Welcome!

Storage Made Easy

Jim Liddle

Subscribe to Jim Liddle: eMailAlertsEmail Alerts
Get Jim Liddle via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories by Jim Liddle

The Top 10 Things to Demand From Your Enterprise File Sync and Share Vendor Enterprise File Sync and Share is being embraced by more and more enterprise companies and this article look at the must have features that should be demanded from an Enterprise Sync and Share vendor. 1. Go hybrid, private or cloud: An enterprise will likely have different topologies and different ways of wanting to deploy. The EFSS vendors should support not only cloud but also hybrid and private topologies to enable enterprises to satisfy all potential use cases. 2. Support Standard protocols: Many enterprise apps and hardware already support standard protocols and any Sync and Share product should be an enabler for use with standard protocols such as WebDav, FTP, and SFTP. 3. Support the Amazon S3 protocol: Amazon S3 is now a de facto standard protocol for many enterprises and many of  scri... (more)

Retail Banks - Dinosaurs in an Online World

I had some interesting (sic) experiences with two separate banks with regards to two business accounts that we keep with each recently. The problem highlighted two issues that were both in some ways intertwined: False positive flagging of online transactions Identity Management between bank departments First let me set the scenario. I am CEO of Storage Made Easy, a business that can be categorized (in bank speak) as an online internet business. We are a business that spends a fair amount on online advertising through various different channels and who also uses best of breed onlin... (more)

How to Secure Your Data in the Cloud in 2014

The recent PRISM Data snooping controversies have heightened almost every companies awareness of the potential vulnerabilities of data stored off-premise in the Cloud. Many Cloud Storage companies talk about encrypting data ‘at rest' but the real issue is that the storage companies control the encryption rather than the company whose data is stored controlling the private key. Ask yourself these questions? Are you comfortable not controlling your own file encryption? Do you have sensitive data you wish to store in the cloud that you do not want to have your file sharing vendor ... (more)

Understanding Straight-Through Processing - A technical overview

Straight-Through Processing (STP) is a term associated with workflow and business process management technologies. STP is the automation of a process flow, from invocation to execution. STP allows the seamless and accurate transactional exchange of information electronically. It can involve many different information stores and parties within the process flow, and it reduces the need for human intervention. STP is often associated with the financial services and securities industry, as this is where its use has been prevalent, due to a change in legislation (Rule 15c6-1) by the ... (more)

Yet Another Java/J2ME Google Maps Midlet!

Jim Liddle's Symbian Blog: Yet Another Java/J2ME Google Maps Midlet! These seem to be coming out quicker that I can blog them !  This one is called J2MEMap and you can get the JAR from here, and the jar from here ... (more)