Without vendor intervention, an Administrator can:
- Establish connections to an unlimited number of data sources
- Explicitly control what information is extracted from each source
- Contol the content of various program pick lists
Anyone with the correct security privilege can then schedule an extract of data by:
- Selecting the time period for the extract
- Choosing the codes and structures to be queried
- Defining calculations to be used with the data
More Features