140 likes | 268 Vues
Join us for an in-depth training session on iStrategy User Courses on March 15th from 10 AM to 3 PM at Clayton State University. This event features both Executive and Power User courses, focusing on data mapping, report development, and department level security. Participants will learn methodologies for report building and gain practical skills in using iStrategy. Lunch is provided. Don't miss this opportunity to enhance your skills in budget management, payroll, and reporting.
E N D
iStrategy TrainingExecutive and Power User Courses Tuesday, March 15th 10:00 am to 3:00 pm Clayton State University
Agenda • Introductions and Course Objectives • User Ids, Login Compatibility Mode • Executive Course • Data Mapping and Organization Slides • Department Level Security • Lunch • Power User Course • Report Development Methodology • Q&A
URL and Login Information • https://frweb.usg.edu/pas/ • Compatibility Mode
Data Available • FY 2006 through 2011 • *PERS_SERV_BOR 2011 only • Controlled Budgets, Commitment Control, GL Journals, AP Detail, PO Detail, Vendors, and now Payroll Detail (PERS_SERV_BOR). • Use of Trees and Hierarchies • Descriptions from related tables (Account, Department, Fund etc.).
Data Hierarchies • Account – central • Fund – central • Program, Class - central • Department – institution • XXX_BI_DEPARTMENT • Project - institution • Alternative Reporting
Organization of Data in iStrategy • Perspectives • Budget Management, Accounts Payable, PO, Payroll, Position (Currently all reports based on Budget Management) • Dimensions • Fund, Account, Program, Class, Department, Budget Ref, Project, Fiscal Period --- also Vendor, Position • Facts • Journals, Vouchers, PERS_SERV_BOR, POs – something with a dollar amount attached • Measures • Budget, Actuals, Encumbered Amt, Remaining Budget, YTD Actual, PYTD Actual, % Budget Utilized
Source of Data in iStrategy Calculated Field = Budget - Open Enc - Actual Hierarchy From department Tree in PSoft Calculated Field = (Actual + Open Enc)/ Budget KK_ACTIVITY_LOG Ledger = APPROP_BD KK_ACTIVITY_LOG Ledger = DETAIL_EN JRNL_HEADER and JRNL_LN, Header Status = P, U KK_AMOUNT_TYPE = 1, 7 Ledger = ACTUALS
Department Level Security • PeopleSoft Panel for Managing Dept Level Security
Report Building Methodology • What is the primary data type (i.e. journals, vouchers, payroll detail etc.)? • Identify the existing report that most closely matches the desired report (organized by account, by fund etc.) • Approach Report by Rows, Columns, and Background Information • Define data elements in Rows and Columns • Define additional criteria in Background • Add detail to each item – i.e. which accounts, which budget periods?
Modifying an Existing Report Step 1 – Choose report to use as template. Step 2 – Define Rows – Account, Step 2b -- Values for Account Step 3 – Define Columns – Change measures to Budget Period Step 3b – include all Budget Periods Step 4 – Set Background Criteria. Step 5 – Refine Report – hide columns, filter zero rows
Report Building Methodology - cont • Refine report with Filters, Sorting etc. • Consider “Nesting” of Dimensions to improve presentation of data • Tips and Techniques • Click “Apply” after each change – build incrementally • Use Leaf Descendents when a report includes all detail values – reduces keying • Save final report as “My View” • Email “My View” reports to others with appropriate security
Thank you! Please send comments or questions to: Debra.Lasher@usg.edu Jason.Beitzel@usg.edu Kurt.Collins@usg.edu