SYS-CON MEDIA Authors: Yeshim Deniz, Pat Romanski, Elizabeth White, Liz McMillan, William Schmarzo

Blog Feed Post

Gladinet Cloud Desktop 2.0 Enhances Security, Performance, Usability and Google Docs Support

Gladinet Cloud Desktop 2.0 Enhances Security

With the release of Cloud Desktop 2.0, Gladinet expects to further establish its industry-leading position as the world's first ubiquitous cloud storage client by enhancing security, usability and performance. Following are some highlights of the new capabilities and enhancements. For more information about Google enhancements, visit ReadWriteWeb's article explaining how to Map GDrive as a Desktop Folder with Gladinet

Enhanced Usability

The new Gladinet Management Console completely reworks and consolidates all the management interfaces for the Cloud Desktop virtual directory manager, task manager, settings manager, backup manager and audit tracing, and the new Cache Manager offers smart caching and granular cache controls.

Here's a screen shot of the new task manager. It gives a brief overview of the progress of all the transfers and backups, with the ability to drill down for more detail.

clip_image002

The new cache manager provides features like the ability to set the cache control mode. There are three modes. 'Low cache usage' and 'Auto optimized' are based on pre-configured settings. 'Advanced Mode' allows the user full freedom to change any cache settings.

clip_image004

When 'Advanced Mode' is selected, you can use the cache usage overview panel or the cache control settings panel to fine tune operation of the cache.

clip_image006

Secure Cloud Storage

Gladinet recognizes that one of the major concerns of cloud storage users is security. How can users be sure that hackers, service provider employees or anyone else can’t look at their files when they’re online? Until now, that was a nagging question with no good answer.

With the introduction of AES 128-bit encryption for files stored in the cloud, Gladinet Cloud Desktop 2.0 is tackling that concern head-on: The system simply encrypts users’ files on the storage client before saving them on the servers in their encrypted form.

Cloud Desktop 2.0- provides a convenient interface to show which directories have been selected for encryption:

clip_image008

Adding a new encrypted folder is also quite user friendly:

clip_image010

The user will also be prompted for a password which will be used to generate a private encryption key.

Faster and More Robust

Cloud Desktop 2.0 is considerably more robust than the system’s earlier iterations, transferring terabytes of data with dozens of upload and download threads, maintaining transfer rates of up to four megabytes per second. To do so, the system uses mirrored folders to pre-cache files and utilizes Smart Bandwidth Control to allocate more bandwidth to the browser when it is in use; once the browser is idle, Cloud Desktop resumes normal transfer speeds.

Note the concurrency and throughput below. This test was running on a machine with a 5MB\s upload speed. Transfer speeds ranged as high as 4MB\s.

clip_image002[1]

Enhanced Cloud Service Integration

Although Gladinet Cloud Desktop has always been fully integrated with the major cloud storage providers -- including Google, Microsoft, EMC, Amazon, Nirvanix, Box.net and AT&T -- with Cloud Desktop 2.0, Gladinet has provided enhancements for Google Picasa, Docs and Apps. The system now supports any file type in Google Storage, while the new Cloud Explorer allows the user to set access controls and share files with Amazon S3 and Azure Blob Storage. The Cloud Explorer is of particular interest as it provides a platform to further develop finer controls of cloud storage in the future.

For more details about the 2.0 enhancements, check out the Gladinet Wiki and the description of Gladinet Support for Google Storage

More Stories By Jerry Huang

Jerry Huang, an engineer and entrepreneur, founded Gladinet with his close friends and is pursuing interests in the cloud computing. He has published articles on the company blog as well as following up on the company twitter activities. He graduated from the University of Michigan in 1998 and has lived in West Palm Beach, Florida since.

Latest Stories
CloudEXPO | DevOpsSUMMIT | DXWorldEXPO Silicon Valley 2019 will cover all of these tools, with the most comprehensive program and with 222 rockstar speakers throughout our industry presenting 22 Keynotes and General Sessions, 250 Breakout Sessions along 10 Tracks, as well as our signature Power Panels. Our Expo Floor will bring together the leading global 200 companies throughout the world of Cloud Computing, DevOps, IoT, Smart Cities, FinTech, Digital Transformation, and all they entail. As ...
Darktrace is the world's leading AI company for cyber security. Created by mathematicians from the University of Cambridge, Darktrace's Enterprise Immune System is the first non-consumer application of machine learning to work at scale, across all network types, from physical, virtualized, and cloud, through to IoT and industrial control systems. Installed as a self-configuring cyber defense platform, Darktrace continuously learns what is ‘normal' for all devices and users, updating its understa...
Digital Transformation (DX) is a major focus with the introduction of DXWorldEXPO within the program. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive over the long term. A total of 88% of Fortune 500 companies from a generation ago are now out of business. Only 12% still survive. Similar percentages are found throughout enterprises of all sizes. We are offering early bird savings...
SUSE is a German-based, multinational, open-source software company that develops and sells Linux products to business customers. Founded in 1992, it was the first company to market Linux for the enterprise. Founded in 1992, SUSE is the world’s first provider of an Enterprise Linux distribution. Today, thousands of businesses worldwide rely on SUSE for their mission-critical computing and IT management needs.
The dream is universal: heuristic driven, global business operations without interruption so that nobody has to wake up at 4am to solve a problem. Building upon Nutanix Acropolis software defined storage, virtualization, and networking platform, Mark will demonstrate business lifecycle automation with freedom of choice and consumption models. Hybrid cloud applications and operations are controllable by the Nutanix Prism control plane with Calm automation, which can weave together the following: ...
Crosscode Panoptics Automated Enterprise Architecture Software. Application Discovery and Dependency Mapping. Automatically generate a powerful enterprise-wide map of your organization's IT assets down to the code level. Enterprise Impact Assessment. Automatically analyze the impact, to every asset in the enterprise down to the code level. Automated IT Governance Software. Create rules and alerts based on code level insights, including security issues, to automate governance. Enterpr...
Your job is mostly boring. Many of the IT operations tasks you perform on a day-to-day basis are repetitive and dull. Utilizing automation can improve your work life, automating away the drudgery and embracing the passion for technology that got you started in the first place. In this presentation, I'll talk about what automation is, and how to approach implementing it in the context of IT Operations. Ned will discuss keys to success in the long term and include practical real-world examples. Ge...
Cloud is the motor for innovation and digital transformation. CIOs will run 25% of total application workloads in the cloud by the end of 2018, based on recent Morgan Stanley report. Having the right enterprise cloud strategy in place, often in a multi cloud environment, also helps companies become a more intelligent business. Companies that master this path have something in common: they create a culture of continuous innovation.
Eric Taylor, a former hacker, reveals what he's learned about cybersecurity. Taylor's life as a hacker began when he was just 12 years old and playing video games at home. Russian hackers are notorious for their hacking skills, but one American says he hacked a Russian cyber gang at just 15 years old. The government eventually caught up with Taylor and he pleaded guilty to posting the personal information on the internet, among other charges. Eric Taylor, who went by the nickname Cosmo...
DevOpsSUMMIT at CloudEXPO, to be held June 25-26, 2019 at the Santa Clara Convention Center in Santa Clara, CA – announces that its Call for Papers is open. Born out of proven success in agile development, cloud computing, and process automation, DevOps is a macro trend you cannot afford to miss. From showcase success stories from early adopters and web-scale businesses, DevOps is expanding to organizations of all sizes, including the world's largest enterprises – and delivering real results. Am...
The benefits of automated cloud deployments for speed, reliability and security are undeniable. The cornerstone of this approach, immutable deployment, promotes the idea of continuously rolling safe, stable images instead of trying to keep up with managing a fixed pool of virtual or physical machines. In this talk, we'll explore the immutable infrastructure pattern and how to use continuous deployment and continuous integration (CI/CD) process to build and manage server images for any platfo...
Automation is turning manual or repetitive IT tasks into a thing of the past-including in the datacenter. Nutanix not only provides a world-class user interface, but also a comprehensive set of APIs to allow the automation of provisioning, data collection, and other tasks. In this session, you'll explore Nutanix APIs-from provisioning to other Day 0, Day 1 operations. Come learn about how you can easily leverage Nutanix APIs for orchestration and automation of infrastructure, VMs, networking, an...
It cannot be overseen or regulated by any one administrator, like a government or bank. Currently, there is no government regulation on them which also means there is no government safeguards over them. Although many are looking at Bitcoin to put money into, it would be wise to proceed with caution. Regular central banks are watching it and deciding whether or not to make them illegal (Criminalize them) and therefore make them worthless and eliminate them as competition. ICOs (Initial Coin Offer...
René Bostic is the Technical VP of the IBM Cloud Unit in North America. Enjoying her career with IBM during the modern millennial technological era, she is an expert in cloud computing, DevOps and emerging cloud technologies such as Blockchain. Her strengths and core competencies include a proven record of accomplishments in consensus building at all levels to assess, plan, and implement enterprise and cloud computing solutions. René is a member of the Society of Women Engineers (SWE) and a m...
Organize your corporate travel faster, at lower cost. Hotailors is a next-gen AI-powered travel platform. What is Hotailors? Hotailors is a platform for organising business travels that grants access to the best real-time offers from 2.000.000+ hotels and 700+ airlines in the whole world. Thanks to our solution you can plan, book & expense business trips in less than 5 minutes. Accordingly to your travel policy, budget limits and cashless for your employees. With our reporting, int...