Maxeler Technologies, based in London UK, and fragmentiX Storage Solutions based in Klosterneuburg Austria, have collaborated to deliver maximum performance and ultra-secure-by-design data storage and computing solutions.
“Protected by hard-to-penetrate FPGAs and distributed in fragments calculated via Shamir’s Secret Sharing, the fragmentiX-Maxeler solution offers unprecedented data secrecy while offering scalability of multiple public cloud vendors, combined with hybrid and on-premise storage where needed,” says Oskar Mencer, CEO of Maxeler Technologies.
“Every person and every company deserve digital sovereignty and peace of mind when storing sensitive data or industrial intellectual property. Such Guaranteed longtime privacy is especially important when it comes to medical and genomic data with potential consequences for multiple generations,” says Werner Strasser, CEO of fragmentiX Storage Solutions.
Based on their combined market experience in scientific computing, government and finance, Maxeler and fragmentiX closely cooperate to provide data-optimized specialized HPC environments with the highest possible performance and, at the same time, with the highest possible data protection.
The products of both companies work together in several situations:
Maxeler’s M-Space Data Platform: the collaborative research and development environment gets the strongest data protection by using fragmentiX’s integrated data storage architecture.
Maxeler’s MAX5 acceleration technology: The Maximum Performance cards bring a customizable architecture to any given computational challenge and will be used in future Generations of fragmentiX products to boost performance and features available to the users.
fragmentiX CLUSTER: The FPGA-based Maxeler miniMAX offers additional protection for the 10GB/s WAN connections of fragmentiX CLUSTER nodes against x86 CPU-related vulnerabilities like Spectre and Meltdown. The miniMAX appliance increases security on any standards-based network connection with real-time performance to mitigate all known and – as far as technically possible – still unknown vulnerabilities of major CPU technologies worldwide.