What is the best process for conversion moving district data to city data?

Hi ALL,
I Need to write one conversion which will move the district field data into city field data in infotype 6..
It need to apply for only one  Specific country which can be identified by Employee Personnel Area..and it should be apply for all active , Terminated employee as well...
What is the best process so that i can catpure all the data records of  employees of the Specific country?
my approacH is..
LDB: PNP.
Start-of-selection.
RP_PROVIDE_FROM_LAST P0001 space pn-begda pn-endda.
check p0001-weks = '5200'.
rp_provide_from_last p0006 space pn-begda pn-endda.
Loop at p0006.
move p0006 to T_p0006.
if ort01 is not initial
Move P0006-ORT01 TO T_P0006-ORT02.
endif.
      CALL FUNCTION 'HR_INFOTYPE_OPERATION'
        EXPORTING
          infty         = '0006'
          subtype       = P0006-subty
   objectid      = P_record-objps
          number        = p0006-pernr     "employeenumber
          validityend   = validityend
          validitybegin = validitybegin
         record        = T_p0006.
          recordnumber  = p_record-SEQNR
          operation     = 'MOD'
          nocommit      = nocommit
          dialog_mode   = '0'
        IMPORTING
          return        = return_struct
          key           = personaldatakey
        EXCEPTIONS
          OTHERS        = 0.
      Endloop.
Is this using Loop is fine? or Using PROVIDE * from p0006 between PN-BEGDA AND PN-ENDDA
ENDPROVIDE is fine?
Is my code is accurate...Bapi_employee enque bapiemployee_deque i  will add apart from that is this code is fine for my requirement or any additional need to take care to capture all the employee data ?
Regards
sas

Hi,
Please use the following code: -
RP_PROVIDE_FROM_LAST P0001 space pn-begda pn-endda.
check p0001-weks = '5200'.
rp_provide_from_last p0006 space pn-begda pn-endda.
provide * from p0006 between PN-BEGDA AND PN-ENDDA
move p0006 to T_p0006.
if ort01 is not initial
Move P0006-ORT01 TO P0006-ORT02.
endif.
CALL FUNCTION 'HR_INFOTYPE_OPERATION'
EXPORTING
infty = '0006'
subtype = P0006-subty
objectid = P_record-objps
number = p0006-pernr "employeenumber
validityend = p0006-endda
validitybegin = p0006-begda
record = p0006.
recordnumber = p0006-SEQNR
operation = 'MOD'
nocommit = nocommit
dialog_mode = '0'
tclass = 'A'
IMPORTING
return = return_struct
key = personaldatakey
EXCEPTIONS
OTHERS = 0.
endprovide.
Hope this will help you.
Thanks & Regards,
Gaurav

Similar Messages

  • What is the best process for adding a long text scroll into a video?

    I have an hour video and need to insert a narrated poem that will either scroll or have lines fade in / out. What is the best process to create that poem? Do I use Motion? Live Type? compose it directly in FCP? I'll have either a still image or a looping video for the background. Once I know the best starting point, then I'll refine my questions. The poem is about 4 minutes narrated. Appreciate any help to get me started.

    In the effects window try "Scrolling Text". Set it to be the length you need it (duration) and paste in your text and render and see how you like it. I think scrolling text has a nice little fade at the top and bottom too.
    Or, you can make the text an image in something like Photoshop and keyframe it to slowly move in FCP for the duration of the video.

  • I am gifting my iMac to my niece and need to wipe the disc for her use.  I have an external backup and also (smile) a brand new iMac I'll need to set up.What is the "best" process for ensuring the safety of my information as well as providing a "new" comp

    Gang,
    I've just purchased a new iMac for myslef and am gifting my "old" iMac to Niece.  Original iMac has Snow Leopard upgrade (came with Leopard) as well as Word for Mac -student addition.  I also have an external backup drive and use Time Machine as specified.
    What are the easy and appropraite steps to provide my niece a "new" iMac (clean and free of my items) as well as protect my info so I can place on my new iMac?  Will I also need to de-authorixe audible for iTunes?
    Thank you for your help.  I know this is probably a very basic procedure but I want to get it correct and ensure I don't harm either iMac.
    Best,
    pshdawg1

    pshdawg1 wrote:
    Gang,
    I've just purchased a new iMac for myslef and am gifting my "old" iMac to Niece.  Original iMac has Snow Leopard upgrade (came with Leopard) as well as Word for Mac -student addition.  I also have an external backup drive and use Time Machine as specified.
    Well I don't think your niece is going to rob you blind or sell your company secrets to the highest bidder, so a full 7x- 35x government grade overwrite and operating install is likely overkill.
    Just likley some personal files, pictures and videos, stuff like that you want to make sure doesn't get seen.
    My suggestion is to clean out your user level files manually in each of your Documents, Pictures etc folders, any bookmarks in browsers (reset Safari, clear cache) and emails you don't want carried on.
    Then download and run the cleaning aspects of OnyX, followed by a Disk Utility > Erase Free Space option. (in your Applications/Utilities folder)
    http://www.titanium.free.fr/
    You can create another Admin account in her name/nick and delete the first one with your name and all that.
    If you really want to get rid of your name from everywhere in the comptuer, then the only option is a c boot from the installer disk, Disk Utility Erase with Zero (7x or even 35x overwrite) and then resintall OS X and shutdown the machine,
    When this is done, OS X boots into the first "Welcome to OS X" video you saw when you first setup the machine. Of course you lose Word as that's not on the installer disk. But LibreOffice is free and much much better.
    http://www.libreoffice.org/
    pshdawg1 wrote:
    Will I also need to de-authorixe audible for iTunes? 
    Your allowed up to 5 computers with your iTunes content, but you can deauthorize the computer in iTunes so it doesn't take one of your authorizations.
    Also before you do anything, make a MANUAL backup of your data to another drive just in case Time Machine/Migration ***. etc doesn't screw the new pooch on you like it's been known to do.
    I always c boot off the new installer disk on new machines and Disk Utility Erase with Zero option the entire boot drive then reinstall OS X, it's not that I'm paranoid, it's that drives are not checked for bad sectors at the factory, they just slap OS X on it and off it goes, problems appear later on as people use the drive or can't read the software correctly off the drive.
    So I map off the bad sectors ahead of time, so the software is on good sectors and never have a post issue like others do with new machines.
    If you ordered a Mac with custom software installed, obiously your going to need to reinstall it after this.

  • What is the best process for creating a webi document?

    I inherited a BI 4.0 environment with published repositories, dashboards, and webi documents.
    For development purposes, I tried creating the webi document local to my machine (due to how slow it was to create the document using BILaunch pad and/or the webi rich client on the "console")
    I created it as 'standalone, pointing to a local universe'; however, I can't figure out a way to move it back into my enterprise world.
    I was able to convert and publish the local universe to my enterprise repository; however, because I created the document in standalone mode, it doesn't appear to want to let me change the data source to a universe.
    So right now .. I have a webi document that won't let me select a universe for a data source.
    Any help or proven methods for creating documents then moving them to an enterprise environment would be appreciated.
    Thanks in advance.

    I don't think Acrobat, or the Acrobat SDK can help you. Acrobat cannot be run on a server.

  • What is the best process for creating, opening, editing, etc PDFs from within Visual Studio 2008?

    I am the project manager on a web-based application that will need to:
    Create, open, edit, save, etc PDFs from within a Visual Studio 2008 web application (Visual Basic).
    Populate PDFs from SQL server 2010 database.
    Allow users to use PDF editing tools from within the website.
    BTW, the application is being written in Visual Basic.
    Will the SDK allow us to do this? What licenses do we need to purchase?
    Are there 3rd party plugins that make doing these things much faster and simpler?
    Any input is GREATLY appreciated!!!
    Sincerely,
    Mike

    I don't think Acrobat, or the Acrobat SDK can help you. Acrobat cannot be run on a server.

  • I have an IPad2.  I've received two different ideas on charging the battery.  One person indicates I should let the battery run almost down before recharging; another person indicated I should keep it charged closer to 100% .  What is the best process?

    I have an IPad2.  I've received two different ideas on charging the battery.  One person indicates I should let the battery run almost down before recharging; another person indicated I should keep it charged closer to 100% .  What is the best process for the best battery life over time?

    I do exactly as Thomas Reed does. Always have from day one. Going on 15 months now and I get at least 10 hours of use out the battery every day. No matter how much juice is left on the device when I go to bed - I put the iPad on the charger - doesn't matter what the battery gauge says - I plug it in and let it charge all night.

  • What is the best app for word processing on the i pad

    What is the best app for word processing using an i pad

    Have a look at the following:
    http://itunes.apple.com/sg/app/quickoffice-pro-hd-edit-office/id376212724?mt=8&l s=1
    http://itunes.apple.com/sg/app/office2-hd/id364361728?mt=8&ls=1
    http://itunes.apple.com/sg/app/documents-to-go-premium-office/id317107309?mt=8&l s=1
    http://itunes.apple.com/sg/app/polaris-office/id513188658?mt=8&ls=1

  • I have problems in the initiation of the Encore process when opening presents the following error message : "Encore CS6 Cannot Run in Non-Royalty Serialized".... What is the best solution for this problem ?

    Help Me.
    What is the best solution for this problem ?

    Encore is activated when you activate Premiere Pro... so, as Stan asked, how did you install P-Pro?
    Ask for serial number http://forums.adobe.com/thread/1234635 has a FAQ link
    -and a fix for Encore http://forums.adobe.com/thread/1421765?tstart=0 in reply #7
    -plus more Encore http://helpx.adobe.com/encore/kb/cant-write-image-fie-larger1.html

  • What is the right process for moving system to another plant

    Dear Guru,
    I have below scenario which i would like to understand what should be the right process to deal with it..
    Organization Structure.
    Company code: C500
    Business area : 500A
    Plant A500 and S500 which is under the same company code and same Business area.
    Storage location: SW01 and AW01 which are physically same location address
    I have this scenario where the user have a PO under Plant S500 which already GR and IR and the physical goods is currently placed in Storage location SW01.
    But the user realized the Material should be created under Plant A500.
    For the above case, can anyone please advice me what should be the better process instead of reversal the IV/GR/PO? and what is the right process for MM and considering also from the finance point of view?
    Thank you very much,
    Regards,
    CheeWee

    Hi
    It is the configuration issue. SOmetime it happens when you copy the Reference plant to your Plant.
    Change the setting and make it both Qty & Value if you really want to manage the stock qty with value then proceed.
    Valuation area is nothing but a Plant.
    karthik
    Edited by: Karthik on Jul 25, 2011 1:23 PM

  • What is the best practice for inserting (unique) rows into a table containing key columns constraint where source may contain duplicate (already existing) rows?

    My final data table contains a two key columns unique key constraint.  I insert data into this table from a daily capture table (which also contains the two columns that make up the key in the final data table but are not constrained
    (not unique) in the daily capture table).  I don't want to insert rows from daily capture which already exists in final data table (based on the two key columns).  Currently, what I do is to select * into a #temp table from the join
    of daily capture and final data tables on these two key columns.  Then I delete the rows in the daily capture table which match the #temp table.  Then I insert the remaining rows from daily capture into the final data table. 
    Would it be possible to simplify this process by using an Instead Of trigger in the final table and just insert directly from the daily capture table?  How would this look?
    What is the best practice for inserting unique (new) rows and ignoring duplicate rows (rows that already exist in both the daily capture and final data tables) in my particular operation?
    Rich P

    Please follow basic Netiquette and post the DDL we need to answer this. Follow industry and ANSI/ISO standards in your data. You should follow ISO-11179 rules for naming data elements. You should follow ISO-8601 rules for displaying temporal data. We need
    to know the data types, keys and constraints on the table. Avoid dialect in favor of ANSI/ISO Standard SQL. And you need to read and download the PDF for: 
    https://www.simple-talk.com/books/sql-books/119-sql-code-smells/
    >> My final data table contains a two key columns unique key constraint. [unh? one two-column key or two one column keys? Sure wish you posted DDL] I insert data into this table from a daily capture table (which also contains the two columns that make
    up the key in the final data table but are not constrained (not unique) in the daily capture table). <<
    Then the "capture table" is not a table at all! Remember the fist day of your RDBMS class? A table has to have a key.  You need to fix this error. What ETL tool do you use? 
    >> I don't want to insert rows from daily capture which already exists in final data table (based on the two key columns). <<
    MERGE statement; Google it. And do not use temp tables. 
    --CELKO-- Books in Celko Series for Morgan-Kaufmann Publishing: Analytics and OLAP in SQL / Data and Databases: Concepts in Practice Data / Measurements and Standards in SQL SQL for Smarties / SQL Programming Style / SQL Puzzles and Answers / Thinking
    in Sets / Trees and Hierarchies in SQL

  • What is the Best practice for ceramic industry?

    Dear All;
    i would like to ask two questions:
    1- which manufacturing category (process or discrete) fit ceramic industry?
    2- what is the Best practice for ceramic industry?
    please note from the below link
    [https://websmp103.sap-ag.de/~form/sapnet?_FRAME=CONTAINER&_OBJECT=011000358700000409682008E ]
    i recognized that ceramic industry is under category called building material which in turn under mill product and mining
    but there is no best practices for building material or even mill product and only fabricated meta and mining best practices is available.
    thanks in advance

    Hi,
    I understand that you refer to production of ceramic tiles. The solution for PP was process, with these setps: raw materials preparation (glazes and frits), dry pressing (I don't know extrusion process), glazing, firing (single fire), sorting and packing. In Spain, usually are All-in-one solutions (R/3 o ECC solutions). Perhaps the production of decors have fast firing and additional processes.
    In my opinion, the curiosity is in batch determination in SD, that you must determine in sales order because builders want that the order will be homogeneus in tone and caliber, and he/she can split the order in diferents deliveries. You must think that batch is tone (diferents colours in firing and so on) and in caliber.
    I hope this helps you
    Regards,
    Eduardo

  • What's the best SSD for a Macbook Pro 13" Mid 2010?

    Hello.
    I will upgrade my 2010 Macbook Pro. I need to know what's the best SSD for my Macbook Pro. I was thinking about those:
    - Kingston SSDNow V+200 (SVP200S37A/120G) - 120 GB
    - CRUCIAL SSD M4 128 GB
    - CORSAIR SSD  Force Series GS 128 GB
    - SAMSUNG SSD 840 Series Basic 2.5" - 120 GB (MZ-7TD120BW)
    - CRUCIAL SSD interno Crucial v4 - 128 GB
    Those are the easiest to find on Portugal.

    It is my understanding that SATA III is backwards compatible to SATA II so that should not be an issue for your selection process.
    As an aside, you might be interested to know that your MBP can now have 16 GB RAM installed.
    http://blog.macsales.com/16353-owc-announces-maxram-memory-upgrades-to-16gb-for- 2010-mac-mini-macbook-and-macbook-pro
    Ciao.

  • What is the best antivirus for MacBook Pro?

    What is the best antivirus for MacBook Pro?

    1. This comment applies to malicious software ("malware") that's installed unwittingly by the victim of a network attack. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the victim's computer. That threat is in a different category, and there's no easy way to defend against it. If you have reason to suspect that you're the target of such an attack, you need expert help.
    If you find this comment too long or too technical, read only sections 5, 6, and 10.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user, but internally Apple calls it "XProtect." The malware recognition database is automatically checked for updates once a day; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't necessarily been tested by Apple, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    It can easily be disabled or overridden by the user.
    A malware attacker could get control of a code-signing certificate under false pretenses, or could simply ignore the consequences of distributing codesigned malware.
    An App Store developer could find a way to bypass Apple's oversight, or the oversight could fail due to human error.
    For the reasons given above, App Store products, and other applications recognized by Gatekeeper as signed, are safer than others, but they can't be considered absolutely safe. "Sandboxed" applications may prompt for access to private data, such as your contacts, or for access to the network. Think before granting that access. OS X security is based on user input. Never click through any request for authorization without thinking.
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is presumably effective against known attacks, but maybe not against unknown attacks. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. XProtect, Gatekeeper, and MRT reduce the risk of malware attack, but they're not absolute protection. The first and best line of defense is always your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and the malware attacker. If you're smarter than he thinks you are, you'll win.
    That means, in practice, that you never use software that comes from an untrustworthy source, or that does something inherently untrustworthy. How do you know what is trustworthy?
    Any website that prompts you to install a “codec,” “plug-in,” "player," "extractor," or “certificate” that comes from that same site, or an unknown one, is untrustworthy.
    A web operator who tells you that you have a “virus,” or that anything else is wrong with your computer, or that you have won a prize in a contest you never entered, is trying to commit a crime with you as the victim. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    Pirated copies or "cracks" of commercial software, no matter where they come from, are unsafe.
    Software of any kind downloaded from a BitTorrent or from a Usenet binary newsgroup is unsafe.
    Software that purports to help you do something that's illegal or that infringes copyright, such as saving streamed audio or video for reuse without permission, is unsafe. All YouTube "downloaders" are in this category, though not all are necessarily harmful.
    Software with a corporate brand, such as Adobe Flash Player, must be downloaded directly from the developer’s website. If it comes from any other source, it's unsafe.
    Even signed applications, no matter what the source, should not be trusted if they do something unexpected, such as asking for permission to access your contacts, your location, or the Internet for no obvious reason.
    6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it — not JavaScript — in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.
    Follow the above guidelines, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself from malware.
    7. Never install any commercial "anti-virus" or "Internet security" products for the Mac, as they all do more harm than good, if they do any good at all. Any database of known threats is always going to be out of date. Most of the danger is from unknown threats. If you need to be able to detect Windows malware in your files, use one of the free anti-virus products in the Mac App Store — nothing else.
    Why shouldn't you use commercial "anti-virus" products?
    Their design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere.
    In order to meet that nonexistent threat, the software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    By modifying the operating system, the software itself may create weaknesses that could be exploited by malware attackers.
    8. An anti-malware product from the App Store, such as "ClamXav," doesn't have these drawbacks. That doesn't mean it's entirely safe. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    An anti-virus app is not needed, and should not be relied upon, for protection against OS X malware. It's useful only for detecting Windows malware. Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else.
    A Windows malware attachment in email is usually easy to recognize. The file name will often be targeted at people who aren't very bright; for example:
    ♥♥♥♥♥♥♥♥♥♥♥♥♥♥!!!!!!!H0TBABEZ4U!!!!!!!.AVI♥♥♥♥♥♥♥♥♥♥♥♥♥♥.exe
    Anti-virus software may be able to tell you which particular virus or trojan it is, but do you care? In practice, there's seldom a reason to use the software unless a network administrator requires you to do it.
    The ClamXav developer won't try to "upsell" you to a paid version of the product. Other developers may do that. Don't be upsold. For one thing, you should not pay to protect Windows users from the consequences of their choice of computing platform. For another, a paid upgrade from a free app will probably have the disadvantages mentioned in section 7.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.
    10. As a Mac user you don't have to live in fear that your computer is going to be infected every time you install an application, read email, or visit a web page. But neither should you have the false idea that you will always be safe, no matter what you do. The greatest harm done by security software is precisely its selling point: it makes people feel safe. They may then feel safe enough to take risks from which the software doesn't protect them. Nothing can lessen the need for safe computing practices.

  • What are the best approaches for mapping re-start in OWB?

    What are the best approaches for mapping re-start in OWB?
    We are using OWB repository 10.2.0.1.0 and OWB client 10.2.0.1.31. The Oracle version is 10 G (10.2.0.3.0). OWB is installed on Linux.
    We have number of mappings. We built process flows for mappings as well.
    I like to know, what are the best approches to incorportate re-start options in our process. ie a failure of mapping in process flow.
    How do we re-cycle failed rows?
    Are there any builtin features/best approaches in OWB to implement the above?
    Does runtime audit tables help us to build re-start process?
    If not, do we need to maintain our own tables (custom) to maintain such data?
    How did our forum members handled above situations?
    Any idea ?
    Thanks in advance.
    RI

    Hi RI,
    How many mappings (range) do you have in a process flows?Several hundreds (100-300 mappings).
    If we have three mappings (eg m1, m2, m3) in process flow. What will happen if m2 fails?Suppose mappings connected sequentially (m1 -> m2 -> m3). When m2 fails then processflow is suspended (transition to m3 will not be performed). You should obviate cause of error (modify mapping and redeploy, correct data, etc) and then repeat m2 mapping execution from Workflow monitor - open diagram with processflow, select mapping m2 and click button Expedite, choose option Repeat.
    In re-start, will it run m1 again and m2 son on, or will it re-start at row1 of m2?You can specify restart point. "at row1 of m2" - I don't understand what you mean (all mappings run in Set based mode, so in case of error all table updates will rollback,
    but there are several exception - for example multiple target tables in mapping without corelated commit, or error in post-mapping - you must carefully analyze results of error).
    What will happen if m3 fails?Process is suspended and you can restart execution from m3.
    By having without failover and with max.number of errors=0, you achieve re-cycle failed rows to zero (0).This settings guarantee existence only two return result of mapping - SUCCSES or ERROR.
    What is the impact, if we have large volume of data?In my opinion for large volume Set based mode is the prefered processing mode of data processing.
    With this mode you have full range enterprise features of Oracle database - parallel query, parallel DML, nologging, etc.
    Oleg

  • What is the best practice for creating primary key on fact table?

    what is the best practice for primary key on fact table?
    1. Using composite key
    2. Create a surrogate key
    3. No primary key
    In document, i can only find "From a modeling standpoint, the primary key of the fact table is usually a composite key that is made up of all of its foreign keys."
    http://download.oracle.com/docs/cd/E11882_01/server.112/e16579/logical.htm#i1006423
    I also found a relevant thread states that primary key on fact table is necessary.
    Primary Key on Fact Table.
    But, if no business requires the uniqueness of the records and there is no materilized view, do we still need primary key? is there any other bad affect if there is no primary key on fact table? and any benifits from not creating primary key?

    Well, natural combination of dimensions connected to the fact would be a natural primary key and it would be composite.
    Having an artificial PK might simplify things a bit.
    Having no PK leads to a major mess. Fact should represent a business transaction, or some general event. If you're loading data you want to be able to identify the records that are processed. Also without PK if you forget to make an unique key the access to this fact table will be slow. Plus, having no PK will mean that if you want to used different tools, like Data Modeller in Jbuilder or OWB insert / update functionality it won't function, since there's no PK. Defining a PK for every table is a good practice. Not defining PK is asking for a load of problems, from performance to functionality and data quality.
    Edited by: Cortanamo on 16.12.2010 07:12

Maybe you are looking for