Business Intelligence Blogs

View blogs by industry experts on topics such as SSAS, SSIS, SSRS, Power BI, Performance Tuning, Azure, Big Data and much more! You can also sign up to post your own business intelligence blog.

07 August
2017
Author: SteveHughes

Power BI and Data Security – App Workspaces and Power BI Apps

Shortly after I published the Power BI Security Sharing Data post in April, Power BI Premium, Power BI Apps, and Power BI App Workspaces were released. These changes impacted that post in many ways. As part of the follow up, I also did an updated webcast with Pragmatic Works. This is a follow up...
04 August
2017
Author: SteveHughes

Power BI and Data Security – Free User’s Cannot Share, Read Only in Premium

As part of the Power BI Premium release, Microsoft changed how the “free users” in Power BI work within the platform. There are two key changes that affect the data security within your organization. Power BI Free Users Cannot Share One of the key areas of concern around the free user accounts...
19 April
2017
Author: SteveHughes

Thoughts about the Microsoft Data Amp Announcements

Microsoft conducted a live event called Microsoft Data Amp to announce a number of key features and releases for SQL Server on premises and data platforms in Azure (such as Azure SQL DB and Azure Data Lake). Some of these include features that I have been waiting to see. Here are some of...
14 April
2017
Author: SteveHughes

Power BI and Data Security – Row Level Security (RLS)

As Power BI becomes more prevalent in data analytics and visualization within the enterprise, data security becomes a significant concern. Power BI at its best is deployed to the Power BI service hosted on Microsoft’s Azure platform. Every enterprise should understand the level of security...
13 April
2017
Author: SteveHughes

Power BI and Data Security – Data Classification and Privacy Levels

As Power BI becomes more prevalent in data analytics and visualization within the enterprise, data security becomes a significant concern. Power BI at its best is deployed to the Power BI service hosted on Microsoft’s Azure platform. Every enterprise should understand the level of security...
12 April
2017
Author: SteveHughes

Power BI and Data Security – On-premises Data Gateway

As Power BI becomes more prevalent in data analytics and visualization within the enterprise, data security becomes a significant concern. Power BI at its best is deployed to the Power BI service hosted on Microsoft’s Azure platform. Every enterprise should understand the level of security...
11 April
2017
Author: SteveHughes

Power BI and Data Security – Sharing Data

As Power BI becomes more prevalent in data analytics and visualization within the enterprise, data security becomes a significant concern. Power BI at its best is deployed to the Power BI service hosted on Microsoft’s Azure platform. Every enterprise should understand the level of security...
10 April
2017
Author: SteveHughes

Power BI and Data Security – Compliance and Encryption

As Power BI becomes more prevalent in data analytics and visualization within the enterprise, data security becomes a significant concern. Power BI at its best is deployed to the Power BI service hosted on Microsoft’s Azure platform. Every enterprise should understand the level of security...
14 February
2017
Author: SteveHughes

T-SQL Tuesday #87 – Fixing Old Problems with Shiny New Toys: STRING_SPLIT

Thanks to Matt Gordon (@atsqlspeed) for hosting this T-SQL Tuesday. Splitting Strings in SQL A problem that has plagued SQL developers through the years is splitting strings. Many techniques have been used as more capabilities were added to SQL Server including XML datatypes, recursive CTEs and...
09 February
2017
Author: SteveHughes

Consumption Based Architecture for Modern Data Analytics

Throughout many years of working with BI solutions and data warehouse solutions, we have strived to put all the data in one location so it could be easily consumed by reporting and analysis tools from SQL Server Reporting Services to Microsoft Excel. We have followed the dimensional modeling...