Book Image

Mastering Microsoft Power BI

By : Brett Powell
5 (1)
Book Image

Mastering Microsoft Power BI

5 (1)
By: Brett Powell

Overview of this book

This book is intended for business intelligence professionals responsible for the design and development of Power BI content as well as managers, architects and administrators who oversee Power BI projects and deployments. The chapters flow from the planning of a Power BI project through the development and distribution of content to the administration of Power BI for an organization. BI developers will learn how to create sustainable and impactful Power BI datasets, reports, and dashboards. This includes connecting to data sources, shaping and enhancing source data, and developing an analytical data model. Additionally, top report and dashboard design practices are described using features such as Bookmarks and the Power KPI visual. BI managers will learn how Power BI’s tools work together such as with the On-premises data gateway and how content can be staged and securely distributed via Apps. Additionally, both the Power BI Report Server and Power BI Premium are reviewed. By the end of this book, you will be confident in creating effective charts, tables, reports or dashboards for any kind of data using the tools and techniques in Microsoft Power BI.
Table of Contents (15 chapters)

Developing DAX Measures and Security Roles

This chapter will detail the implementation of DAX measures and security roles for the dataset developed in the previous two chapters. First, a set of base measures for each business process are created, representing business definitions such as gross and net sales, cost of sales, and margin percentages. The base measures are then leveraged in the development of date intelligence calculations including year-to-date (YTD) and year-over-year (YOY) growth. Additionally, a set of customs measures are created, including exceptions, rankings, and KPI targets to further extract insights from the dataset and simplify report visualizations.

This chapter will also contain examples of dynamic security models in which the identity of the logged in user is used to filter the dataset. Finally, guidance will be provided on testing the performance of...