Oracle Data Integrator (ODI) DM End-to-End Solution for ... · PDF filecustomer/business as...
-
Upload
truongtuyen -
Category
Documents
-
view
218 -
download
0
Transcript of Oracle Data Integrator (ODI) DM End-to-End Solution for ... · PDF filecustomer/business as...
1Copyright © 2016. All Rights Reserved. l Tech Mahindra Confidential.
Oracle Data Integrator (ODI) – DM2
End-to-End Solution for Data Migration
DM2
2Copyright © 2016. All Rights Reserved. l Tech Mahindra Confidential.
END TO END IT SOLUTION SERVICE
Migration Strategy, Road Maps
Data Mining, Data Analysis, Data Profiling
Identifying Data inconsistencies, De-duplication, Missing Data
Migration Solutions
Migration Execution (Incremental, Real time etc)
Cut-Over & Go-Live Support
Oracle ERP System
DW Migration
Data Integrations
Data Migration Solutions are delivered using Oracle Data Integrator (ODI) which is an end to end Data Management
Platform
ODI as one stop E2E Data Migration solution
3Copyright © 2016. All Rights Reserved. l Tech Mahindra Confidential.
Automation of entire DM flow with just a click of
button It extracts data from legacy, transforms the data,
loads the data into target system and finally
reconciliation.
Single click solution
Advantages of ODI solution
Hot pluggable Data connectivity with flexible and
extensible architecture. In built adaptors available to connect any
source/Target applications
Extraction/Load engines can be de-coupled and can
run independently.
N number of reconciliation reports can be generated
at will.
All in one place (Modularity)
Automation of entire DM flow with just a click of
button Reduced learning curve and increased developer
productivity which significantly reduce cost. (No
Speciality skills are required)
Eliminates hardware (infrastructure) and maintenance
costs.
Cost savings
Real time Data Warehousing with data quality
firewall and better execution performance Data Profiling and Data Integrity on the fly.
Evolve from batch to near real-time data integration.
Security compliance as Raw Data and Transformed
Data resides on a single server.
Real time Data Warehousing
4Copyright © 2016. All Rights Reserved. l Tech Mahindra Confidential.
No specific Infrastructure and maintenance required hence no
investment
Single click solution, No manual intervention required.
No need to build logic from scratch to meet specific requirements of
customer/business as ODI provides a concept called Knowledge
Modules which are completely re usable and customizable.
User friendly since Mappings, Lookups, Filters etc., are done via Drag
& Drop.
Inbuilt adaptors are available to connect any source/Target systems,
unlike other tools, no need to supply parameter file to dump the data
from source to the tool/ server for processing.
Features End to End Mechanism which includes extract, transform
and load into target system. Most tools only do extraction
High Performance and simplified way to reconcile data.
Advantage of DM2 over other non-Oracle Tools
5Copyright © 2016. All Rights Reserved. l Tech Mahindra Confidential.
Traditional ETL tools: operate by first Extracting the data from various sources, Transforming the data on a proprietary, middle-
tier ETL engine, and then Loading the transformed data onto the target data warehouse or integration server.
Issues raised by above architecture are:
Hardware: Most third party tools utilize their own engine to implement the ETL process. Regardless of the size of the solution this
can necessitate the investment in additional hardware to implement the tool’s ETL engine.
Learning Curve: Implementing a third party tool that uses foreign processes and languages results in the learning curve that is
implicit in all technologies new to an organization and can often lead to following blind alleys in their use due to lack of experience.
New E-LT tools (ODI): operate by first Extracting the data from various sources, Load the Data into destination servers and then
Transforming the data on destination server.
Advantages of this new architecture are:
Utilize Existing Hardware: the inherent tools provided by the database engine can be used. The ELT process is run on the same
hardware as the database engine underpinning the data warehouse, using the
existing hardware deployed.
Utilize Existing Skill sets: By using the functionality provided by the database engine, the existing investments in database skills
are re-used to develop the warehouse. No new skills need be learned and the full weight of the experience in developing the
engine’s technology is utilized, further reducing the cost and risk in the development process.
ODI Over traditional ETL Tools
6Copyright © 2016. All Rights Reserved. l Tech Mahindra Confidential.
The below picture shows the pictorial representation of ETL vs ELT approach
ETL vs ELT Architecture
ODI Over traditional ETL Tools cont…
7Copyright © 2016. All Rights Reserved. l Tech Mahindra Confidential.
Data
Extraction
Data Analysis &
ProfilingData Transform & De-
duplication
Raw Data into Target
Server
Reporting
Traceability
Source Data Import and Transformation
Loading Data into Target Application
Data ValidationTransformed
Data
Load Data into Target
Application Change & Release
Management
Migration Process
8Copyright © 2016. All Rights Reserved. l Tech Mahindra Confidential.
Migration Process cont.
Data
Extraction
Data Analysis &
ProfilingData Transform & De-
duplication
Raw Data into Target
Server
Reporting
Traceability
Source Data Import and Transformation
Loading Data into Target Application
Data ValidationTransformed
Data
Load Data into Target
Application Change & Release
Management
Pre-Built adaptors available for a
large variety of source systems
covering almost all the platforms
some examples are: Oracle
IMB
Sybase
MS access
Essbase
MySQL
SAP ABAP
Oracle BI
Xcel
Hyperion
file server
XML
Tera Data etc.,
9Copyright © 2016. All Rights Reserved. l Tech Mahindra Confidential.
Migration Process cont.
Data
Extraction
Data Analysis &
ProfilingData Transform & De-
duplication
Raw Data into Target
Server
Reporting
Traceability
Source Data Import and Transformation
Loading Data into Target Application
Data ValidationTransformed
Data
Load Data into Target
Application Change & Release
Management
Data Profiling done at 3
different Levels :
Profiling in Source System: Unique Values, NULL values
and Dependencies
Profiling against Business
Rules: Checks against
specific business rules and
conditions
Profiling against Target:Checks w.r.t target data like
Data Types, Precisions, basic
differences like COA,
Payroll’s etc.
10Copyright © 2016. All Rights Reserved. l Tech Mahindra Confidential.
Migration Process cont.
Data
Extraction
Data Analysis &
ProfilingData Transform & De-
duplication
Raw Data into Target
Server
Reporting
Traceability
Source Data Import and Transformation
Loading Data into Target Application
Data ValidationTransformed
Data
Load Data into Target
Application Change & Release
Management
Data Transformation
includes: Transformation rules that are
build against the data
Migration strategy (CV015)
and data conversion rules
(CV040)
Mapping rules
Field mapping
De duplication
Exception handling
Fallout Management
Reconciliation Management
11Copyright © 2016. All Rights Reserved. l Tech Mahindra Confidential.
Migration Process cont.
Data
Extraction
Data Analysis &
ProfilingData Transform & De-
duplication
Raw Data into Target
Server
Reporting
Traceability
Source Data Import and Transformation
Loading Data into Target Application
Data ValidationTransformed
Data
Load Data into Target
Application Change & Release
Management
Fallout Reporting at each
Stage: CV015 Strategy
CV040 Conversion
Mapping
De-duplication
Report of data errors at target
Data Validation
Report of errors while loading
data into target application
CV015 Strategy
CV040 Conversion
Mapping
De-duplication
Report of data errors at target
Data Validation
Report of errors while loading
data into target application
12Copyright © 2016. All Rights Reserved. l Tech Mahindra Confidential.
Migration Process cont.
Data
Extraction
Data Analysis &
ProfilingData Transform & De-
duplication
Raw Data into Target
Server
Reporting
Traceability
Source Data Import and Transformation
Loading Data into Target Application
Data ValidationTransformed
Data
Load Data into Target
Application Change & Release
Management
End-to-End Traceability: Reconciliation of Raw Data to
Transformed Data.
Reconciliation of Transformed
Data to Target Application
Data.
Reconciliation of Target
Application Data to Raw
Data.
13Copyright © 2016. All Rights Reserved. l Tech Mahindra Confidential.
Oracle ERP Target
Oracle ERP
Legacy
Non -Oracle
ERP Legacy
Peripheral
Legacy
Systems
XLS, CSV
File
Systems
Mapping, De duplication, Field Mapping, Data
Transformations
CV015 and
CV040
Data Profiling
Transformation
Engine
CSV,XLS,
TXT
Transformed Data
R12 Validation
API’s
R12 Load
API’s / Interfaces
Case Study
14Copyright © 2016. All Rights Reserved. l Tech Mahindra Confidential.
Inbuilt Knowledge Modules
Oracle Data Integrator (ODI)
Data Extraction Profiling Data Transformation Data Loading
Inbuilt Adaptors
Fallout &
Reconciliation
Reports
Data Analysis
Profiling Rules
Mapping
Rules
Strategy & Functional
Rules
Field
Mapping
Data Validation
against Target
Application
Data Loaders for
Target Application
Reconciliation across all stages
Completely Reusable Partially Reusable No Reusability
Legacy
Systems
Target
Systems
Solution Reusability
15Copyright © 2016. All Rights Reserved. l Tech Mahindra Confidential.
Name Role E-mail
Kalyana
GuggilamTechnical Architecture [email protected]
Sreekanth
ChadalawadaTechnical Architecture [email protected]
Pankaj
KhandelwalDelivery Manager
Ashish
Agnihotri
Pre-Sales & Solution [email protected]
Contact us
16Copyright © 2016. All Rights Reserved. l Tech Mahindra Confidential.
Disclaimer
Tech Mahindra Limited, herein referred to as TechM provide a wide array of presentations and reports, with the contributions of
various professionals. These presentations and reports are for informational purposes and private circulation only and do not
constitute an offer to buy or sell any securities mentioned therein. They do not purport to be a complete description of the markets
conditions or developments referred to in the material. While utmost care has been taken in preparing the above, we claim no
responsibility for their accuracy. We shall not be liable for any direct or indirect losses arising from the use thereof and the viewers are
requested to use the information contained herein at their own risk. These presentations and reports should not be reproduced, re-
circulated, published in any media, website or otherwise, in any form or manner, in part or as a whole, without the express consent in
writing of TechM or its subsidiaries. Any unauthorized use, disclosure or public dissemination of information contained herein is
prohibited. Unless specifically noted, TechM is not responsible for the content of these presentations and/or the opinions of the
presenters. Individual situations and local practices and standards may vary, so viewers and others utilizing information contained
within a presentation are free to adopt differing standards and approaches as they see fit. You may not repackage or sell the
presentation. Products and names mentioned in materials or presentations are the property of their respective owners and the
mention of them does not constitute an endorsement by TechM. Information contained in a presentation hosted or promoted by
TechM is provided “as is” without warranty of any kind, either expressed or implied, including any warranty of merchantability or
fitness for a particular purpose. TechM assumes no liability or responsibility for the contents of a presentation or the opinions
expressed by the presenters. All expressions of opinion are subject to change without notice.
Thank youVisit us at www.techmahindra.com