Generating Test Credit Card Numbers
Credit card numbers (CCN) or primary account numbers (PAN) are the string of digits on the front of most credit cards. The major cards here in the United States are 16 digits long. Read More
Credit card numbers (CCN) or primary account numbers (PAN) are the string of digits on the front of most credit cards. The major cards here in the United States are 16 digits long. Read More
Introduction: This example demonstrates an older method of using IRI RowGen to generate and populate large or complex collection prototypes for testing or system capacity using flat files. Read More
Editors Note: This example demonstrates our earliest, least direct (though still available) method of using IRI FieldShield to protect data found within MongoDB tables. As you will read, the MongoDB Export Utility in this case extracts data and create a CSV file that FieldShield masks externally, prior to loading the newly secured data back into MongoDB. Read More
Introduction: As with multiple BI platforms discussed throughout this section of the IRI blog site, this article analyzes the relative data preparation performance (and benefit) of using its external data wrangling engine – via the IRI CoSort product or Voracity platform — with QlikView when ‘big data’ sources are involved. Read More
In the course of legacy platform and/or application migration, COBOL users often need to convert their binary and index files into a human-readable, ASCII-numeric target. One of these older formats is the ACUCOBOL Vision1 file, which we discussed previously in this article. Read More
Introduction: As with multiple BI platforms discussed throughout this section of the IRI blog site, this article analyzes the relative data preparation performance (and benefit) of IRI CoSort with Tibco Spotfire when ‘big data’ sources are involved. Read More
Among analytic tools for statistical computation and graphics, R has shown an increase in popularity among data miners, and in the development of its open source language. Read More
Introduction: This example demonstrates an older method of using IRI FieldShield to protect sensitive data prior to indexing the data in Splunk. As you will read, FieldShield would process the data outside of Splunk and create a CSV file for Splunk’s ingestion. Read More
The “Multi-Table Migration Wizard” in the DBMS edition of IRI NextForm software moves data from one database to another, multiple tables at a time. IRI Voracity platform users can also make use of this feature. Read More
This is an introduction to IRI CellShield. Subsequent blogs will demonstrate the different functions in CellShield: data masking, encryption, and pseudonymization. If you’re interested in finding, classifying, or masking PII in databases or flat files, check out IRI FieldShield. Read More
Introduction This is my third installment of blog articles about Data Quality. In the first article, I postulated that data has quality when it has an acceptable level of errors. Read More