
Creating Test Data for Cassandra
UPDATE: Q1’17: Native JSON file generation, and available JDBC and ODBC drivers for NoSQL RDBs like Cassandra, now provide a more seamless connection than the CSV/import approach shown below. Read More
UPDATE: Q1’17: Native JSON file generation, and available JDBC and ODBC drivers for NoSQL RDBs like Cassandra, now provide a more seamless connection than the CSV/import approach shown below. Read More
Introduction: This example demonstrates an older method of using IRI RowGen to generate and populate large or complex collection prototypes for testing or system capacity using flat files. Read More
Editors Note: This example demonstrates our earliest, least direct (though still available) method of using IRI FieldShield for NoSQL database protection; i.e., for MongoDB data masking. Read More
Introduction: This example demonstrates an older method of using IRI FieldShield to protect sensitive data prior to indexing the data in Splunk. As you will read, FieldShield would process the data outside of Splunk and create a CSV file for Splunk’s ingestion. Read More
This is an introduction to IRI CellShield. Subsequent blogs will demonstrate the different functions in CellShield: data masking, encryption, and pseudonymization. If you’re interested in finding, classifying, or masking PII in databases or flat files, check out IRI FieldShield. Read More
Editors Updates: Q2’16: In addition to the database profiling wizard in the data discovery menu group in IRI Workbench described below, IRI has introduced robust data classification that enables the application of field rules for multi-source data transformation and protection through data class libraries. Read More
Data architects and data scientists, as well as DBAs and governance teams, may need to use or migrate data in legacy file formats and databases. Additionally, the ability to mash-up those sources with newer file and database repositories is important in data integration (ETL) and analytic projects, as well as in data profiling for data loss prevention and privacy law compliance. Read More
This is the last in a four-part series to introduce IRI CellShield. An overview is found here. The following parts demonstrate how to use the other functions in CellShield: data masking and encryption. Read More
This is the third in a four-part series describing IRI CellShield data masking software for Excel, and its format-preserving encryption function in particular; the series overview starts here. Read More
This is the second in a four-part series to introduce IRI CellShield. An overview is found here. The other parts demonstrate how to use more functions in CellShield like encryption and pseudonymization. Read More
This article is second in a 3-part series on using IRI products to expand functionality and improve performance in Pentaho systems. We first demonstrate how to improve sorting performance, and then introduce ways to mask production data, and create test data, in the Pentaho Data Integration (PDI) environment. Read More