The Use of Data Lakes
Has your organization considered using a data lake? This article explains what a data lake is, and posits a data lake architecture optimized for analytic results. Read More
Has your organization considered using a data lake? This article explains what a data lake is, and posits a data lake architecture optimized for analytic results. Read More
Very large legacy IT vendors, or what we’ll call megavendors, provide valuable hardware, software, and services to companies worldwide. Often however, their technical approach, product roadmap, and price point will not be the best fit for your use case. Read More
Update Q3’2019: Subsequent to the development of the IRI Voracity Add-On for Splunk described below, there is now also a Splunkbase-registered IRI Voracity App for Splunk available for Seamless Data Preparation, Indexing, and Visualization…
After our first examples of external unstructured data preparation and PII data masking for Splunk generated interest in these capabilities, IRI wanted to develop a direct integration from the Splunk user interface (UI). Read More
Linear regression is a staple data analysis function for financial, economic, research, and many other disciplines, that helps discover new data correlations. Users of the IRI Voracity platform can now simultaneously process big data from any number of sources and present customized trend lines to help business users make predictions. Read More
“Progress is impossible without change, and those who cannot change their minds cannot change anything.”
-George Bernard Shaw
The mathematical symbol for change is the Greek uppercase letter delta: Δ. Read More
Note: This example demonstrates a more direct method of using IRI FieldShield or IRI Voracity to statically mask PII within structured MongoDB collections. Our older how-to-article on indirect data masking of MongoDB through export/mask/import from 2015 is here, and a newer method through MongoDB’s native driver support in CoSort v10 from 2018 is here. Read More
Intelligent. Fierce. Powerful. Fast. Voracious.
Killer whales, or orcas thrive in every world ocean and in many seas. They are intelligent, lively, and highly social creatures that form close, matrilineal groups. Read More
In ancient times, the ability to process and analyze information was invaluable. Greek knowledge of astronomy gave rise to the Antikythera Mechanism, an analog computer with sophisticated bronze gears that predicted astronomical events like lunar phases and eclipses. Read More
IRI provides a software development kit (SDK) to help FieldShield users apply column-level encryption, decryption, hashing, and redaction algorithms in Java and .NET projects for more in-situ or dynamic data masking requirements. Read More
Editors Note / UPDATE: The article below describes an older method of data masking in Cassandra through IRI FieldShield. As of 2023 however, the DarkShield V5 features a purpose-built NoSQL DB API for searching and masking operations in Cassandra, as well as fit-for-purpose graphical wizard in the IRI Workbench GUI for DarkShield that leverages the API for PII protection in Cassandra. Read More
UPDATE: Q1’17: Native JSON file generation, and available JDBC and ODBC drivers for NoSQL RDBs like Cassandra, now provide a more seamless connection than the CSV/import approach shown below. Read More