Top 25 European Cloud Computing Rising Stars: Huddle

One can hardly say that Alastair Mitchell and Andy McLoughlin, co-founders of Huddle, entered an underdeveloped and non-competitive market when they started Huddle.com in 2006. The cloud-based platform competes with collaboration and project management solutions like those offered by 37signals and Cisco, while products like Central Desktop, Sosius, Ximdesk, LiquidPlanner, and Project Manager   are directly competing with the Huddle’s platform.

Huddle, like all major project management products, can be used online, on mobile devices and on desktops. In addition, the platform supports a number of businesses social networks and can be accessed via Microsoft Office applications.

The main challenge to developers of collaboration software and project management software products is the fast development of mobile devices used by business people to access and manage their databases, documents and run their businesses remotely. Huddle offers various options to access and manage corporate projects and information and via numerous mobile applications developed in-house. The company offers applications for iPhone, iPad, and BlackBerry while desktop applications include add-ins and plug-ins for Microsoft Office, Xobni, Chrome Web Store, LinkedIn, Xing, and Ning.

It is not unusual for a cloud-based platform to provide support for various devices, office suits and online services but Huddle offers an impressive set of options to connect to different web-based services using mobile devices.

The company’s software allows users to store their work on the Huddle’s servers while backup procedures are also conducted in the Huddle’s platform. The platform allows sharing of documents and features search function, which is a must-have functionality in each and every project management software. The profile of each member of a team created shows his/her area of expertise, contact details and work schedule enabling team leaders and managers to assign tasks to the right person who is available at the moment.

The web-based software tracks versions and revisions of documents and features phone and web conferencing, functionality lacking in some other products of the same caliber. The whiteboard function allows virtual brainstorming sessions, the company claims.

Interestingly, Huddle offers functionality to add unlimited number of users to a workspace which can collaborate using online whiteboards, calendars and free online MS Word and Excel via secured connection within the entire site. Another interesting functionality, in addition to email alerts related to projects, is the ability to track project progress and changes via RSS.

The search function offers full text search functionality and searches within both titles, descriptions and text in a single workspace or across all user’s workspaces. Huddle enables users to upload multiple files to its data centers supporting various file formats including MS Office docs, PDF, images, video and others. The company has made a step further in organizing its support department, offering support to users via Twitter, in addition to traditional methods like email, ticketing and classic online support.

The emergence of the cloud computing concept urged investors to re-think their investment priorities in the IT sector and companies like Huddle are increasingly in the spotlight. For good or bad, cloud computing companies and clod services providers quickly managed to become a new Silicon Valley myth attracting interest of venture capital firms, angel investors and even individual investors.

Huddle secured a Series A funding in October 2007 with Eden Ventures pouring USD4 million in the company. Eden Ventures, together with Matrix Partners, led a Series B funding in May 2010 and Huddle received USD10.2 million in new financing. Therefore, the company is not lacking financial resources to develop its product and services unlike many other start-ups in the cloud computing sector.

The company boasts customers like HTC, Kia Motors, AKQA, and Fujitsu which is a good indicator of Huddle’s ability to attract corporate clients that are able to spend larger budgets on cloud-based services. However, many peer companies are also expanding aggressively, offering free or discounted services to small and medium businesses, for example. Huddle offers a good product but the company faces fierce competition which will determine its corporate behavior and businesses model in the foreseeable future. Nevertheless, Huddle already demonstrated its ability to survive in a highly competitive environment.

By Kiril Kirilov

Sorry, comments are closed for this post.

Comic
InformationWeek Reveals Top 125 Vendors Taking the Technology Industry by Storm

InformationWeek Reveals Top 125 Vendors Taking the Technology Industry by Storm

InformationWeek Reveals Top 125 Vendors Five-part series details companies to watch across five essential technology sectors SAN FRANCISCO, Sept. 27, 2016 /PRNewswire/ — InformationWeek released its list of “125 Vendors to Watch” in 2017. Selected by InformationWeek’s expert editorial team, the companies listed fall into one of five key themes: infrastructure, security, cloud, data management and…

Part 1 – Connected Vehicles: Paving The Way For IoT On Wheels

Part 1 – Connected Vehicles: Paving The Way For IoT On Wheels

Connected Vehicles From cars to combines, the IoT market potential of connected vehicles is so expansive that it will even eclipse that of the mobile phone. Connected personal vehicles will be the final link in a fully connected IoT ecosystem. This is an incredibly important moment to capitalize on given how much time people spend…

Embedded Sensors and the Wearable Personal Cloud

Embedded Sensors and the Wearable Personal Cloud

The Wearable Personal Cloud Wearable tech is one avenue of technology that’s encouraging cloud connections and getting us all onto interconnected networks, and with the continued miniaturization and advancement of computing the types of wearable tech are always expanding and providing us with new opportunities. A few years ago, smartwatches were rather clunky devices with…

SWIFT Says Bank Hacks Set To Increase

SWIFT Says Bank Hacks Set To Increase

Bank Hacks Set To Increase SWIFT, whose messaging network is used by banks to send payment instructions worth trillions of dollars each day, said three clients were hacked over the summer and cyber attacks on banks are set to increase. The theft of $81 million in February from Bangladesh’s central bank using SWIFT messages rocked…

Security: Avoiding A Hatton Garden-Style Data Center Heist

Security: Avoiding A Hatton Garden-Style Data Center Heist

Data Center Protection In April 2015, one of the world’s biggest jewelry heists occurred at the Hatton Garden Safe Deposit Company in London. Posing as workmen, the criminals entered the building through a lift shaft and cut through a 50cm-thick concrete wall with an industrial power drill. Once inside, the criminals had free and unlimited…

HOW THE CFAA RULING AFFECTS INDIVIDUALS AND PASSWORD-SHARING

HOW THE CFAA RULING AFFECTS INDIVIDUALS AND PASSWORD-SHARING

Individuals and Password-Sharing With the 1980s came the explosion of computing. In 1980, the Commodore ushered in the advent of home computing. Time magazine declared 1982 was “The Year of the Computer.” By 1983, there were an estimated 10 million personal computers in the United States alone. As soon as computers became popular, the federal government…

Staying on Top of Your Infrastructure-as-a-Service Security Responsibilities

Staying on Top of Your Infrastructure-as-a-Service Security Responsibilities

Infrastructure-as-a-Service Security It’s no secret many organizations rely on popular cloud providers like Amazon and Microsoft for access to computing infrastructure. The many perks of cloud services, such as the ability to quickly scale resources without the upfront cost of buying physical servers, have helped build a multibillion-dollar cloud industry that continues to grow each…

Achieving Network Security In The IoT

Achieving Network Security In The IoT

Security In The IoT The network security market is experiencing a pressing and transformative change, especially around access control and orchestration. Although it has been mature for decades, the network security market had to transform rapidly with the advent of the BYOD trend and emergence of the cloud, which swept enterprises a few years ago.…

Maintaining Network Performance And Security In Hybrid Cloud Environments

Maintaining Network Performance And Security In Hybrid Cloud Environments

Hybrid Cloud Environments After several years of steady cloud adoption in the enterprise, an interesting trend has emerged: More companies are retaining their existing, on-premise IT infrastructures while also embracing the latest cloud technologies. In fact, IDC predicts markets for such hybrid cloud environments will grow from the over $25 billion global market we saw…

Cloud Infographic: The Future of File Storage

Cloud Infographic: The Future of File Storage

 The Future of File Storage A multi-billion dollar market Data storage has been readily increasing for decades. In 1989, an 8MB Macintosh Portable was top of the range; in 2006, the Dell Inspiron 6400 became available, boasting 160GB; and now, we have the ‘Next Generation’ MacBook Pro with 256GB of storage built in. But, of course,…

The Future Of Cybersecurity

The Future Of Cybersecurity

The Future of Cybersecurity In 2013, President Obama issued an Executive Order to protect critical infrastructure by establishing baseline security standards. One year later, the government announced the cybersecurity framework, a voluntary how-to guide to strengthen cybersecurity and meanwhile, the Senate Intelligence Committee voted to approve the Cybersecurity Information Sharing Act (CISA), moving it one…

Cloud Computing – The Game Changer

Cloud Computing – The Game Changer

Global Cloud Index In October, Cisco released its Global Cloud Index (GCI) report for 2014-2019, projecting a near 3-fold growth of global data center traffic, with predictions that this traffic will reach 8.6 zettabytes (cloud data center traffic) and 10.4 zettabytes (total data center traffic) per year in 2019 and 80% of it will come…

Protecting Your Web Applications In A Hybrid Cloud Environment

Protecting Your Web Applications In A Hybrid Cloud Environment

Protecting Your Web Applications It’s no secret that organizations are embracing the cloud and all the benefits that it entails. Whether its cost savings, increased flexibility or enhanced productivity – businesses around the world are leveraging the cloud to scale their business and better serve their customers. They are using a variety of cloud solutions…

Cloud Infographic: The Explosive Growth Of The Cloud

Cloud Infographic: The Explosive Growth Of The Cloud

The Explosive Growth Of The Cloud We’ve been covering cloud computing extensively over the past number of years on CloudTweaks and have truly enjoyed watching the adoption and growth of it. Many novices are still trying to wrap their mind around what the cloud it is and what it does, while others such as thought…

How Data Science And Machine Learning Is Enabling Cloud Threat Protection

How Data Science And Machine Learning Is Enabling Cloud Threat Protection

Data Science and Machine Learning Security breaches have been consistently rising in the past few years. Just In 2015, companies detected 38 percent more security breaches than in the previous year, according to PwC’s Global State of Information Security Survey 2016. Those breaches are a major expense — an average of $3.79 million per company,…