Caresoft presented many white paper on Hyperion at Oracle worldwide conference
ESSBASE ANALYTICS LINK “THE SEAMLESS DATA CONNECTOR” BY ORACLE
Can we connect all the Dots, in Time and within Budgets? HFM and Essbase have co-existed for quite sometime; and the traditional Data integration tools put in place required development of Extraction, Transformation and Load data processes. However, Oracle Essbase Analytics Link has enabled developers to completely eliminate this effort, thereby reducing time and costs. EAL has also allowed the broad user community to review Management reporting information based on different EPM data-sources in near Real-time
Explain and Demo EAL capabilities
Case Study of EAL implementation in a fortune 500 Company
Comparison between other ETL solutions Vs EAL
Tips and tricks to optimize performance of EAL bridges
DEMYSTIFYING ORACLE HYPERION UPGRADE PROJECTS
A Little Bit of Planning, a Lot of Success. With time, Hyperion upgrade projects become imminent. Companies tend to delay these projects, as they perceive that Hyperion System upgrades can turn out to be a headache. However, with proper planning and guidance, companies can not only stay up-to-date with technology and their competitors but also exploit the benefits of these upgrades.
Importance of getting your timing right for upgrade
Benefits of upgrade
Importance of project planning
Key considerations during execution
Post implementation activities
FREE HYPERION UTILITIES
Yes, there is free lunch! Oracle throws in a bunch of utilities along with Hyperion – e.g. Log Viewer, Audit Extract, Copy Application, Extended Analytics Template Copy, Application Year Update, HFM Tool Box, Rules Managers and many others. Learn all about these free utilities. Or why not write your own? For example, with a little knowledge of VBA, and a little database, you can write a utility to go through entire EPM application, the rule files and scripts to search for a string.
Explain and demonstrate EPM utilities
How to write a utility using VBA
Common VBA functions
Database tables for EPM repository
Tips and tricks for writing powerful utilities
SECURITY BEST PRACTICES FOR HYPERION
An EPM implementation involves a large number of components – ranging from Source System Data Adapters, Staging Area, ETL Tools, Databases, Flat Files, EPM suit and downstream systems. This paper attempts to expose various security holes and governance issues that lie in this landscape. It discusses best practices to avoid pitfalls whether you have a large team, or a small team with limited resources, and a methodology to conduct an IS security audit to ensure air tight EPM System.
Security Best Practices for architecting, deploying and operating an enterprise wide EPM System
How to secure your data, meta-data, reports and other artifacts
Discuss possible security holes in an EPM System architecture
Checklists and Methodology to conduct IS Security audit
Tips to ensure Segregation of Duty and Data Governance
MANAGING THE PEOPLE SIDE OF A GLOBAL SOFTWARE IMPLEMENTATION
Change is inevitable, yet it is so difficult to get people to embrace it. How do you help your most experienced users exploit advanced features of the new s/w? How do you subject powerful stake holders to the rigors of training. Aligning a large global user base, each having their own sets of priorities, to collaborate and make the most out of a new roll-out. Managing Culture Change and introducing new organizational paradigms (e.g., Lean, Quality, Continuous Improvement, Innovation, Big Data)
Strategies to support end user adoption
Communication dilemmas for stakeholders during technology change initiatives
Change Leadership, Appreciative Inquiry, Transition Management
Lessons Learnt and Best Practices