Creating Test Data for MongoDB
Introduction: This example demonstrates an older method of using IRI RowGen to generate and populate large or complex collection prototypes for testing or system capacity using flat files. Read More
Introduction: This example demonstrates an older method of using IRI RowGen to generate and populate large or complex collection prototypes for testing or system capacity using flat files. Read More
This is an introduction to the IRI CellShield data masking tool designed specifically for PII protection in Excel. Subsequent blog articles demonstrate the different functions in CellShield: data masking, encryption, and pseudonymization. Read More
Editors Updates: Q2’16: In addition to the database profiling wizard in the data discovery menu group in IRI Workbench described below, IRI has introduced robust data classification that enables the application of field rules for multi-source data transformation and protection through data class libraries. Read More
Data architects and data scientists, as well as DBAs and governance teams, may need to use or migrate data in legacy file formats and databases. Additionally, the ability to mash-up those sources with newer file and database repositories is important in data integration (ETL) and analytic projects, as well as in data profiling for data loss prevention and privacy law compliance. Read More
This is the last in a four-part series to introduce IRI CellShield. An overview is found here. The following parts demonstrate how to use the other functions in CellShield: data masking and encryption. Read More
This is the third in a four-part series describing IRI CellShield data masking software for Excel, and its format-preserving encryption function in particular; the series overview starts here. Read More
This is the second in a four-part series to introduce IRI CellShield. An overview is found here. The other parts demonstrate how to use more functions in CellShield like encryption and pseudonymization. Read More
This article is second in a 3-part series on using IRI products to expand functionality and improve performance in Pentaho systems. We first demonstrate how to improve sorting performance, and then introduce ways to mask production data, and create test data, in the Pentaho Data Integration (PDI) environment. Read More
This article is third in a 3-part series on CLF and ELF web log data. We first introduced CLF and ELF web log formats, then introduced IRI solutions for processing web log data, and here we conclude by masking private data in web log files. Read More
Abstract: Amid the still-growing problem of data breaches, and new v3 requirements of the Payment Card Industry Data Security Standard (PCI DSS) in effect, it has never been more important to protect sensitive data properly. Read More
Data Privacy on Fire For the past 20 years or so, data breach headlines continue to capture public and legal attention. Significant data breaches are chronicled at the Privacy Rights Clearinghouse on this page. Read More