140 likes | 260 Views
iStrategy Training Executive and Power User Courses. Wednesday, September 21 st 9:30 am to 2:30 pm Georgia Gwinnett College. Agenda. Introductions and Course Objectives User Ids, Login Compatibility Mode Executive Course Data Mapping and Organization Slides Department Level Security
E N D
iStrategy TrainingExecutive and Power User Courses Wednesday, September 21st 9:30 am to 2:30 pm Georgia Gwinnett College
Agenda • Introductions and Course Objectives • User Ids, Login Compatibility Mode • Executive Course • Data Mapping and Organization Slides • Department Level Security • Lunch • Power User Course • Report Development Methodology • Q&A
URL and Login Information • https://frweb.usg.edu/pas/ • Compatibility Mode
Data Available • FY 2006 through 2011 • *PERS_SERV_BOR 2011 only • Controlled Budgets, Commitment Control, GL Journals, AP Detail, PO Detail, Vendors, and now Payroll Detail (PERS_SERV_BOR). • Use of Trees and Hierarchies • Descriptions from related tables (Account, Department, Fund etc.).
Data Hierarchies • Account – central • Fund – central • Program, Class - central • Department – institution • XXX_BI_DEPARTMENT • Project - institution • Alternative Reporting
Organization of Data in iStrategy • Perspectives • Budget Management, Accounts Payable, PO, Payroll, Position (Currently all reports based on Budget Management) • Dimensions • Fund, Account, Program, Class, Department, Budget Ref, Project, Fiscal Period --- also Vendor, Position • Facts • Journals, Vouchers, PERS_SERV_BOR, POs – something with a dollar amount attached • Measures • Budget, Actuals, Encumbered Amt, Remaining Budget, YTD Actual, PYTD Actual, % Budget Utilized
Source of Data in iStrategy Calculated Field = Budget - Open Enc - Actual Hierarchy From department Tree in PSoft Calculated Field = (Actual + Open Enc)/ Budget KK_ACTIVITY_LOG Ledger = APPROP_BD KK_ACTIVITY_LOG Ledger = DETAIL_EN JRNL_HEADER and JRNL_LN, Header Status = P, U KK_AMOUNT_TYPE = 1, 7 Ledger = ACTUALS
Department Level Security • PeopleSoft Panel for Managing Dept Level Security
Report Building Methodology • What is the primary data type (i.e. journals, vouchers, payroll detail etc.)? • Identify the existing report that most closely matches the desired report (organized by account, by fund etc.) • Approach Report by Rows, Columns, and Background Information • Define data elements in Rows and Columns • Define additional criteria in Background • Add detail to each item – i.e. which accounts, which budget periods?
Modifying an Existing Report Step 1 – Choose report to use as template. Step 2 – Define Rows – Account, Step 2b -- Values for Account Step 3 – Define Columns – Change measures to Budget Period Step 3b – include all Budget Periods Step 4 – Set Background Criteria. Step 5 – Refine Report – hide columns, filter zero rows
Report Building Methodology - cont • Refine report with Filters, Sorting etc. • Consider “Nesting” of Dimensions to improve presentation of data • Tips and Techniques • Click “Apply” after each change – build incrementally • Use Leaf Descendents when a report includes all detail values – reduces keying • Save final report as “My View” • Email “My View” reports to others with appropriate security
Thank you! Please send comments or questions to: Debra.Lasher@usg.edu Jason.Beitzel@usg.edu Kurt.Collins@usg.edu