The file transfer speed of other method are limited due to: the geographical distance between the origin and destination, delay in the response of the standard protocol and inefficient data exchange. Although companies have high-performance IT resources, due to non-hardware limitations, they cannot fully utilize these resources such as high-performance mass storage/server, high-capacity network equipment and high-bandwidth networks.
Featuring Exchanger software-based transfer technology, these limitations can be easily overcome without network bandwidth expansion. This innovative technology can transfer all kinds of files at high-speeds and also maximize utilization efficiency of the company's IT resources.
Furthermore, additional features such as optimizing packets, intelligent compression and transferring mass files at high-speeds and various file transfer features enable Exchanger to transfer files more quickly, even in unexpected environments that have not been predetermined.
High-speed file transfers for devices
In existing standard transfer methods, UDP transfer loses a lot of data while transferring so it unnecessarily uses too much bandwidth and requires opening many ports, resulting in threatened security. TCP transfer is very slow due to the inefficient communication methods. Exchanger drastically improves these TCP low-speed problems and provides high-speed file transfer rates that are up to 30 times faster even in situations like low-bandwidth, high-latency, high-loss and other hostile environments.
Expands the limited transfer capacity
File transfer speeds in existing transfer methods are greatly affected by the devices, OSes, types of software, network conditions, overload of servers and etc. In order for the existing maximum speed to be exceeded, Exchanger expands transfer capacity at the software level, making file transfer speed the fastest in any environment.
Optimizes transfers by interval
Exchanger analyzes various transfer environments (file sizes, transfer distances and network conditions, etc.) and automatically optimizes transfers. According to the transfer environment, Exchanger determines the most optimal data size and data arrangement, as well as exchanges data back and forth with the server in each every environment, as result of these actions, Exchanger can transfer files at the fastest speed in any transfer environment.
Most ideal transfer method
Other transfer methods can only utilize minimal capacity so bandwidth is wasted, as a result file transfers are always slower and take a longer time. In addition, they cause various transfer problems such as frequent transfer failure, etc. Exchanger can utilize optimal capacity, enabling file transfers to be quickly completed and the network to be cleaned up much faster. Exchanger fundamentally resolves the issue of having too many files remaining in the network for a long period of time. Therefore, more files can be exchanged in the same network without changing any IT infrastructure.
Large and mass file transfers
The file size and number of files are continuously increasing in current business environments. However, files are not being exchanged when it is needed because most companies still use previous temporary methods and to transfer files.
Exchanger is optimized to transfer large files. If there are chooses any files (document and large files, folders, etc.), Exchanger will transfer anything to anywhere in the fastest and most convenient way without any limitations. It also clearly eliminates repetitive efforts and the time wasted that users put into the transfer of large files, making it possible for the productivity of the whole organization to be dramatically improved.
Large file transfer
Due to all different kinds of technical difficulties, almost all transfer methods limit file sizes. Exchanger is the only way for companies to transfer files of all sizes from small size to large-size 100GByte as well as very large-size more than 10TByte without any limitations between devices in a single process.
Overcome various transfer limits
Exchanger changed HTTPS that is being used in all web-based business systems to RHTTP (reliable HTTP) which is a proprietary technology that INNORIX developed so that Exchanger can transfer files in any network environment without any security threats. Exchanger is the only way in the industry to transfer large and mass files in all OSes such as Windows, Mac, Linux, UNIX and embedded OS, etc.
Flawless transfer
Speed, accuracy and perfection are important requirements in all enterprise business environments. But in the current business system, file transfer methods between web browsers and servers are imperfect. As a result, these methods cannot perfectly meet the needs of companies. In the current environment, after a file transfer begins, all users can do is sit around and pray for the file to be completely transferred.
Generally, in typical business environments, when a file transfer is interrupted by unstable network conditions, server load or other various reasons, the user has no choice but to start the transfer again from the beginning. When a transfer has failed after many repeated tries, the engineers has to start from the beginning or try to seek other alternatives. The engineers has no choice but to be tolerant and accept inconveniences.
Exchanger fundamentally resolves all of these incomplete and inconvenient issues. While transferring, Exchanger responds automatically to a variety of exceptions that occur and assures a perfect transfer. Moreover, Exchanger provides security and integrity. Exchanger can perfectly meet the mission-critical needs of companies that are required in business environments.
Unstable issues in existing environment
Situations, in which file transfers fail, occur countlessly within a day and can sometimes happen repeatedly to the same devices. Although the above situation has not taken place, current file transfer methods have never assured a perfect transfer. Various security policies, network environments, server/device types and OSes have applied more pressure to these unstable situations.
Built-in scenarios to combat obstacles
When carrying out a perfect file transfer mission, if system engineers only rely on traditional methods, they have to use all kinds of server technologies and detailed monitors. Even if they find the causes of failure, it is very difficult to devise fundamental solutions that can respond to a variety of causes. It is also not easy to find a proper solution in general situations, such as transient network disconnections by unstable network conditions or response delay of servers.
Exchanger has built-in scenarios that automatically respond to a variety of situations while transferring. After the transfer is started, even if problems occur, Exchanger automatically analyzes all situations and it completes the file transfer on its own. Unless the network has been completely disconnected between client and servers, or unless the servers have not been recovered, Exchanger automatically completes transfers without any engineers interventions.
Flawless lossless transfer
In all business environments, flawless lossless transfer is a required feature that enables every single file to be transferred without any file loss. However, in existing transfer methods, lossless transfer is not taken into account, as a result, as more files are transferred, more files are lost.
Most engineers do not want to accept this fact about file loss but it is an ongoing inherent problem in the live operating environment. When only a few files fail to transfer among the files being transferred, companies have to invest unthinkable time and costs to find the one failed file. Even if the transfer is restarted from scratch, unstable situations will still remain and the same situations can happen.
Devices and servers cannot respond to all requests and the loss of files occurs often due to various environmental constraints. With flawless transfer structure, Exchanger can resolve these problems so that hundreds of thousands of files can be transferred without any file loss or additional delays.
Double integrity verification
File alterations occur due to malicious attacks or inserting malignant codes into files while transferring. In order to prevent them, the Exchanger verifies the integrity of the files twice (each block of a file and then the whole file again).
Even if an altered part of a file is detected, only the altered part will be automatically retransferred so that more accurate and reliable transfers occur. This guarantees safety and convenience.
File transfer test center
As a file transfer specialized company, INNORIX operates file transfer test centers for continuous monitoring and improvement of the quality of file transfers. INNORIX conducts tests in all network environments and all OSes in major cities of North America, Europe and Asia around the clock, 365 days a year.
Privacy policy
Your privacy is very important to us. INNORIX respects your privacy and is committed to protect the personal information that you share with us. Generally, you can browse through our website without giving us any information. When we do need your personal information to provide services, you will be noticed from us or you can choose to provide us with your personal information. Below statement describes how we collect and use your information.
Overview
The privacy practices of this statement apply to our services available under the domain and subdomains of www.innorix.com (the 'Site'). By visiting this site you agree to be bound by the terms and conditions of this privacy policy.
1. Why we collect the data
Our primary purpose in collecting personal information is to provide you with efficient, and customized experience. We only collect personal information about you that we consider necessary for achieving this purpose.
Once you give us your personal information, you are not anonymous to us. If you choose to use our services, we may require you to provide contact and some other basic information about yourself. We indicate which fields are required and which fields are optional. You always have the option to not provide information by choosing not to use a particular service or feature.
2. Our use of data
We may use your name and email address to inform you of future offers, product developments, and new products we think may be of interest to you based on your previous enquiries and orders. This information is not shared with third parties and you can unsubscribe at any time via phone, email or our website.
If you do not wish to receive these communications, we encourage you to opt out of the receipt of certain communications by sending an email to general@innorix.com to opt-out. You may make changes to your notification preferences at any time.
3. Choice not to provide data
You may choose whether or not to provide personal information to INNORIX. However, when you engage in certain activities on this site, such as ordering products and downloading software, INNORIX requires that you provide certain information about yourself such as name, mailing address, e-mail address and other personal identifying information.
4. Security
Your information is stored on the INNORIX servers. We use procedural and technical safeguards to protect your personal information against loss or theft as well as unauthorized access and disclosure to protect your privacy, including encryption, 'firewalls' and secure socket layers. We employ many different security techniques to protect your precious data from unauthorized access by users inside and outside the company. However, 'perfect security' does not exist on the Internet.
5. Notice
We may amend this privacy policy at any time by posting the amend terms on the site. All amended terms shall automatically be effective 30 days after they are initially posted on the site. In addition, we will notify you in accordance with your notification preferences.
For questions regarding the above privacy policy please contact us at general@innorix.com.
Terms of use
This is a legal agreement between you and INNORIX, for use of the service from the INNORIX which you selected or initiated. “you” refers to the individual and enterprise that registered and/or provided in the INNORIX website.
Any software associated with the services is protected by copyright laws and international copyright treaties, as well as other intellectual property laws and treaties. “Data” refers to all information entered from “you” on the company servers in relation to services.
Services
The company may at its sole discretion modify the features of the Services from time to time without prior notice. The company will provide the Services in accordance with this agreement.
Our use of data
We may use your name and email address to inform you of future offers, product developments, and new products we think may be of interest to you based on your previous enquiries and orders. This information is not shared with third parties and you can unsubscribe at any time via phone, email or our website.
Materials posted on this website
All materials that are made available as part of the website services are the copyrighted work of INNORIX or its suppliers. Your use of these materials is governed by one of two sets of license terms. Whether you are presented with a license for the materials or no license is presented to you, these terms apply. INNORIX reserves all rights to the materials expressly granted under these license terms. In your use of the materials you may not:
• Remove, modify or tamper with any copyright notices;
• Distribute the materials to third parties, including by posting the materials on any networked computer for access by any other computer on the network, or broadcast the materials in any media; or
• Make any modifications to the materials.
Elements of INNORIX websites are protected by trade dress, trademark, unfair competition, and other laws and may not be copied or imitated in whole or in part. No logo, graphic, sound, or image from any INNORIX website may be copied or retransmitted unless expressly permitted by INNORIX. INNORIX may have trademarks, copyrights, or other intellectual property rights covering subject matter in the materials. By providing the materials to you, INNORIX does not give you any license to these patents, trademarks, copyrights, or other intellectual property, unless INNORIX does so expressly in writing.
Proprietary Rights
The company and/or its suppliers, as applicable, retain ownership of all proprietary rights in the services and in all trade names, trademarks, and service marks associated or displayed with the services. You will not remove, deface or obscure any of the company’s or its suppliers’ copyright or trademark notices and/or legends or other proprietary notices on, incorporated therein, or associated with the Services. You may not reverse engineer, reverse compile or otherwise reduce to human readable form any software associated with the services.
For questions regarding the above terms of use please contact us at general@innorix.com.