Data Migration Issues (Validation using a Combined Approach)

Nagarajan, R.; Sivaraman, Aswini; Kiruthik, B. Ponni; Priyadarshni, S.
July 2009
CURIE Journal;2009, Vol. 2 Issue 2, p55
Academic Journal
The main purpose of undertaking this project is to circumvent some of the limitations implicit in the migration tools. The main constraint is the lack of facility to validate the migrated data at the target level. In case of small data transfer it may be possible to make comparisons visually between the source and the target. But during the transfer of large volumet rics there is likelihood of the loss of some data elements. Hence a robust validation procedure becomes inevitable to assure data integrity at the target level. Informatica, a migration tool, seems to suffer this desideratum, which is the main motivation for this project. The software developed is highly comprehensive and concise in tackling this vital problem. Usually the migration from different external source s are considered to be the needs and then loaded into the data ware house. While the data are getting populated in data ware house, validation is a sine quanon to bring about the "data rectitude". The reports generated from data ware house are primarily meant for the higher management to embark upon adroit decision in respect of the future growth of the organization. The acient on this work is to be minimizing the manual checking and to replace it with automatic validation.


Related Articles

  • Effect of External Acid Site Content in PdHZSM-5 Catalyst on Its Activity and Selectivity in Hydroisomerization of n-Hexane. Bobik, V. V.; Voloshina, Yu. G.; Bobonich, F. M. // Theoretical & Experimental Chemistry;Sep/Oct2004, Vol. 40 Issue 5, p320 

    We have studied the relationship between the external acidity and the catalytic properties of zeolite PdHZSM-5 (Si/Al = 21) in hydroconversion of n-hexane. We have established that decreasing the external H-site content by 5-9 μmol/g at 548 K leads to an increase in conversion by 18-19% and a...

  • Determination of volumetric joint count based on 3D fracture network and its application in engineering. Jinliang Wu; Ji He // Applied Mechanics & Materials;2014, Issue 580-583, p907 

    Volumetric joint county Jv is an important parameter to evaluate the development of fractures. It is a fundamental representative for the strength and permeability of rock masses. However, Jv cannot be directly measured in field. In this study, an indirect method is applied for its estimation....

  • OS CHALLENGE: Best backup tools. MILLS, ASHTON // APC (Bauer Media Group);Oct2011, Vol. 31 Issue 10, p94 

    The article offers information on storing some backup data. It is stated that Ubuntu's software repositories contain some packages to choose from, so there's no excuse for not using any software. There are several tools one can use to maintain backup data. Tools such as File Backup Manager work...

  • Popcorn Puzzler. Mishica, Clare // Highlights;Dec2012, Vol. 67 Issue 12, p6 

    An educational game about volume is presented.

  • Towards Secure Cloud Infrastructure with Cloud Validation. Sathiya Moorthy, S.; Chandrasekar, C. // International Journal of Computer Science & Information Technolo;2014, Vol. 5 Issue 3, p2676 

    Cloud computing is an emerging standard with various computing ideas and technologies for the Internet, supporting cost-effective organization applications and IT infrastructure. The acceptance of cloud computing demand is gradually increasing over the years and the development of the global...

  • Strategic and Economic Issues of Ownership Rights and Private Life Compliance. Crestin, Frederic; Judde, Michel // Internal Security;Jan-Jun2011, Vol. 3 Issue 1, p63 

    Rapid evolution of technology, especially taking into account the contribution of nanotechnologies has helped the improvement of Information System performance and provided access to new features in CLOUD COMPUTING STORAGE, for example, creation of new services, realization of the popular idea...

  • Data Encryption in the Hostile Environment for Wireless Sensor Network Using Virtual Energy and Trigger Time Response Protocol. Lavania, Krishan Kant; Tiwari, Saumitra Mani; Batra, Sahil // International Journal of Computer Science Issues (IJCSI);May2011, Vol. 8 Issue 3, p538 

    The future of communication is the intelligent sensors capable enough to manage the decision making process by making communication among themselves. Although to do that they need a secure communication to take place which is continuous and for that we need energy sources which is continuous and...

  • Key Scheduling Scheme for Secured Routing in Wireless Adhoc Network. Waheed, Mohammed Abdul; Karibassappa, K. // International Journal of Computer Science Engineering & Technolo;May2011, Vol. 1 Issue 4, p158 

    A self-protection technique is suggested for adhoc network fall short of the objective of data privacy, data integrity, and authentication. Various security standards such as IEEE 802.11i, WPA, IEEE 802.1X were suggested to enhance the security issues in 802.11. Despite their efficiency, these...

  • Time to get personal. Hinde, Anne // Computer Bulletin;Jan1998, Vol. 40 Issue 1, p24 

    New data protection laws go live in nine months� time � yet there is still considerable ignorance about existing legislation. Anne Hinde considers the impact of the new European Union Directive


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics