by Vels | Feb 19, 2016 | Tuesday
What encryption methods are used in MicroStrategy 9.x?MicroStrategy 9.x employs two main encryption algorithms. These are the Tiny Encryption Algorithm (TEA) and the RACE Integrity Primitives Evaluation MD-160 (RIPEMD-160) fast cryptographic hash function...
by Vels | Feb 18, 2016 | Tuesday
The MicroStrategy Intelligence Server 9.x offers a new addition to the OLAP services features: in-memory Intelligent Cubes. The results of the Intelligent Cube reports can be used by multiple users and reports to avoid executing...
by Vels | Feb 18, 2016 | Tuesday
When publishing or updating a cube, MicroStrategy does not impose any limits on cube memory consumption except for the memory available on Intelligence Server machine. However, after publishing, MicroStrategy calculates the approximate size...
by Vels | Feb 10, 2016 | Tuesday
MicroStrategy Analytics Enterprise 9.4.1 Administrators can configure different basemaps for the ESRI Maps widget and visualizations for cloud based ESRI maps and on-premise ESRI maps.A basemap in ESRI terminology is...
by Vels | Feb 5, 2016 | Tuesday
Feature iOS Android iPhone iPad Phone Tab General Share Document/Report Screenshot ✓ ✓ ✓ ✓ Printing ✓ ✓ ✓ ✓ URL Configuration ✓ ✓ ✓ ✓ Micro-Application ✓ ✓ ✓ ✓ HTML Help ✓ ✓ ✓ ✓ ...
by Vels | Feb 1, 2016 | Tuesday
INTRODUCTIONConnection mappings allow users to assign a user or group in the MicroStrategy system to a specific login ID on the data warehouse RDBMS. The mappings are typically used to take advantage of one of several RDBMS data security techniques...