IRI Blog Articles

Diving Deeper into Data Management

 

 

Voracity MapReduce

This article, along with counterpart articles for Cloudera and HortonWorks, describes the simple 5-step process to connect the IRI Voracity big data management platform to any MapR distribution through the VGrid Gateway. After connecting,  data can be conveniently moved between HDFS and other systems. Furthermore, that data can be manipulated and masked in Hadoop via MR2, Spark, Spark Stream, […]

{ 0 comments }

Connecting Voracity to Cloudera

August 23, 2017 Big Data
Cloudera Dashboard

This article, along with counterpart articles for HortonWorks (Ambari) and MapR, describes the simple 3-step process to connect the IRI Voracity big data management platform to a Cloudera distribution through the VGrid Gateway. After connecting, data can be conveniently moved between HDFS and other systems. Furthermore, that data can be manipulated and transformed in Hadoop via MR2, Spark, Spark Stream, […]

Read the full article →

Connecting Voracity to HortonWorks

August 23, 2017 Big Data
Ambari Dashboard

This article, along with counterpart articles for Cloudera and MapR, describes the simple 3-step process to connect the IRI Voracity big data management platform to any Ambari distribution through the VGrid Gateway. After connecting, data can be conveniently moved between HDFS and other systems. Furthermore, that data can be manipulated and masked in Hadoop via MR2, Spark, Spark Stream, […]

Read the full article →

How to Mask Tables and Preserve Referential Integrity

August 14, 2017 Data Masking/Protection
Thumbnail image for How to Mask Tables and Preserve Referential Integrity

The Multi Table Protection Job wizard in IRI FieldShield can mask personally identifiable information (PII) in database columns that are part of a foreign key relationship, and thus preserve referential integrity between the tables. This ensures that the records remain linked even after they are de-identified. FieldShield users achieve this in the wizard by defining field-level […]

Read the full article →

How to Build Realistic but Fake PII

June 13, 2017 Data Masking/Protection
Thumbnail image for How to Build Realistic but Fake PII

There are times when it is necessary to test with or share data that has elements of personally identifiable information (PII). To comply with data privacy laws and prevent a data breach, you may need to provide data that reflects, and sometimes imparts, critical information, but still protects the PII. This article shows how you […]

Read the full article →

Process and Protect HL7 Data with Voracity

June 12, 2017 Data Masking/Protection
Thumbnail image for Process and Protect HL7 Data with Voracity

This article shows how you can use IRI Voracity to rapidly integrate and mask sensitive healthcare data in the HL7 file standard we introduced here. The process begins as HL7 messages are converted into a relational format using Flexter Data Liberator software from Sonra. The output of that process will be an Oracle database — […]

Read the full article →

Unmasking the HL7 Data Standard

May 16, 2017 Business Intelligence (BI)
Thumbnail image for Unmasking the HL7 Data Standard

In this series of articles, we will describe the semi-structured HL7 file format used in many healthcare industry data storage and processing settings, and show how you can rapidly transform and mask large volumes of HL7 XML messages without writing code. This first article introduces the HL7 standard and explains how HL7 messages are structured […]

Read the full article →

🎥 IRI Chakra Max Setup Video

March 19, 2017 Data Masking/Protection
Thumbnail image for 🎥 IRI Chakra Max Setup Video

Learn how to set up IRI Chakra Max and get the most protection out of your DB firewall with this instructional video.

Read the full article →

The Formidable but Imperative Task of IoT Security

February 28, 2017 Big Data
Thumbnail image for The Formidable but Imperative Task of IoT Security

The Internet of Things (IoT) continues to grow at an unbelievable rate, and creates tremendous benefits and opportunities for society. With it grows the demand for products and services that control, manage, and protect the massive amounts of data streaming from all those network-connected devices.  But as they provide more and more advantages, and even […]

Read the full article →

How to Run Remote Jobs from IRI Workbench

February 23, 2017 IRI Workbench
Thumbnail image for How to Run Remote Jobs from IRI Workbench

This article covers the creation and use of remote server connections from IRI Workbench so you can run CoSort (Voracity), FACT, NextForm, FieldShield, or RowGen scripts on other computers. IRI Workbench is the graphical IDE client, built on Eclipse™, where you design and manage all IRI software jobs. Depending on your license agreement, your program’s […]

Read the full article →

When to Use Hadoop

February 16, 2017 Big Data
Thumbnail image for When to Use Hadoop

In the last couple of years since this article about the use of IRI CoSort as a parallel data manipulation alternative to Hadoop, IRI released the Voracity platform to process big data in either paradigm. With its “map once, deploy anywhere” capability, Voracity can run many popular jobs for data transformation, masking, and test data […]

Read the full article →