IBM To Acquire Aspera To Help Companies Speed Global Movement Of Big Data

IBM To Acquire Aspera To Help Companies Speed Global Movement Of Big Data

IBM to Acquire Aspera to Help Companies Speed Global Movement of Big Data

aspera

New Capabilities Allow Organizations To Reduce Transfer Time For Large Data Files From Hours To As Little As Seconds

ARMONK, N.Y. – 19 December 2013: IBM (NYSE: IBM) today announced a definitive agreement to acquire Emeryville, CA-based Aspera, Inc. Aspera’s technology helps companies securely speed the movement of massive data files around the world. Financial terms of the deal were not disclosed.

Licensed to clients and partners either in the cloud or on premise, Aspera’s high-speed transfer technology reduces transmission times for large files or data sets by up to 99.9 percent – potentially cutting a 26 hour transfer of a 24 gigabyte file, sent halfway around the world, down to just 30 seconds.  Aspera’s patented fasp™ technology overcomes inherent bottlenecks in broadband wide area networks that slow the transfer of extremely large files, such as high-definition video or scientific research files, over distance.

Companies today are struggling to manage increasing volumes of structured and unstructured data created by everything from sensors to social media. They must accelerate the velocity of sending and receiving this data to improve competitiveness in a variety of ways – including the ability to more quickly uncover valuable business insights, bring products to market faster and improve employee productivity. This becomes even more critical with the growing adoption of cloud computing, where companies need a more effective way to transport extremely large files to and from cloud platforms. Aspera moves Big Data to, from and within the cloud faster than traditional methods while providing security, bandwidth control and predictability.

Aspera solutions solve data transfer problems across numerous industries and scenarios such as: 

·        Life sciences organizations sharing genomic data in the quest to find the next medical breakthrough;
·        Media companies shortening production cycles or uploading hit television shows and blockbuster movies to popular consumer streaming services;
·        Gaming companies receiving the latest software build from third party developers to enable rapid game development;
·        Any individual within an enterprise trying to share and synchronize large files over distance between multiple devices such as a laptop, mobile phone or tablet.

Our experience working with thousands of clients on Big Data projects tells us that companies can better compete and win when they can quickly extract value from massive volumes of data,” said John Mesberg, Vice President, B2B and Commerce Solutions, IBM. “With this acquisition, IBM addresses a key challenge for globally integrated enterprises by allowing them to move large data files much faster to the individuals who need them, wherever in the world they may be.”

Our team has redefined how the world’s biggest data can be moved quickly, securely and reliably around the world,” said Michelle Munson, president and co-founder, Aspera. “By tapping into IBM’s innovative capabilities and global resources, we will solve ever expanding data movement challenges for our customers now and in the future.”

Aspera advances the transfer of large files where traditional network protocols limit speed and reliability. Typical data transfers over TCP/IP are hampered by network delays or packet loss, even over the fastest broadband networks. Aspera’s fasp protocol delivers the industry’s fastest transmission speeds over any network link regardless of file size, transfer distance or network conditions. Aspera ensures secure encryption of the files in transit or at rest.

By combining Aspera with the power of cloud computing, customers have a practical way to transport big data files to and from the cloud. Aspera makes cloud computing even faster, more predictable and more cost effective for big data transfers such as enterprise storage backup, sharing virtual images or bursting to the cloud for increased computing capacity. Its fasp technology is licensed to many leading cloud computing services and will be integrated with IBM’s recently acquired SoftLayer cloud infrastructure later next year.

This acquisition builds on IBM’s Smarter Commerce initiative by allowing businesses to accelerate their digital supply chains between partners and suppliers. This also extends IBM’s market-leading capabilities in Managed File Transfer with a complementary set of capabilities to help enterprises further gain control and oversight of their data transfers.

Aspera recently received an Emmy® award for Outstanding Achievement in Engineering Development in recognition of its fasp protocol. The academy commented that fasp is an “an industry game changer” used by “virtually all the major broadcast television networks, Hollywood studios and CG/animation houses.”

The acquisition of Aspera is subject to customary closing conditions and is expected to close in the first quarter 2014.

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Comic
Investing In The Future With The Introduction of Sage Cloud

Investing In The Future With The Introduction of Sage Cloud

CHICAGO, IL–(Marketwired – Jul 26, 2016) – Sage, a market leader in cloud accounting software, announced today at Sage Summit 2016 its strong commitment to future technologies, with a focus on new and existing partnerships that power business growth. Revealed during CEO Stephen Kelly’s keynote address, which opened the world’s largest gathering of entrepreneurs and…

2016 Tour de France: Racing With Big Data

2016 Tour de France: Racing With Big Data

2016 Tour de France The 2016 Tour de France has just concluded, with Chris Froome (SKY) taking his third overall win. Not the kind of event we often focus on here at CloudTweaks, but Dimension Data has put its analytics technology to use tracking the journeys of each rider across all 21 stages, and their…

Ransomware: A Digital Pandemic – Is There A Cure?

Ransomware: A Digital Pandemic – Is There A Cure?

The Rise Of Ransomware You can imagine the scene: you’ve just completed that business plan and a set of accounts. Finally, it’s done and saved, ready for a final read through and to be sent out to your contact list. And right when you’re ready to click “Send”, the next thing you see on the…

Martech In A Content Crazed World

Martech In A Content Crazed World

Content Crazed World Everywhere you look there are pop-up ads and offers, at times it can feel like overload. What used to be a few online ads on websites has now grown into a wild world of offers that consume your every device. These advancements in marketing technology can not only be overwhelming to the…

Hubgets – Advanced Collaboration, Enriched Communication

Hubgets – Advanced Collaboration, Enriched Communication

Advanced Collaboration Tool Sponsored series provided in collaboration with Hubgets Collaboration tools have advanced leaps and bounds with the advent of cloud technology, and the services available are only getting better. Promising features such as sophisticated group communication, productive management of tasks and meetings, and the ultimate dream, working remotely from some gorgeous island destination, innovative collaboration…

Cloud And The Military – In The US

Cloud And The Military – In The US

Cloud And The Military Scandalous cost overruns; the newest high tech doesn’t work any better than very old tech; sweetheart monopoly deals with favorite defense contractors; sole sourcing key components from our enemies – the litany just goes on and on. The military’s relationship with technology always seems to be like watching a slow motion…

Maintaining Network Performance And Security In Hybrid Cloud Environments

Maintaining Network Performance And Security In Hybrid Cloud Environments

Hybrid Cloud Environments After several years of steady cloud adoption in the enterprise, an interesting trend has emerged: More companies are retaining their existing, on-premise IT infrastructures while also embracing the latest cloud technologies. In fact, IDC predicts markets for such hybrid cloud environments will grow from the over $25 billion global market we saw…

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported…

Shaking Up The Cloud Technology Marketplace

Shaking Up The Cloud Technology Marketplace

Cloud Technology Marketplace Cloud continues its devastating rearrangement of the technology marketplace. As legacy vendors struggle to compete many deck chairs are getting moved about – some pretty spectacularly. In the meantime, the boat is still sinking. We have seen how SaaS (Software as a Service) is tearing up traditional software firms who must adapt…

Multi-Cloud Integration Has Arrived

Multi-Cloud Integration Has Arrived

Multi-Cloud Integration Speed, flexibility, and innovation require multiple cloud services As businesses seek new paths to innovation, racing to market with new features and products, cloud services continue to grow in popularity. According to Gartner, 88% of total compute will be cloud-based by 2020, leaving just 12% on premise. Flexibility remains a key consideration, and…

Cloud Infographic – Big Data Analytics Trends

Cloud Infographic – Big Data Analytics Trends

Big Data Analytics Trends As data information and cloud computing continues to work together, the need for data analytics continues to grow. Many tech firms predict that big data volume will grow steadily 40% per year and in 2020, will grow up to 50 times that. This growth will also bring a number of cost…

Shadow IT To Remain A Focus For Both Cloud Vendors And CIOs

Shadow IT To Remain A Focus For Both Cloud Vendors And CIOs

Shadow IT To Remain A Focus Shadow IT, a phenomenon defined as building internal IT systems without the official organizational approval has been a growing concern for CIOs over the last few years. In 2015, it climbed to the top of the list of the emerging IT threats, with as much as 83% CIOs reporting…

Containerization: The Bold Face Of The Cloud In 2016

Containerization: The Bold Face Of The Cloud In 2016

Containerization And The Cloud “Right now, the biggest technology shift in the cloud is a rapid evolution from simple virtual machine (VM) hosting toward containerization’’ says the CTO of Microsoft Azure, Mark Russinovitch, a man who deals with the evolving cloud infrastructure every day. In his words, containerization is “an incredibly efficient, portable, and lightweight…

How Data Science And Machine Learning Is Enabling Cloud Threat Protection

How Data Science And Machine Learning Is Enabling Cloud Threat Protection

Data Science and Machine Learning Security breaches have been consistently rising in the past few years. Just In 2015, companies detected 38 percent more security breaches than in the previous year, according to PwC’s Global State of Information Security Survey 2016. Those breaches are a major expense — an average of $3.79 million per company,…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

5 Predictions For Education Technology

5 Predictions For Education Technology

Education Technology Although technology has fast influenced most sectors of our world, education is an area that’s lagged behind. Many classrooms still employ the one-to-many lecturing model wherein the average student is catered for while a few are left behind, and others bored. Recently, there’s been a drive to uncover how to use technology successfully…