1 / 14

iStrategy Training Executive and Power User Courses

iStrategy Training Executive and Power User Courses. Wednesday, September 21 st 9:30 am to 2:30 pm Georgia Gwinnett College. Agenda. Introductions and Course Objectives User Ids, Login Compatibility Mode Executive Course Data Mapping and Organization Slides Department Level Security

teague
Download Presentation

iStrategy Training Executive and Power User Courses

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. iStrategy TrainingExecutive and Power User Courses Wednesday, September 21st 9:30 am to 2:30 pm Georgia Gwinnett College

  2. Agenda • Introductions and Course Objectives • User Ids, Login Compatibility Mode • Executive Course • Data Mapping and Organization Slides • Department Level Security • Lunch • Power User Course • Report Development Methodology • Q&A

  3. URL and Login Information • https://frweb.usg.edu/pas/ • Compatibility Mode

  4. Begin Executive Course

  5. Data Available • FY 2006 through 2011 • *PERS_SERV_BOR 2011 only • Controlled Budgets, Commitment Control, GL Journals, AP Detail, PO Detail, Vendors, and now Payroll Detail (PERS_SERV_BOR). • Use of Trees and Hierarchies • Descriptions from related tables (Account, Department, Fund etc.).

  6. Data Hierarchies • Account – central • Fund – central • Program, Class - central • Department – institution • XXX_BI_DEPARTMENT • Project - institution • Alternative Reporting

  7. Organization of Data in iStrategy • Perspectives • Budget Management, Accounts Payable, PO, Payroll, Position (Currently all reports based on Budget Management) • Dimensions • Fund, Account, Program, Class, Department, Budget Ref, Project, Fiscal Period --- also Vendor, Position • Facts • Journals, Vouchers, PERS_SERV_BOR, POs – something with a dollar amount attached • Measures • Budget, Actuals, Encumbered Amt, Remaining Budget, YTD Actual, PYTD Actual, % Budget Utilized

  8. Source of Data in iStrategy Calculated Field = Budget - Open Enc - Actual Hierarchy From department Tree in PSoft Calculated Field = (Actual + Open Enc)/ Budget KK_ACTIVITY_LOG Ledger = APPROP_BD KK_ACTIVITY_LOG Ledger = DETAIL_EN JRNL_HEADER and JRNL_LN, Header Status = P, U KK_AMOUNT_TYPE = 1, 7 Ledger = ACTUALS

  9. Department Level Security • PeopleSoft Panel for Managing Dept Level Security

  10. Begin Power User Course

  11. Report Building Methodology • What is the primary data type (i.e. journals, vouchers, payroll detail etc.)? • Identify the existing report that most closely matches the desired report (organized by account, by fund etc.) • Approach Report by Rows, Columns, and Background Information • Define data elements in Rows and Columns • Define additional criteria in Background • Add detail to each item – i.e. which accounts, which budget periods?

  12. Modifying an Existing Report Step 1 – Choose report to use as template. Step 2 – Define Rows – Account, Step 2b -- Values for Account Step 3 – Define Columns – Change measures to Budget Period Step 3b – include all Budget Periods Step 4 – Set Background Criteria. Step 5 – Refine Report – hide columns, filter zero rows

  13. Report Building Methodology - cont • Refine report with Filters, Sorting etc. • Consider “Nesting” of Dimensions to improve presentation of data • Tips and Techniques • Click “Apply” after each change – build incrementally • Use Leaf Descendents when a report includes all detail values – reduces keying • Save final report as “My View” • Email “My View” reports to others with appropriate security

  14. Thank you! Please send comments or questions to: Debra.Lasher@usg.edu Jason.Beitzel@usg.edu Kurt.Collins@usg.edu

More Related