GDrive: Driving In The Right Direction?

GDrive: Driving In The Right Direction?

Technology has yet again touched new horizons. Google has launched its new GDrive into the market, and mixed results have precipitated in the cloud computing world. To start off, Google docs has been among Google’s primary and most effective cloud computing services, but the need for GDrive evolved because of the ravaging competitors who brutally came onto the scene with brilliant, user-friendly interfaces.

Among GDrive’s greatest strengths is the fact that it can successfully be integrated with Google docs and Google apps. This gives Google an edge over most of its competitors, because it makes cloud storage easier. In contrast, file conversion is needed for few types of files. This makes GDrive a less attractive product as compared to other competitors for the average consumer, who tends to opt for an easy-to-use product. Popular rivals of GDrive such as Dropbox have made it extremely easy for users to upload files in the shortest possible time.

Moving on to security, cloud computing has to win its users’ hearts by providing them with the firm belief that their files will be secure. If a browser alerts its user about a fault in the website’s security certificate, there is a strong chance that the website is not secure. GDrive has no such issues, and here cloud storage is much safer and more reliable.

Perhaps one of the greatest drawbacks of cloud computing is that large files are difficult to move around. This nuisance clings to GDrive as it clings to other cloud computing services. On the other hand, having revolutionized the business world with Google docs, Google will feel obliged to try it’s luck with GDrive.

Another strategy adopted by Google to win over customers, is that it has increased the amount of available free storage to 5 GB. This is more than double the storage capacity provided by most other cloud storage service providers. But this is a well-worn strategy, and may not be sufficient to lure many customers to GDrive.

Even though GDrive has brought with it some new features, it still lacks innovation. Other products such as Dropbox have established strong roots in this volatile market, and are more mature than GDrive in the cloud computing world. Being an infant on a well-established cloud computing stage will not help GDrive, and it will have to come up with radical ideas to divert users toward its services.

By Haris Smith

Sorry, comments are closed for this post.

Don’t Be Intimidated By Data Governance

Don’t Be Intimidated By Data Governance

Data Governance Data governance, the understanding of the raw data of an organization is an area IT departments have historically viewed as a lose-lose proposition. Not doing anything means organizations run the risk of data loss, data breaches and data anarchy – no control, no oversight – the Wild West with IT is just hoping…

Do Not Rely On Passwords To Protect Your Online Information

Do Not Rely On Passwords To Protect Your Online Information

Password Challenges  Simple passwords are no longer safe to use online. John Barco, vice president of Global Product Marketing at ForgeRock, explains why it’s time the industry embraced more advanced identity-centric solutions that improve the customer experience while also providing stronger security. Since the beginning of logins, consumers have used a simple username and password to…

Is Machine Learning Making Your Data Scientists Obsolete?

Is Machine Learning Making Your Data Scientists Obsolete?

Machine Learning and Data Scientists In a recent study, almost all the businesses surveyed stated that big data analytics were fundamental to their business strategies. Although the field of computer and information research scientists is growing faster than any other occupation, the increasing applicability of data science across business sectors is leading to an exponential…

5% Of Companies Have Embraced The Digital Innovation Fostered By Cloud Computing

5% Of Companies Have Embraced The Digital Innovation Fostered By Cloud Computing

Embracing The Cloud We love the stories of big complacent industry leaders having their positions sledge hammered by nimble cloud-based competitors. Saleforce.com chews up Oracle’s CRM business. Airbnb has a bigger market cap than Marriott. Amazon crushes Walmart (and pretty much every other retailer). We say: “How could they have not seen this coming?” But, more…

How The CFAA Ruling Affects Individuals And Password-Sharing

How The CFAA Ruling Affects Individuals And Password-Sharing

Individuals and Password-Sharing With the 1980s came the explosion of computing. In 1980, the Commodore ushered in the advent of home computing. Time magazine declared 1982 was “The Year of the Computer.” By 1983, there were an estimated 10 million personal computers in the United States alone. As soon as computers became popular, the federal government…

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart  Breaches Formal verification is not a new concept. In a nutshell, the process uses sophisticated math to prove or disprove whether a system achieves its desired functional specifications. It is employed by organizations that build products that absolutely cannot fail. One of the reasons NASA rovers are still roaming Mars…

Three Challenges of Network Deployment in Hyperconverged Infrastructure for Private Cloud

Three Challenges of Network Deployment in Hyperconverged Infrastructure for Private Cloud

Hyperconverged Infrastructure In this article, we’ll explore three challenges that are associated with network deployment in a hyperconverged private cloud environment, and then we’ll consider several methods to overcome those challenges. The Main Challenge: Bring Your Own (Physical) Network Some of the main challenges of deploying a hyperconverged infrastructure software solution in a data center are the diverse physical…

How To Overcome Data Insecurity In The Cloud

How To Overcome Data Insecurity In The Cloud

Data Insecurity In The Cloud Today’s escalating attacks, vulnerabilities, breaches, and losses have cut deeply across organizations and captured the attention of, regulators, investors and most importantly customers. In many cases such incidents have completely eroded customer trust in a company, its services and its employees. The challenge of ensuring data security is far more…

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

The 80-20 Rule For Security Practitioners  Everyday we learn about yet another egregious data security breach, exposure of customer data or misuse of data. It begs the question why in this 21st century, as a security industry we cannot seem to secure our most valuable data assets when technology has surpassed our expectations in other regards.…