Solved

This is  in AIX and we have informatica installed on the box ..

Posted on 2010-09-13
2
764 Views
Last Modified: 2013-12-21
This is  in AIX and we have informatica installed on the box ..But there is an issue the application is not able to identify special characters.Doesnt know what is installed on AIX os (if it is utf8 or unicode)..I am giving the output of locale.
locale
LANG=en_US
LC_COLLATE="en_US"
LC_CTYPE="en_US"
LC_MONETARY="en_US"
LC_NUMERIC="en_US"
LC_TIME="en_US"
LC_MESSAGES="en_US"
LC_ALL=
Doesnt know from the above output if i is unicode or utf8 installed.If I need want to intstall utf 8 or unicode how can I do that as the O.S  is  not able to see special characters..Please provide all the steps as how we can do this

0
Comment
Question by:aixtutorial
2 Comments
 

Author Comment

by:aixtutorial
ID: 33669289
and also let me know how can I install utf8 and unicode or configure it
0
 
LVL 68

Accepted Solution

by:
woolmilkporc earned 250 total points
ID: 33669933
Hi,
Informatica uses (afaik) the ICU4C library (Unicode) , which is installed in AIX by default.
But check with
lslpp -l ICU4C.rte
whether it's actually there. I'm rather sure that it is, but if it's missing use "smitty install" to install from your installation CDs/DVD
ICU4C.rte
and if you're going to develop your own Unicode-based applications with ICUC, install as well
ICU4C.adt
Check and change (if needed) the setup of your Informatica server. (Server Configuration -> Compatibility -> UNICODE -> Apply)
As for UTF-8, please check with
lslpp -l "bos.loc.com*"
whether "bos.loc.com.utf" is installed, and check with
locale -a
whether "EN_US.UTF-8" is present.
If it isn't (which I assume) use "smitty mle_add_lang" -> "LANGUAGE translation to install" -> (select "UTF-8      English (United States) [EN_US]")
to install  it from your OS installation CDs/DVD.
For the new packages to be fully integrated into your system you'll have to reboot.
Good luck!
wmp
0

Featured Post

Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

Join & Write a Comment

Let's say you need to move the data of a file system from one partition to another. This generally involves dismounting the file system, backing it up to tapes, and restoring it to a new partition. You may also copy the file system from one place to…
I promised to write further about my project, and here I am.  First, I needed to setup the Primary Server.  You can read how in this article: Setup FreeBSD Server with full HDD encryption (http://www.experts-exchange.com/OS/Unix/BSD/FreeBSD/A_3660-S…
Learn several ways to interact with files and get file information from the bash shell. ls lists the contents of a directory: Using the -a flag displays hidden files: Using the -l flag formats the output in a long list: The file command gives us mor…
This video shows how to set up a shell script to accept a positional parameter when called, pass that to a SQL script, accept the output from the statement back and then manipulate it in the Shell.

705 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

22 Experts available now in Live!

Get 1:1 Help Now