get2Clouds(R)

Blogs

Silicon Valley (Sitcom)

2016-05-24

A show about a start up just like Get2clouds


This is a new sitcom by HBO, which is steadily growing in popularity. It shows you the life cycle and problems faced by a group of engineers who start a compression company called Pied Pipper.

"In the high-tech gold rush of modern Silicon Valley, the people most qualified to succeed are the least capable of handling success. A comedy partially inspired by Mike Judge's own experiences as a Silicon Valley engineer in the late 1980s. Written by Home Box Office"-Plot summary from IMDB.

Dropbox introduces new document scanning feature

2016-05-20

Dropbox introduces new document scanning feature.


The best feature so far is the tool on the mobile application that allows users to be able to scan documents and upload them directly to Dropbox. This will be a great addition to their service.

They are also enhancing their search abilities. They use OCR (Optical Character Recognition) to be able to identify text in the documents it's scanning. If this concept works they will be able to search within documents on the app. This is entering into a new area for Dropbox.

Worlds most powerful computer

2016-05-16

China has built a new supercomputer.


The 93 petaflop Sunway TaihuLight is now officially the most powerful and fastest computer in the world.

The Chinese supercomputer is in Wuxi, east China's Jiangsu Province, and capable of performing 93 quadrillion calculations per second. Sunway Taihu Light beat China's Tianhe-2 from the list of 500 most powerful supercomputers in the world.

Magic Pony acquired by Twitter

2016-05-12

Twitter buys Magic Pony for 150 Million Dollars


Magic Pony Technologies is a machine learning company.

Magic Pony use neural networks to examine images and understand the "features of imagery", and Twitter is likely to use it to enhance its live video offerings.

Machine Learning is an integral part of what Twitter does as a company. So this acquisition makes complete sense. The Magic Pony team will be joining the "Cortex" the team of Engineers, Data Scientists and Machine Learning Scientists at Twitter.

Internet connectivity in cars

2016-05-10

The new Tesla model X comes with full internet connectivity.


The world is going crazy for the new Tesla Model X, indisputably the car of the future.

The Model X is one of the first and greatest smart cars ever built. Not only does it have Falcon doors, it also looks like it’s jumped straight out of a futuristic cartoon.

What is an API

2016-05-05

Application Programming Interface


"In computer programming, an application programming interface (API) is a set of routine definitions, protocols, and tools for building software and applications.

Music Coalition with E2E

2016-05-03

Music Production and File Transfer


With the advent of file sharing and P2P transferring of just about any sort of files, the e-music producers didn't want to be left behind. With high speed internet lots of DJs and music producers started sending their raw tracks to people around the work to add an instrument or a new sound too. This has become a very common way of producing music and not having to limit your reach only to people who can come to your studio.

Top 5 Data Breaches in the World

2016-05-01

List of most Deadly Security Breaches in the World


Here is list of some of biggest names that have had security breaches.

1. Heartland Payment Systems, 2008-2009: 130 million records compromised Early 2009, New Jersey based payment-processor company. Exposing nearly 130 million Credit/Debit card costumers to hackers. Albert Gonzalez, was sentenced to 20 years in prison for the breach.

Transfer Manager

2016-04-30

File Transfer Manager


What is a file transfer manager? It is a secure way of transferring files from one computer to another, when users have to transfer a large or small amount of secure data that shouldn't be hacked or fall into the hands of the wrong people.

A way to ensure this is through E2E or end to end Encryption, where only the person who is going to receive the file has a password to look at the actual content.