Consultancy and Software for
Business Performance Management

Configuration and Administration - Entalysis Extensions

Data Sources

Entalysis Extensions connects to any ODBC-compliant datasource like SQL Server, Oracle, MySQL, Sybase, Access, Excel spreadsheets, text files, etc., and utilises existing database licenses and servers. Extensions has a client-server architecture where the Extensions server program is installed on a network server with access to the relevant datasources and communicates securely with each user's client program, installed on their computer or remote desktop, over a company intranet and/or the internet. To ensure data integrity, we recommend that a solution accesses data via a read-only connection and performs any data manipulation and calculation on a separate clone of the relevant data, before updating the master data of the management information systems where required.

Configuring Analyses and Functionality

Initially, most customers request a particular solution from Entalysis (e.g. some dashboards and KPIs), which we deliver as a turn-key solution. However, such is Extensions' capability that this initial project invariably spawns others and, at this point, we encourage the customer's IT staff to learn to configure the analyses and reports, so they can independently create their own solutions. Configuration is handled by xml script files whose syntax is enforced and prompted within an xml editor by an xml schema; the only requirement of the IT staff member is good SQL proficiency (the database querying language). This enables your IT staff to fulfil any general reporting and analysis requirements. Entalysis has a number of standard solution templates and modules for complex data manipulation and calculation like demand forecasting and finite capacity planning, which minimise developer effort and enable solutions to be delivered quickly.


The Extensions client-server communication is secured by a SSL certificate (X509) meaning the solution can be securely deployed over the internet and to persons outside your business involved in your processes. Extensions' security features ensure that only the relevant analyses and functionality are available to a given user, safeguarding sensitive information.

Administration and Scheduling

Extensions can schedule any data manipulation and calculation routines to run at chosen intervals, which is necessary where these routines are intensive and time-consuming. These scheduled routine outcomes and any errors, in addition to all system and user log messages, are logged and can be filtered and reviewed by the system administrators. A message service also offers the facility to broadcast to all currently logged-on users, should they need notification.

Next, read about Extensions' range of solutions or return to the Product Overview page.