Multiple role membership in Value Level Security (2)
In an earlier blog, I described a solution for the use of Value Level Security (VLS) when users can be a member of multiple roles. (The general concept of VLS…
In an earlier blog, I described a solution for the use of Value Level Security (VLS) when users can be a member of multiple roles. (The general concept of VLS…
For a few years now, we have worked with the concept of Value-level security (VLS). In short, VLS allows you to secure the visibility of not rows, as with Row-level…
If you are not in the US, chances are that your organization works with a calendar based on the ISO 8601 week numbering system. In the ISO standard, weeks…
When analyzing large amounts of data, we are often interested in trends and correlations. One of the most basic methods to research these, is linear regression. Linear regression is a…
The DAX function ALLSELECTED is a powerful function that accomplishes something that cannot be done otherwise. The simple version of what ALLSELECTED does, is this: like other ALL functions,…
This article is a follow-up to the AutoExists introductory post and one with an example on time intelligence based on workdays. In the latter, we created the month-to-date chart below,…
In this post, I show an approach to non-standard time intelligence analysis. This is, in fact, the second article on AutoExist. In the first, I explained the general principle of…
When working with DAX measures, it is critical to think in terms of context. Those of you who have taken our course of DAX Fundamentals, or attended one of our…
One of the foundational features of Power BI visual reports is interactivity. The capability to interact with the report allows for primarily visual representation of insights, while at the same…
Inactive relationships in a Power BI model have probably been encountered by everyone who has set their first steps in Power BI. As there can only be one active path…