Friday, 28 June 2019


Learn how to design data models 
for maximum efficiency and effectiveness 
from Renowned DAX experts 
Alberto Ferrari and Marco Russo

ANALYZING DATA WITH MICROSOFT POWER BI AND POWER PIVOT FOR EXCEL
Alberto Ferrari and Marco Russo are the founders of sqlbi.com, where they regularly publish articles about Microsoft Power Pivot, Power BI, DAX, and SQL Server Analysis Services. Both Ferrari and Russo provide consultancy and mentoring on business intelligence (BI). They are also frequent speakers at major international conferences, including Microsoft Ignite, PASS Summit, and SQLBits.


How can you use Excel and Power BI to gain real insights into your information? As you examine your data, how do you write a formula that provides the numbers you need? The answers to both of these questions lie with the data model. This book introduces the basic techniques for shaping data models in Excel and Power BI. It’s meant for readers who are new to data modeling as well as for experienced data modelers looking for tips from the experts. If you want to use Power BI or Excel to analyze data, the many real-world examples in this book will help you look at your reports in a different way—like experienced data modelers do. As you’ll soon see, with the right data model, the correct answer is always a simple one!

By reading this book, you will:
• Gain an understanding of the basics of data modeling, including tables, relationships, and keys
• Familiarize yourself with star schemas, snowflakes, and common modeling techniques
• Learn the importance of granularity
• Discover how to use multiple fact tables, like sales and purchases, in a complex data model
• Manage calendar-related calculations by using date tables
• Track historical attributes, like previous addresses of customers or manager assignments
• Use snapshots to compute quantity on hand
• Work with multiple currencies in the most efficient way
• Analyze events that have durations, including overlapping durations
• Learn what data model you need to answer your specific business questions

Get all code samples, including complete apps, at

Target Audience
For intermediate to advanced users of Microsoft Excel
• For Excel and Power BI users who want to exploit the full power of their favorite tools
• For BI professionals seeking new ideas for modeling data
 power pivot power bi excel

Contents
Introduction
CHAPTER 1 Introduction to data modeling
CHAPTER 2 Using header/detail tables
CHAPTER 3 Using multiple fact tables
CHAPTER 4 Working with date and time
CHAPTER 5 Tracking historical attributes
CHAPTER 6 Using snapshots
CHAPTER 7 Analyzing date and time intervals
CHAPTER 8 Many-to-many relationships
CHAPTER 9 Working with different granularity
CHAPTER 10 Segmentation data models
CHAPTER 11 Working with multiple currencies
APPENDIX A Data modeling
Index

Buy the book from our website and enhance your skills. Click http://social.phindia.com/alGYrPU2

New Book Announcement

CURRENT ENGLISH GRAMMAR AND USAGE, SECOND EDITION By Sagar Mal Gupta, Ph.D. (Linguistics, University of Hawaii, USA) who is Emeritus Professor of English at Sobhasaria Group of Institutions, Sikar, Rajasthan. He has more than 50 years of experience in teaching English to undergraduate and postgraduate students in India and abroad. Professor Gupta has authored/co-authored 10 books, presented 50 research papers at national and international conferences, and published 40 research papers in national, international journals and edited books.

In the present age of Information and Communication Technology (ICT) revolution and social networking scenario, fast and precise communication has become the need of the hour. But in the whirlwind of fluency, accuracy cannot be sacrificed. Sometimes, adequate attention is not paid to the use of grammar and usage, which leaves a very bad impression on the readers. This book on English grammar presents the topics in an innovative way and meets the long-felt need of a good user-friendly grammar book.

The book makes the study of grammar very interesting, challenging and exciting. It discusses grammatical categories, processes and principles of sentence construction in a very simple and lucid manner. The book starts with the discussion of word classes and goes on to describe phrases and sentences. More importantly, it deals with the problem areas of tenses, modal verbs, articles, determiners, prepositions, passive constructions and direct and indirect narration in a novel way. The composition section of the book includes a very useful presentation of letter-writing, precis-writing, report writing, reading comprehension and, above all, the use of vocabulary. The Appendices on how to avoid spelling errors and a complete list of the types of sentences are very useful.

This comprehensive and well-researched book should prove very valuable for undergraduate students of all streams. Besides, professionals, those preparing for competitive examinations and even any lay reader who wishes to possess the essentials of English grammar and usage will find the book useful and interesting. In the Second Edition of the book the introduction of two new chapters on error analysis and functional grammar will prove very useful to interviewees and competitors.

KEY FEATURES
• Explains difficult grammatical concepts in a simple and lucid language.
• Provides models for every writing activity.
• Incorporates latest linguistic research in the conceptualization and presentation of the grammatical material.
• Contains lots of exercises with solutions.
• Adds comprehensive material on error analysis and functional grammar.

TARGET AUDIENCE
• UG and PG Students of all streams
• Aspirants of competitive exams
• Teachers and instructors
 english grammar

CONTENTS
Preface
Preface to the First Edition
Acknowledgements
Word Classes
Phrases
The Sentence: Different Types
Sentence Patterns
Compound and Complex Sentences
Conditional Sentences
Indirect Speech
The Uses of Articles
Determiners
Prepositions
Tenses
Modal Auxiliaries
Passive Voice
Letter Writing
Precis Writing
Reading Comprehension
Report Writing
Vocabulary
Common Errors
Functional Grammar
Appendix 1: Types of Clauses
Appendix 2: Rules for Spelling Changes
Appendix 3: Punctuation Review
Appendix 4: Concord
Appendix 5: Forms of Verbs
References
Index

To buy the book click http://social.phindia.com/x9BNUchm

Special Offer Book – 30% Off Using Promo Code

The Essential 1st Year Engineering Book To Learn 
DATA STRUCTURES: A PROGRAMMING APPROACH WITH C, SECOND EDITION

This well-organized book, now in its second edition, discusses the fundamentals of various data structures using C as the programming language. Beginning with the basics of C, the discussion moves on to describe Pointers, Arrays, Linked lists, Stacks, Queues, Trees, Heaps, Graphs, Files, Hashing, and so on that form the base of data structure. It builds up the concept of Pointers in a lucid manner with suitable examples, which forms the crux of Data Structures. Besides updated text and additional multiple choice questions, the new edition deals with various classical problems such as 8-queens problem, towers of Hanoi, minesweeper, lift problem, tic-tac-toe and Knapsack problem, which will help students understand how the real-life problems can be solved by using data structures. The book exhaustively covers all important topics prescribed in the syllabi of Indian universities/institutes, including all the Technical Universities and NITs.

Primarily intended as a text for the undergraduate students of Engineering (Computer Science/Information Technology) and postgraduate students of Computer Application (MCA) and Computer Science (M.Sc.), the book will also be of immense use to professionals engaged in the field of computer science and information technology.

Key Features
•   Provides more than 160 complete programs for better understanding.
•   Includes over 470 MCQs to cater to the syllabus needs of GATE and other competitive exams.
•   Contains over 500 figures to explain various algorithms and concepts.
•   Contains solved examples and programs for practice.
•   Provides companion CD containing additional programs for students’ use.
 data structures using c

Contents
Preface
1.    A Quick Overview of C Fundamentals
2.    Introduction to Data Structure
3.    Understanding Pointers in C
4.    Recursion
5.    Arrays
6.    Linked List
7.    Sorting
8.    Strings
9.    Stacks
10.  Queues
11.  Trees
12.  Advanced Topics in Trees
13.  Heap Data Structure
14.  Graphs
15.  Files
16.  Hashing
17.  Data Structure Projects
Index

The Authors
Dharmender Singh Kushwaha (PhD) is Associate Professor, Department of Computer Science & Engineering, Motilal Nehru National Institute of Technology (MNNIT) Allahabad. He is a member of IEEE and has more than twenty years of teaching experience.

Arun Kumar Misra (PhD) is Professor, Department of Computer Science & Engineering, MNNIT Allahabad. He is a senior member of IEEE and member of ISTE and CSI. He has more than forty years of teaching experience.

Buy the book from our website to avail 30% discount using Promo Code PHI#6663. Click http://social.phindia.com/Zo9JojkM
Special Offer Book – 30% Off Using Promo Code

The Essential 1st Year Engineering Book To Develop 
COMMUNICATION SKILLS FOR ENGINEERS AND SCIENTISTS
By SANGEETA SHARMA & BINOD MISHRA

In the era of information technology, organizations seek employees who have excellent communication skills. The advantage is for the individuals who, with their excellent communicative ability, are able to meet the challenges of the professional world through diverse paths such as writing, speaking, reading, and listening.

This comprehensive and student friendly book dwells on various aspects of technical communication that students of science and engineering should be familiar with. Divided into two parts, Part A of the text describes in detail the planning, designing and drafting of documents for a broad range of situations and applications. The text explores the types of business letters reflecting current practices, and different techniques of drafting them. Since, in the professional settings, executives have to work in teams, the book explains various causes of communication breakdown and ways to overcome them. A separate chapter is devoted to Advertising.

Part B elaborates on Group Communication taking into consideration the collective and individual requirements. This part also includes individual chapters on Effective Presentation, Non-Verbal Cues, Speeches, Interviews, and Negotiation Skills so as to orient young professionals towards new challenges.

This compact book is intended primarily as a text for undergraduate students of engineering and science. Besides, students of business management would also find the book immensely valuable. In addition, the text would be a handy reference for practicing professionals who wish to hone their communication skills for achieving better results and should prove extremely useful for those involved in everyday communication.
 communication skills for engineers and scientists

Contents
Preface • Foreword
PART A
1. Technical Report Writing: An Overview
2. Communication Breakdown
3. Listening
4. Business Letters
5. Types of Business Letters
6. Techniques of Writing
7. Report Writing
8. Sample Reports
9. Advertising
PART B
10. Effective Presentation
11. Communicating without Words
12. Interviews
13. Speeches
14. Negotiation Skills
15. Group Discussions
16. Most Frequently Wrongly Spelt Words
Appendix A List of Frequently Misused Words
Appendix B British vs American Vocabulary
Index

About the Authors
SANGEETA SHARMA, Ph.D., is Group Leader and Assistant Professor in the Language Group at Birla Institute of Technology and Science (BITS), Pilani (Rajasthan). She has over 17 years of teaching experience, and has to her credit many research papers published in national and international journals. A corporate trainer in Communication, Dr. Sangeeta Sharma has authored four books and has been the Editor of International Journal of Communication and AIMS International Journal of Management.

BINOD MISHRA, Ph.D., is Associate Professor of English and Co-ordinator, Department of Humanities & Social Sciences, IIT Patna. He has over 12 years of teaching experience. Dr. Mishra has published many research papers in various national and international journals. He has authored four books and edited seven anthologies in the areas of English literature and language.

Buy the book from our website to avail 30% discount using Promo Code PHI#6663. Click http://social.phindia.com/jcocjddV.

Add to Learning

Overview of Identity and Access Management Platforms

The larger the company, the more information systems and staff members it has. This brings the issue of managing employee accounts and their access to enterprise systems to the fore. In a small company, this can be done manually by in-house system administrators.

In a large company, however, this presents a number of challenges: a large and ramified IT infrastructure makes manual management of identification and access a very labor-intensive process. We also need not remind you that the greater the human involvement, the higher the risk of errors, delays, information security incidents, and even intentional sabotage.

History is rife with examples where employees leaked confidential corporate information to competitors or intentionally harmed the employer after losing their job.

To avoid such unfortunate outcomes while maximally automating and streamlining access management, companies resort to identity and access management (IAM) systems. They help manage user accounts and their access to corporate systems, applications, and devices. This solves all of the above-mentioned and many other issues. Such systems are plentiful. Our overview covers some of them.

According to Gartner experts and industry pros, they rank among the best in this segment. You can also choose the one that suits you best using the selection tool we devised. It stands to mention that similar terms exist, such as Identity and Access Governance (IAG), Identity Management (IdM), etc. They actually refer to one and the same thing. For the sake of convenience, we use the term “Identity and Access Management” or its abbreviation “IAM”.

If you dissect the anatomy of IAM systems, you will see that these are integrated solutions comprising many tools. They are responsible for various processes, among which several key ones stand out: single sign-on systems, multi-factor authentication and password management, access control and secure storage of user profile data.

Reliable credential management systems should handle these tasks without too much trouble. They include tools for gathering and logging information about user logins into corporate operating systems and employee access to devices (ranging from printers to servers and data repositories). They also greatly simplify and automate the configuration of accounts and provision of access to employees.

For instance, upon creating a new employee account, the administrator chooses his or her access level. Depending on this setting, the user can immediately use all information systems accessible at this level. The user can do so using his or her account password.

However, this user cannot access a server with confidential information using this account password. It is important to understand that an IAM system is not a solution that can be installed with a few clicks and be up and running immediately. Each company has its own unique IT infrastructure to which any platform has to be customized and integrated.

An IAM platform often comprises several standalone products that can be used collectively or separately. It all depends on the objectives and needs of the company. That’s why technical aspects should be considered first when choosing a platform of this kind.

For instance, you should look at the degree to which a specific platform is compatible with the IT infrastructure: whether it has the appropriate connectors (modules that interact with corporate tools), the extension and scalability opportunities it offers, the number of supported accounts, and the cost of specific products.

It also would not hurt to check how user-friendly the system is. This is not limited to an intuitive interface and level of automation. You should look at how easy it is to add and delete new employee accounts, grant permanent or temporary access, and perform other common procedures. Most products let you evaluate their functionality by running a demo version.

Many products of this type are currently available on the market, both those by big-name vendors and lesser-known companies. You can compare the functionality of some of these tools and choose the best option for your business on ROI4CIO’s comparison table of IAM platforms, search for it on their website.
Let us now examine specific solutions.

IAM Platforms
Oracle Identity Management

Oracle’s solution is a comprehensive, integrated platform for managing data and roles both in an enterprise setting and in the cloud. Oracle Identity and Access Management is currently one of the most functionally advanced products on the market. It covers almost all aspects of identity management, access control, and directory services. It features over 20 tools, including solutions for managing privileged accounts, access from mobile devices, passwords, detailed reports, etc.
All basic identity and access management functions are also available through a multi-user cloud platform.

Oracle Identity and Access Management has an advanced analytical system. For example, it can find inactive accounts and detect unauthorized changes to access privileges by administrators of IT systems in an enterprise. It also displays current and historical data of audits of employee access privileges. You can also generate a report on the history of decisions to grant access privileges.

Keeping up with the times, the product developers implemented support of the Social Sign-on authentication mechanism for Facebook, Twitter, and LinkedIn social networks, as well as Google and Yahoo accounts. This lets you logon to corporate resources using these accounts or simply import information from them when creating corporate accounts. This solution is fairly convenient in addition to being a time saver.

Okta Identity and Access Management
Okta offers a number of cloud products for comfortable management of user access and account credentials adapted to web applications. Based entirely in the cloud, this service is compatible with both cloud applications and the corporate IT infrastructure.

Okta offers a total of six products as part of its IAM platform. Worthy of special mention are a single sign-on system and a universal directory that offers access to all users, groups, and devices. It also comes with a multi-factor authentication feature and tools for managing access to the API and the company’s life cycle.
Okta also offers its own APIs and off-the-shelf tools that can be integrated into applications. Okta tools are compatible with various types of directories, including Active Directory and LDAP, and can also be integrated with third-party identity and access management tools.

Okta products give administrators a very high level of control. They allow configuring a number of conditions for user integration into a particular system based on specific criteria, for example, whether or not the user has an existing account.

Administrators can also generate real-time security reports that help identify vulnerabilities or abnormal user behavior. Since the product is entirely cloud-based, its deployment and configuration takes the least possible amount of time. The tools are free to try for 30 days.

SailPoint IdentityIQ
This is an integrated identity and access management solution that uses role-based models, rules, and policies. In addition to access management proper, it offers detailed information about employee interactions with applications and data.

IdentityIQ also offers the essential controls and tools for unauthorized access prevention, as well as access-related risk analysis functionality. The product offers a single sign-on system for business application users. Both cloud and local services are supported.

In addition to IdentityIQ, SailPoint also offers a cloud platform called IdentityNow. Both have similar functionality and a very user-friendly and intuitive interface. Free trial versions of the products are also available.

IBM Security Identity Manager
IBM has been on the Gartner leaderboard for several consecutive years with its IAM platform. Its product, Security Identity Manager, is a role- and policy-based tool. It offers a very high level of automation. If configured properly, the involvement of administrators is minimal and comes down to creating user accounts and monitoring system performance. It is fairly easy to configure Security Identity Manager after the first launch using a Wizard tool.

The platform can be shared across multiple companies and projects at the same time. For example, it offers access to specific resources not only to the company’s own employees, but also to business partners or third-party developers. It also offers an audit feature and detailed reports on user access. This ensures a high level of security and minimizes access-related risks.

The degree of risk is assessed with the help of AI. A great deal of attention is also devoted to management of privileged accounts.

A detailed audit and reporting feature is also available for them. In the event of unauthorized access, safeguards are in place to minimize potential damage caused by intruders. This is accomplished using a standalone tool called IBM Security Secret Server.

The solution can be rolled out both on enterprise hardware and in the cloud. The cloud offers access to many popular SaaS applications.

Microsoft Identity Manager
Microsoft Corporation is renowned for its software and cloud services. It is therefore no surprise that it also has something to offer in the realm of identity management.

Microsoft Identity Manager manages account access to applications, directories, databases, etc. It uses sets of policies, rules, and roles, and also provides user integration between dissimilar systems. This makes them accessible from a single location under one user account.

The product offers powerful tools for managing passwords and multi-factor authentication as well as privileged accounts. It comes with Azure Active Directory. This cloud-based solution enables comfortable interaction with cloud applications and provides a high level of security.

Support of mobile devices is another strong suit of this platform. This is made possible by a standalone tool called Enterprise Mobility + Security, which offers control and identification of mobile device users and provides reliable protection of data and applications on them.

CA Technologies Identity and Access Management
The platform offered by CA Technologies comprises five products. The core product is called CA Identity Suite. As its name suggests, the product is responsible for identity and access management. The product supports local and cloud applications, can be integrated with various IT systems and scaled up or down depending on the current needs and changes in the enterprise infrastructure.

Identity Suite offers convenient reports and risk analysis, making it possible to neutralize or minimize risks on the go. Role- and policy-based management is also supported.

The tools called CA Advanced Authentication and CA Single Sign-On support advanced authentication and single sign-on. Both tools provide a high level of security when used with web and mobile applications, while significantly simplifying access for employees (and customers and partners, if necessary).

In addition to these tools, CA Technologies offers a directory management tool called CA Directory and a security tool for applications called CA Rapid App Security. This tool grants access to applications after matching data on the device, the user account, and the application itself. The arsenal of Rapid App Security also features many other tools such as fingerprint or face scanners.

Ping Intelligent Identity Platform
The platform by Ping Identity is an integrated solution that can operate both as a regular corporate application and as a cloud service.

A hybrid usage model is also possible. Intelligent Identity Platform offers plenty of tools for effective identity and access management. They include sign-on and multi-factor authentication, support of policies, detailed reports with risk assessment, etc.

A great deal of attention is also devoted to access security. It is provided using not only standard methods and policies but also the company’s brand-name proxy server (in the case of a cloud-based solution) or a configured corporate proxy.
The Ping cloud offers thousands of pre-configured applications accessible through this cloud.

The platform also offers convenient management of directories, supports all common types of devices, and provides AI-powered security.

NetIQ Identity & Access Management
NetIQ’s versatile platform comes with the tools that cover all basic identity and access management needs of employees. Its policies are equally productive in local, mobile, and cloud environments, and the high level of security makes the workflows reliable and safe.

The NetIQ product supports multi-factor authentication and single sign-on in addition to providing a powerful password management tool. Detailed reports are available to system administrators. A particular focus is on privileged user accounts with a high level of access, since they can be compromised and exploited to harm the company.

All of these tools are available to customers as standalone solutions. Their functionality can be tested during a free trial period.

Brief Summary
We wish to thank contributor: Vladyslav Myronovych.  In summary, he says: IAM platforms do not necessarily fall into the category of essential tools. Still, they can be a big help to the company’s IT department.

Such systems can significantly reduce the time of forced interruptions of workflows, caused by delays in providing access or other similar issues. This in turn boosts the overall productivity of employees.

Source Credit: Business Blogs


Let’s Know What’s There In The Book

WASTEWATER TREATMENT: CONCEPTS AND DESIGN APPROACH SECOND EDITION  By G.L. Karia & R.A. CHRISTIAN

This thoroughly revised Second Edition presents a comprehensive account of the principles of operation and design of wastewater treatment plants.

Beginning with the basic concepts of treatment of wastewater and the design considerations required of an efficient treatment plant, the book moves on to spotlight the design criteria for domestic wastewater treatment units. In essence, the text gives the detailed procedures for design computations of all units of a wastewater treatment plant. It also describes the most common types of reactors used for physical operations and biological processes in wastewater treatment plants.

Besides additional examples and exercises, this edition also includes a new chapter on “Disinfection of Wastewater”.

The book is intended for the undergraduate students of Civil and Environmental Engineering. It will also be useful to the practising professionals involved in the design of wastewater treatment plants.

Key Features
• Provides several examples supported by graphs and sketches to highlight the various design concepts of wastewater treatment units.
• Encapsulates significant theoretical and computational information, and useful design hints in Note and Tip boxes.
• Includes well-graded practice exercises to help students develop the skills in designing treatment plants.
 waste water management

Contents
Preface • Acknowledgements
1.    Wastewater and Treatment Concepts
2.    Basic Design Considerations
3.    General Procedure for Design Calculations
4.    Reactions and Reactors
5.    Design of Preliminary Treatment Units
6.    Design of Primary Treatment Units
7.    Biological Treatment of Wastewater: Aerobic Processes
8.    Design of Secondary Biological Treatment Units: Suspended Growth Process
9.    Designs of Aerobic Biological Treatment Units: Attached Growth Processes
10.  Anaerobic Biological Wastewater Treatment
11.  Design of Sludge Treatment Units
12.  Disinfection of Wastewater
Appendix I       List of Some Useful Conversion Factors
Appendix II      Dimension Details of Parshall Flume (mm)
Appendix III     Physical Properties of Water
Appendix IV    Symbols and Units Used in Wastewater Treatment  (in SI Units)
References • Index

About the Authors
By G.L. Karia, M.E. (Environmental Engineering), is former Assistant Professor, Department of Civil Engineering, S.V. National Institute of Technology, Surat. Currently he is working as a Senior Technical Consultant with Sapient Techno Consultants, Surat. He has about thirty years of teaching experience. Professor Karia has been a Senior Research Fellow at National Environmental Engineering Research Institute (NEERI), Nagpur and Technical Advisor at Civen Constructions, Nagpur. He is a life member of several professional bodies.

R.A. CHRISTIAN, Ph.D., is Associate Professor, Department of Civil Engineering, S.V. National Institute of Technology, Surat. He has about twenty-five years of teaching experience. Dr. Christian is associated with several professional bodies. He is also holding administrative position at S.V. National Institute of Technology.

Purchase the book from our website. Click http://social.phindia.com/q-Rs_FYK


People Management Skills Every Manager Needs To Succeed

Success as a manager will primarily depend on Soft Skills. What is this talent that means more than experience and technical prowess ...