Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

This document gives an overview of the PhixFlow training courses. You can use this document to decide which courses are appropriate for each person in your company that will be using PhixFlow.
As a guide there are typically three roles to be covered by PhixFlow users:

  • End User
  • Designer
  • Administrator

End users will usually receive training specifically for the applications in PhixFlow that they will use. These training materials are developed as part of implementation projects, and may be created and delivered by PhixFlow, the organisation itself, or often by the organisation with support from PhixFlow - whatever is most suitable for each project, and each application.

Depending on the size and type of your organisation, groups of users may be required to carry out all roles or only a subset of roles e.g. a medium or large organisation will have a dedicated administrator, whereas in a smaller organisation a user may need to be familiar with all roles.
The table below gives a recommended set of courses for each role:

...


Role

User

Designer

Administrator


Course

 

 

 

 

User

0.5 days

 

0.5 days





Introduction to Modelling

 

1 day

1 day

Modelling Concepts

 

2 day

 


Advanced Modelling

 

1 day

 

Administration

 

 

0.5 days

 



Anchor
_Toc443558094
_Toc443558094
Course Descriptions

All PhixFlow courses are hands-on and include a mixture of PowerPoint presentation and exercises. Courses are held either at our offices in Cambridge, UK, or at your own offices. When courses are held at a customer site, all that is required is a dedicated room with a projector screen, and a PC per candidate with access to the internet – no software needs to be installed.

...

Aims:
After this course the user will be able to log into PhixFlow and use reports and action buttons. They will learn how to export data from PhixFlow, and use linked views for problem investigation.
Prerequisites:
Attendees should have a basic knowledge of using computers, and of the type of issues that PhixFlow will be addressing in your organisation. Course Content:

  • Logging in
  • Opening reports & dashboards
  • Problem investigation and resolution
  • Updates – using action buttons and making updates
  • Using linked views
  • Updating dashboard layouts
  • Exporting data

Anchor
_Toc443558096
_Toc443558096
PhixFlow Introduction to Modelling (1 day)

...

  • Creating and using File Collectors and Database Collectors.
  • Creating and using Streams.
  • Attribute Functions and basic scripting.
  • Creating and using File Exporters and Database Exporters.
  • Creating and using Alarm Generators.
  • Running Streams, rolling back data in models, setting up Task Plans.

Anchor
_Toc443558097
_Toc443558097
PhixFlow Modelling Concepts (

...

2 days)

Aims:
After attending this course the user will be able to build and operate models in PhixFlow to handle most commonly occurring problems. This course builds on the Introduction to Modelling course by exploring the fundamental concepts behind PhixFlow models, covers many advanced features of PhixFlow modelling, and works through many common use cases.
Prerequisites:
The candidate must have attended the Introduction to Modelling course.
Course Content:

...

  • Enriching small data sets from very large data sets.
  • Enriching large data sets from very large data sets.
  • Fuzzy matching.
  • Advanced file processing.
  • Advanced database collection.

...

Aims:
After attending this course the user will be able to carry out day-to-day PhixFlow administration: monitoring activity in PhixFlow; creating and managing users; data security; scheduling tasks; archiving data; audit tracking; recovering from operational errors.
Prerequisite:
Attendees must have attended the Introduction to Modelling course.
Course Content:

  • Setting up tasks, task plans and schedules.
  • Monitoring system processes.
  • Recovering from operational errors: identifying problems; options for rolling back and re-running.
  • Monitoring user activity.
  • Examining the audit log.
  • Archive and restore.
  • Systems Security: Users, User Groups, Roles and Privileges; access to data.