wednesday, september 21 st 9:30 am to 2:30 pm georgia gwinnett college 1

14
iStrategy Training Executive and Power User Courses Wednesday, September 21 st 9:30 am to 2:30 pm Georgia Gwinnett College 1

Upload: brook-simpson

Post on 17-Dec-2015

215 views

Category:

Documents


2 download

TRANSCRIPT

1

iStrategy TrainingExecutive and Power User Courses

Wednesday, September 21st

9:30 am to 2:30 pmGeorgia Gwinnett College

2

AgendaIntroductions and Course ObjectivesUser Ids, Login Compatibility ModeExecutive Course

Data Mapping and Organization SlidesDepartment Level Security

LunchPower User Course

Report Development MethodologyQ&A

URL and Login Informationhttps://frweb.usg.edu/pas/

Compatibility Mode

3

4

Begin Executive Course

5

Data AvailableFY 2006 through 2011

*PERS_SERV_BOR 2011 onlyControlled Budgets, Commitment Control, GL

Journals, AP Detail, PO Detail, Vendors, and now Payroll Detail (PERS_SERV_BOR).

Use of Trees and Hierarchies Descriptions from related tables (Account,

Department, Fund etc.).

6

Data HierarchiesAccount – centralFund – centralProgram, Class - centralDepartment – institution

XXX_BI_DEPARTMENT

Project - institutionAlternative Reporting

7

Organization of Data in iStrategyPerspectives

Budget Management, Accounts Payable, PO, Payroll, Position (Currently all reports based on Budget Management)

DimensionsFund, Account, Program, Class, Department, Budget Ref,

Project, Fiscal Period --- also Vendor, Position Facts

Journals, Vouchers, PERS_SERV_BOR, POs – something with a dollar amount attached

MeasuresBudget, Actuals, Encumbered Amt, Remaining Budget,

YTD Actual, PYTD Actual, % Budget Utilized

8

Source of Data in iStrategy

HierarchyFrom departmentTree in PSoft

KK_ACTIVITY_LOGLedger = APPROP_BD

Calculated Field = Budget - Open Enc - Actual

Calculated Field = (Actual + Open Enc)/Budget

JRNL_HEADER and JRNL_LN, Header Status = P, UKK_AMOUNT_TYPE = 1, 7Ledger = ACTUALS

KK_ACTIVITY_LOGLedger = DETAIL_EN

9

Department Level SecurityPeopleSoft Panel for Managing Dept Level

Security

10

Begin Power User Course

11

Report Building Methodology1. What is the primary data type (i.e. journals,

vouchers, payroll detail etc.)? 2. Identify the existing report that most closely

matches the desired report (organized by account, by fund etc.)

3. Approach Report by Rows, Columns, and Background Information

a) Define data elements in Rows and Columnsb) Define additional criteria in Backgroundc) Add detail to each item – i.e. which accounts,

which budget periods?

12

Modifying an Existing Report

Step 2 – Define Rows – Account, Step 2b -- Values for Account

Step 1 – Choose report to use as template.

Step 3 – Define Columns – Change measures to Budget PeriodStep 3b – include all Budget Periods

Step 4 – Set Background Criteria.

Step 5 – Refine Report – hide columns, filter zero rows

13

Report Building Methodology - cont4. Refine report with Filters, Sorting etc.5. Consider “Nesting” of Dimensions to improve

presentation of data6. Tips and Techniques

a) Click “Apply” after each change – build incrementally

b) Use Leaf Descendents when a report includes all detail values – reduces keying

c) Save final report as “My View”d) Email “My View” reports to others with

appropriate security

14

Thank you!Please send comments or questions to:

[email protected]@usg.edu [email protected]