Jerry Huang, CEO Of Gladinet: Interview With CloudTweaks

Jerry Huang, CEO Of Gladinet: Interview With CloudTweaks

Are you seeking a Cloud Technology Platform for backing up your critical data? It is a struggle for many firms to make the decision to back-up on local servers or use a Cloud Platform offsite. Gladinet , the Cloud Storage Access Platform company, has solutions which enable organizations to back up their files and critical database information. Their unique technology offers a variety of platforms focused on delivering a back-up solution tailored to your companies platform needs.

The CEO of Gladinet is Jerry Huang, an engineer and trailblazer in cloud technology. He is renowned for his insight and innovative approach to complex cloud solutions. In an exclusive on-line interview with Jerry, we asked him to respond to some of Cloudtweak subscribers’ most important questions regarding back-up solutions.

Cloudtweaks:

” Jerry, what are the key questions most of your customers ask related to security and back-up concerns? ”

Jerry:

” They ask about what security algoritum is used and ask for stand alone decryption tool. They want it to be both secure and open. secure so no one else can decrypt the file. Open so they can still have file back as long as they have the key. ”

CloudTweaks:

” How do you internally insure that client data can be restored if you yourself are subject to a major threat to your datacenter? ”

Jerry:

” Make sure we use open standard and also standard set by the cloud storage vendors. so to distribute the file to different places such as to Google and Amazon at the same time. so to reduce the chance that both are under threat. It is more expensive but it is a trade off. Gladinet will be a good fit since we support major cloud storage vendors side by side. For example, you can backup to S3 and Azure at the same time. ”

CloudTweaks:

” How do you address internal security issues on your platform? What safeguards are in place to guarantee cutting edge processes for a security policy that addresses customer needs? ”

Jerry:

” For security, follow common sense and best practice. For example, use OpenSSL and use key strength and 128bit (usually 256 bit) for encryption.”

Cloudtweaks:

” When major players jump into the market with enormous resources both in development and marketing how does a small start-up protect a market share or niche today? ”

Jerry:

” There is no easy answer. A small startup needs to develop its own unfair advantage. The advantage could be viral such as a big user base. The advantage could be that the startup moves quicker and develop new niche. The advantage could be patent applications. The advantage could be that the startup stay even more focused so to spend the resource on smaller front.”

Cloudtweaks:

” Is there room in the “cloud” for small start-ups and how do they position themselves against the competition? ”

Jerry:

” There are plenty of opportunities for something that is “new”, given “cloud” is “new”. As internal operating cost is concerned, using the cloud is less expensive so it is easier ever for startups to start. As far as positioning is concerned, trying to be the first of a new technology, be the first to publicize the idea and the category shall be the goal for a startup. ”

Cloudtweaks:

” In terms of current market issues how does your firm determine pricing to attract new customers and retain existing one? ”

Jerry:

” In the current market and for startup, generate cash flow is always good. If the market is new, keep pricing attractive is also good as a way to broden the customer base. There is always version 2 to adjust later on. ”

Cloudtweaks:

” What issues determine how you address platform reliability and performance from the perspective of your application offering? ”

Jerry:

“The Gladinet Cloud Access Solutions and Platforms are solving one single issue: How do you access the cloud storage from the desktops and the servers. The cloud is way high, the desktop is on the ground. How to make the cloud meet the ground?”

“From this perspective, the issues are the glithes from the internet is much more often and longer than the glitches you may be seeing from a local system (hard drive, USB drive). and the latencies are longer. We need to have built-in retry and other reliability measures and local cache for performance.”

Cloudtweaks:

“With new announcements daily we see the major players continue to validate cloud applications. How do you protect or at least anticipate a market share niche with the incredible speed of change in today’s market?”

Jerry:

” Have a vision and execute. Many startup fails, not because of the outside competition, it is because of internal execution. “Vision from the leaders is very important. and the next step is follow the vision and execute to the plan. ”

Cloudtweaks:

” There are many legal and regulatory guidelines dealing with domain names and management. Are there sufficient legal and regulatory processes in place to protect customers who have made the decision to move all or part of the company data to a Cloud Platform? ”

Jerry:

” It is not easy to have something similar to FDIC/SPIC for money when it comes to data protection. Cloud Platform is a new word but in practice, we have data centers and hosting companies since the begining of the Internet. “Cloud Platform” is a new way of using services while the services providers may still be old (racespace, Amazon and etc). It is still a business contract between a customer and a service provider. For example, if the customer has moved the web server to Racespace 10 years ago, similar conditions and concerns should apply if the customer starts to use Cloud Files. If you are using services from managed service provider, you are already in the “cloud” in a loose term.”

Cloudtweaks:

” What is the new paradigm of cloud business models if any? Put your “futurist hat” on and describe how you see the “cloud” evolving over the next ten years? ”

Jerry:

” First you will see cloud storage take off, starting with backup. This already happened. Then you see more cloud-enabled apps, such as those in ASP.NET and created by Visual Studio. Instead of using SQL 2005, you are using SQL Azure; instead of using local file system, you are using azure storage. This will happen from now on. ”

“Eventually, with the speed gap between LAN and WAN become smaller. You are seeing virtual desktops like Amazon EC2, not just for web servers, but for employees’ everyday user experience. You will see something like Citrix XenDesktop, not just for enterprise, but for SMB or family even.”

Cloudtweaks:

“In what way does your internal new product development interface with the need to keep a dedicated cloud security team involved and engaged in anticipating vulnerabilities in security?

Jerry:

” Currently we adopt security coding practice such as using strcpy_s instead of strcpy, preventing buffer overrun. Using prefast and driver verifier and all other recommended security practice. ”
Cloudtweaks appreciated the thoughtful and focused answers of Jerry Huang, CEO of Gladinet and know our readers will enjoy the insights and ideas of one of the most respected leaders in Cloud Platform applications. For more information on Gladinet Solutions you can visit their website at http://www.gladinet.com.

By Anthony Park

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Comic
Maintaining Network Performance And Security In Hybrid Cloud Environments

Maintaining Network Performance And Security In Hybrid Cloud Environments

Hybrid Cloud Environments After several years of steady cloud adoption in the enterprise, an interesting trend has emerged: More companies are retaining their existing, on-premise IT infrastructures while also embracing the latest cloud technologies. In fact, IDC predicts markets for such hybrid cloud environments will grow from the over $25 billion global market we saw…

Cloud-based GRC Intelligence Supports Better Business Performance

Cloud-based GRC Intelligence Supports Better Business Performance

Cloud-based GRC Intelligence All businesses need a strategy and processes for governance, risk and compliance (GRC). Many still view GRC activity as a burdensome ‘must-do,’ approaching it reactively and managing it with non-specialized tools. GRC is a necessary business endeavor but it can be elevated from a cost drain to a value-add activity. By integrating…

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

The Rise Of BI Data And How To Use It Effectively

The Rise Of BI Data And How To Use It Effectively

The Rise of BI Data Every few years, a new concept or technological development is introduced that drastically improves the business world as a whole. In 1983, the first commercially handheld mobile phone debuted and provided workers with an unprecedented amount of availability, leading to more productivity and profits. More recently, the Cloud has taken…

5 THINGS TO CONSIDER ABOUT YOUR NEXT ENTERPRISE FILE SHARING SOLUTION

5 THINGS TO CONSIDER ABOUT YOUR NEXT ENTERPRISE FILE SHARING SOLUTION

Enterprise File Sharing Solution Businesses have varying file sharing needs. Large, multi-regional businesses need to synchronize folders across a large number of sites, whereas small businesses may only need to support a handful of users in a single site. Construction or advertising firms require sharing and collaboration with very large (several Gigabytes) files. Financial services…

Part 1 – Connected Vehicles: Paving The Way For IoT On Wheels

Part 1 – Connected Vehicles: Paving The Way For IoT On Wheels

Connected Vehicles From cars to combines, the IoT market potential of connected vehicles is so expansive that it will even eclipse that of the mobile phone. Connected personal vehicles will be the final link in a fully connected IoT ecosystem. This is an incredibly important moment to capitalize on given how much time people spend…

Data Breaches: Incident Response Planning – Part 1

Data Breaches: Incident Response Planning – Part 1

Incident Response Planning – Part 1 The topic of cybersecurity has become part of the boardroom agendas in the last couple of years, and not surprisingly — these days, it’s almost impossible to read news headlines without noticing yet another story about a data breach. As cybersecurity shifts from being a strictly IT issue to…

Cloud Computing Is Greener Than You Think

Cloud Computing Is Greener Than You Think

Cloud Computing Is Greener Than You Think Last week we touched upon how a project in Finland had blended two of the world’s most important industries, cloud computing and green technology, to produce a data centre that used nearby sea water to both cool their servers and heat local homes.  Despite such positive environmental projects, there…

Cloud Computing Myths That SMBs Should Know

Cloud Computing Myths That SMBs Should Know

Cloud Computing and SMBs Cloud Computing is the hottest issue among IT intellects of Small and Medium Businesses (SMBs). Like any other computer-orientated technology, Cloud Computing has some misconceptions and myths that often kick-start arguments among the two opposing groups: Cloud Supporters and Cloud Opponents. Both of these groups have their own ideology and reasons…

Cloud Infographic – Cloud Public, Private & Hybrid Differences

Cloud Infographic – Cloud Public, Private & Hybrid Differences

Cloud Public, Private & Hybrid Differences Many people have heard of cloud computing. There is however a tremendous number of people who still cannot differentiate between Public, Private & Hybrid cloud offerings.  Here is an excellent infographic provided by the group at iWeb which goes into greater detail on this subject. Infographic source: iWeb

Shadow IT To Remain A Focus For Both Cloud Vendors And CIOs

Shadow IT To Remain A Focus For Both Cloud Vendors And CIOs

Shadow IT To Remain A Focus Shadow IT, a phenomenon defined as building internal IT systems without the official organizational approval has been a growing concern for CIOs over the last few years. In 2015, it climbed to the top of the list of the emerging IT threats, with as much as 83% CIOs reporting…

Infographic Introduction – Benefits of Cloud Computing

Infographic Introduction – Benefits of Cloud Computing

Benefits of Cloud Computing Based on Aberdeen Group’s Computer Intelligence Dataset, there are more than 1.6 billion permutations to choose from when it comes to cloud computing solutions. So what, on the face of it, appears to be pretty simple is actually both complex and dynamic regardless of whether you’re in the market for networking,…

Business Analytics Vs Data Science

Business Analytics Vs Data Science

Big Data Continues To Grow Big Data continues to be a much discussed topic of interest and for good reason.  According to a recent report from International Data Corporation (IDC), “worldwide revenues for big data and business analytics will grow from nearly $122 billion in 2015 to more than $187 billion in 2019, an increase…

Expert Insights Into The Yahoo Breach

Expert Insights Into The Yahoo Breach

Yahoo Breach Latest reports suggest that the recent Yahoo! data breach may exceed 500 million records, with some sources implying millions more records penetrated, upping the total number of records stolen in various recent hacks to approximately 3.5 billion. CloudTweaks spoke to Kevin O’Brien, CEO of GreatHorn, for expert insight into this latest violation. GreatHorn…

Using Private Cloud Architecture For Multi-Tier Applications

Using Private Cloud Architecture For Multi-Tier Applications

Cloud Architecture These days, Multi-Tier Applications are the norm. From SharePoint’s front-end/back-end configuration, to LAMP-based websites using multiple servers to handle different functions, a multitude of apps require public and private-facing components to work in tandem. Placing these apps in entirely public-facing platforms and networks simplifies the process, but at the cost of security vulnerabilities. Locating everything…

Big Data’s Significant Role In Fintech

Big Data’s Significant Role In Fintech

Data Banking Fintech covers a range of financial fields such as retail banking, investments, and lending and thanks to the mobile and internet innovations of late is a thriving sector. Offering improvements which drive customer satisfaction and education in an area previously inscrutable and dictated by gigantic inflexible corporations, fintech is helping put the power…

Battle of the Clouds: Multi-Instance vs. Multi-Tenant

Battle of the Clouds: Multi-Instance vs. Multi-Tenant

Multi-Instance vs. Multi-Tenant The cloud is part of everything we do. It’s always there backing up our data, pictures, and videos. To many, the cloud is considered to be a newer technology. However, cloud services actually got their start in the late 90s when large companies used it as a way to centralize computing, storage,…

Infographic: 9 Things To Know About Business Intelligence (BI) Software

Infographic: 9 Things To Know About Business Intelligence (BI) Software

Business Intelligence (BI) Software  How does your company track its data? It’s a valuable resource—so much so that it’s known as Business Intelligence, or BI. But using it, integrating it into your daily processes, that can be significantly difficult. That’s why there’s software to help. But when it comes to software, there are lots of…