DataStage官方培训教程7
合集下载
相关主题
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
2020/9/14
Module Objectives
Upon module completion, students will be able to: Define what a hashed List different types of hashed files List various uses for hashed files Create hashed files Source hashed files Use caching attributes to accelerate reads and writes Import metadata from hashed files Delete hashed files
A DataStage to the Most use a hashing algorithm based on key
column values Files can be cataloged in the project’s VOC easy
retrieval
© 2002 Ascential Software Corp. All rights reserved.Corporation. All Rights Reserved Reproduction and/or Redistribution Is Prohibited.
Copyright © 2003 Ascential Software Corporation. All rights Reserved
Ascential Software Corporation reserves the right to make changes to this document and the software described herein at any time and without notice. No warranty is expressed or implied other than any contained in the terms and conditions of sale.
© 2002 Ascential Software Corp. All rights reserved.Corporation. All Rights Reserved Reproduction and/or Redistribution Is Prohibited.
What is a Hashed File?
DataStage Essentials
Hashed Files Server பைடு நூலகம்dition
This document and the software described herein are the property of Ascential Software Corporation and its licensors and contain confidential trade secrets. All rights to this publication are reserved. No part of this document may be reproduced, transmitted, transcribed, stored in a retrieval system or translated into any language, in any form or by any means, without prior permission from Ascential Software Corporation.
© 2002 Ascential Software Corp. All rights reserved.Corporation. All Rights Reserved Reproduction and/or Redistribution Is Prohibited.
Uses of Hashed Files
Types of Hashed Files
21 different types Type 1 and 19 do not use a hashing algorithm Types 2-18 are static hashed files and use a
hashing algorithm Type 25 is static and uses a B-tree algorithm Type 30 is dynamic and uses a hashing algorithm
Good for locally storing tables of a remote database that will be read from frequently
Good as an intermediate in sequences of jobs Main use is as a reference lookup table
Ascential Software Corporation 50 Washington Street
Westboro, MA 01581-1021 USA Phone: (508) 366-3888 Fax: (508) 366-3669
Ascential, DataStage, INTEGRITY, MetaRecon, MetaStage and MetaBroker are trademarks of Ascential Software Corporation. Pick is a registered trademark of Pick Systems. Ascential Software is not a licensee of Pick Systems. Other trademarks and registered trademarks are the property of the respective trademark holder.
Module Objectives
Upon module completion, students will be able to: Define what a hashed List different types of hashed files List various uses for hashed files Create hashed files Source hashed files Use caching attributes to accelerate reads and writes Import metadata from hashed files Delete hashed files
A DataStage to the Most use a hashing algorithm based on key
column values Files can be cataloged in the project’s VOC easy
retrieval
© 2002 Ascential Software Corp. All rights reserved.Corporation. All Rights Reserved Reproduction and/or Redistribution Is Prohibited.
Copyright © 2003 Ascential Software Corporation. All rights Reserved
Ascential Software Corporation reserves the right to make changes to this document and the software described herein at any time and without notice. No warranty is expressed or implied other than any contained in the terms and conditions of sale.
© 2002 Ascential Software Corp. All rights reserved.Corporation. All Rights Reserved Reproduction and/or Redistribution Is Prohibited.
What is a Hashed File?
DataStage Essentials
Hashed Files Server பைடு நூலகம்dition
This document and the software described herein are the property of Ascential Software Corporation and its licensors and contain confidential trade secrets. All rights to this publication are reserved. No part of this document may be reproduced, transmitted, transcribed, stored in a retrieval system or translated into any language, in any form or by any means, without prior permission from Ascential Software Corporation.
© 2002 Ascential Software Corp. All rights reserved.Corporation. All Rights Reserved Reproduction and/or Redistribution Is Prohibited.
Uses of Hashed Files
Types of Hashed Files
21 different types Type 1 and 19 do not use a hashing algorithm Types 2-18 are static hashed files and use a
hashing algorithm Type 25 is static and uses a B-tree algorithm Type 30 is dynamic and uses a hashing algorithm
Good for locally storing tables of a remote database that will be read from frequently
Good as an intermediate in sequences of jobs Main use is as a reference lookup table
Ascential Software Corporation 50 Washington Street
Westboro, MA 01581-1021 USA Phone: (508) 366-3888 Fax: (508) 366-3669
Ascential, DataStage, INTEGRITY, MetaRecon, MetaStage and MetaBroker are trademarks of Ascential Software Corporation. Pick is a registered trademark of Pick Systems. Ascential Software is not a licensee of Pick Systems. Other trademarks and registered trademarks are the property of the respective trademark holder.