IRI Reflects on 55 Years of Unix
Unix first operating system was revealed by AT&T Bell Labs engineers Ken Thompson, Brian Kernighan, and Dennis Ritchie in September 1969 on a DEC PDP-7 minicomputer. Read More
Unix first operating system was revealed by AT&T Bell Labs engineers Ken Thompson, Brian Kernighan, and Dennis Ritchie in September 1969 on a DEC PDP-7 minicomputer. Read More
Data at Rest is Data at Risk. Mitigate the Risk through Data-Centric Security
Data Risk Mitigation … the need for it is on the rise in the United States and around the globe. Read More
Data privacy breaches are becoming more and more prevalent and common in the United States today. Â Did you know that on average, as many as 72,000 documented breaches of personally identifiable information (i.e. Read More
What is business intelligence, and why is its rapid creation and delivery important?
Business intelligence, or BI, refers to computer-based techniques used in identifying, extracting and analyzing business data. Read More
This demonstration shows how to use IRI FieldShield in Workbench to create a script to protect personally identifying information (PII) at the field level. Masking functions and encryption algorithms are applied to separate fields in a database in the same pass. Read More
IRI FieldShield is a proven, best-in-class data-centric security package for classifying, finding, and masking personally identifying information (PII) and other sensitive data in database columns and flat-file fields. Read More
IRI Voracity is an affordable data management platform that streamlines information architectures and helps enterprises leverage the intrinsic value of data without the cost or complexity of multiple tools. Read More
This video is a demonstration of using IRI Workbench to apply format preserving encryption (FPE) and pseudonymization to select fields in a data file to protect personally identifiable information (PII) and protected health information (PHI). Read More
Here is an overview of how IRI uses IRI CoSort as a processing engine to deliver faster business intelligence (BI) results and analytic capabilities. As you can see, there are three distinctive processes that are possible. Read More
BI and analytic tools cannot handle the volume, variety, velocity, and veracity challenges of big data. Today there are many ways to prepare (franchise) that data into the subsets that visualization platforms can ingest, but each typically involves trade-offs between performance, price, and capability. Read More