without using rank transformation how can we rank items by
using some other transformations
Answers were Sorted based on User's Feedback
Answer / sukanta
how your rank will look like
let suppose
ename sal
a 1000
b 1000
c 2000
d 1000
e 2000
and rank will work upon sal column.
what will be your target as per informatica rank works
ename sal rank
a 1000 1
b 1000 1
d 1000 1
c 2000 4
d 2000 5
if your rank will like this
ename sal rank
a 1000 1
b 1000 2
d 1000 3
c 2000 4
d 2000 5
or
ename sal rank
a 1000 1
b 1000 1
d 1000 1
c 2000 2
d 2000 2
all are can be done by using expression
transformation,sorter and aggrerator transformation combined
in a mapping.
Regards
Sukanta
| Is This Answer Correct ? | 5 Yes | 3 No |
Answer / bhupal
Use sorter t/r first and sort the data by using which port
u want
next use that expression t/r to generate the sequence by
using variable port
next u can use the filter t/r to restrict the data or
required ranks as a output.
| Is This Answer Correct ? | 2 Yes | 0 No |
What is a repository? And how to add it in an informatica client?
What are the different threads in DTM process?
My source is flat file which contain only one column with data type varchar.now i want to send string data types into one target and if any numbers and special characters are there that should be send it into another target.so how do you design a mapping for this?
my source having 10 records but how can i load 20 records in target, i am not bother about duplicates?
I have source table 100 records after run session successfully but loads the target table 50 records only what happened that 50 records and how can i load remaining 50 records
my source is junk data how will u remove that junk data by using unix please any one replay me
Explain about perform recovery?
Differentiate between sessions and batches?
how remove 1st 3 records & last 3 records in informatics
If no. of source columns is changing every time (First time it is 10 next time it is 20 so on). How to deal with it without changing mapping?
Partition, what happens if the specified key range is shorter and longer
How to implement security measures using repository manager?