Georgina Park

I am a marketing enthusiast in my twenties who loves travelling, sports and socialising. I recently returned from a round the world backpacking trip and currently keep dreaming of sandy beaches!
Find me on:

Recent Posts

Introducing Quatrix Business

Posted by Georgina Park

Apr 16, 2014 12:00:00 PM

 Quatrix_Business_Logo-pos-01

At Maytech we never stop innovating, so it’s with great pleasure we’re announcing the latest evolution of our growing product range: Quatrix Business.

Quatix Business is for organisations that crave a no-nonsense data-transfer service which is fast and secure, because it marries these two essential elements with a near-religious focus. Security and Simplicity are our gods.

It means Quatrix Business users get the sort of stringent security standards demanded by modern IT departments coupled with a level of usability that can be mastered by the average domesticated moggy. So Brian in marketing should be fine with it too.

 

Read More

Topics: Quatrix

Your Data, Your File Sharing Vendor, Your Responsibility

Posted by Georgina Park

Apr 16, 2014 11:00:00 AM

It’s no coincidence that the first point of call for any parents in the market for a babysitter is family. Outside of the cheap labour costs, family also represents people they know and trust. When it comes to business file sharing this approach might not be as productive but the same rules apply.

 data_transfer

As data controller the buck stops with you regardless of whom you outsource your online storage and file sharing to. It’s still very much your baby and you are still responsible for knowing where it is, how it is secured and what rules and regulations apply to it.

Read More

Topics: Security, Cloud and Big Data

PCI Industry Compliant File Transfer

Posted by Georgina Park

Apr 15, 2014 11:51:41 AM

Ignorantia juris non excusat.

 

That’s the Latin for a foundational principle of the laws governing all European-law countries such as the UK... “ignorance of the law is not an excuse”.

In other words, just because you didn’t know that you were required to do something, doesn’t excuse you from the consequences of not doing it.
If your company accepts, transmits or stores any cardholder data, then the Law requires that you are PCI DSS compliant.

 

Not sure of what that is?

Read More

Topics: Security

How Data Transfer Helps When it’s a Marathon, not Just a Sprint

Posted by Georgina Park

Apr 11, 2014 1:37:53 PM

The rapid transmission of data hasn’t just transformed the professional world. It’s completely changed the way that people watch and partake in sport too. Huge advances in technology, alongside the evolution of data transfer systems, means that it’s easier than ever before to analyse performance and maintain safety – particularly in long distance running.

 

How data is used to help professional marathon runners

Before it was possible to collect and transfer data from runners in races and training situations, different coaches swore by different training theories and techniques – to varying levels of success. But nowadays, with quick data transfer available, athletes can be monitored down to the last hundredth of a second – allowing for the most in-depth analysis and helping to improve performance down to the very last detail.

Read More

Topics: Cloud and Big Data

8 Steps To Protecting Yourself From The OpenSSL Heartbleed Bug

Posted by Georgina Park

Apr 10, 2014 5:29:00 PM

 

“On the scale of 1 to 10, this is an 11.”

These were the words of Bruce Schneier, world-expert on cryptography and security, talking about a major Internet security flaw that was publically reported on Monday 7th April 2014.

Known as “Heartbleed”, it was discovered by Google security researcher Neel Mehta, and independently confirmed by security firm Codenomicon.

 

Heartbleed is a flaw in the OpenSSL framework, which is the open-source encryption standard used by the majority of websites to transmit data that users want to keep secure.

Read More

Topics: Security

Cloud China; Monthly Update

Posted by Georgina Park

Apr 10, 2014 10:33:00 AM

In China data news: Chinese state-owned telecoms operator China Unicom has opened a data centre in the Shuitu Hi-tech Park of the Liangjiang New District, Chongqing, in Southwest China.

china_data_transfer

The new data centre will provide bandwidth leasing and internet data centre hosting services.

Phase 1 of the project has a total floor space of 14,415 sq m and is designed to host 1700 racks and 35,000 servers. Chinese internet companies Guangdong Huaduo Network Science and Technology, Shanghai Grand Cloud and Beijing Fushion have already signed up with China Unicom for the data services.

 

Read More

Topics: FTP-China, Cloud and Big Data

Lady Gaga Stole Your Customers. Here’s How You Can Get Them Back

Posted by Georgina Park

Apr 9, 2014 4:32:00 PM

“I don't want the 5 dollars in your pocket, I want your soul.” – Lady Gaga

Image: Jason H Smith

Here’s a silly question.

Would your best customer willingly tattoo your company’s name, tagline or logo on their face?

On the surface this might seem like a ridiculous thing to ask.

But in the context of major companies going out of business due to a failure to retain their existing customers (e.g. Blockbuster), this is a highly important question.

Read More

Topics: Cloud and Big Data

Data Residency in the UK and US Post-Edward Snowden Leaks

Posted by Georgina Park

Apr 8, 2014 2:42:38 PM

 

Never has the issue of data residency and protection been so high on the public agenda thanks to former CIA employee and US National Security Agency (NSA) contractor Edward Snowden and his leaked documents on the United States’ global surveillance programmes.

 

 

 

Edward Snowden’s revelations

From June 2013, the Guardian newspaper began releasing details of the leaked documents that revealed, among a number of things, that the NSA was collecting the telephone records of tens of millions of Americans, as well as tapping directly into the servers of internet firms including Facebook, Google, Microsoft and Yahoo to track online communications in a surveillance operation called Prism.

Read More

Topics: Security

Corporate File Sharing Gets a Facelift

Posted by Georgina Park

Apr 8, 2014 2:23:31 PM

Overcomplicated and clunky.

That’s what you would have said if you travelled back in time to the 19th Century to see the first mechanical computer.

Roughly 8 feet by 3 feet by 100 feet, and taking up 1,800 square feet of real estate, this remarkable ingenious invention is a far cry from the sleek, super-charged computing devices that we carry around in our purses or pockets.

This dramatic contrast can be felt in every area of human endeavour. Healthcare, travel, agriculture, education...and now corporate file sharing.

Read More

Topics: Security, Cloud and Big Data

Encryption: What It Is and How You Can Use It

Posted by Georgina Park

Apr 7, 2014 3:12:49 PM

 

In honour of Data Protection Day – an annual commemoration of the first pan-European data protection regulation on 28th January 1981 – we’re going to look at encryption.

Encryption. It’s a word you would expect to find in Hollywood blockbusters like The Matrix, Mission Impossible, and any movie featuring hackers, but does it have any bearing on your day-to-day life? With all the busyness of life, do you really need to know about encryption?



In a word...yes. But don’t worry; this article will explain what encryption is, when you need to use it, and how you can use it conveniently and easily without having to be a tech geek like us.

Read More

Topics: Security

Subscribe