Infosys Invests in Software-Defined Servers with TidalScale
Today, global IT consultancy Infosys announced its investment in TidalScale, a Software-Defined Server developer that aims to simplify the way companies can apply computing resources to tackle large-scale problems, with the deal set to be completed on or before 24 November this year.
With the explosion of big data expected to reach 44 zettabytes of data by 2020, companies are continually tasked with finding new ways of dealing with the information overload, with many viewing Software-Defined Servers as key in enabling organizations to draw insights from their big data faster and with much more flexibility.
“TidalScale-based systems can scale dynamically and at linear cost as application needs evolve, without the need for costly hardware investments or time-consuming software rewrites,” said Ritika Suri, executive vice-president of corporate development and ventures at Infosys. “As a pioneer of Software-Defined Servers, TidalScale provides solutions that are extraordinarily simple to use, requiring absolutely no changes to existing operating systems, databases, or applications.”
Among our client base, she continued, we see a need for inventive and cost-effective approaches to derive business value from big data, and our investment in TidalScale underscores our commitment to our clients to bring innovative new solutions across our platforms and offerings.”
“The vast amount of data which is available to organizations around the globe is both an opportunity and a challenge,” added Gary Smerdon, president and chief executive officer of TidalScale. “The Software-Defined Server technology created by TidalScale enables customers to glean insight from ever-growing data volumes by scaling systems quickly, easily and affordably across virtually any population of commodity servers. We believe this partnership with Infosys, a global leader in nextgeneration services, will provide significant value to our customers and help them easily expand the amount of data they are able to digest, analyze and act upon.”
Source: Information Security Magazine