Decision makers - the intended readership for this book - gain increasing comfort and confidence as they get into the book that they are getting to see all facets of the issues, on a consistent basis, and that they will not be blind-sided at meetings by people asking 'difficult' questions. At the end of each chapter, Guruge summarizes and reinforces key points, allowing the reader to skim through the topics for crucial information. The book also leverages living outside resources and ensures that the readership always has ready and consistent access to any and all terms, definitions and concepts they might not be familiar with.
"Debate style" presentation, focusing repeatedly on pros-and-cons, e.g., .NET vs. Java, open vs. proprietary and buy vs. build
Author's trademark detailed architectural and network diagrams of portal implementations
Q&A section at end of each chapter
After reading this book, you will be able to design the overall architecture for functioning business intelligence systems with the supporting data warehousing and data-integration applications. You will have the information you need to get a project launched, developed, managed and delivered on time and on budget – turning the deluge of data into actionable information that fuels business knowledge. Finally, you’ll give your career a boost by demonstrating an essential knowledge that puts corporate BI projects on a fast-track to success.Provides practical guidelines for building successful BI, DW and data integration solutions. Explains underlying BI, DW and data integration design, architecture and processes in clear, accessible language.Includes the complete project development lifecycle that can be applied at large enterprises as well as at small to medium-sized businesses Describes best practices and pragmatic approaches so readers can put them into action. Companion website includes templates and examples, further discussion of key topics, instructor materials, and references to trusted industry sources.
This book is intended for executives, entrepreneurs, finance and business development officers; technology and engineering officers; marketers, licensing professionals, and technology professionals; in-house counsel; and anyone else that deals with software or digital technology in business.Comprehensive Business and Legal Guidance including
* Securing Intellectual Property for Digital Business
* Digital Contract Fundamentals
* Open Source Rules and Strategies
* Development, Consulting and Outsourcing
* Software as a Service
* Business Software Licensing, Partnering, and Distribution
* Web and Internet Agreements
* Privacy on the Internet
* Digital Multimedia Content Clearance and Distribution
* IT Standards
* Video Game Development and Content Deals
* International Distribution
* User-Created Content, Mash-Ups, MMOGs, and Web Widgets
* And Much More
* Up-to-the-Moment Legal Guide
* In Plain English
* Includes 38 Contract and Web Forms in the Book
Assuming no knowledge of programming, this book guides the reader through both programming and built-in functions to easily exploit MATLAB's extensive capabilities for tackling engineering problems. The book starts with programming concepts, such as variables, assignments, and selection statements, moves on to loops, and then solves problems using both the programming concept and the power of MATLAB. In-depth coverage is given to input/output, a topic fundamental to many engineering applications.Winner of a 2017 Textbook Excellence Award (Texty) from the Textbook and Academic Authors AssociationPresents programming concepts and MATLAB built-in functions side-by-sideOffers a systematic, step-by-step approach, building on concepts throughout the book and facilitating easier learningIncludes sections on common pitfalls and programming guidelines to direct students toward best practicesCombines basic programming concepts, built-in functions, and advanced topics for problem solving with MATLAB to make this book uniquely suitable for a wide range of courses teaching or using MATLAB across the curriculum
The book covers recent crises in financial systems and job markets, the housing bubble, and environment, assessing their impact on systems thinking. A companion website is available at interactdesign.com.
This volume is ideal for senior executives as well as for chief information/operating officers and other executives charged with systems management and process improvement. It may also be a helpful resource for IT/MBA students and academics.Four NEW chapters on self-organizing systems, holistic thinking, operational thinking, and design thinkingCovers the recent crises in financial systems and job markets globally, the housing bubble, and the environment, assessing their impact on systems thinkingCompanion website to accompany the book is available at interactdesign.com
*Provides complete coverage of the latest techniques used for designing and analyzing petroleum production systems
*Increases efficiency and addresses common problems by utilizing the computer-based solutions discussed within the book
* Presents principles of designing and selecting the main components of petroleum production systems
Author Susan Snedaker shares her expertise with you, including the most current options for disaster recovery and communication, BCDR for mobile devices, and the latest infrastructure considerations including cloud, virtualization, clustering, and more. Snedaker also provides you with new case studies in several business areas, along with a review of high availability and information security in healthcare IT.
Don’t be caught off guard—Business Continuity and Disaster Recovery for IT Professionals, 2nd Edition , is required reading for anyone in the IT field charged with keeping information secure and systems up and running.Complete coverage of the 3 categories of disaster: natural hazards, human-caused hazards, and accidental / technical hazardsExtensive disaster planning and readiness checklists for IT infrastructure, enterprise applications, servers and desktopsClear guidance on developing alternate work and computing sites and emergency facilities Actionable advice on emergency readiness and response Up-to-date information on the legal implications of data loss following a security breach or disaster
The book includes chapters that cover the principles of entity resolution and the principles of Information Quality, in addition to their concepts and terminology. It also discusses the Fellegi-Sunter theory of record linkage, the Stanford Entity Resolution Framework, and the Algebraic Model for Entity Resolution, which are the major theoretical models that support Entity Resolution. In relation to this, the book briefly discusses entity-based data integration (EBDI) and its model, which serve as an extension of the Algebraic Model for Entity Resolution. There is also an explanation of how the three commercial ER systems operate and a description of the non-commercial open-source system known as OYSTER. The book concludes by discussing trends in entity resolution research and practice. Students taking IT courses and IT professionals will find this book invaluable.First authoritative reference explaining entity resolution and how to use it effectivelyProvides practical system design advice to help you get a competitive advantage Includes a companion site with synthetic customer data for applicatory exercises, and access to a Java-based Entity Resolution program.
Each chapter has how-to guidance to walk you through implementing concepts, and real-world scenarios to help you relate to the information and better grasp how it impacts your data. This book provides the information that you need in order to understand the current PCI Data Security standards and how to effectively implement security on network infrastructure in order to be compliant with the credit card industry guidelines, and help you protect sensitive and personally-identifiable information.Completely updated to follow the most current PCI DSS standard, version 3.0Packed with help to develop and implement an effective strategy to keep infrastructure compliant and secureIncludes coverage of new and emerging technologies such as NFC, P2PE, CNP/Mobile, and EMVBoth authors have broad information security backgrounds, including extensive PCI DSS experience
New to this edition:
The Backstage is introduced (a new Office 2013 feature); all the ‘external’ operations like Save, Print etc. are now in one placeThe chapter on charting is totally revised and updated – Excel 2013 differs greatly from earlier versionsIncludes many new end-of-chapter problems Most chapters have been edited to improve readability
communications systems. Since 9/11 it has become increasingly important for companies to implement a
plan for disaster recovery. This comprehensive book addresses the operational and day-to-day security
management requirements of business stability and disaster recovery planning specifically tailored for the needs and requirements of an Information Security Officer.
This book has been written by battle tested security consultants who have based all the material, processes and problem- solving on real-world planning and recovery events in enterprise environments world wide.
John has over 25 years experience in the IT and security sector. He is an often sought management consultant for large enterprise and is currently a member of the Federal Communication Commission's Homeland Security Network Reliability and Interoperability Council Focus Group on Cybersecurity, working in the Voice over Internet Protocol workgroup.
James has over 30 years experience in security operations and technology assessment as a corporate security executive and positions within the intelligence, DoD, and federal law enforcement communities. He has a Ph.D. in information systems specializing in information security and is a member of Upsilon Pi Epsilon (UPE), the International Honor Society for the Computing and Information Disciplines. He is currently an Independent Consultant.
· Provides critical strategies for maintaining basic business functions when and if systems are shut down
· Establishes up to date methods and techniques for maintaining second site back up and recovery
· Gives managers viable and efficient processes that meet new government rules for saving and protecting data in the event of disasters
The Qlik platform was designed to provide a fast and easy data analytics tool, and QlikView Your Business is your detailed, full-color, step-by-step guide to understanding Qlikview's powerful features and techniques so you can quickly start unlocking your data’s potential. This expert author team brings real-world insight together with practical business analytics, so you can approach, explore, and solve business intelligence problems using the robust Qlik toolset and clearly communicate your results to stakeholders using powerful visualization features in QlikView and Qlik Sense.
This book starts at the basic level and dives deep into the most advanced QlikView techniques, delivering tangible value and knowledge to new users and experienced developers alike. As an added benefit, every topic presented in the book is enhanced with tips, tricks, and insightful recommendations that the authors accumulated through years of developing QlikView analytics.
This is the book for you:
The book covers three common business scenarios - Sales, Profitability, and Inventory Analysis. Each scenario contains four chapters, covering the four main disciplines of business analytics: Business Case, Data Modeling, Scripting, and Visualizations.
The material is organized by increasing levels of complexity. Following our comprehensive tutorial, you will learn simple and advanced QlikView and Qlik Sense concepts, including the following:
How to use the Data Load Script language for implementing data modeling techniques How to build and use the QVD data layer Building a multi-tier data architectures Using variables, loops, subroutines, and other script control statements Advanced scripting techniques for a variety of ETL solutions Building Insightful Visualizations in QlikView:
Introduction into QlikView sheet objects — List Boxes, Text Objects, Charts, and more Designing insightful Dashboards in QlikView Using advanced calculation techniques, such as Set Analysis and Advanced Aggregation Using variables for What-If Analysis, as well as using variables for storing calculations, colors, and selection filters Advanced visualization techniques - normalized and non-normalized Mekko charts, Waterfall charts, Whale Tail charts, and more
Building Insightful Visualizations in Qlik Sense:
Whether you are just starting out with QlikView or are ready to dive deeper, QlikView Your Business is your comprehensive guide to sharpening your QlikView skills and unleashing the power of QlikView in your organization.
Electronic spreadsheet analysis has become part of the everyday work of researchers in all areas of engineering and science. Microsoft Excel, as the industry standard spreadsheet, has a range of scientific functions that can be utilized for the modeling, analysis and presentation of quantitative data. This text provides a straightforward guide to using these functions of Microsoft Excel, guiding the reader from basic principles through to more complicated areas such as formulae, charts, curve-fitting, equation solving, integration, macros, statistical functions, and presenting quantitative data.
Content written specifically for the requirements of science and engineering students and professionals working with Microsoft Excel, brought fully up to date with the new Microsoft Office release of Excel 2007.Features of Excel 2007 are illustrated through a wide variety of examples based in technical contexts, demonstrating the use of the program for analysis and presentation of experimental results. Updated with new examples, problem sets, and applications.
Implementing Splunk Second Edition is a learning guide that introduces you to all the latest features and improvements of Splunk 6.2. The book starts by introducing you to various concepts such as charting, reporting, clustering, and visualization. Every chapter is dedicated to enhancing your knowledge of a specific concept, including data models and pivots, speeding up your queries, backfilling, data replication, and so on. By the end of the book, you'll have a very good understanding of Splunk and be able to perform efficient data analysis.
A special feature of the book is its focus on call center case studies, describing a number of successful call center strategies and best practices, selected from various business sectors - financial, retail, healthcare, travel, technology, and others. These case studies provide useful guidelines based on successful corporate call centers that will guide you in establishing and maintaining the most effective call center operation for your enterprise.
· Presents key concepts and techniques, including a formal development process, in a real-world context
· Provides extensive management guidelines
· Stresses the importance of staff selection and training
“Cindi has created, with her typical attention to details that matter, a contemporary forward-looking guide that organizations could use to evaluate existing or create a foundation for evolving business intelligence / analytics programs. The book touches on strategy, value, people, process, and technology, all of which must be considered for program success. Among other topics, the data, data warehousing, and ROI comments were spot on. The ‘technobabble’ chapter was brilliant!” —Bill Frank, Business Intelligence and Data Warehousing Program Manager, Johnson & Johnson
“If you want to be an analytical competitor, you’ve got to go well beyond business intelligence technology. Cindi Howson has wrapped up the needed advice on technology, organization, strategy, and even culture in a neat package. It’s required reading for quantitatively oriented strategists and the technologists who support them.” —Thomas H. Davenport, President’s Distinguished Professor, Babson College and co-author, Competing on Analytics
“Cindi has created an exceptional, authoritative description of the end-to-end business intelligence ecosystem. This is a great read for those who are just trying to better understand the business intelligence space, as well as for the seasoned BI practitioner.” —Sully McConnell, Vice President, Business Intelligence and Information Management, Time Warner Cable
“Cindi’s book succinctly yet completely lays out what it takes to deliver BI successfully. IT and business leaders will benefit from Cindi’s deep BI experience, which she shares through helpful, real-world definitions, frameworks, examples, and stories. This is a must-read for companies engaged in – or considering – BI.” —Barbara Wixom, PhD, Principal Research Scientist, MIT Sloan Center for Information Systems Research
Expanded to cover the latest advances in business intelligence such as big data, cloud, mobile, visual data discovery, and in-memory computing, this fully updated bestseller by BI guru Cindi Howson provides cutting-edge techniques to exploit BI for maximum value. Successful Business Intelligence: Unlock the Value of BI & Big Data, Second Edition describes best practices for an effective BI strategy. Find out how to:Garner executive support to foster an analytic culture Align the BI strategy with business goals Develop an analytic ecosystem to exploit data warehousing, analytic appliances, and Hadoop for the right BI workload Continuously improve the quality, breadth, and timeliness of data Find the relevance of BI for everyone in the company Use agile development processes to deliver BI capabilities and improvements at the pace of business change Select the right BI tools to meet user and business needs Measure success in multiple ways Embrace innovation, promote successes and applications, and invest in training Monitor your evolution and maturity across various factors for impact
Exclusive industry survey data and real-world case studies from Medtronic, Macy’s, 1-800 CONTACTS, The Dow Chemical Company, Netflix, Constant Contact, and other companies show successful BI initiatives in action.
From Moneyball to Nate Silver, BI and big data have permeated our cultural, political, and economic landscape. This timely, up-to-date guide reveals how to plan and deploy an agile, state-of-the-art BI solution that links insight to action and delivers a sustained competitive advantage.
Odoo is a full-featured open source ERP with a focus on extensibility. The flexibility and sustainability of open source is also a key selling point of Odoo. It is built on a powerful framework for rapid application development, both for back-end applications and front-end websites.
The book starts by covering Odoo installation and administration, and provides a gentle introduction to application development. It then dives deep into several of the areas that an experienced developer will need to use. You'll learn implement business logic, adapt the UI, and extend existing features.Style and Approach
These practical and easy-to-follow recipes are presented step-by-step, with dozens of hands-on recipes to boost your Odoo skills. This book can also be used as a reference guide for your daily work.
Comprised of contributions from leaders in the development and application of this technology, Point-Based Graphics examines it from all angles, beginning with the way in which the latest photographic and scanning devices have enabled modeling based on true geometry, rather than appearance.
From there, it’s on to the methods themselves. Even though point-based graphics is in its infancy, practitioners have already established many effective, economical techniques for achieving all the major effects associated with traditional 3D Modeling and rendering. You’ll learn to apply these techniques, and you’ll also learn how to create your own. The final chapter demonstrates how to do this using Pointshop3D, an open-source tool for developing new point-based algorithms.The first book on a major development in computer graphics by the pioneers in the fieldShows how 3D images can be manipulated as easily as 2D images are with Photoshop
This book is intended for those who have a basic understanding of AWS services and want to take their knowledge to the next level by getting their hands dirty with coding recipes in DynamoDB.What You Will LearnDesign DynamoDB tables to achieve high read and write throughputDiscover best practices like caching, exponential back-offs and auto-retries, storing large items in AWS S3, storing compressed data etc.Effectively use DynamoDB Local in order to make your development smooth and cost effectiveImplement cost effective best practices to reduce the burden of DynamoDB chargesCreate and maintain secondary indexes to support improved data accessIntegrate various other AWS services like AWS EMR, AWS CloudSearch, AWS Pipeline etc. with DynamoDBIn Detail
AWS DynamoDB is an excellent example of a production-ready NoSQL database. In recent years, DynamoDB has been able to attract many customers because of its features like high-availability, reliability and infinite scalability. DynamoDB can be easily integrated with massive data crunching tools like Hadoop /EMR, which is an essential part of this data-driven world and hence it is widely accepted. The cost and time-efficient design makes DynamoDB stand out amongst its peers. The design of DynamoDB is so neat and clean that it has inspired many NoSQL databases to simply follow it.
This book will get your hands on some engineering best practices DynamoDB engineers use, which can be used in your day-to-day life to build robust and scalable applications. You will start by operating with DynamoDB tables and learn to manipulate items and manage indexes. You will also discover how to easily integrate applications with other AWS services like EMR, S3, CloudSearch, RedShift etc. A couple of chapters talk in detail about how to use DynamoDB as a backend database and hosting it on AWS ElasticBean. This book will also focus on security measures of DynamoDB as well by providing techniques on data encryption, masking etc.
By the end of the book you'll be adroit in designing web and mobile applications using DynamoDB and host it on cloud.Style and approach
An easy-to-follow guide, full of real-world examples, which takes you through the world of DynamoDB following a step-by-step, problem-solution based approach.
The perspective of the book is from the top down: looking at the overall architecture and then delving into the issues underlying the components. This allows people who are building or using a data warehouse to see what lies ahead and determine what new technology to buy, how to plan extensions to the data warehouse, what can be salvaged from the current system, and how to justify the expense at the most practical level. This book gives experienced data warehouse professionals everything they need in order to implement the new generation DW 2.0.
It is designed for professionals in the IT organization, including data architects, DBAs, systems design and development professionals, as well as data warehouse and knowledge management professionals.* First book on the new generation of data warehouse architecture, DW 2.0.
* Written by the "father of the data warehouse", Bill Inmon, a columnist and newsletter editor of The Bill Inmon Channel on the Business Intelligence Network.
* Long overdue comprehensive coverage of the implementation of technology and tools that enable the new generation of the DW: metadata, temporal data, ETL, unstructured data, and data quality control.
Cyber Guerilla provides valuable insight for infosec professionals and consultants, as well as government, military, and corporate IT strategists who must defend against myriad threats from non-state actors. The authors take readers inside the operations and tactics of cyber guerillas, who are changing the dynamics of cyber warfare and information security through their unconventional strategies and threats. This book draws lessons from the authors’ own experiences but also from illustrative hacker groups such as Anonymous, LulzSec and Rebellious Rose.Discusses the conceptual and ideological foundation of hackers and hacker groupsProvides concrete footholds regarding hacker group strategyDiscusses how cyber guerillas are changing the face of cyber warfare and cyber security through asymmetrical, flexible and stealthy means and methodsExplains the tactics, techniques, and procedures these hacker groups use in their operationsDescribes how cyber guerrillas and hackers use the media and influence the publicServes as a must-have guide for anyone who wants to understand—or is responsible for defending against—cyber warfare attacks
Expert co-authors Bran Selic and Sébastien Gérard lead the team that drafted and maintain the standard and give you the tools you need apply MARTE to overcome the limitations of cyber-physical systems. The functional sophistication required of modern cyber-physical systems has reached a point where traditional code-centric development methods are proving less and less capable of delivering a reliable product in a timely manner. In Modeling and Analysis of Real-Time and Embedded Systems with UML and MARTE, you will learn how to take advantage of modern model-based engineering methods and corresponding industry standards to overcome these limitations. These methods take full advantage of computer-supported automation allowing timely detection of design flaws to reduce engineering risk, leading thereby to better overall product quality and greater productivity.Understand the design rationale behind the MARTE standard needed to take full advantage of its many powerful modeling capabilities Best apply the various MARTE features for the most common use cases encountered in the design of real-time and embedded softwareLearn how MARTE can be used together with the SysML language for the design of complex cyber-physical systemsDiscover how MARTE can be used for different kinds of computer-supported engineering analyses to predict key system characteristics early in development Customize MARTE for a specific domain or project
Gavin Powell shows that the central theme of Oracle10gR2 Performance Tuning is four-fold: denormalize data models to fit applications; tune SQL code according to both the data model and the application in relation to scalability; create a well-proportioned physical architecture at the time of initial Oracle installation; and most important, mix skill sets to obtain the best results.
* Fully updated for version 10gR2 and provides all necessary transition material from version 9i
* Includes all three aspects of Oracle database tuning: data model tuning, SQL & PL/SQL code tuning, physical plus configuration tuning
* Contains experienced guidance and real-world examples using large datasets Emphasizes development as opposed to operating system perspective
Part one provides an introduction to quantum information processing using diamond, as well as its principles and fabrication techniques. Part two outlines experimental demonstrations of quantum information processing using diamond, and the emerging applications of diamond for quantum information science. It contains chapters on quantum key distribution, quantum microscopy, the hybridization of quantum systems, and building quantum optical devices. Part three outlines promising directions and future trends in diamond technologies for quantum information processing and sensing.
Quantum Information Processing with Diamond is a key reference for R&D managers in industrial sectors such as conventional electronics, communication engineering, computer science, biotechnology, quantum optics, quantum mechanics, quantum computing, quantum cryptology, and nanotechnology, as well as academics in physics, chemistry, biology, and engineering.Brings together the topics of diamond and quantum information processingLooks at applications such as quantum computing, neural circuits, and in vivo monitoring of processes at the molecular scale
All of this makes Citrix Presentation Server a high-value target for malicious hackers. And although it is a high-value target, Citrix Presentation Servers and remote workstations are often relatively easily hacked, because they are often times deployed by overworked system administrators who haven't even configured the most basic security features offered by Citrix. "The problem, in other words, isn't a lack of options for securing Citrix instances; the problem is that administrators aren't using them." (eWeek, October 2007). In support of this assertion Security researcher Petko D. Petkov, aka "pdp", said in an Oct. 4 posting that his recent testing of Citrix gateways led him to "tons" of "wide-open" Citrix instances, including 10 on government domains and four on military domains.
* The most comprehensive book published for system administrators providing step-by-step instructions for a secure Citrix Presentation Server.
* Special chapter by Security researcher Petko D. Petkov'aka "pdp detailing tactics used by malicious hackers to compromise Citrix Presentation Servers.
* Companion Web site contains custom Citrix scripts for administrators to install, configure, and troubleshoot Citrix Presentation Server.
All companies use information to set strategies and accomplish business objectives. But how many CEOs and CIOs would say they are satisfied that their companies get maximum value from information? Business Transformation reveals how SAS's Information Evolution Model (IEM) can be used together with analytics for groundbreaking results. Author Aiman Zeid provides the necessary information you need to introduce and promote the use of analytics and insight across your organization. Along with examples and best practices of global companies that have successfully been through this process, you'll learn how to identify the starting point and develop a road map for execution.Reveals how to introduce and promote the use of analytics and insights across your organization Written by a lead developer at SAS global Business Intelligence Competency Center program and services Features global case studies and examples
Practical and insightful, this reference provides businesses with an essential blueprint for creating improvements that optimize business returns and put the potential of data analytics to work.
Use this step-by-step guide to deepen your own application development skills through self-study, show your teammates the world's fastest and most reliable techniques for creating business intelligence systems, or ensure that the IT department working for you is building your next decision support system the right way.Learn how to quickly define scope and architecture before programming starts Includes techniques of process and data engineering that enable iterative and incremental delivery Demonstrates how to plan and execute quality assurance plans and includes a guide to continuous integration and automated regression testing Presents program management strategies for coordinating multiple agile data mart projects so that over time an enterprise data warehouse emerges Use the provided 120-day road map to establish a robust, agile data warehousing program
This book includes more than 80 games to help you break down barriers, communicate better, and generate new ideas, insights, and strategies. The authors have identified tools and techniques from some of the world's most innovative professionals, whose teams collaborate and make great things happen. This book is the result: a unique collection of games that encourage engagement and creativity while bringing more structure and clarity to the workplace. Find out why -- and how -- with Gamestorming.Overcome conflict and increase engagement with team-oriented gamesImprove collaboration and communication in cross-disciplinary teams with visual-thinking techniquesImprove understanding by role-playing customer and user experiencesGenerate better ideas and more of them, faster than ever beforeShorten meetings and make them more productiveSimulate and explore complex systems, interactions, and dynamicsIdentify a problem's root cause, and find the paths that point toward a solution
The book begins with a brief discussion of data models, drawing a parallel between relational databases, NoSQL, and consequently MongoDB. Next, the book explains the most basic MongoDB concepts, such as read and write operations, indexing, and how to design schemas by knowing how applications will use the data. Finally, we will talk about best practices that will help you optimize and manage your database, presenting you with a real-life example of data modeling on a real-time logging analytics application.
* Includes numerous templates, detailed examples, and practical advice for executing every step of the “Ten Steps approach.
* Allows for quick reference with an easy-to-use format highlighting key concepts and definitions, important checkpoints, communication activities, and best practices.
* A companion Web site includes links to numerous data quality resources, including many of the planning and information-gathering templates featured in the text, quick summaries of key ideas from the Ten Step methodology, and other tools and information available online.
The important stuff you need to know:Go from novice to ace. Learn how to analyze your data, from writing your first formula to charting your results.Illustrate trends. Discover the clearest way to present your data using Excel’s new Quick Analysis feature.Broaden your analysis. Use pivot tables, slicers, and timelines to examine your data from different perspectives.Import data. Pull data from a variety of sources, including website data feeds and corporate databases.Work from the Web. Launch and manage your workbooks on the road, using the new Excel Web App.Share your worksheets. Store Excel files on SkyDrive and collaborate with colleagues on Facebook, Twitter, and LinkedIn.Master the new data model. Use PowerPivot to work with millions of rows of data.Make calculations. Review financial data, use math and scientific formulas, and perform statistical analyses.