
IRI Reflects on 40 Years of Unix
Unix first operating system was revealed by AT&T Bell Labs engineers Ken Thompson, Brian Kernighan, and Dennis Ritchie in September 1969 on a DEC PDP-7 minicomputer. Read More
Unix first operating system was revealed by AT&T Bell Labs engineers Ken Thompson, Brian Kernighan, and Dennis Ritchie in September 1969 on a DEC PDP-7 minicomputer. Read More
Encryption key management is one of the most important “basics” for an organization dealing with security and privacy protection. Major data losses and regulatory compliance requirements have prompted a dramatic increase in the use of encryption within corporate data centers. Read More
Eclipse was originally started by IBM in the late 1990s in response to the need for a common development platform for all IBM products. Read More
This article deals with pseudonymization as one method of de-identifying or anonymizing sensitive data.
The unauthorized use or misuse of our personally identifiable information (or PII) — such as name, social security number, date of birth, mother’s maiden name, place of birth, etc. Read More
It is a common mistake to refer to data masking and data encryption interchangeably to mean the same things. While field-level encryption is considered one of many possible “data masking” functions, we define data masking and encryption as technically distinct processes below. Read More
IRI Voracity is an affordable data management platform that streamlines information architectures and helps enterprises leverage the intrinsic value of data without the cost or complexity of multiple tools. Read More