
Masking PANs in Credit Card Images
Abstract: Previously the DarkShield API for Files could perform black-box redaction of primary account numbers (PANs, also known as CCNs) on credit cards only within defined areas in the image . Read More
Abstract: Previously the DarkShield API for Files could perform black-box redaction of primary account numbers (PANs, also known as CCNs) on credit cards only within defined areas in the image . Read More
Public and private cloud file systems are becoming increasingly popular places for businesses and government agencies to store their data. Several major competitors have arisen in the cloud storage provider space, with Amazon, Microsoft Azure, and Google Cloud Platform at the top. Read More
Connecting the Microsoft Access database to IRI Workbench and the back-end SortCL data processing program to exploit the many data manipulation and management capabilities of Voracity platform software is a simple process. Read More
This article demonstrates how to use IRI Workbench to facilitate the creation of new relational database tables for database schema management, database data migration tools like IRI NextForm, or other IRI management product operations such as:
IRI FieldShield to read flat-file or table data, mask it, and write it into new tables IRI CoSort to wrangle data and populate staging tables for ETL or wrangled views for analytics IRI RowGen to subset data, or synthesize data from scratch, into empty tables based on DDL info IRI Voracity to extract, transform, and load data from existing sources to new targetsThanks to the enhanced Data Tools Platform (DTP) interface, IRI Workbench users can easily create and use Structured Query Language (SQL) to build tables and run SQL jobs. Read More
Data flowing through application development, machine learning, and analytic pipelines must address several needs common to all three, including:
Realism, to reflect production data characteristics and application test requirements; Compliance, with business and data privacy rules, plus DB and analytic models; Availability, or security, of the data (depending on your perspective); and, Auditability, for lineage and accountability. Read MoreIn this article we will discuss how HL7 and X12 messages are structured, and demonstrate how to use the IRI RowGen test data generation software package to generate realistic messages in those (primarily healthcare-related) EDI file formats. Read More
IRI DarkShield has always had the ability to search through and mask Personally Identifiable Information (PII) and other sensitive data in unstructured sources like PDF documents and image files. Read More
Named entity recognition (NER) is a type of machine learning (ML) used to detect named entities within the grammatical context of unstructured text (documents). NER is needed to find things like people names and street addresses, since those do not conform to patterns, nor likely have a match to values in a defined list (lookup set). Read More
This Jenkins entry is the fourth in a series of articles on the use of IRI test data management software – that masks, synthesizes, or subsets data – to feed safe, referentially correct test data for DevOps to CI/CD environments. Read More
This is the third addition to our 4-article DevOps pipeline series. Here are the links to related DevOps articles for Jenkins, GitLab and AWS CodePipeline. Read More
Editor’s Note: This article covers the discovery and de-identification of PII and other sensitive data in semi-structured or unstructured files stored in AWS S3 buckets, GCP folders, and Azure Blob Storage, via the IRI DarkShield API for files. Read More