In incremental loading using Mapping variable if session failed with any of reason in the middle of process. is the Mapping variable remains constant or change?
guys which is the best institute in banglore to learn informatica??2 4505
1)What is Data Masking in informatica? 2)How to restrict junk characters while loading data into target. 3) what happen if i won't pass sorted input in a transformation.6202
How to fasten loading of 100 million distinct records in informatica? (Initially they are loaded into target without using any transformation, taking 2 hours)3 9151
I have id, seq_no date, bill_amt and weight 1,11,'01-Jan-2014',100,2 2,12,'01-Jan-2014',40,5 3,13,'01-Jan-2014',32,5 4,14,'01-Jan-2014',98,2 5,15,'01-Jan-2014',105,3 6,16,'01-Jan-2014',11,3 1,11,'02-Jan-2014',40,2 2,12,'02-Jan-2014',100,5 3,13,'02-Jan-2014',132,5 4,14,'02-Jan-2014',198,2 5,15,'02-Jan-2014',15,3 6,16,'02-Jan-2014',16,3 Now I need output as date MXAMT_LSTWGHT MINAMT_GRTWGHT 01-Jan-2014 100 32 02-Jan-2014 198 100 Could not think of mapping to do so. Please help1 4553
What is informatica? What exactly are the practical uses in real world2 4693
If there are 3 workflows are running and if 1st workflow fails then how could we start 2nd workflow or if 2nd workflow fails how could we start 3rd workflow?
How can i maintain unique surrogate key if 2 seperate workflows from different repository run and insert/update the main table at the same time.9 11526
how to get max value record into one target and remaining records into another target?2 8085
Load data to multiple targets according date. When First time session runs it should send to 1st target,second time session runs then send to 2nd target and goes on how to achieve it1 2565
Scenario:- Below is the requirement. Source:- NAME ID Requirement RAVI 1 (no need to repeat as it ID is 1) KUMAR 3 (repeat 3 times as it ID is 3) John 4 (repeat 4 times as it ID is 4) Required Out Put:- Name ID RAVI 1 KUMAR 3 KUMAR 3 KUMAR 3 John 4 John 4 John 4 John 4 Scenario 2:- Source Data ID NAME 1,2 NETEZZA,ORACLE 3,4,5 SQL Server, DB2, Teradata Required Output:- ID NAME 1 NETEZZA 1 ORACLE 3 SQL Server 3 DB2 3 Teradata1 3791
Consider a Phone Log table as below. It records all phone numbers that we dial in a given day. SOURCE_PHONE_NUMBER DESTINATION_PHONE_NUMBER CALL_START_DATETIME 1234 4567 01/07/2011 10:00 1234 2345 01/07/2011 11:00 1234 3456 01/07/2011 12:00 1234 3456 01/07/2011 13:00 1234 4567 01/07/2011 15:00 1222 7890 01/07/2011 10:00 1222 7680 01/07/2011 12:00 1222 2345 01/07/2011 13:00 Please provide an SQL query to display the source_phone_number and a flag where the flag needs to be set to Y if first called number and last called number are the same and N if the first called number and last called number are different. Desired Output: Source Number Is_Match 1222 N 1234 Y2 7850
I have 2records in target table and this record is deleted in source. Now if I run mapping twice how many records do target will have, source having 10records. Same with incrementally. Please answer me ASAP.1 3459
How do you change parameter when you move it from development to production.1 1824
Explain joiner transformation in informatica
How do you set a varible in incremental aggregation
lookup transformation with screenshots
How to create the list file having millions of flat files while indirect loading in informatica? In indirect file loading, suppose we have less no.of flat files then we can enter files names manually in list file creation. If millions of files are there, how can we enter the flat file names in list file?
Explain the tuning lookup transformation - informatica
Where can we find the throughput option in informatica?
While importing the relational source definition from the database, what are the metadata of source that will be imported?
How we can use union transformation?
how to load dimension table and fact table. plz tell me the steps.
What is the way to execute pl/sql script using informatica mapping?
What is source qualifier transformation in informatica?
What is repository manager?
What is meant by a domain?
What is the use of transformation?
How to implement security measures using repository manager?