Abstract: IRI and DataSwitch have partnered to create an end-to-end, multi-featured metadata and data engineering environment to: modernize legacy data and ETL jobs, create and orchestrate data mapping operations with AI, mask PII on the fly, and wrangle data in business-friendly ways for analytics.
Abstract: Now that XLS and XLSX files are now also directly supported in IRI FieldShield by virtue of their new /PROCESS (format) support in the CoSort 10.5 SortCL program, IRI Voracity data management platform and standalone data masking users have three different ways to “shield” sensitive data in their spreadsheets.
The names of IRI software products and how they run have at times been a source of mystery, or even confusion, to the uninitiated. This article spells out the pieces and clarifies their interplay, providing a quick primer for prospective users, partners, and new industry analysts.
According to Simson L. Garfinkel at the NIST Information Access Division’s Information Technology Laboratory,
De-identification is not a single technique, but a collection of approaches, algorithms, and tools that can be applied to different kinds of data with differing levels of effectiveness.
For the last 30 or so years, the precursor to most large scale business intelligence (BI) environments has been the Enterprise Data Warehouse (EDW). A data warehouse (DW) is usually a central database (DB) for reporting, planning, and analyzing summarized, subject-matter data integrated from disparate, historical transaction sources.