Data masking is one method to combat the nearly 72,000 documented breaches of personally identifiable information (PII) that occur every day. With data privacy breaches still at unacceptably high levels, how can companies protect PII such as their national ID numbers across their myriad sources of data?
The Social Security Number (SSN) in the United States is similar to many other forms of national identification around the world, such that it is a number or set of characters that is designated to a citizen or person who has entered the country for an extended stay on a visa.
Big Data Problem Big data volumes are growing exponentially. This phenomenon has been happening for years, but its pace has accelerated dramatically since 2012. Check out this blog entitled Big Data Just Beginning to Explode from CSC for a similar viewpoint on the emergence of big data and the challenges related thereto.
Database Test Data Usage – This blog caught my eye because of its title, Do the right thing when testing with production data. It struck me as oxymoronic, since we know production data should not be used for testing at all …
Of course we know how tempting it is to use production data for testing applications, simulating databases, prototyping ETL operations, and just about anything else that needs to work with the real thing.
Data migration is done using NextForm; IRI’s data migration utility for converting large files into different formats and/or translating field-level data into other types. The current version converts between uniform XML and text files, LDIF and CSV, Vision and ISAM, MF COBOL variable-length files and Excel, etc.
A pivot transformation turns multiple rows of data into one, denormalizing a data set into a more compact version by rotating the input data on a column value.
Data Management and Protection Expertise – IRI Professional Services Now Open
In response to customer requests for bespoke applications across a broad range of data processing requirements, IRI now has an in-house business unit for the implementation of custom data transformation, ad hoc reporting, and data security solutions.