DronaBlog

Tuesday, August 28, 2018

Informatica Master Data Management - MDM - Quiz - 8

Q1. What does the HM console allow Data stewards to do?

A. Perform matching and merging of relationship data.
B. Display detailed graphic views of entities and relationships.
C. Configure data models in the hub store.
D. Run batch load jobs of hierarchy data.

Q2. What does the match tables contain?

A. All records with consolidation indicator set to 1
B. All records in a match batch
C. Match pair information
D. All match rules

Q3. Before security settings have been applied, it is recommended that initial IDD config with admin level security has been set.

A. True
B. False

Q4. What statement best decribes the key width?

A. It can be any user-defined value
B. It is always 10 characters
C. The choices include standard, limited, extended and preferred.
D. It determines the match score.

Q5. Which one of the following is NOT an MDM product?

A. Master Referenece Server
B. HM
C. SAM
D. Informatica Data services

Previous Quiz             Next Quiz

Thursday, August 23, 2018

How to use 'tar' commands in Unix?



Are you looking for various commands in the Unix environment? Are you also looking for what are structures and samples for each command in the Unix system? If so, then this article provides detailed information about command details with its usage. In this article we will focus on the 'tar' command.


'tar' command:

What is the 'tar' command and why is it used? In Unix, 'tar' is the abbreviation for Tape ARchive.  This command is used to store entire file systems onto the magnetic tape. The command 'tar' is also commonly used to combine the multiple files into a single file for easy storage and distribution.

Below are commonly used 'tar' commands -




A.Commands dealing with .tar files

1. The command 'tar cvf' is used to create a new tar archive file. With the 'tar' command, the files are not compressed. The files are only combined and grouped into a single archive file.
$ tar cvf archive_abc.tar dirabc/

Here, 
c - Create a new archive
v – Verbosely list files
f – Following is the archive file name

2. The command 'tar xvf' is used to extract an existing archive file.
$ tar xvf archive_abc.tar

Here,
x – Extract files from the archive file

3. The command 'tar xvf' is used to extract a single file 'file_abc' from the existing archive file.
$ tar xvf archive_abc.tar /location/to/file_abc

4. The command 'tar xvf' is used to extract a single directory 'abcdir' from the existing archive file. The subdirectories and files are extracted with this command.
$ tar xvf archive_abc.tar /location/to/abcdir/

To extract multiple directories use the command below 
$ tar xvf archive_abc.tar /location/to/abcdir1/ /location/to/abcdir1/

5. The command 'tar xvf' is used to extract multiple files from the .tar file. We can use Regular Expression to achieve it. The command below will list all files with extension 'txt'
$ tar xvf archive_abc.tar --wildcards '*.txt'

6. The command 'tar tvf' is used to view the archive file. This will list the files without extracting files.
$ tar tvf archive_abc.tar

7. The command 'tar rvf' is used to add a new file in an existing .tar file. With the command below we can add 'file_pqr' file to archive_abc.tar file.
$ tar rvf archive_abc.tar file_pqr

We can use the command below to add the directory to the existing archive (.tar) file 
$ tar rvf archive_abc.tar dir_xyz/

Note: We cannot add files or directories to compressed files such as .gz or .bz2 file. If we try to add then we will get the 'Cannot update compressed archives' error message.

8. The command 'tar tvfW' is used to verify the archive (.tar) files. Normally we use this command before removing any file from the archive file.
$ tar tvfW file_xyz.tar

Note:
a. If an output line starts with Verify with no differs line then the file/directory is Ok. If that is not the case, then we need to fix the issue.
b. We cannot verify files in a compressed the archive file. (e.g. .gz, .bz2)

9. The command 'tar -cf' is used to determine the size of the .tar file. The size returned is in KB.
$ tar -cf - /location/to/archive/ | wc -c
20660




B.Commands dealing with .gz files

1. The command 'tar cvzf' is used create the gzipped archive file. With the help of this command the files are compressed and grouped into a single file. The file extension .tar.gz and .tgz are both the same.
$ tar cvzf archive_abc.tar.gz dirabc/
Here,
z - Archive through gzip

2. The command 'tar xvfz' is used to extract the existing gzipped file.
$ tar xvfz archive_abc.tar.gz

3. The command 'tar xvfz' is used to extract a single file 'file_abc' from the existing gzipped file.
$ tar xvfz archive_abc.tar.gz /location/to/file_abc

4. The command 'tar xvfz' is used to extract a single directory 'abcdir' from the existing gzipped file. The subdirectories and files are extracted with this command.
$ tar xvfz archive_abc.tar.gz /location/to/abcdir/

To extract multiple directories use the command below 
$ tar xvfz archive_abc.tar.gz /location/to/abcdir1/ /location/to/abcdir1/

5. The command 'tar xvfz' is used to extract multiple files from the .gz file. The command below will list all files with the extension 'txt' with the help of RegExp.
$ tar xvfz archive_abc.tar.gz --wildcards '*.txt'

6. The command 'tar tvfz' is used to view the .gz archive file. This will list the files without extracting files.
$ tar tvfz archive_abc.tar.gz

7. The command 'tar -czf' is used to determine the size of .gz file. The size returned is in KB.
$ tar -czf - /location/to/archive/ | wc -c
200


C.Commands dealing with .bz2 files

1. The command 'tar cvfj' is used to create a bzipped tar archive file. The size of bzip2 is lesser than gzip. Normally the creation of the bzip2 file takes more time to compress and decompress than gzip.
$ tar cvfj archive_abc.tar.bz2 dirabc/

Here, 
j – Filter the archive through bzip2
Bz2 - It is the abbreviation for Burrows-Wheeler compression 

2. The command 'tar xvfj' is used to extract the existing bzipped file.
$ tar xvfj archive_abc.tar.bz2

3. The command 'tar xvfj' is used to extract a single file 'file_abc' from the existing bzipped file.
$ tar xvfj archive_abc.tar.bz2 /location/to/file_abc

4. The command 'tar xvfj' is used to extract a single directory 'abcdir' from the existing bzipped file. The subdirectories and files are extracted with this command.
$ tar xvfj archive_abc.tar.bz2 /location/to/abcdir/

To extract multiple directories use the command below 
$ tar xvfj archive_abc.tar.bz2 /location/to/abcdir1/ /location/to/abcdir1/

5. The command 'tar xvfj' is used to extract multiple files from .bz2 file. The command below will list all files with the extension 'txt' with the help of RegExp.
$ tar xvfj archive_abc.tar.bz2 --wildcards '*.txt'

6. The command 'tar tvfj' is used to view the .bz2 archive file. This will list the files without extracting files.
$ tar tvfj archive_abc.tar.bz2

7. The command 'tar -cjf' is used to determine the size of .bz2 file. The size returned is in KB.
$ tar -cjf - /location/to/archive/ | wc -c
200 

The video below provides details about commands in the Unix environment:





Saturday, August 18, 2018

Informatica Master Data Management - MDM - Quiz - 7

Q1. Which statement describes ORS best?

A. It stores the rules for processing and managing the master data.
B. It comes pre-configured with the MDM hub.
C. It stores user login info for the MDM hub.
D. All the choices are correct.

Q2. Which choice best describes what influences tokenization?

A. Key width.
B. STRIP_ CTAS_DELETE_ RATIO.
C. Fuzzy match column.
D. All the choices influence tokenization.

Q3. Part of child relationship refers to a child record on a many-many relationship that really belongs to one record in primary object

A. True
B. False

Q4. Which statements are correct regarding IDD

A. All interaction between an IDD application and an ORS is through SIF API calls
B. Searching for data in an subject area can be based only on searchMatch SIF API.
C. IDD uses clenasePUT API
D. By default, IDD authenticates users with a SIF call to the hub server.

Q5. Which statements are true regarding trust configuration?

A. All columns in a base object must have trust enabled
B. You can configure trust with no decay
C. You can change trust setting after records have been loaded into base object.
D. Validation rules can downgrade the trust below the minimum trust value

Previous Quiz             Next Quiz

Friday, August 17, 2018

Variables in the Unix system

Are you looking for information about what variables are available in the Unix Operating system? Would you be interested in knowing how to work with variables in the Unix environment? This article provides details about variables used in Unix programming with sample examples.

Introduction

A variable in the Unix environment is used to store values temporarily and use it during program execution. 

A variable can contain only letters (a to z or A to Z), numbers ( 0 to 9) or the underscore character ( _). The standard practice is to use the variable name in UPPERCASE but it is not mandatory. We can write it in lowercase too.
For example: testVar, test1, var1 , 2var, _var 

What are types of variables?

  • Local Variables: These variables present within the current instance of the shell. These are not available to programs that are started by the shell.  They are set at the command prompt.
  • Environment Variables: These variables are available to any child process of the shell. 
  • Shell Variables : A shell variable is a special variable that is set by the shell and is required by the shell in order to function correctly.  These can include environment variables and local variables.

Defining and Initiating Variables 

The syntax for creating a variable is as below
variable_name = variable_value

Here variable 'country' is a scalar variable. A scalar variable can hold only one value at a time.
e.g. country=“India”

Unix shell enables us to store any value - like storing the integer value in the country_cd field
e.g. country_cd=100

How to access value from a variable?

To access value from a variable, we need to use the $ character before the variable name. 
For example,
#!/bin/sh
NAME="Techno Guru"
echo $NAME

How to create the read only variable?

To mark variables as read only by using the readonly command.
The value of  the readonly variable cannot be changed.
e.g.
#!/bin/sh
VAR="Techno Guru"
readonly VAR
VAR="Training"

How to unset variables?

  • Unsetting or deleting a variable directs the shell to remove the variable from the list of variables that it tracks. 
  • Once we unset a variable, we cannot access the stored value in the variable.
  • We cannot use the unset command to unset variables that are marked readonly
e.g.
#!/bin/sh
VAR="Techno Guru"
unset VAR
echo $VAR

The video below provides in-depth knowledge about how to use variables in the Unix environment with the demo.


Java Interview Questions and Answers - Part 3


Are you preparing for Java interview and looking for material for preparation? Are you also interested in knowing what kinds of questions are normally asked during Java interview? If so, then this article provides detailed questions and answers about Java. Good luck for your interview.

Q1: What is marker interface in Java?
Answer:  The interface with no defined methods is called marker interface. Such interface acts as a marker which tells the compiler that the objects of the classes implementing the interfaces with no defined methods need to be treated differently.

For example, java.io.Serializable, java.lang.Cloneable etc. are marker interfaces 
  • Marker interface also called as ‘tag’ interface as they tag the derived classes into a specific category based on usage.
  • We can write custom marker interface. 

Q2: What is method in Java?
Answer:
  • A Java method in java is a set of statements that are grouped together to perform an operation
  • It can be called at any point in the program using the method's name.
  • The method is a subprogram which works on the data.
  • Method has return type, so it either return some value or it may return void. 

     For example, in the sample code below area() is method. 
    class Triangle 
        public int area(int param1, int param2) {
        return (1/2*param1*param2);
     }

Q3: What is method overloading and method overriding?
Answer:

  1. Method overloading means multiple methods in the same class with the same name but different method signatures. We can define the same operation in different ways for different data.

          For example -
       class Shape {
            public void calculateArea(int param) {…}
            public void calculateArea(int length, int width){}
        }
     
      2. Method overriding means two methods with same name and signatures, one in the parent class and the other one in the child class. We can define the same operation in different ways for different object types.

             For example - In the example below, method name 'area(int length)' is same. The signature of method in parent and child class is also same. Here, the child class Square overrides 'area' method from parent class - Shape.
       class Shape{
             public void area(int length) {…}
        }

       class Square extends Shape {
             public void area(int length) { …}
        }

Q4: Is Java 100% Object Oriented?
Answer: The Java technology is based on Object Oriented concepts. However, it does not follow 100% Object Oriented. Java uses eight primitive data types such as int, float, double , boolean, byte, char, long, short which are not objects.  Hence it is not fully Object Oriented.

Q5: What is an Object in Java?
Answer: Object is an entity which has state and behavior. State is presented through fields and behavior is presented through methods.  Person, Table, TV, Home etc . are examples of an object.

For example, assume person as an object.
It has state - weight, height, gender, eye color, hair color etc.
It has behavior - walk, speak, listen etc.


                                   



Thursday, August 16, 2018

Informatica Master Data Management - MDM - Quiz - 6

Q1. Before you can configure Informatica Data Director(IDD) what must be done?

A. A valid operational reference store(ORS) has been created
B. A complete data model has been set up.
C. Master data has been loaded
D. The stage batch jobs have been completed

Q2. Enable Search by rules - match rules set property is used how ?

A. With fuzzy- match base objects only.
B. Applied to the SIF search Match request.
C. Only when the searchMatch request has a matchType parameter of 'BOTH'.
D. Cannot use any exact match columns in the rule.

Q3. Build Match Groups to remove redundant matches before consolidation.

A. True
B. False

Q4. Which of these are valid child realtionship types in IDD

A. 1:many
B. Lohgical 1:many
C. Part of
D. Part of Primary object

Q5. Which of the valid customization supported by the hub?

A. Custom sequence
B. Custom index
C. Custom Match engine
D. Custom logging procedure

Previous Quiz             Next Quiz

How to enable DEBUG mode match process in Informatica MDM?

Are you facing any issues while running the match process in Informatica MDM? Are you looking for information about how to analyze the issue in the match process? Would you also be interested in knowing how to enable DEBUG mode for match process such as searchMatch API, Match jobs, IDD Extended Search? If so, then this article provides detailed information about it.

Introduction

The match process is one of the critical processes in the MDM hub. Any issue in this process, will impact the business. So to analyze the issue, we need logs in DEBUG mode for the match process. Configure your log4j.xml file to generate a separate match log file. This log file can be used to analyze match issues in the Master Data Management (MDM) Hub and Informatica Data Director (IDD). Match can occur during execution of the searchMatch API, the Match jobs and the IDD Extended Search. 

After making the changes mentioned below in log4j.xml file, it will generate match.log file. It will have details about the matches comparing with each of the match rules separately. It will be helpful to understand the behavior of the match rule configuration. Based on the log file analysis we can fine tune the match rules.  

How to make log4j.xml changes for the match process?

We need to make the configuration changes below in log4j.xml file. This file presents at <Install directory>/hub/cleanse/conf directory.

Add the entry below in the log4j.xml file to generate the  'matchprocess.log' file:

<appender name="MATCH" class="org.apache.log4j.RollingFileAppender">
   <errorHandler class="org.apache.log4j.helpers.OnlyOnceErrorHandler"/>
   <param name="File" value="/data/user/infamdm/hub/cleanse/logs/matchprocess.log"/>
   <param name="Append" value="true"/>
    <param name="MaxFileSize" value="10MB"/>
    <param name="MaxBackupIndex" value="10"/>
    <param name="Threshold" value="DEBUG"/>
    <layout class="org.apache.log4j.PatternLayout">
    <!-- The default pattern: Date Priority [Category] Thread Message -->
     <param name="ConversionPattern" value="[%d{ISO8601}] [%t] [%-5p] %c: %m%n"/>
  </layout>
 </appender>
 <category name="com.siperian.mrm.util" additivity="false">
        <priority value="ON"/>
        <appender-ref ref="MATCH"/>
  </category>
 <category name="com.siperian.mrm.match" additivity="false">
        <priority value="ON"/>
        <appender-ref ref="MATCH"/>
  </category>


The video below provides information about how the match process works in the MDM hub.


Understanding Survivorship in Informatica IDMC - Customer 360 SaaS

  In Informatica IDMC - Customer 360 SaaS, survivorship is a critical concept that determines which data from multiple sources should be ret...