Diagnosing PAfE Performance Issues

IBM Planning Analytics for Microsoft Excel – or PAfE (previously referred to as PAX) – is a Microsoft Excel-based tool that report authors use to build sophisticated, multiple-sheet, multiple-query reports against multiple databases, including Planning Analytics models. If you are a PAfE user, or support a group of PAfE users, you may eventually need to…

Read More

Uploading data files to IBM Planning Analytics (Cloud)

Planning Analytics (PA) is a great platform for building models, such as workforce planning, revenue planning, and capital expenditure. These models require data from other systems. The cloud version of PA provides many data integration methods. However, a flat file is still useful when other data integration methods are not possible. To upload a file…

Read More

Using Hash Values in Planning Analytics

When working with IBM Planning Analytics, it is not uncommon to source data from a relational data source. Typically, you will see a Data Warehouse or Data Lake where data is transformed and loaded on a schedule using an ETL tool. ETL, which stands for Extract, Transform and Load, extracts data from a source, modifies it in some…

Read More

When To Feed from String Cells in IBM Planning Analytics

While developing an IBM Planning Analytics (PA) model, you may have come across a situation similar to the following:  A rule and feeder are seemingly working correctly, but upon a data change the expected cells are not returning values, implying they are no longer being fed.  Consider the example below showing a simple rule from…

Read More

Utilizing an Alternate Hierarchy for Security in IBM Planning Analytics

IBM Planning Analytics (PA) allows administrator (admin) users to control users’ read and write access through different levels of object security. The system provides a set of redefined groups for admin purposes but allows custom groups to be created as well that users can belong to. Planning Analytics admins commonly use security controls to limit users’ access to elements within a dimension. This can be done by setting a security group’s access…

Read More