IRI Blog Articles

Diving Deeper into Data Management

 

 

Learn how to set up IRI Chakra Max and get the most protection out of your DB firewall with this instructional video.

{ 0 comments }

There are times when it is necessary to test with or share data that has elements of personally identifiable information (PII). To comply with data privacy laws and prevent a data breach, you may need to provide data that reflects, and sometimes imparts, critical information, but still protects the PII. This article shows how you […]

{ 0 comments }

Process and Protect HL7 Data with Voracity

June 12, 2017 Data Masking/Protection
Thumbnail image for Process and Protect HL7 Data with Voracity

This article shows how you can use IRI Voracity to rapidly integrate and mask sensitive healthcare data in the HL7 file standard we introduced here. The process begins as HL7 messages are converted into a relational format using Flexter Data Liberator software from Sonra. The output of that process will be an Oracle database — […]

Read the full article →

Unmasking the HL7 Data Standard

May 16, 2017 Data Masking/Protection
Thumbnail image for Unmasking the HL7 Data Standard

In this series of articles, we will describe the semi-structured HL7 file format used in many healthcare industry data storage and processing settings, and show how you can rapidly transform and mask large volumes of HL7 XML messages without writing code. This first article introduces the HL7 standard and explains how HL7 messages are structured […]

Read the full article →

The Formidable but Imperative Task of IoT Security

February 28, 2017 Big Data
Thumbnail image for The Formidable but Imperative Task of IoT Security

The Internet of Things (IoT) continues to grow at an unbelievable rate, and creates tremendous benefits and opportunities for society. With it grows the demand for products and services that control, manage, and protect the massive amounts of data streaming from all those network-connected devices.  But as they provide more and more advantages, and even […]

Read the full article →

How to Run Remote Jobs from IRI Workbench

February 23, 2017 IRI Workbench
Thumbnail image for How to Run Remote Jobs from IRI Workbench

This article covers the creation and use of remote server connections from IRI Workbench so you can run CoSort (Voracity), FACT, NextForm, FieldShield, or RowGen scripts on other computers. IRI Workbench is the graphical IDE client, built on Eclipse™, where you design and manage all IRI software jobs. Depending on your license agreement, your program’s […]

Read the full article →

When to Use Hadoop

February 16, 2017 Big Data
Thumbnail image for When to Use Hadoop

In the last couple of years since this article about the use of IRI CoSort as a parallel data manipulation alternative to Hadoop, IRI released the Voracity platform to process big data in either paradigm. With its “map once, deploy anywhere” capability, Voracity can run many popular jobs for data transformation, masking, and test data […]

Read the full article →

Incremental Data Replication in IRI Workbench

December 20, 2016 Data Migration
Thumbnail image for Incremental Data Replication in IRI Workbench

Our first article on data replication in the IRI Workbench GUI for NextForm (DB edition) or Voracity demonstrated how to copy and transform data as it moved from Oracle to two targets. This article shows how to synchronize incrementally a production and backup table in separate databases. In this case, the production database is Oracle, […]

Read the full article →

Creating & Executing SQL Statements in IRI Workbench

December 20, 2016 Big Data
Thumbnail image for Creating & Executing SQL Statements in IRI Workbench

Among the many database-centric features in IRI Workbench is the ability to create, modify, and execute SQL statements. These “SQL scrapbooking” features are available through the free Data Tools Platform (DTP) plug-in for Eclipse, which also supports IRI job wizards for database: profiling, searching, classification, E-R diagramming, and integrity checking integration, including ETL, pivoting, slowly […]

Read the full article →

Data Security Governance

December 1, 2016 Data Masking/Protection
Thumbnail image for Data Security Governance

The Latest Data Risk Landscape It’s the end of 2016, and enterprise data continues to change rapidly in form, size, use, and residence. Rarely does it remain in siloed constructs anymore, limited to certain business units or untouched by the outside world. Data now freely crosses the prior conceived thresholds that limit business potential. It […]

Read the full article →

IoT & IRI – Aggregation on the Edge

November 30, 2016 Big Data
Thumbnail image for IoT & IRI – Aggregation on the Edge

As a follow-on to my introduction to IoT and MQTT, this article describes how device data collected from standard climate sensors and sent through an MQTT (Message Queuing Telemetry Transport) server can be rapidly and inexpensively pre-aggregated by a single SortCL program (in IRI CoSort) on a tiny edge device or gateway. The resulting data […]

Read the full article →