Cloud Apps of the Week: Comondo Cloud

Cloud Apps of the Week: Comondo Cloud

From sexy Emmy winners to tip-top security, this week’s selection of apps keeps both entertainment and assurance at the fore.

Let’s not get started on the heated discussion of whether (or not) Crocs count as viable footwear. For every detractor, it seems like two Croc-oholics come along right on cue. A brand new app is targeted squarely at such connoisseurs of Crocs, called Crocs Mix & Match. (Search for the most recent app using your smartphone now.) This application, available on both the iPhone and the Android, allows users to virtually sample and even try on their favorite pair of the comfy shoes. Free of cost, this application works by the user snapping a shot of their outfit and uploading it. The app then flits through around three hundred of the latest Crocs models — including boat shoes, penny loafers, and wedges — sorting through them in pursuit of the most ideal Crocs for your particular ten toes.

Modern Family, Mad Men, Downton Abbey — the inescapable pandemonium for all of these shows, and countless others, is undeniably due (in part) to the hugely warm reception they annually from the Emmy Awards, celebrating the best in television. Industry insiders are elected each year to decide who’ll get the trophies every September; obviously, they’ll need to watch more than a few hours of TV, on ready-to-watch DVDs called “screeners,” to make the best choice. Enter the first-ever Emmy screener iPad application, also known as the NBCU Screen It app, powered by Brightcove’s App Cloud. Now Emmy voters will have the incentive of watching Sofia Vergara or Jon Hamm in beautiful form, thanks to the cloud’s assets to entertainment.

In response to increasing public scrutiny of the cloud re: its security, several cloud security apps have been released. Among the most noteworthy of these is Comodo Cloud, which helps protects users’ data by storing it in multiple locations via its sync features. Five gigabytes of free storage are available right off the bat, and every file a user uploads is automatically backed up. With a download size of just over 1M, Comodo Cloud is also quite ideal for those with little space for such a helpful application.

Another security app you should know about is Bitdefender’s Safebox, which offers users 2 gigs of space gratis, with more on offer for a nominal fee. Safebox differs from Comodo in that the app can be manipulated to automatically back up a file whenever it is altered. Whichever app you pick, you won’t go wrong, but rather securely right.

By Jeff Norman

About Jeff Norman

Jeff Norman is a freelance writer currently based in New York City. He's moved into writing about cloud computing from substantial work in culture and the arts. He earned his undergraduate degree in English at Stanford and has studied at Oxford and Cambridge.

View All Articles

Sorry, comments are closed for this post.

Comics
7 Common Cloud Security Missteps

7 Common Cloud Security Missteps

Cloud Security Missteps Cloud computing remains shrouded in mystery for the average American. The most common sentiment is, “It’s not secure.” Few realize how many cloud applications they access every day: Facebook, Gmail, Uber, Evernote, Venmo, and the list goes on and on… People flock to cloud services for convenient solutions to everyday tasks. They are so easy to start using that consumers rarely think twice about setting up an account or downloading a new…

Cost of the Cloud: Is It Really Worth It?

Cost of the Cloud: Is It Really Worth It?

Cost of the Cloud Cloud computing is more than just another storage tier. Imagine if you’re able to scale up 10x just to handle seasonal volumes or rely on a true disaster-recovery solution without upfront capital. Although the pay-as-you-go pricing model of cloud computing makes it a noticeable expense, it’s the only solution for many use cases that were previously unthinkable. Costs affiliated with the cloud may be rising, but enterprises not willing to explore…

The Five Rules of Security and Compliance in the Public Cloud Era

The Five Rules of Security and Compliance in the Public Cloud Era

Security and Compliance  With technology at the heart of businesses today, IT systems and data are being targeted by criminals, competitors and even foreign governments. Every day, we hear about how another retailer, bank or Internet company has been hacked and private information of customers or employees stolen. Governments and oversight organizations are responding to these attacks with calls for tighter control and regulations, from the Society for Worldwide Interbank Financial Telecommunication (SWIFT) beefing up…

Disaster Recovery – A Thing Of The Past!

Disaster Recovery – A Thing Of The Past!

Disaster Recovery  Ok, ok – I understand most of you are saying disaster recovery (DR) is still a critical aspect of running any type of operations. After all – we need to secure our future operations in case of disaster. Sure – that is still the case but things are changing – fast. There are really two things forcing us to look at disaster recovery differently across the board. On the one hand the sheer…

The Rise Of BI Data And How To Use It Effectively

The Rise Of BI Data And How To Use It Effectively

The Rise of BI Data Every few years, a new concept or technological development is introduced that drastically improves the business world as a whole. In 1983, the first commercially handheld mobile phone debuted and provided workers with an unprecedented amount of availability, leading to more productivity and profits. More recently, the Cloud has taken availability far beyond the simple act of voice-to-voice communication, allowing businesses to untether employees from their desks and give them…

Cloud Native Trends Picking Up – Legacy Security Losing Ground

Cloud Native Trends Picking Up – Legacy Security Losing Ground

Cloud Native Trends Once upon a time, only a select few companies like Google and Salesforce possessed the knowledge and expertise to operate efficient cloud infrastructure and applications. Organizations patronizing those companies benefitted with apps that offered new benefits in flexibility, scalability and cost effectiveness. These days, the sharp division between cloud and on-premises infrastructure is quickly becoming a thing of the past. In fact, the cloud has become so ingrained in the fabric of…

Four Recurring Revenue Imperatives

Four Recurring Revenue Imperatives

Revenue Imperatives “Follow the money” is always a good piece of advice, but in today’s recurring revenue-driven market, “follow the customer” may be more powerful. Two recurring revenue imperatives highlight the importance of responding to, and cherishing customer interactions. Technology and competitive advantage influence the final two. If you’re part of the movement towards recurring revenue, here are four essentials to guide your way: All Revenue Will Become Recurring Revenue. Perhaps not this week or…

Write Once, Run Anywhere: The IoT Machine Learning Shift From Proprietary Technology To Data

Write Once, Run Anywhere: The IoT Machine Learning Shift From Proprietary Technology To Data

The IoT Machine Learning Shift While early artificial intelligence (AI) programs were a one-trick pony, typically only able to excel at one task, today it’s about becoming a jack of all trades. Or at least, that’s the intention. The goal is to write one program that can solve multi-variant problems without the need to be rewritten when conditions change—write once, run anywhere. Digital heavyweights—notably Amazon, Google, IBM, and Microsoft—are now open sourcing their machine learning…

Data Breaches: Incident Response Planning – Part 1

Data Breaches: Incident Response Planning – Part 1

Incident Response Planning – Part 1 The topic of cybersecurity has become part of the boardroom agendas in the last couple of years, and not surprisingly — these days, it’s almost impossible to read news headlines without noticing yet another story about a data breach. As cybersecurity shifts from being a strictly IT issue to being a mission-critical component, BODs are also becoming more interested in what their organizations are doing to plan their incident…