matter whether they are inside or outside the organization. That information is stored in a security token. This token holds one or more claims about the user. This is metadata about the user that may include user name, password, organizational information, location information, and device information; all to be used to ensure identification can be accomplished on any system, even those that require more than user name or password authentication.

Download PDF sample

Rated 4.64 of 5 – based on 33 votes