Top 25 European Cloud Computing Rising Stars: Memonic

Top 25 European Cloud Computing Rising Stars: Memonic

Memonic Attacks Specific Markets with Its Cloud-based Personal Notebook

memonicZurich-based start-up Nektoon Inc. was founded in 2009 to launch a new cloud-based service called Memonic and since then managed to become a popular online service in Europe. The company competes with services like Evernote, providing customers with a personal online notebook to store text, pictures, videos or sound they found in Internet. Memonic allows users to capture essential content of any web page, store it in their personal cloud-based notebook and access their accounts anytime through different devices. Actually, Memonic is a sort of Storage as a Service with extended functionality.

The service was launched in November, 2009 by co-founders Dorian Selz, Felix Hürlimann, Patrice Neff, Christoph Hauzenberger and Toni Birrer who managed to secure USD 200,000 in seed funding for Nektoon. The Swiss-headquartered company received USD 1 million in angel investor funding in May 2010 and since then no news on new rounds of funding have been revealed. Memonic, however, won several awards in just a couple of years, including an award for innovative and promising business idea.

The online notebook offered by Memonic is available as a web-based service and is accessible in Windows, iPhone and any Smartphone. Apart from online knowledge gathering functionality, the application allows users to share the content they stored under their online accounts as well as possibility to edit collected information.

Memonic features several basic modules or functionality that should be included in any cloud-based application designed to serve as an online notebook. The first one, the web clipper allows users to select text, images or videos from web pages visited by customers. The web clipper works as a bookmarklet or browser extension while the application is automatically indexing all the content captured by the users. The capturing tool is also able to mail users’ notes to their Memonic accounts while creating new items is also possible. Thus, the content of the personal notebook is searchable, which is not an innovative functionality but is worth mentioning.

The company calls its folders, containing various items organized by users, “Sets” and these Sets can be organized by dragging and dropping an item to a list or by using special menus. In addition, an item may belong to a particular Set or a group of Sets. Memonic has a built-in text editor allowing users to edit the content of items while adding or removing images to an item.

Sharing functionality is essential part of any cloud-based application and Nektoon added such feature to their Memonic service. The application allows users to share their collected content via email, Facebook and Twitter while any item can be labeled as private or public. Private items can be shared too, using a guest password that unlocks the content of a private set of items.

Recent hacking competitions showed that iPhones, and smartphones, in general, are not the most secure devices to use for private browsing but Memonic follows the overall industry trends and made its application accessible via such devices. Memonic supports iPhone, iPad and iPod and offers data synchronization for offline browsing and reading. The application is available on the iTunes application store but we suggest to be careful what you store online using your mobile smartphone.

The Windows version of Memonic adds more functionality to the application with possibility to write notes and take screenshots. Users are allowed to extract text and pictures form various Windows applications like text and presentation editors while saving clipboard is also possible. Notes and screenshots created offline can be uploaded automatically to a user account when the application goes online.

The company offers two types of free accounts, Instant and Standard, with the latter providing additional sharing capabilities, mobile access, iPhone application, and create by email function. However, both free account types do not provide SSL encryption, which is a serious disadvantage.

An unbiased observer might ask: “Why should I use Memonic if services like Google Docs exits?”. The correct answer is that Memonic is not trying to compete with cloud services like the one offered by Google Docs and other collaborative platforms.

There are plenty of cloud-based collaborative tools around while Memonic bets on another, yet underdeveloped, niche. The growing market for cloud services and the related boom of Internet-based operating systems and devices is creating an entirely new market of cloud storage services. The growing number of Internet PCs and smartphones force their owners to seek affordable, secure and user friendly methods to store their data collected during Internet browsing sessions. Why should a user in Africa purchase an expensive laptop to browse the web if the market offers cheap web OS PCs while services like Memonic provide cloud storage space for the user’s collected valuable content. Add functions like sharing and editing and you get a good idea why services like Memonic are the likely winners in a fast paced cloud computing environment.

By Kiril Kirilov

Sorry, comments are closed for this post.

Comic
Are CEO’s Missing Out On Big Data’s Big Picture?

Are CEO’s Missing Out On Big Data’s Big Picture?

Big Data’s Big Picture Big data allows marketing and production strategists to see where their efforts are succeeding and where they need some work. With big data analytics, every move you make for your company can be backed by data and analytics. While every business venture involves some level of risk, with big data, that risk…

5 THINGS TO CONSIDER ABOUT YOUR NEXT ENTERPRISE FILE SHARING SOLUTION

5 THINGS TO CONSIDER ABOUT YOUR NEXT ENTERPRISE FILE SHARING SOLUTION

Enterprise File Sharing Solution Businesses have varying file sharing needs. Large, multi-regional businesses need to synchronize folders across a large number of sites, whereas small businesses may only need to support a handful of users in a single site. Construction or advertising firms require sharing and collaboration with very large (several Gigabytes) files. Financial services…

Security: Avoiding A Hatton Garden-Style Data Center Heist

Security: Avoiding A Hatton Garden-Style Data Center Heist

Data Center Protection In April 2015, one of the world’s biggest jewelry heists occurred at the Hatton Garden Safe Deposit Company in London. Posing as workmen, the criminals entered the building through a lift shaft and cut through a 50cm-thick concrete wall with an industrial power drill. Once inside, the criminals had free and unlimited…

Three Tips To Simplify Governance, Risk and Compliance

Three Tips To Simplify Governance, Risk and Compliance

Governance, Risk and Compliance Businesses are under pressure to deliver against a backdrop of evolving regulations and security threats. In the face of such challenges they strive to perform better, be leaner, cut costs and be more efficient. Effective governance, risk and compliance (GRC) can help preserve the business’ corporate integrity and protect the brand,…

Which Is Better For Your Company: Cloud-Based or On-Premise ERP Deployment?

Which Is Better For Your Company: Cloud-Based or On-Premise ERP Deployment?

Cloud-Based or On-Premise ERP Deployment? You know how enterprise resource management (ERP) can improve processes within your supply chain, and the things to keep in mind when implementing an ERP system. But do you know if cloud-based or on-premise ERP deployment is better for your company or industry? While cloud computing is becoming more and…

Do Not Rely On Passwords To Protect Your Online Information

Do Not Rely On Passwords To Protect Your Online Information

Password Challenges  Simple passwords are no longer safe to use online. John Barco, vice president of Global Product Marketing at ForgeRock, explains why it’s time the industry embraced more advanced identity-centric solutions that improve the customer experience while also providing stronger security. Since the beginning of logins, consumers have used a simple username and password to…

How To Humanize Your Data (And Why You Need To)

How To Humanize Your Data (And Why You Need To)

How To Humanize Your Data The modern enterprise is digital. It relies on accurate and timely data to support the information and process needs of its workforce and its customers. However, data suffers from a likability crisis. It’s as essential to us as oxygen, but because we don’t see it, we take it for granted.…

Don’t Be Intimidated By Data Governance

Don’t Be Intimidated By Data Governance

Data Governance Data governance, the understanding of the raw data of an organization is an area IT departments have historically viewed as a lose-lose proposition. Not doing anything means organizations run the risk of data loss, data breaches and data anarchy – no control, no oversight – the Wild West with IT is just hoping…

Cloud Computing Offers Key Benefits For Small, Medium Businesses

Cloud Computing Offers Key Benefits For Small, Medium Businesses

Cloud Computing Benefits A growing number of small and medium businesses in the United States rely on as a means of deploying mission-critical software products. Prior to the advent of cloud-based products — software solutions delivered over the Internet – companies were often forced to invest in servers and other products to run software and…

Teach Yourself The Cloud: Cloud Computing Knowledge In 5 Easy Steps

Teach Yourself The Cloud: Cloud Computing Knowledge In 5 Easy Steps

Teach Yourself The Cloud Learn how to get to grips with cloud computing in business  Struggling to get your head around the Cloud? Here are five easy ways you can improve your cloud knowledge and perhaps even introduce cloud systems into your business.  Any new technology can appear daunting, and cloud computing is no exception.…

Three Factors For Choosing Your Long-term Cloud Strategy

Three Factors For Choosing Your Long-term Cloud Strategy

Choosing Your Long-term Cloud Strategy A few weeks ago I visited the global headquarters of a large multi-national company to discuss cloud strategy with the CIO. I arrived 30 minutes early and took a tour of the area where the marketing team showcased their award winning brands. I was impressed by the digital marketing strategy…

The Rise Of BI Data And How To Use It Effectively

The Rise Of BI Data And How To Use It Effectively

The Rise of BI Data Every few years, a new concept or technological development is introduced that drastically improves the business world as a whole. In 1983, the first commercially handheld mobile phone debuted and provided workers with an unprecedented amount of availability, leading to more productivity and profits. More recently, the Cloud has taken…

M2M, IoT and Wearable Technology: Where To Next?

M2M, IoT and Wearable Technology: Where To Next?

M2M, IoT and Wearable Technology Profiling 600 companies and including 553 supporting tables and figures, recent reports into the M2M, IoT and Wearable Technology ecosystems forecast opportunities, challenges, strategies, and industry verticals for the sectors from 2015 to 2030. With many service providers looking for new ways to fit wearable technology with their M2M offerings…

12 Promising Business Intelligence (BI) Services For Your Company

12 Promising Business Intelligence (BI) Services For Your Company

12 Promising Business Intelligence (BI) Services Business Intelligence (BI) services have recently seen an explosion of innovation and choices for business owners and entrepreneurs. So many choices, in fact, that many companies aren’t sure which business intelligence company to use. To help offer you a solution, we’ve compiled a list of 12 Business Intelligence companies…

Expert Insights Into The Yahoo Breach

Expert Insights Into The Yahoo Breach

Yahoo Breach Latest reports suggest that the recent Yahoo! data breach may exceed 500 million records, with some sources implying millions more records penetrated, upping the total number of records stolen in various recent hacks to approximately 3.5 billion. CloudTweaks spoke to Kevin O’Brien, CEO of GreatHorn, for expert insight into this latest violation. GreatHorn…

Using Private Cloud Architecture For Multi-Tier Applications

Using Private Cloud Architecture For Multi-Tier Applications

Cloud Architecture These days, Multi-Tier Applications are the norm. From SharePoint’s front-end/back-end configuration, to LAMP-based websites using multiple servers to handle different functions, a multitude of apps require public and private-facing components to work in tandem. Placing these apps in entirely public-facing platforms and networks simplifies the process, but at the cost of security vulnerabilities. Locating everything…

Big Data’s Significant Role In Fintech

Big Data’s Significant Role In Fintech

Data Banking Fintech covers a range of financial fields such as retail banking, investments, and lending and thanks to the mobile and internet innovations of late is a thriving sector. Offering improvements which drive customer satisfaction and education in an area previously inscrutable and dictated by gigantic inflexible corporations, fintech is helping put the power…

Battle of the Clouds: Multi-Instance vs. Multi-Tenant

Battle of the Clouds: Multi-Instance vs. Multi-Tenant

Multi-Instance vs. Multi-Tenant The cloud is part of everything we do. It’s always there backing up our data, pictures, and videos. To many, the cloud is considered to be a newer technology. However, cloud services actually got their start in the late 90s when large companies used it as a way to centralize computing, storage,…

Infographic: 9 Things To Know About Business Intelligence (BI) Software

Infographic: 9 Things To Know About Business Intelligence (BI) Software

Business Intelligence (BI) Software  How does your company track its data? It’s a valuable resource—so much so that it’s known as Business Intelligence, or BI. But using it, integrating it into your daily processes, that can be significantly difficult. That’s why there’s software to help. But when it comes to software, there are lots of…