Category Archives: Technology

RCS In Emerging Markets Means A Step Forward For Cloud Computing

RCS In Emerging Markets Means A Step Forward For Cloud Computing

Rich Communication Services

As a cloud service provider operating in emerging markets, we’re excited about the possibilities of rich communication services (RCS) offered by mobile carriers.

You may remember, in the era before smartphones (and a bit after the launch), SMS ruled the mobile messaging landscape. There were no over-the-top (OTT) messaging platforms to compete with text-based mobile chatting and mobile carriers placed a premium on text messaging amounts.

And then came WhatsApp, LINE, Facebook Messenger, WeChat, Kakao, and Skype (among many others). All of a sudden, mobile carriers saw customers place less of a premium on SMS and data became the real breadwinner.

So why does the development of a chat platform excite a white label cloud service provider?

Simply put, RCS may be the messaging platform, but cloud is where the chats can be stored, backed up and accessed. If RCS is on the rise, we feel that cloud is going to be right there with it in the search for the perfect 4G bundle. Given that mobile carriers are involved in implementation of RCS, we feel that the cloud capabilities to accompany it are up for grabs.


So when Google announced last February that they had signed with the GSMA and mobile carriers around the world to develop an RCS for Android, we were just as excited about what that meant for the future of cloud on Android phones.

What is RCS you ask?

Think of RCS as SMS on steroids. While SMS lacks a lot of the emoticons, gifs, and video chatting options we typically find on OTT messengers, RCS would allow SMS to compete with similar features.

While early reception to RCS is mixed, when it’s implemented well, users are eager it implement it. T-Mobile’s RCS app, Advanced Messenger came armed with features such as real-time typing display, message delivery reports, and file sharing. After seven months, the US mobile carrier reported over 5.5 million users on the platform.

However, RCS does have a spotty history. Joyn, an RCS app by Jibe, failed to pick up any traction when it launched. While there were many reasons for Joyn’s failures, mainly the fact that while Joyn had potential, it was very poorly executed.

Thankfully, Google bought Jibe in September 2015, signing with the GSMA and mobile carriers globally just 5 months later.

RCS and the Emerging Market

In the first quarter of 2016, Android held the largest mobile market share by a mile with 84.1% of all units sold. And with Android devices sweeping emerging markets, the distance between first place Android and second place iOS looks like it’s only going to get further.

So here we are, with our own service targeting emerging markets, when all of a sudden, the leading device OS manufacturer comes out and says they want to implement a service that will require users to save more data on their existing plans.

RCS presents mobile carriers an opportunity to claim the messaging crown back from the likes of OTT. Putting things in perspective, mobile carriers are expected to earn US$96.7 billion in 2018 from SMS. In 2013, they were making US$120 billion from SMS revenue. You can see clearly the 23.3 billion reasons mobile carriers want to see RCS come to life.

In emerging markets where Android has dominated, RCS could take a healthy bit out of users on LINE, WeChat, Kakao, QQ, and even giants Facebook and WhatsApp. If you take into effect the network effect that OTT messengers benefit from (you download the messenger your friends and intimates use), RCS would benefit in the same vein iMessenger does for iPhones.

So when you factor in the network effect plus the segmentation of the OTT messenger space in emerging markets like Asia, this means Google could penetrate these markets instantly and be the first stop for mobile users with a pre-installed messenger.

Plus White Label Cloud

Looking at our own internal usage statistics for Cloudike personal, we’ve found that about 80% of the files stored are photos. While some users store files just to have backups ready in case of disaster, we would wager that some users store them because of space capacity on their phone.

So here comes RCS with with media sharing capabilities pre-installed on a phone. With Google’s backing, we’ve no doubt that RCS constitutes another source of data to occupy user storage spaces. And what better way for mobile carriers to get in on this action by pushing a white label cloud branded under their own flag to preserve and backup all this beautiful data shared over their network?

Again, we’re excited for RCS…

By Max Azarov

4 Tech Cleanups For National Cyber Security Awareness

4 Tech Cleanups For National Cyber Security Awareness

National Cyber Security Awareness

October is Cyber Security Awareness Month, and President Obama recently called upon the American people to recognize how important it is to have tight cyber security — not just for keeping personal details secure, but to support the nation’s security. Now is the perfect time to ensure you’re doing all you can to lock down your tech tools.

Here are four actionable tips you can take:

1. Restore Devices to Factory Settings Before Parting With Them

With the holiday season just around the corner, perhaps you’re considering selling a tablet you no longer need so you can generate some cash. There are many websites and physical shops that’ll accept devices in good condition. Or maybe you want to play Santa and give an old tablet to someone in your family who’s not concerned about having the newest model.


Before doing away with yours, though, select the option to restore the gadget to factory settings. That way, you can rest assured the next owner won’t see personal details you forgot to delete.

2. Verify App Permissions Regularly

Many of the apps you use every day probably share personal details. During the setup process of installing applications, you’ll usually see a pop-up window that indicates the kinds of information that’s normally disclosed through the app. If you don’t agree with the outlined permissions, there are usually ways to alter what’s shared.

However, many people absentmindedly accept the default permissions sharing option and only skim through the section that lists shared information. If you relate to that approach, there’s an easy way to take action — with another app.

MyPermissions works on the Android and iOS platforms and offers a streamlined way to scan your social media networks, computers and devices and check which permissions you’ve authorized for each application. It’s also possible to set alerts and receive notifications when apps access personal information.

After you’ve done an initial check, continue verifying permissions every month, or more often if you install apps frequently. Furthermore, adopt the habit of taking time to read details about permissions when downloading a new app rather than just blindly giving acceptance. Finally, scroll through your device and decide whether you really need everything you’ve installed.

3. Delete Old Files in All Applicable Places

Hopefully you’re already accustomed to periodically deleting unwanted files from your tablets, computers and smartphones. That’s a smart step to take because it not only helps those devices run faster, but it also gives hackers less data access if your files become compromised.

However, if you use a cloud-backup service, don’t forget to delete old files from the cloud instead of just from physical devices. The process for doing that varies based on the service you use, but it’s normally very straightforward.

This tip applies both to cloud-based backup services and cloud-storage services such as Dropbox and Google Drive. When people use the cloud-storage services, they often upload important documents, especially if they’re nervous about losing work due to a hardware failure or if they want to access those files from anywhere. When deleting files for good, don’t overlook those cloud-based storage sites, especially if you rely on them to hold sensitive information.

4. Set up Automatic Software Updates

There are dozens of ways to make your time online as secure as possible, and you can adjust settings so some of them occur in the background. Namely, see if your software has an automatic updating feature, and if so, turn it on. Software manufacturers publish security updates, patches and other enhancements to improve the user experience, especially if they’ve identified security vulnerabilities.

By enabling automatic updates, it’s easy to keep software as current as possible without further action on your behalf. Plus, ongoing updates allow you to always access the latest versions of software, preventing you from unknowingly using buggy, outdated versions that don’t include all available features.

The tips above all only take a few minutes of your time, but they could safeguard you from hours of headaches that result from compromised data. Tune up your tech today while simultaneously celebrating Cyber Security Awareness Month.

By Kayla Matthews

AT&T Announces New Strategic Relationship with Amazon Web Services

AT&T Announces New Strategic Relationship with Amazon Web Services

Alliance will initially focus on delivering suite of cloud solutions spanning on-demand cloud networking, security and IoT

DALLAS, Oct. 6, 2016 /PRNewswire/ — AT&T* has reached a multi-year, strategic alliance agreement with Amazon Web Services (AWS) to optimize delivery of integrated solutions built on the companies’ respective cloud and networking capabilities. The collaboration is designed to help both existing and new customers more efficiently migrate to and utilize the AWS Cloud with the AT&T network. The solutions are intended to span cloud networking, mobility, Internet of Things (IoT), security and analytics.

Customers of all sizes are quickly migrating to the AWS Cloud to reduce their data center footprint, become more agile and take advantage of innovation in areas such as IoT, Big Data and Analytics,” said Terry Wise, Vice President of Worldwide Partner Ecosystem, Amazon Web Services, Inc. “Advanced connectivity and network solutions are critical to enabling our customers to get the most out of our services. We are excited to expand our alliance with AT&T and deliver new solutions designed to enable customers to accelerate their journey to the AWS Cloud.”

For many enterprises, the cloud’s potential can be equal parts tantalizing and challenging. Emerging technology trends and fluctuating needs mean that a company’s plans are dynamic, and can quickly change,” said Mo Katibeh, Senior Vice President, Advanced Solutions, AT&T Business Solutions. “Together, AT&T and AWS can help streamline the leap to the cloud. We’re helping businesses connect everything and anything to the cloud. More importantly, we’re doing this so it can be simple, scalable and highly secure.

The collaboration will focus in three main business areas, with potential expansion in the future:

  • Business Cloud Networking: Since the integration was initially launched, AT&T NetBond® has become an increasingly popular way for customers to establish high-speed, highly secure network connections to the AWS Cloud. In fact, the AT&T NetBond ecosystem has seen four fold growth in connections and eight fold in traffic over the last year. In order to deliver even more advanced networking capabilities to customers, AT&T and AWS will work together to identify new solutions with security, performance, and mobility in mind. Emphasis will be placed on enhancing end-to-end customer visibility across more highly secure and high performing network connections, allowing for faster and more automated decision making capabilities to the customer.
  • IoT: AT&T and AWS will coordinate introduction of AT&T IoT-connected sensors and devices preconfigured to seamlessly and more securely send data into the AWS Cloud. This integration will provide customers with massive breadth and scale. It brings together AT&T’s global network, which connects nearly 29 million connected devices as of 2Q 2016 and reaches over 200 countries and territories, with AWS IoT, a managed cloud platform that can more securely and reliably scale to billions of devices and trillions of messages. Integration with the AT&T IoT Starter Kit and IoT Data plans are also intended to be included, which would allow customers to build their own solutions using AT&T IoT and AWS IoT.
  • Threat Management:AT&T and AWS both view security as the highest priority. As part of this expanded strategic relationship, AT&T and AWS plan to employ their respective expertise and knowledge in security to help customers prevent, detect, and respond to threats faster and more efficiently. Using threat data and knowledge from both organizations will help fuel the processes and tools that comprise AT&T Threat Intellect, the “brains” behind AT&T’s security platform that uses advanced analytics to help provide improved end-to-end security protection for every user on our network.

With a key focus on implementing innovative strategies, the alliance relationship will bring together designated professionals from each company to integrate automated and flexible cloud solutions in support of the global, mobilized workforce.

*AT&T products and services are provided or offered by subsidiaries and affiliates of AT&T Inc. under the AT&T brand and not by AT&T Inc.

About AT&T

AT&T Inc. (NYSE: T) helps millions around the globe connect with leading entertainment, mobile, high speed internet and voice services. We’re the world’s largest provider of pay TV. We have TV customers in the U.S. and 11 Latin American countries. We offer the best global coverage of any U.S. wireless provider.* And we help businesses worldwide serve their customers better with our mobility and highly secure cloud solutions.

Cloud Native Trends Picking Up – Legacy Security Losing Ground

Cloud Native Trends Picking Up – Legacy Security Losing Ground

Cloud Native Trends

Once upon a time, only a select few companies like Google and Salesforce possessed the knowledge and expertise to operate efficient cloud infrastructure and applications. Organizations patronizing those companies benefitted with apps that offered new benefits in flexibility, scalability and cost effectiveness.

These days, the sharp division between cloud and on-premises infrastructure is quickly becoming a thing of the past. In fact, the cloud has become so ingrained in the fabric of the enterprise computing experience that we often don’t even use the term “cloud” as a descriptive qualifier, but rather take it for granted as an inherent and vital component of all IT environments.


In the enterprise, where once traditional on-premises software like Oracle and SAP dominated the IT environment, organizations are now increasingly turning to cloud and cloud native capabilities – that is, applications built from microservices running in containers, or installed in cloud-based virtual machines (VMs)–to achieve greater efficiency and better economic value of IT services.

Why the surge of interest in cloud native technologies? Organizations that are making new and ambitious forays into the world of cloud native are allowed to press the proverbial “reset button.” For them, it’s an opportunity to do things differently, from customer-facing applications all the way down to the infrastructure layer.

And the advantages are tremendous. The ability to develop and manage applications in a true modular fashion – to troubleshoot and update components up and down the stack without impacting other parts of the application – delivers better efficiency and strong economic benefits which are some of the reasons why more and more organizations are rolling up their sleeves and diving headfirst into this new arena.

One of the driving forces behind this technological and economic transformation is the proliferation of container technologies like Docker*, which helps to enable automated deployment of cloud native applications. All you have to do is look at the numbers to wrap your head around Docker’s exponential growth rates. In February 2016, 2 billion Docker images had been pulled from Docker hub.


That number has recently surpassed 5 billion in August 2016, according to Docker published statistics. If this kind of growth trajectory remains consistent, it’s very likely that by 2020 nearly 100 percent of net new enterprise applications will be cloud native and a significant portion of legacy applications will be migrated to cloud native infrastructure.

The ripple effects around this massive shift are extensive. One of the ramifications is that traditional IT tooling suites are going to be losing quite a bit of “real estate.” For example, traditional storage mechanisms will likely give away to software-defined storage. Traditional networking with physical routers connected to physical endpoints will be replaced with virtual overlay networks whose topologies can change on the dot. And security mechanisms that work on traditional host or VM boundaries will need to adopt new semantic lens to address containers or container-equivalent.

Is this shift occurring already? The short answer is yes. Many user organizations are either already in the middle of the transformation or are actively preparing for this impending reality. Adobe, the Silicon Valley based digital media company, is moving its hugely-popular Creative Cloud services to cloud native infrastructure. Online payroll service provider ADP made an early and critical bet on Docker technology and is transforming many of its applications and services to a cloud native implementation. GE digital’s Predix system will be largely built on container infrastructure. Even GSA, the largest service provider to the U.S. government, invested heavily in Docker and microservice-related technologies to modernize service delivery to government agencies.

But what may be an even bigger harbinger of changes to come is that many startups aren’t investing in legacy products, but instead are leap-frogging over traditional solutions right into container technologies and cloud native apps. And the startup companies of today will be the new industry visionaries and leaders of tomorrow. While the apex of this technological shift might still be some time in the future, organizations that are laying the foundation for this transformation today will not only have a competitive edge tomorrow, but will also help pioneer an entirely new era of digital transformation.

By Chenxi Wang,

chenxi-wangDr. Chenxi Wang, current chief strategy officer at Twistlock, is a security industry veteran and a respected thought leader. She held a variety of strategy leadership positions from Intel and Ciphercloud, following a stint as a highly respected industry analyst at Forrester Research. Chenxi held a faculty position at Carnegie Mellon University earlier on in her career. She has a Ph.D. in Computer Science from University of Virginia.

Introducing and Implementing Voice Biometrics in Call Centers

Introducing and Implementing Voice Biometrics in Call Centers

Voice Biometrics in Call Centers

It wouldn’t be wrong to say that voice biometrics is the way of the future, when it comes to verifying the identity of customers contacting call centers. Market research firm Forrester, for one, predicts it will be the go-to authentication solution for financial institutions by 2020.

But it is just as accurate to say that voice biometrics is rapidly being recognized as today’s best practice as well. Already, major businesses in such sectors as banking and finance, healthcare, telecom, and other security-sensitive fields are recognizing that voice authentication offers a wide array of compelling benefits.

For one thing, it vastly improves the customer experience, by doing away with the unwelcome interrogations that call centers traditionally needed to go through to identify each caller. Since voice authentication relies on the caller’s normal conversation itself, and verifies a caller’s identity in real time without requiring any effort on the caller’s part, the process is frustration-free, unlike a barrage of questions. In fact, most consumers say they prefer voice authentication to jumping through the current hoops. Secondly, because voice authentication takes into account more than 100 variables of speech in a sophisticated mathematical expression, it offers a high degree of accuracy and security that rivals or exceeds the certainty of the fingerprint.


(Infographic Source: NJIT)

And, in no small matter for businesses, it offers benefits that go directly to the bottom line. By eliminating time spent on verifying identity every time the phone rings, it frees up employees for the revenue-generating activities at the heart of their jobs.

That said, it is still the case that making the transition from the old way to the new and improved way doesn’t come without challenges. Fortunately, with the right guidance for efficient implementation, these adoption challenges become negligible.

Facing the hurdles, and clearing them

  • As much as deploying a voice authentication solution is a technical challenge, it is also a legal one in many jurisdictions. It can’t happen without the consent of the customers, so investigating the requirements and potential issues is an essential starting point.
  • Once legal questions are resolved, the next step is optimizing the process of actually asking for consent. The key to mounting a successful recruitment campaign includes not only making an effective pitch by way of carefully selected channels (mass media, email etc.), but also providing consumers with the information they need about voice biometrics to make an informed decision about whether they want to opt in.
  • Enrolling those who give consent demands yet another optimized process to collect and maintain all the necessary records, but it also calls for attention to a crucial factor. If done less than optimally, enrollment can be a lengthy, complex, and expensive proposition to gather the voiceprints of customers. The alternative, as pointed out by the experts at NICE, a leading provider of voice biometrics solutions, is to enroll customers “passively“. As opposed to using an “active” approach, in which customers might be asked to repeat a phrase a number of times to create a voiceprint, a process that undermines the customer experience gains voice biometrics offers. The passive approach employs a solution that integrates with existing call recording capabilities to leverage historical calls. Once they gave their consent, customers can then be enrolled without having to do anything at all.
  • The need for integration doesn’t end with enrollment. It is not uncommon for call centers to need to integrate voice biometrics technology with a number of other systems such as security and CRM software. That can be a lengthy and costly process when an ad-hoc integration is attempted, but selecting a biometrics product that offers ready-made end-to-end support or that features embedded APIs can alleviate the problems.

The advantages outweigh the challenges

Everybody wins with voice biometrics. It puts the customer first, because it eliminates extra steps and frustration. Businesses and customers alike benefit from the added security it provides, and from the shorter call times, which pay off in convenience for the customer and increased ROI for the company – especially when the company has selected a biometrics solution that adapts to all necessary integrations.

By Naomi Webb

3 Keys To Keeping Your Online Data Accessible

3 Keys To Keeping Your Online Data Accessible

Online Data

Data storage is often a real headache for businesses. Additionally, the shift to the cloud in response to storage challenges has caused security teams to struggle to reorient, leaving 49 percent of organizations doubting their experts’ ability to adapt.

Even so, decision makers should not put off moving from old legacy systems to a more flexible and accessible solution — whether public or private. By putting the right system in place, businesses can free up IT staff for more strategic projects, ensure content is available and retrievable whenever and wherever it’s needed, and analyze data effectively for actionable insights.

Keeping Data Accessible

There are several obstacles that must be overcome when keeping data accessible:

1. Storage silos have been a problem since the first digital storage devices hit the market. Directory and folder hierarchical structures were fairly useful when dealing with a limited number of files, all accessed by users or a handful of applications that knew where to find the files.

But in today’s connected world, where remote collaboration and access by many devices and applications is the norm, these hierarchical structures are hindering new workflows and locking files in place (hence the term “silo”).

2. Search issues present a number of operational and financial challenges to businesses. Searching for data from multiple systems spread across several geographic locations is a laborious task, and the need to use both past and present data makes it even trickier.

The data that is searched is often indexed in a database located in a specific application. This valuable “data about the data,” also known as metadata, needs to be stored in a way that enables portability. The Internet of Things has opened businesses to a world of new data possibilities, but going back to a specific application to search for your file or continuously migrating entire data sets to different analysis applications wastes valuable time and introduces the possibility of errors.

3. Scalability dilemmas in storage capacity, both in file count and the amount of data, as well as expansion to different geographies, prevents businesses from keeping pace with the needs of modern data accessibility requirements.

Most organizations keep data forever because they don’t know what will have value. There are also many use cases in which government regulations require longer retention times and tighter security, creating a compounding effect on storage needs. This growth, combined with the need to keep the data accessible, poses a serious problem for traditional network attached storage solutions, file systems, and their complex hierarchical structures.

Making Your Storage Efficient


While certainly challenging, these problems are far from insurmountable.  Here are 3 easy-to-implement solutions to help keep storage simple and efficient:

1. Consolidate your data in one storage platform.

The dawn of the cloud was a major breakthrough for data storage, and the first step toward a simplified storage process is to embrace that technology. Sharing resources in a virtual environment is at the heart of the transformation we’re seeing to a more service-based approach in IT.

You can now stand up a storage service within your own data center (a private solution) or use any one of the services on the market (a public solution). If you need to keep your data secure or plan to keep the data for more than three years, private is most likely your best option. However, if you have limited data center space or only need to store data for a few months or years, public is probably the way to go.

2. Leverage metadata.

Data is growing at an astonishing rate, and experts predict the digital universe will reach 44 trillion gigabytes by 2020. But what use is that data if it can’t be found or identified? Metadata is an essential tool for simplifying data storage because it allows managers to quickly and automatically identify characteristics about data in a way that can continuously evolve, providing new views of ever-changing data sets.

The key is making metadata portable and accessible by any application or device in a way that’s easy to protect. For this reason, metadata searching and management must be native features of your storage systems — not just afterthoughts.

3. Adopt object storage.

Object storage is a core feature of many major cloud storage services on the market and is the most efficient and cost-effective way to reliably store and provide access to petabytes of data and trillions of files. Object storage is highly automated, resilient, and easily available, resulting in a vastly improved capacity-to-management resource ratio. It’s common to find one system administrator managing more than 10 PBs of storage (compared to 1PB for a NAS solution).

Object storage uses a method of storing and retrieving data that uses a key or name, supplementing that with metadata. Think of it like a valet service for your data: When you store something, you get a key or associate a tag (metadata) with it. All you need to do is present the key or search for the specific tag or combination of tags, and the storage system will retrieve the data that matches your request.


This approach not only makes data easier to find, but it also enables continuous, self-healing protection and virtually unlimited scalability. Certain vendors are also making significant advancements in integrating search and providing interfaces that plug right into existing workflows in a way that’s transparent to current users and applications.

The most effective and simple storage solutions incorporate data consolidation and the use of metadata with object storage. This provides greater data access, better protection from data corruption, and the streamlined performance necessary to keep any amount of data online, accessible, and providing value for growing businesses and organizations.

Whether you want to attribute the quote “With great power comes great responsibility” to Voltaire or Spider-Man, in the world of business, we need to preface that by saying “With great knowledge comes great power.” Once you simplify your storage, it gives you the knowledge to not only help run your business, but to also gain actionable insight and the power to make discoveries that can help you solve problems and propel your business forward.

By Jonathan Ring

jonathan-ringJonathan Ring is co-founder and CEO of Caringo, a leading scale-out storage provider. Prior to Caringo, Jonathan was an active angel investor advising a broad range of companies, and he was a vice president of engineering at Siebel Systems, where he was a member of the executive team that grew Siebel from $4 million to $2 billion in sales. Jonathan’s passion and experience are shaping the future of Caringo.

Cloud and the Convenience Solution

Cloud and the Convenience Solution

Cloud Mobility

Buying a new phone is always an exciting endeavour. Whether you had just broken your phone (ouch) or re-upping after a contract expired, it’s something most people look forward to. As a mobile carrier, while your line-up of fancy new phones and best-bang-for-buck service plans will entice your customers, one feature that doesn’t often make headlines is convenience.

It may be low-key, but over the years, mobile carriers have made an effort to make switching carriers, renewing plans, or signing a contract easier and easier.

Yet, one issue of convenience not being tackled by mobile carriers is backing up and moving existing personal effects onto a new one.

For example, we’ve seen offers like Verizon’s which helps customers keep their existing phone numbers or T-Mobile’s providing discounts for bringing in your pre-owned devices. All of this is done in the name of bringing in and retaining customers.


But all of these existing promotions deal with hardware and assets. From our vantage point, we feel that consumer-side convenience is an up-and-coming market. And if you’ve ever bought a new phone and sat there moving, downloading, and checking everything into your new phone, I’m ready to bet that you’ve come across one or two things later that you inexplicably missed. While the software to help transition personal data on mobile phones exists, the process is still left outside of mobile carrier control.

The smooth and consolidated transfer of personal effects should be something mobile carriers add as more and more users buy their 2nd or 3rd smartphones – and we feel that white label personal clouds are just the way to access the market.

The Status of Cloud Integration by Carriers

According to research done by Ericsson in 2012, mobile carriers have dedicated significant amounts of time and money towards integrating cloud into their existing bundle of services. The report cites Verizon having spent “well over US$2 billion” trying to capture a large share of the global cloud community; while Australia’s largest telecom, Telstra, predicts that cloud would make up roughly 20-30% of its total revenue by 2018.

However, even with all that money spent, cloud computing has yet to headline mobile plans as a pillar of a winning 4G offering for customers.

This possibility of transferring files, is an opportunity left unexplored by most mobile carriers.

Convenience and Transition

In an open questionnaire by Android Police in 2015, over 63% of respondents claimed that they had owned between 1-4 smartphones (The survey looked at Android device ownership exclusively), with 3 being the most frequent response at 21%. Given the average smartphone plan length at 2-3 years, this indicates that most users have only gone through the hassles of transferring data once:

  • The first commercially available Android device, HTC’s Dream in 2008, had only 256 MB of memory and would’ve been an easy move for personal data
  • According to that 2-3 plan cycle, the next available smartphones, such as the Galaxy SII, was the first time where users had significant internal storage to move personal effects like photos, videos, docs, etc…
  • With their next phone (roughly 2013 and onwards on 2-3 year plan cycles) is the first time where users may have had difficulty transferring data given the sheer amounts (8 GB and up)

Granted, Android and iOS allows users to sync contacts, notes, and calendars through its own infrastructure, while apps downloaded can be backed up through the app stores of both platforms.

However, everything from photos, videos, documents, messages have to be transferred by the individual through third-party apps or through their PCs rather than through the operating system.

For consumers in emerging markets, this solution becomes even more pivotal given that many of their users have skipped the ‘256 MB era’ altogether. This means these smartphone owners will face the issue on their second phone.

This is the chance white label cloud solutions can aim at.

Backup and Access As Needed – All Under Your Brand

Given the costs associated with integrating a cloud onto existing services (i.e. Verizon’s US$2 billion cloud budget), we wanted to offer mobile carriers a scalable and affordable cloud option. For us, that included making sure that mobile service subscribers wouldn’t be handcuffed to packages (like Dropbox’s Pro option) should they decide to exceed their allotted 2 GB.


(Comic Above Is Free For The Commercial/Personal Reuse Courtesy Of CloudTweaks)

With white label, brands have the opportunity to brand and advertise their newfound cloud feature. Enabling them another leg up on the competition when they can quote features such as ‘transfer all of your personal effects from one phone to another’ without issue.

In conclusion, yes, we feel that white label cloud solutions should take sight at this market deemed convenience. As more and more users go through smartphones with sizeable memory, we’re banking on this issue becoming more and more prominent.

The question is: Will your mobile carrier be ready with a solution?

By Max Azarov
Jobs of The Future with AI and VR

Jobs of The Future with AI and VR

Future Jobs

Some people have been worried that with the growth of technologies like artificial intelligence (AI) and virtual reality (VR) jobs will become more scarce. We have learned from history though that every time a new technology hits the market, any job losses from it usually are replaced by new jobs related to that technology. This infographic from Futurism gives us a good glimpse at what such a future with the boom of artificial intelligence and virtual reality may look like.

Neuro-implant technicians as well as other neuro-scientists of all kinds will be needed to deal with the neuro-implant boom which is set to happen in the next few years.

Smart home technicians will also be needed to install smart home technology. Smart home engineers will be needed to problem solve current smart home technology models and innovate new systems of smart home technology.


Budding program designers can look forward to programming virtual reality. A VR experience specialist will be able to refine the VR experience for all aspects of work, play, home, entertainment, shopping, family, etc.

More and more professors will become freelance professionals since teaching will move into the on demand realm. Starting your own university won’t seem like such a foreign concept anymore; many professors will carry their own custom teaching style, course materials, and marketing plan.

We might see the return of local farming as the public becomes more aware of the growing environment damage of industrial farming.

Some people will become a professional data collector – collecting a terabyte of information or more every day while they go about their normal routine – and they will be compensated handsomely for it.

This information rich infographic has a lot more to say about what the possible jobs of the future are and how they are going to come into existence – so check it out if you want to see more about what careers of the future could be like!

By Jonquil McDaniel

CloudTweaks Comics
Cloud Infographic – DDoS attacks, unauthorized access and false alarms

Cloud Infographic – DDoS attacks, unauthorized access and false alarms

DDoS attacks, unauthorized access and false alarms Above DDoS attacks, unauthorized access and false alarms, malware is the most common incident that security teams reported responding to in 2014, according to a recent survey from SANS Institute and late-stage security startup AlienVault. The average cost of a data breach? $3.5 million, or $145 per sensitive…

The DDoS That Came Through IoT: A New Era For Cyber Crime

The DDoS That Came Through IoT: A New Era For Cyber Crime

A New Era for Cyber Crime Last September, the website of a well-known security journalist was hit by a massive DDoS attack. The site’s host stated it was the largest attack of that type they had ever seen. Rather than originating at an identifiable location, the attack seemed to come from everywhere, and it seemed…

Cloud Infographic: Security And DDoS

Cloud Infographic: Security And DDoS

Security, Security, Security!! Get use to it as we’ll be hearing more and more of this in the coming years. Collaborative security efforts from around the world must start as sometimes it feels there is a sense of Fait Accompli, that it’s simply too late to feel safe in this digital age. We may not…

The Conflict Of Net Neutrality And DDoS-Attacks!

The Conflict Of Net Neutrality And DDoS-Attacks!

The Conflict Of Net Neutrality And DDoS-Attacks! So we are all cheering as the FCC last week made the right choice in upholding the principle of net neutrality! For the general public it is a given that an ISP should be allowed to charge for bandwidth and Internet access but never to block or somehow…

Part 1 – Connected Vehicles: Paving The Way For IoT On Wheels

Part 1 – Connected Vehicles: Paving The Way For IoT On Wheels

Connected Vehicles From cars to combines, the IoT market potential of connected vehicles is so expansive that it will even eclipse that of the mobile phone. Connected personal vehicles will be the final link in a fully connected IoT ecosystem. This is an incredibly important moment to capitalize on given how much time people spend…

How The CFAA Ruling Affects Individuals And Password-Sharing

How The CFAA Ruling Affects Individuals And Password-Sharing

Individuals and Password-Sharing With the 1980s came the explosion of computing. In 1980, the Commodore ushered in the advent of home computing. Time magazine declared 1982 was “The Year of the Computer.” By 1983, there were an estimated 10 million personal computers in the United States alone. As soon as computers became popular, the federal government…

Data Breaches: Incident Response Planning – Part 1

Data Breaches: Incident Response Planning – Part 1

Incident Response Planning – Part 1 The topic of cybersecurity has become part of the boardroom agendas in the last couple of years, and not surprisingly — these days, it’s almost impossible to read news headlines without noticing yet another story about a data breach. As cybersecurity shifts from being a strictly IT issue to…

5 Ways To Ensure Your Cloud Solution Is Always Operational

5 Ways To Ensure Your Cloud Solution Is Always Operational

Ensure Your Cloud Is Always Operational We have become so accustomed to being online that we take for granted the technological advances that enable us to have instant access to everything and anything on the internet, wherever we are. In fact, it would likely be a little disconcerting if we really mapped out all that…

Cloud Native Trends Picking Up – Legacy Security Losing Ground

Cloud Native Trends Picking Up – Legacy Security Losing Ground

Cloud Native Trends Once upon a time, only a select few companies like Google and Salesforce possessed the knowledge and expertise to operate efficient cloud infrastructure and applications. Organizations patronizing those companies benefitted with apps that offered new benefits in flexibility, scalability and cost effectiveness. These days, the sharp division between cloud and on-premises infrastructure…

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups Cloud platforms have become a necessary part of modern business with the benefits far outweighing the risks. However, the risks are real and account for billions of dollars in losses across the globe per year. If you’ve been hacked, you’re not alone. Here are some other companies in the past…

Three Tips To Simplify Governance, Risk and Compliance

Three Tips To Simplify Governance, Risk and Compliance

Governance, Risk and Compliance Businesses are under pressure to deliver against a backdrop of evolving regulations and security threats. In the face of such challenges they strive to perform better, be leaner, cut costs and be more efficient. Effective governance, risk and compliance (GRC) can help preserve the business’ corporate integrity and protect the brand,…


Sponsored Partners