
Run Remote Linux Jobs from IRI Workbench
This article demonstrates how you can run SortCL-compatible jobs configured in your local Linux IRI Workbench on a remote Linux machine with a licensed CoSort SortCL executable. Read More
This article demonstrates how you can run SortCL-compatible jobs configured in your local Linux IRI Workbench on a remote Linux machine with a licensed CoSort SortCL executable. Read More
Healthcare providers, medical researchers, and other “business associates” collect and process sensitive data on patients, which HIPAA law classifies as protected health information (PHI). Because PHI is stored and shared in databases, clinical notes, imaging studies, treatment forms, and EDI (claim) formats – both on-premise and in the cloud – safeguarding it by finding and de-identifying it can be a complex, time-consuming challenge. Read More
A data masking tool can be an effective, if not essential, way to protect sensitive information stored in files and databases. As the numbers of data breaches, lawsuits, and data privacy laws continue to grow, companies must find ways to anonymize production and test data without sacrificing its utility for analytics, research, marketing, or development. Read More
The Banking, Financial Services, and Insurance (BFSI) industry handles huge amounts of personally identifiable information (PII) and sensitive financial data each day. This data ranges from NID, account information and credit scores to financial transactions and loan documents. Read More
Threats of data breaches and cyberattacks have intensified over the years. In 2025 alone, the total damage cost is already forecast to reach up to $10.5 trillion. Read More
Abstract: Adopting a data mesh approach represents a contemporary solution to the challenges faced by traditional centralized data management systems. This article summarizes what data mesh architecture is about, and how you can leverage its key benefits using the IRI Voracity platform. Read More
This article demonstrates the Voracity user’s ability to join values in a flat-file file to those in an RDB (Relational Database) table to provide meaningful information. Read More
To configure both JDBC and ODBC to support the Transport Layer Security (TLS) protocol, there are additional configuration steps that are needed when compared to this previous article. Read More
Corporations and government agencies store a lot of useful information in non-transactional semi-structured and unstructured data sources. Finding that data – in documents, logs, and images – is important not only for data masking, but also for textual ETL. Read More
Since SQL Server has changed the functionality and default behavior of their driver, this article will go over the basic ODBC and JDBC connections required for the IRI software backend (CoSort SortCL engine in Voracity) and job design front-end (IRI Workbench, respectively, to Microsoft SQL Server databases on-premise or in the cloud which use encrypted connections. Read More
The enactment of the Digital Personal Data Protection Act (DPDPA) 2023 on August 11, 2023, marks a significant evolution in India’s data protection landscape. This new legislation introduces stringent requirements for the management and protection of personal data and tries to balance individual rights and organizational responsibilities. Read More