How does real-time data work?
High performance for data access and changes
Fast data access, combined with the ability to make changes to data in real time, is the key to meeting the challenges inherent in current and future planning processes. Sequential processes are increasingly being broken down and transferred into interactive planning processes. For this to be possible, powerful supporting technology is required: flexis In-Memory uses the working memory to store data efficiently and thus enables the necessary speed in data access, even when data and structures are changed. The result: A reliable basis for agile planning - across departmental boundaries up to the joint decision-making process.
Start of form
Agile and powerful: In-Memory offers a compact and mobile tool that meets all requirements for changes to data and data structures during operation. flexis’ technology is characterized by continuous updating of data and calculation results. This data push is performed by the system and does not have to be explicitly executed (Active Notification). The server sends the delta information to all clients affected by data changes. This means that the delta information is constantly updated.
Changes are published in open views, so that all users can view them at all times. This is particularly important when several users are operating in a common system and their interactions with the system (order postponements, order manipulations, restriction changes, etc.) affect the decisions of the other users.
How does real-time actually work?
Batch-oriented processes are broken down into interactive planning processes, such that alternative decisions and analyses of change requests can be tested. Data storage can be made more efficient through the use of optional attributes, i.e. rare characteristics are only created where they are available, for example. The system works with a declarative input language and the integration of traditional OLAP/OLTP processes into a live OLAP function. Our customers benefit from high data security through persistent logging of all transactions.