Hi all,
We are importing the data from the CSV file into the database using COPY
command. But when the 'primary key ' violation occurs , it stops
Then and there and data is not updated into the tables. Also in the CSV
file the number of columns is not fixed , its varies
In number , it can range
Hi all,
We are importing the data from the CSV file into the database using COPY
command. But when the 'primary key ' violation occurs , it stops
Then and there and data is not updated into the tables. Also in the CSV
file the number of columns is not fixed , its varies
In number , it can ra
Hello...
I am trying to validate a asset number (10 Characters) from one table
to another table. Problem is they are in two different DB's and
haven't done that before?
Basically trying to take record 1 from Table 1/DB1 and validate it
against record 1 in Table 2/DB2 if the record doesn't exist i
Shall i use \d command from the c program. If possible give me a example
program.
Office firewalls, cyber cafes, college labs, don't allow you to download
CHAT? Click here: http://in.messenger.yahoo.com/webmessengerpromo.php
I am in the process of transitioning a bioinformatics database from
one schema to another, and I have to do some "massaging" of the data
in order to do it.
I have two tables, "gene" and "exon". Exon has a many-to-one
relationship with Gene. The structure of the Gene table isn't
importan
John Summerfield wrote:
Penchalaiah P. wrote:
Information transmitted by this e-mail is proprietary to Infinite
Computer Solutions
It may be proprietary, but it shore ain't confidential!
Placing "confidential" on every document without regard for its content,
especially when some of it's
[EMAIL PROTECTED] wrote:
Hi all,
We are importing the data from the CSV file into the database using COPY
command. But when the ‘primary key ‘ violation occurs , it stops
Then and there and data is not updated into the tables. Also in the CSV
file the number of columns is not fixed , its var
> In my opinion your best bet in terms of getting around the primary
> key
> violation is to create a temporary table ...
good idea! from my experience it's almost always best to pull raw info
into a buffer table before introducing it into the real world.
___
On May 17, 2007, at 5:43 AM, S balasankaravadivel wrote:
Shall i use \d command from the c program. If possible give me a
example program.
If you want to use the \d command in a C program, link your program
to libpq and grab the C source code for the \d command from psql.
Also, if you jus