Data Storage Startup Acunu Raises $3.6 Million To Launch Its First Product

Data Storage Startup Acunu Raises $3.6 Million  To Launch Its First Product

London-based startup Acunu managed to secure USD 3.6 million in a Series A funding, provided by UK’s venture capital companies Eden Ventures, Oxford Technology Management and Pentech Ventures LLP, intended to help the company launch its first data storage product. The company’s software is still in private beta and a small number of undisclosed companies in the cloud computing, advertising, and social media business segments are running the software on commodity servers, Acunu said in a press release.

Acunu’s software is optimized to help solid drives act as a more efficient bridge between expensive, in-memory RAM and cheap-but-slow hard disks. The company bets on a technology that rewrites software stack for SSDs since modern applications require quick access to large amounts of data stored in memory or on memcached servers or SSDs near the web server. The software kernel uses a modified version of the Cassandra database for input and allows for multiple queries on distributed databases,
giving customers a unified view of the databases, which is advantageous for companies with multiple data stores located around the globe.

The Acunu Storage Platform is a software product dealing with “Big Data”, or very large amounts of data, combining existing Big Data tools with a cardinal re-architecture of the storage stack, making commodity storage much more faster than high-end conventional databases.

“Acunu tackles some of the hardest challenges in Big Data, both for startups and for large enterprises, reducing time to market and increasing performance. This funding will support our growth and speed  the adoption of our technology,” Tim Moreton, CEO of Acunu, was quoted as saying by Businesswire.

The company was founded in 2009 and its total funding stands at USD 5 million with backing form UK’s government agencies The Carbon trust and Finance Southeast. Acunu’s solution can be deployed in own data centers of enterprises and government agencies as well as in the cloud, allowing customers to meet growing storage demands with fewer computers and save on energy.
The company is founded and managed by Oxford and Cambridge researchers who are developing an open, fast and flexible storage engine based on patented algorithms. The Acunu Storage Platform, now open for public beta testing, features a powerful management interface for scale-out deployment and cluster management. Initially, the storage platform will be used to power Apache Cassandra and an Amazon S3 -compatible store, the company revealed.

The Acunu Storage Platform is open software running on clusters of commodity machines, allowing users’ application to run unmodified while providing a great number of open source tools to customers. Extensible tools for deploying, managing and monitoring the whole stack are also available.The Acunu Storage Core, an open source next-generation storage stack, runs inside the Linux Kernel, powering databases like Acunu’s Distribution for Cassandra through a native key-value interface.
The company claims that benefits include performance from large cost-effective SATA disks and consumer-grade SSDs as well as enhanced data integrity. Risk and performance impact of disk rebuilds are eliminated by the product, Acunu insists.

Developers will rest satisfied with a familiar interface in view of the fact that Acunu uses a modified version of Apache Cassandra, an open-source database based on systems utilized at Google, Amazon and Facebook.

The company did not elaborate when the product will be officially launched, however, we could expect it to come to life in late-2011. Obviously, more detailed analysis of Acunu’s product should be conducted after the public beta testing progresses to a level where a critical mass of beta-testers is accumulated.

By Kiril Kirilov

Sorry, comments are closed for this post.

Comic
How Identity Governance Can Secure The Cloud Enterprise

How Identity Governance Can Secure The Cloud Enterprise

Securing The Cloud Enterprise Cloud adoption is accelerating for most enterprises, and cloud computing is becoming an integral part of enterprise IT and security infrastructure. Based on current adoption trends, it’s clear that the vast majority of new applications purchased by organizations will be SaaS applications. The allure is evident, from cost savings to speed…

Significant Emerging Technologies To Lookout For In 2017

Significant Emerging Technologies To Lookout For In 2017

Emerging Technologies The entire world is being transformed right before our eyes. Emerging technologies are developing at break-neck speeds, and the global community needs to be prepared for what lies in the horizon. As with anything new or evolving there is benefit versus risk to consider. Most of the up-and-coming technologies that will soon affect…

In The Fast Lane: Connected Car Hacking A Big Risk

In The Fast Lane: Connected Car Hacking A Big Risk

Connected Car Hacking Researchers and cybersecurity experts working hard to keep hackers out of the driver’s seat. Modern transportation has come a million miles, and most all of today’s vehicles are controlled entirely by digital technology. Millions of drivers are not aware that of the many devices in their digital arsenal, the most complex of…

Having Your Cybersecurity And Eating It Too

Having Your Cybersecurity And Eating It Too

The Catch 22 The very same year Marc Andreessen famously said that software was eating the world, the Chief Information Officer of the United States was announcing a major Cloud First goal. That was 2011. Five years later, as both the private and public sectors continue to adopt cloud-based software services, we’re interested in this…

Building a Data Security Strategy – More Important Than Ever

Building a Data Security Strategy – More Important Than Ever

Data Security Strategy Article sponsored by SAS Software and Big Data Forum Security and privacy have been an integral concern of the IT industry since its very inception, but as it expands through web-based, mobile, and cloud-based applications, access to data is magnified as are the threats of illicit penetration. As enterprises manage vast quantities…

Ending The Great Enterprise Disconnect

Ending The Great Enterprise Disconnect

Five Requirements for Supporting a Connected Workforce It used to be that enterprises dictated how workers spent their day: stuck in a cubicle, tied to an enterprise-mandated computer, an enterprise-mandated desk phone with mysterious buttons, and perhaps an enterprise-mandated mobile phone if they traveled. All that is history. Today, a modern workforce is dictating how…

How You Can Improve Customer Experience With Fast Data Analytics

How You Can Improve Customer Experience With Fast Data Analytics

Fast Data Analytics In today’s constantly connected world, customers expect more than ever before from the companies they do business with. With the emergence of big data, businesses have been able to better meet and exceed customer expectations thanks to analytics and data science. However, the role of data in your business’ success doesn’t end…

5% Of Companies Have Embraced The Digital Innovation Fostered By Cloud Computing

5% Of Companies Have Embraced The Digital Innovation Fostered By Cloud Computing

Embracing The Cloud We love the stories of big complacent industry leaders having their positions sledge hammered by nimble cloud-based competitors. Saleforce.com chews up Oracle’s CRM business. Airbnb has a bigger market cap than Marriott. Amazon crushes Walmart (and pretty much every other retailer). We say: “How could they have not seen this coming?” But, more…

Are Cloud Solutions Secure Enough Out-of-the-box?

Are Cloud Solutions Secure Enough Out-of-the-box?

Out-of-the-box Cloud Solutions Although people may argue that data is not safe in the Cloud because using cloud infrastructure requires trusting another party to look after mission critical data, cloud services actually are more secure than legacy systems. In fact, a recent study on the state of cloud security in the enterprise market revealed that…

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

The 80-20 Rule For Security Practitioners  Everyday we learn about yet another egregious data security breach, exposure of customer data or misuse of data. It begs the question why in this 21st century, as a security industry we cannot seem to secure our most valuable data assets when technology has surpassed our expectations in other regards.…

Cloud Infographic – The Data Scientist

Cloud Infographic – The Data Scientist

Data Scientist Report The amount of data in our world has been exploding in recent years. Managing big data has become an integral part of many businesses, generating billions of dollars of competitive innovations, productivity and job growth. Forecasting where the big data industry is going has become vital to corporate strategy. Enter the Data…

How Data Science And Machine Learning Is Enabling Cloud Threat Protection

How Data Science And Machine Learning Is Enabling Cloud Threat Protection

Data Science and Machine Learning Security breaches have been consistently rising in the past few years. Just In 2015, companies detected 38 percent more security breaches than in the previous year, according to PwC’s Global State of Information Security Survey 2016. Those breaches are a major expense — an average of $3.79 million per company,…

Explosive Growth Of Data-Driven Marketing

Explosive Growth Of Data-Driven Marketing

Data-Driven Marketing There is an absolute endless amount of data that is being accumulated, dissected, analyzed with the important bits extracted and used for a number of purposes. With the amount of data in the world has already reached into multiple zettabytes annually. A Zettabyte is one million petabytes or one thousand exabytes. With data…

Utilizing Digital Marketing Techniques Via The Cloud

Utilizing Digital Marketing Techniques Via The Cloud

Digital Marketing Trends In the past, trends in the exceptionally fast-paced digital marketing arena have been quickly adopted or abandoned, keeping marketers and consumers on their toes. 2016 promises a similarly expeditious temperament, with a few new digital marketing offerings taking center stage. According to Gartner’s recent research into Digital Marketing Hubs, brands plan to…

Cloud Infographic – Cloud Public, Private & Hybrid Differences

Cloud Infographic – Cloud Public, Private & Hybrid Differences

Cloud Public, Private & Hybrid Differences Many people have heard of cloud computing. There is however a tremendous number of people who still cannot differentiate between Public, Private & Hybrid cloud offerings.  Here is an excellent infographic provided by the group at iWeb which goes into greater detail on this subject. Infographic source: iWeb

6 Tech Predictions To Have A Major Impact In 2016

6 Tech Predictions To Have A Major Impact In 2016

6 Tech Predictions To Have A Major Impact The technology industry moves at a relentless pace, making it both exhilarating and unforgiving. For those at the forefront of innovation it is an incredibly exciting place to be, but what trends are we likely to see coming to the fore in 2016? Below are six predictions…