IBM To Acquire Aspera To Help Companies Speed Global Movement Of Big Data

IBM To Acquire Aspera To Help Companies Speed Global Movement Of Big Data

IBM to Acquire Aspera to Help Companies Speed Global Movement of Big Data

aspera

New Capabilities Allow Organizations To Reduce Transfer Time For Large Data Files From Hours To As Little As Seconds

ARMONK, N.Y. – 19 December 2013: IBM (NYSE: IBM) today announced a definitive agreement to acquire Emeryville, CA-based Aspera, Inc. Aspera’s technology helps companies securely speed the movement of massive data files around the world. Financial terms of the deal were not disclosed.

Licensed to clients and partners either in the cloud or on premise, Aspera’s high-speed transfer technology reduces transmission times for large files or data sets by up to 99.9 percent – potentially cutting a 26 hour transfer of a 24 gigabyte file, sent halfway around the world, down to just 30 seconds.  Aspera’s patented fasp™ technology overcomes inherent bottlenecks in broadband wide area networks that slow the transfer of extremely large files, such as high-definition video or scientific research files, over distance.

Companies today are struggling to manage increasing volumes of structured and unstructured data created by everything from sensors to social media. They must accelerate the velocity of sending and receiving this data to improve competitiveness in a variety of ways – including the ability to more quickly uncover valuable business insights, bring products to market faster and improve employee productivity. This becomes even more critical with the growing adoption of cloud computing, where companies need a more effective way to transport extremely large files to and from cloud platforms. Aspera moves Big Data to, from and within the cloud faster than traditional methods while providing security, bandwidth control and predictability.

Aspera solutions solve data transfer problems across numerous industries and scenarios such as: 

·        Life sciences organizations sharing genomic data in the quest to find the next medical breakthrough;
·        Media companies shortening production cycles or uploading hit television shows and blockbuster movies to popular consumer streaming services;
·        Gaming companies receiving the latest software build from third party developers to enable rapid game development;
·        Any individual within an enterprise trying to share and synchronize large files over distance between multiple devices such as a laptop, mobile phone or tablet.

Our experience working with thousands of clients on Big Data projects tells us that companies can better compete and win when they can quickly extract value from massive volumes of data,” said John Mesberg, Vice President, B2B and Commerce Solutions, IBM. “With this acquisition, IBM addresses a key challenge for globally integrated enterprises by allowing them to move large data files much faster to the individuals who need them, wherever in the world they may be.”

Our team has redefined how the world’s biggest data can be moved quickly, securely and reliably around the world,” said Michelle Munson, president and co-founder, Aspera. “By tapping into IBM’s innovative capabilities and global resources, we will solve ever expanding data movement challenges for our customers now and in the future.”

Aspera advances the transfer of large files where traditional network protocols limit speed and reliability. Typical data transfers over TCP/IP are hampered by network delays or packet loss, even over the fastest broadband networks. Aspera’s fasp protocol delivers the industry’s fastest transmission speeds over any network link regardless of file size, transfer distance or network conditions. Aspera ensures secure encryption of the files in transit or at rest.

By combining Aspera with the power of cloud computing, customers have a practical way to transport big data files to and from the cloud. Aspera makes cloud computing even faster, more predictable and more cost effective for big data transfers such as enterprise storage backup, sharing virtual images or bursting to the cloud for increased computing capacity. Its fasp technology is licensed to many leading cloud computing services and will be integrated with IBM’s recently acquired SoftLayer cloud infrastructure later next year.

This acquisition builds on IBM’s Smarter Commerce initiative by allowing businesses to accelerate their digital supply chains between partners and suppliers. This also extends IBM’s market-leading capabilities in Managed File Transfer with a complementary set of capabilities to help enterprises further gain control and oversight of their data transfers.

Aspera recently received an Emmy® award for Outstanding Achievement in Engineering Development in recognition of its fasp protocol. The academy commented that fasp is an “an industry game changer” used by “virtually all the major broadcast television networks, Hollywood studios and CG/animation houses.”

The acquisition of Aspera is subject to customary closing conditions and is expected to close in the first quarter 2014.

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Comic
HOW THE CFAA RULING AFFECTS INDIVIDUALS AND PASSWORD-SHARING

HOW THE CFAA RULING AFFECTS INDIVIDUALS AND PASSWORD-SHARING

Individuals and Password-Sharing With the 1980s came the explosion of computing. In 1980, the Commodore ushered in the advent of home computing. Time magazine declared 1982 was “The Year of the Computer.” By 1983, there were an estimated 10 million personal computers in the United States alone. As soon as computers became popular, the federal government…

Having Your Cybersecurity And Eating It Too

Having Your Cybersecurity And Eating It Too

The Catch 22 The very same year Marc Andreessen famously said that software was eating the world, the Chief Information Officer of the United States was announcing a major Cloud First goal. That was 2011. Five years later, as both the private and public sectors continue to adopt cloud-based software services, we’re interested in this…

Using Cloud Technology In The Education Industry

Using Cloud Technology In The Education Industry

Education Tech and the Cloud Arguably one of society’s most important functions, teaching can still seem antiquated at times. Many schools still function similarly to how they did five or 10 years ago, which is surprising considering the amount of technical innovation we’ve seen in the past decade. Education is an industry ripe for innovation…

Security: Avoiding A Hatton Garden-Style Data Center Heist

Security: Avoiding A Hatton Garden-Style Data Center Heist

Data Center Protection In April 2015, one of the world’s biggest jewelry heists occurred at the Hatton Garden Safe Deposit Company in London. Posing as workmen, the criminals entered the building through a lift shaft and cut through a 50cm-thick concrete wall with an industrial power drill. Once inside, the criminals had free and unlimited…

Digital Twin And The End Of The Dreaded Product Recall

Digital Twin And The End Of The Dreaded Product Recall

The Digital Twin  How smart factories and connected assets in the emerging Industrial IoT era along with the automation of machine learning and advancement of artificial intelligence can dramatically change the manufacturing process and put an end to the dreaded product recalls in the future. In recent news, Samsung Electronics Co. has initiated a global…

Four Keys For Telecoms Competing In A Digital World

Four Keys For Telecoms Competing In A Digital World

Competing in a Digital World Telecoms, otherwise largely known as Communications Service Providers (CSPs), have traditionally made the lion’s share of their revenue from providing pipes and infrastructure. Now CSPs face increased competition, not so much from each other, but with digital service providers (DSPs) like Netflix, Google, Amazon, Facebook, and Apple, all of whom…

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups Cloud platforms have become a necessary part of modern business with the benefits far outweighing the risks. However, the risks are real and account for billions of dollars in losses across the globe per year. If you’ve been hacked, you’re not alone. Here are some other companies in the past…

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And Virtual Reality This is a term I created (Virtual Immersion). Ah…the sweet smell of Virtual Immersion Success! Virtual Immersion© (VI) an extension/expansion of Virtual Reality to include the senses beyond visual and auditory. Years ago there was a television commercial for a bathing product called Calgon. The tagline of the commercial was Calgon…

6 Tech Predictions To Have A Major Impact In 2016

6 Tech Predictions To Have A Major Impact In 2016

6 Tech Predictions To Have A Major Impact The technology industry moves at a relentless pace, making it both exhilarating and unforgiving. For those at the forefront of innovation it is an incredibly exciting place to be, but what trends are we likely to see coming to the fore in 2016? Below are six predictions…

Infographic: IoT Programming Essential Job Skills

Infographic: IoT Programming Essential Job Skills

Learning To Code As many readers may or may not know we cover a fair number of topics surrounding new technologies such as Big data, Cloud computing , IoT and one of the most critical areas at the moment – Information Security. The trends continue to dictate that there is a huge shortage of unfilled…

10 Trending US Cities For Tech Jobs And Startups

10 Trending US Cities For Tech Jobs And Startups

10 Trending US Cities For Tech Jobs And Startups Traditionally actors headed for Hollywood while techies made a beeline for Silicon Valley. But times are changing, and with technological job opportunities expanding (Infographic), new hotspots are emerging that offer fantastic opportunities for tech jobs and startup companies in the industry. ZipRecruiter, an online recruitment and job…

Four Reasons Why CIOs Must Transform IT Into ITaaS To Survive

Four Reasons Why CIOs Must Transform IT Into ITaaS To Survive

CIOs Must Transform IT The emergence of the Cloud and its three delivery models of Infrastructure as a Service (IaaS), Software as a Service (SaaS) and Platform as a Service (PaaS) has dramatically impacted and forever changed the delivery of IT services. Cloud services have pierced the veil of IT by challenging traditional method’s dominance…

Internet Of Things – Industrial Robots And Virtual Monitoring

Internet Of Things – Industrial Robots And Virtual Monitoring

Internet Of Things – Industrial Robots And Virtual Monitoring One of the hottest topics in Information and Communication Technology (ICT) is the Internet of Things (IOT). According to the report of International Telecommunication Union (2012), “the Internet of things can be perceived as a vision with technological and societal implications. It is considered as a…

Cloud Computing – The Real Story Is About Business Strategy, Not Technology

Cloud Computing – The Real Story Is About Business Strategy, Not Technology

Enabling Business Strategies The cloud is not really the final destination: It’s mid-2015, and it’s clear that the cloud paradigm is here to stay. Its services are growing exponentially and, at this time, it’s a fluid model with no steady state on the horizon. As such, adopting cloud computing has been surprisingly slow and seen more…

Big Data’s Significant Role In Fintech

Big Data’s Significant Role In Fintech

Data Banking Fintech covers a range of financial fields such as retail banking, investments, and lending and thanks to the mobile and internet innovations of late is a thriving sector. Offering improvements which drive customer satisfaction and education in an area previously inscrutable and dictated by gigantic inflexible corporations, fintech is helping put the power…

Battle of the Clouds: Multi-Instance vs. Multi-Tenant

Battle of the Clouds: Multi-Instance vs. Multi-Tenant

Multi-Instance vs. Multi-Tenant The cloud is part of everything we do. It’s always there backing up our data, pictures, and videos. To many, the cloud is considered to be a newer technology. However, cloud services actually got their start in the late 90s when large companies used it as a way to centralize computing, storage,…

Infographic: 9 Things To Know About Business Intelligence (BI) Software

Infographic: 9 Things To Know About Business Intelligence (BI) Software

Business Intelligence (BI) Software  How does your company track its data? It’s a valuable resource—so much so that it’s known as Business Intelligence, or BI. But using it, integrating it into your daily processes, that can be significantly difficult. That’s why there’s software to help. But when it comes to software, there are lots of…

Cukes and the Cloud

Cukes and the Cloud

The Cloud, through bringing vast processing power to bear inexpensively, is enabling artificial intelligence. But, don’t think Skynet and the Terminator. Think cucumbers! Artificial Intelligence (A.I.) conjures up the images of vast cool intellects bent on our destruction or at best ignoring us the way we ignore ants. Reality is a lot different and much…

Ransomware’s Great Lessons

Ransomware’s Great Lessons

Ransomware The vision is chilling. It’s another busy day. An employee arrives and logs on to the network only to be confronted by a locked screen displaying a simple message: “Your files have been captured and encrypted. To release them, you must pay.” Ransomware has grown recently to become one of the primary threats to…