Feeds

Teradata snaps up Aster Data for $263m

Big data analytics

Beginner's guide to SSL certificates

Data warehousing appliance maker Teradata has figured out that it needs a software business that it controls above and beyond its clustered parallel database. It has ponied up $263m to acquire Aster Data Systems, which has created tools for chewing on monstrous amounts of unstructured data.

Aster Data sells a product called nCluster that is a hybrid row and column database that runs on parallel clusters. The company also has a patent in the works for that it calls SQL-MapReduce, a hybrid of normal data warehousing of structured data and big data chewing techniques for unstructured data. Some big names on the web use Aster Data's tools to analyze clickstreams, social networking connections, recommendations and personalization, churn and detect fraud. These include LinkedIn, Comscore, Akamai, Barnes & Noble, MySpace, Intuit, InsightExpress, and Full Tilt Poker.

Aster Data has been peddling its big data analytics software on Dell's cloudy PowerEdge-C boxes as an appliance. Teradata also uses Dell iron to build its flagship Enterprise Data Warehouse (EDW) clustered appliances, so Aster and Teradata already have that in common.

What we didn't know is that Teradata bought an 11 per cent stake in Aster Data already, back in September 2010. The $263m that it is shelling out today is to buy the rest of the company. That $263m is net of debt expenses; Teradata gets the $21m in cash Aster data has on the books. All of the company's employees, including co-founders Tasso Argyros and Mayank Bawa, who are chief technology officer and chief customer officer, are coming over to Teradata.

Teradata expects to close the deal in the second quarter, and said that it did not expect for Aster to have a material effect on its revenue stream in 2011 and would make it give up a few pennies from its bottom line. So presumably Aster Data had great technology but was not yet making money.

The Aster Data acquisition follows hot on the heels of Teradata's $550m acquisition in December 2010 of Aprimo, a maker of web-based marketing management software that Teradata wants to marry with its data warehouse appliances. ®

Protecting users from Firesheep and other Sidejacking attacks with SSL

More from The Register

next story
New 'Cosmos' browser surfs the net by TXT alone
No data plan? No WiFi? No worries ... except sluggish download speed
'Windows 9' LEAK: Microsoft's playing catchup with Linux
Multiple desktops and live tiles in restored Start button star in new vids
iOS 8 release: WebGL now runs everywhere. Hurrah for 3D graphics!
HTML 5's pretty neat ... when your browser supports it
'People have forgotten just how late the first iPhone arrived ...'
Plus: 'Google's IDEALISM is an injudicious justification for inappropriate biz practices'
Mathematica hits the Web
Wolfram embraces the cloud, promies private cloud cut of its number-cruncher
Mozilla shutters Labs, tells nobody it's been dead for five months
Staffer's blog reveals all as projects languish on GitHub
SUSE Linux owner Attachmate gobbled by Micro Focus for $2.3bn
Merger will lead to mainframe and COBOL powerhouse
iOS 8 Healthkit gets a bug SO Apple KILLS it. That's real healthcare!
Not fit for purpose on day of launch, says Cupertino
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.