This manual explains how to use SAS ETL Studio to specify metadata for sources, specify metadata for targets, and create jobs that specify how data is extracted, transformed, and loaded from sources to targets.
Features that are new in SAS ETL Studio 9.1.3 include the following:
Support for the SAS Scalable Performance Data Server (SPD Server). The SAS SPD Server is a high performance, multi-user, parallel-processing data server with a comprehensive security infrastructure, backup and restore utilities, and sophisticated administrative and tuning options. The SAS SPD Server can be faster and more flexible than other storage options, including the SAS SPD Engine.
Two new transformation templates provide additional support for slowly changing dimensions (SCD):
Unlike the SCD Type 2 transformation, which tracks changes to a table's descriptive attributes, the Key Effective Date transformation tracks changes in a table's keys. The Key Effective Date transformation can be used to track changes in a table that does not have descriptive attributes, such as an intersection table, which is a table that describes the relationships between two or more tables.
For example, suppose that you have a table of users, called USERS, and a table of groups, called GROUPS. An intersection table called USERS_X_GROUPS could describe the many-to-many relationships between USERS and GROUPS. The Key Effective Date transformation would use date ranges (beginning and end dates) to detect when a new key combination has been entered in USERS_X_GROUPS.
The Surrogate Key Generator transformation enables you to create a unique identifier for records, a surrogate key. The surrogate key can be used to perform operations that would be difficult or impossible to perform on the original key. For example, a numeric surrogate key could be generated for an alphanumeric original key, to make sorting easier.
The "Redeploy Jobs to Stored Process" feature rebuilds all stored processes that are associated with SAS ETL Studio jobs. Use this feature when you update a job for which a stored process has been generated. You can also use this feature when the computing environment changes, such as when a metadata repository is promoted from a test environment to a production environment, for example.
The property window for the Mining Results transformation was updated to make it easier to select inputs and outputs.
Holub on Patterns: Learning Design Patterns by Looking at Code
This is a book about programming in an object -oriented way and about how to use design patterns to solve commonplace problems in object-oriented systems.
I've based this book on the philosophy that the best way to learn and understand the design patterns is to see them in action, all jumbled up, just as they occur in the...
Understanding Web Services Specifications and the WSE
Explore the emerging specifications—and the latest tools—for implementing advanced Web services using Microsoft technologies. Keep pace with evolving Web services specifications—and get developer-to-developer insights for using them to deliver advanced, interoperable solutions for Microsoft .NET. This guide provides a...
Computer and Machine Vision, Fourth Edition: Theory, Algorithms, Practicalities
Computer and Machine Vision: Theory, Algorithms, Practicalities (previously entitled Machine Vision) clearly and systematically presents the basic methodology of computer and machine vision, covering the essential elements of the theory while emphasizing algorithmic and practical design constraints. This fully revised fourth edition has...
Postfix (Other Sams) Networking guide to the Postfix Mail Transfer software package, showing how to configure Postfix for specific tasks, how to use external databases with Postfix, and how to migrate from Sendmail. Also explains e-mail protocols, setting up Postfix as an ISP or office mail server, and using list servers and Web mail interfaces with Postfix. Softcover.... Information Security Management Handbook, Sixth Edition (Isc2 Press) A comprehensive compilation of the fundamental knowledge, skills, techniques, and tools required by all information technology professionals, Information Security Management Handbook, Sixth Edition features new developments in information security and the Common Body of Knowledge. It contains new information on identity management, intrusion... Codes, Ciphers and Secret Writing (Test Your Code Breaking Skills) Experiment with cryptography — the science of secret writing. Cipher and decipher codes: transposition and polyalphabetical ciphers, famous codes, typewriter and telephone codes, codes that use playing cards, knots, and swizzle sticks...even invisible writing and sending messages through outer space. Hours of intrigue and challenge. 45...