Awesome Image



Data capture & ML consulting services to map out the way to a custom

Worlds leading reinsurance company head- quartered at Munich, Germany.

There was a strong need for reconfiguring their existing Informatica TDM to cater to issues around,
• stability,
• data generation
• connectivity

Processing System

Must explain to you how all this mistaken idea of denouncing pleasure and praising pain was born will give you a complete account of the system pain can procure.

  • Step 01
  • Step 02
  • Step 03
  • Step 04

Step1: Define the problem:

Differentiate fact from opinion.
Specify underlying causes.
Consult each faction involved for information.
State the problem specifically.
Identify what standard or expectation is violated.
Determine in which process the problem lies.
Avoid trying to solve the problem without data.

Step2: Generate solutions:

Postpone evaluating alternatives initially
Include all involved individuals in the generating of alternatives
Specify alternatives consistent with organizational goals
Specify short- and long-term alternatives
Brainstorm on others’ ideas
Seek alternatives that may solve the problem.

Step3: Evaluate:

Evaluate alternative relative to a target standard
Evaluate all alternatives without bias
Evaluate alternatives relative to established goals
Evaluate both proven and possible outcomes
State the selected alternative explicitly.

Step4: Implement:

Plan and implement a pilot test of the chosen alternative
Gather feedback from all affected parties
Seek acceptance or consensus by all those affected
Establish ongoing measures and monitoring
Evaluate long-term results based on a final solution.

Our Approach

DataGridz, validated the pre-requisite towards TDM configuration & installation in production environment. All the performance issues were identified and mitigated. The team shared best practices with the client for deriving maximum ROI from their investment.
The process helped at improving the overall performance on data masking and test data generation, at the same time adhering to deploying necessary secured controls to users