Products is the category to show case subjects related to some of our products. So, you can find what we actually offer as products here: https://sesamedisk.com/pricing/ . Anyhow thanks for visiting and looking forward to having you onboard and using our free or paid product.
This category can mention any product and article about things that are not necessarily our own. In fact we will have posts about many different providers and producers and their outcomes that might be of interest to you or other people around the world. Aside of course our focus will be our own products and our industry, but there will be many different issues dealt with in our posts.
Understand product as any of the following.
“A product is the item offered for sale. A product can be a service or an item. Every product is made at a cost and each is sold at a price. The price that can be charged depends on the market, the quality, the marketing and the segment that is targeted.”
Taken from India Times on April, 2021.
Another definition from Gartner
Who defines some common characteristics that can be used to determine what a product is. It can serve an external or internal customer (user). Is clearly defined by its business capability. Delivers capability that customers value can be:
A repeatable service. A platform (one- or multi-sided)
Be bought, sold, subscribed or funded. Has competition and a product lifecycle.
…A product can be made up of one or more other products. Therefore if you take the example of buying a new computer – you might end up with a bundle of products. This might include a screen, tower, keyboard and mouse that is wrapped up as a single offer. Each item here represents a distinct value proposition, but can also be a bundled value proposition.
In today’s dynamic world, time is the most critical aspect for any business person. Whether it’s deciding to trade off or launching a new product, reaching the customers within the least possible time filter you from the majority crowd. How much your customers wait for your website to load? 5 -seconds? 10 seconds? Probably not more than that! And in the end, the client leaves the website heavy-heartedly and downvotes the user experience. In this article, we’ll show some performance test results of our site NiHao cloud using some simple steps.
We’ve taken curl (a powerful command-line tool to transfers data from or to a server) and using Linux based operating system. The steps would be nearly the same with another os as well. In addition, we will use time-related variables and test the same with 2 different networks.
Create a file which has arguments that curl command takes:
Visuals and media content are much more important for the overall impression of applications. We prefer visuals over textual content. There is no meaning of visuals if they’re not of high quality. With the emergence of cloud environments, we have found a way of effectively storing the data. But the question lies on how to deliver that media to clients. Let’s see how we can leverage Sesame Disk by NiHao Cloud to enhance the performance.
What’s the use case?
Suppose you’re running a website that obviously has high-quality images and probably videos. Rather than storing all content on the webserver and chokes its performance, store all files in a cloud provider and enable public visibility. Nowadays, object storage provides allows publicly accessible links so we can simply paste those links in our web content load in the runtime.
High-level benefits of this setup:
Enhances webserver performance because we’re not actually storing any media in it.
No worries regarding managing the media on our own as a cloud provider will maintain.
Furthermore, we can set CDN for those objects to ensure faster delivery.
Find below a simple code where one webpage is having an image in it. Basically, the image is stored in the NiHao cloud and a link for public access is generated and fed in the code. Click on share in the NiHao cloud console and generate a link. The link will look something like this:
This is as simple as it looks.! Whenever someone will hit your website, the textual and media content will be loaded simultaneously and will look seamless process.
Such setup helps a lot for larger and complex environments and makes the process way more sufficient to manage. And the end-user will also get enhanced performance if CDN is integrated. Sesame Disk offers CDN service by default to ensure clients get the best possible response always. Do read article on lazy loading content which is very much related to article above!
With great powers comes great responsibilities.!”. In this revolutionary internet and data-driven era, everything is much handier and easily accessible. But this can turn into a curse if proper management is not present. If you want to achieve personal and business goals, the management of your data and resources is one of the key aspects. Web office solutions are one of the most effective the answer to sorting all the mess in your environment. Here at Sesame Disk we are betting on this feature for helping our customers.
What does Web Office mean?
A web office is a bundle of various tools hosted by the service providers that allow users to share and collaborate on a broad set of information and documentation. Besides, such SaaS(Software-as-a-service) products help improving team collaboration.
Web office components normally include spreadsheets, word docs, portal and content management systems, emails, calendars, accounting applications, and many more…
Key differences between Desktop and Cloud-based collaboration services:
For cloud-based service, one doesn’t need to invest upfront in the hardware and maintenance whereas, in desktop-based solutions, the whole workflow is dependent on the management team. So, cloud-based solutions are cost-effective.
For web-based collaboration services, the sky is the limit of storage. In other words, the tenant gets nearly infinite storage.
No licensing and software upgrading required in managed service. However, it’s the opposite in desktop-based usage.
Web office is portable and accessible anytime anywhere. Teams can collaborate across the globe. By the way I also mean you can access using any device with a web browser; phone, laptop, table, PC, etc.
Higher data durability and availability are provided in a web-based solution. It indeed becomes a tedious job to maintain such in desktop-based solution.
Undoubtedly, the web office holds an upper hand in current industry needs and aligns exactly with the requirements. Depending on the needs and size of the organization, choose the right plan and external integration strategies to enhance the productivity of your teams. Sesame Disk provides such solutions and ticks all the boxes of what a team collaboration needs.
“A picture is worth a thousand words”. Graphical representation has the ability to impact straight to us and can deliver the intention on point. Do we still need examples like shinchan cartoon to prove that images can turn conscious human beings into crazy heads? The portion of images and videos in typical web content is significant. And there is no doubt at all of removing such content just for the sake of site performance. Luckily, we have solutions like lazy loading that in a certain context.
Well, there is a cost to having graphical content and soaks huge bandwidth. More importantly, it costs both users and servers in terms of data capturing and bandwidth consumption. And project managers may be unwillingly cut media resources from applications and end up being in frustrated debates on optimization of the application. Here comes the lazy load technique.
What is Lazy Loading?
Simply, lazy loading means loading the content only when the users need them to display. The user won’t have to wait for the elements on the page to load and start working. This leads to potentially save gigabytes of data over high traffic. For example, if a webpage has an image that the user has to scroll down to see, you can display the placeholder initially and lazy load the full image when the user arrives at that location.
Some of the benefits of implementing lazy loading in your application:
Improving initial loading time: This approach decreases the wright of payload and allows quicker response
Bandwidth conservation: Only the requested data is loaded that implies saving of data.
Resource conservation: We can save server and use resources on a very large scale because we enable rendering of only required content
It’s time to get lazy, folks! Lazy load is seriously uncontroversial in the concern of performance. Many customers at Sesame Disk have fairly adopted such an approach in their environments and have got considerably good results.
Imagine a huge bunch of keys tagged with their associated correct locks🔐. Now the culprit rushes and shuffles the key tags intentionally and leaves the room. The manager will put a hell of a lot of effort but won’t get lucky in finding the key for a particular lock just because the tags are mismatched. Let’s relate this with DNS poisoning.
Domain Name Server (DNS) cache poisoning is an attack in which altered DNS records are used to redirect online traffic to a malicious website that resembles its intended destination. Here, locks are the IP addresses and tags are the DNS records. We won’t be able to open the lock until we attach the correct key. Same like this, traffic will be redirected to the wrong place until DNS records are inaccurate.
How does DNS caching work?
DNS resolver basically helps in converting IP addresses to domain names. We, humans, are much more familiar with domain names rather than confusing IP addresses. A DNS resolver will store the request queries for a certain amount of time (TTL –Time to Live). This is how the resolver will be able to serve the request more quickly without communicating further with other DNS networks.
How is DNS poisoning done?
Attackers poison the DNS records by impersonating the nameservers and alters the reply for that query. Hence, the user will get totally unexpected result and the result will also be stored in the DNS cache records. And if DNS resolver fetches the wrong entry, there is no legitimate source to verify that value.
The Great Firewall of China is an example of DNS poisoning on a very large scale. One of the primary methods of query filtering that the GFW relies on is DNS response poisoning. When a query is poisoned by the GFW, the infected result is returned. This is applied to the caches as well.
Such activities can be prevented by a concept named DNSSES which is meant for DNS level security and simply verifies the queries and results.
“TEAM”.! The word refers to “Together Everyone Achieves More”. Teamwork is the concrete element for any organization. By the digital transformation, all the businesses have made file-sharing paperless. And in such a scenario, without having a reliable way to run the same task one may end up messing the whole ecosystem.
Due to enforced work-from-home caused by the covid-19 pandemic, the remote workspace has emerged and become essential for businesses to carry on their functionalities. As a result, the working perceptions are shifting to a modern approach and remote working is globally accepted even after the pandemic. Available tools and technology are some of the main reasons to make this transition so seamless.
There are mainly two categories of workspace file sharing applications: consumer-grade and enterprise-grade. Consumer-grade products offer basic collaboration facilities. We design such tools for day-to-day tasks and personal use. Whereas, business file sharing offers more features like automated workflows, file-based access control, document tracking, and versioning.
Such a third-party provides offers ease of access by hosting the documents centrally with real-time sync. Besides, an efficient file sharing system can bridge the silo effects and improve employee productivity and well-being. Sesame disk offers full data control with backup strategies, making sure you never lose your critical data. Also, a simple yet effective interface with the admin panel helps organize data in a particular manner.
Today, file sharing tools are fast, affordable, and powerful with a wide range of options. But which one is right for your team’s requirement? Here, your primary focus should be security, ease of accessibility and collaboration, cost and time saving, and security compliance. We’ve quoted Sesame Disk quite a few times above which is a product primarily designed for core collaboration elements. When you choose our tool as your file-sharing strategy you unlock the powerful features that help to keep your team productivity at its peak.
File Sharing and Cloud Storage Brings Benefits to Business
File sharing and cloud storage providers have become increasingly popular. In fact it have become the most convenient method for storing data with enhanced collaboration methods. It has reached a level where organizations can undoubtedly depend on and thrive in the competition. These sites now offer extra features by developing a business-specific ecosystem. Let’s get deep dive into it by pinpointing some of the benefits…
Efficient pricing model
Traditional storage option requires lots of upfront investment in hardware and infrastructure set up. With cloud file sharing and storage, we almost have no worries regarding hardware and maintenance. Pay-as-you-model gives flexibility in spending the funds and you always can increase storage when required. Therefore Sesame Disk offers affordable pricing models with significant customizable options.
We all have heard this famous phrase: “Security is a big deal for everyone doing business on the web…” Indeed it is! In the data-driven digital era, the most critical part is data. The service providers put an enormous amount of effort into hardening the data centers. They put redundant storage layers with encrypted mechanisms throughout.
Also, identity and user access management ensures right person access the allocated files.
Team File sharing
The manpower always may not be working in the same premises. With team file sharing, you can invite and collaborate with your fellow mates and efficiently work towards the business goals.
You’re up and running as soon as you subscribe to such services. Also, the straight forward management consoles allow the user to easily navigate to the services. The user gets multi-device accessibility with drag and drop options makes file sharing even more convenient.
When it comes to customer satisfaction, response time is a plus for every product. The faster user retrieves the data the better it is for client experience and company reputation. The file-sharing and storage providers span their data centers across the world to ensure the least latency of user data.
Finding the right solution for your requirements really helps in business productivity and growth. Sesame Disk by NiHao Cloud offers you the ability to improve collaboration in file sharing following best security practices.
Cloud storages are a type of computing Cloud. Cloud, Cloud, Cloud. That’s the most we all hear in the IT industry. Over the last decade, “cloud” was the fancy term that boomed the market and covered a large area of the industry within no time. The cloud has completely changed the structure of storage and communication.
Cloud simply means a service running on the internet and allows us to store our data at a “remote location”. Implies the data center of a cloud service provider. Once we store our data on the cloud, we or any authorized user can retrieve it anytime anywhere from any device.
How does Cloud Storage work?
In past, enterprises totally relied on storing data locally. Over the period of time, organizations started preferring handy storage options after the exponential construction of cloud farms. Basically, it works on a client-server model. A client sends the request to the subscribed service and the server at the data center gives the appropriate response. The main objective of the cloud, instead of saving data at local storage.
When the non-technical crowd first thinks about such virtual storage, they will likely think about storing files, (for example songs, videos, and applications) on a remote server to be retrieved simultaneously. Absolutely correct! Whether you’re talking about Google Drive, DropBox, or any other provider, the definition remains the same. Checkout NiHao Cloud’s Sesame Disk, an emerging German enterprise whose origins are linked to the Chinese market, in the world of cloud storages and file-sharing that provides a fast, secure, and highly available medium for effective collaboration worldwide.
Nowadays, businesses use such storage to store documents and share them with peers within the premises. It not only helps in securely storing your important files and documents but also at the same time gives you a decent opportunity to collaboratively work on the project with other folks through data sharing. The days when an email was more than enough to share attachments are long gone. Cloud gives you almost unlimited data storage space. Also, it’s cheaper and more secure than traditional storage mediums. No wonder cloud storages is quickly replacing physical storage systems!
Thanks for reading my post. Here is another one related.
Disclaimer: This post does not serve as legal advice and should be considered only as guidelines in your GDPR or China cyber-security planning. Therefore you should work with your legal counsel to make the right decisions based on your business needs and circumstances.
What is GDPR?
General Data Privacy Regulation, or GDPR, takes effect on May 25, 2018. Then the legislation will had a big impact on the way marketers approach their work and the way organizations obtain, store, manage or process the personal data of EU citizens. Even though NiHao Cloud stores its user data outside of the EU, the new law still applies to us, and thus our services comply with GDPR regulations.
We choose the biggest and most secure hosting partner AWS (Amazon Web Services) to setup Sesamedisk by NiHao Cloud platform. Now, we ensure a maximum security of you personal data by utilizing AWS tools and services in areas that are applicable for Sesamedisk by NiHao Cloud. Therefore your data is secured by AWS and their GDPR ready compliance certificates: Learn more on how Amazon AWS helps us conform GDPR:
2. Sesamedisk byNiHao Cloud Service:
Sesamedisk by NiHao Cloud only collects essential data to provide professional services for our users/customer. here we include users ID/name, email address, device type & IP. so, this data can be seen by every organization administrator, as required by GDPR.
When users delete their accounts from Sesamedisk by NiHao Cloud and unsubscribe from marketing mailing lists, we do not keep email addresses and you will not receive any more communications from us.
3. List of Vendors
Sesamedisk by NiHao Cloud has carefully chosen 3rd party marketing and support vendors that comply with GDPR.
Websites: are based on current tech that is compliant with GDPR.
Support & Chat: We use support & chat system provided by Zendesk. Learn more about how they abide by GDPR on their website :
Cloud Mailing Notifications: NiHao Cloud uses Drip to send important notifications regarding service and educational or promotional emails. Learn more on how Drip conforms GDPR via their website.
Below are a few links for you to assess your own company policies regarding general data collection:
IP loss in China; 6 most common mistakes SMEs & entrepreneurs make.
This article is about IP loss landscape in mainland China. We did a summary analysis of the 6 more common mistakes companies make. here are the results, therefore let’s just get to it.
1. First let’s understanding the IP Legal Landscape and why IP loss happens.
Many of the “complaints” are made by senior executives who actually do not clearly understand the complexities of IP. Aside they also do not know the mistakes their own companies may have made in protecting it. For example, filling a weak patent application or failing to register their IP at all ( an all-too-common mistake)*
We are interested IP loss because At Sesame Disk by Nihao Cloud one of our main goals is to keep the information safe at all times. Second we have had our selves living in china for many years a lot of experiences with IP protection and theft attempts. As a result we created NiHao Cloud in part because of this.
2. Not preparing the way in advance.
Well known IPR lawyer in China, Dan Harris, in his article Protect Your IP From China: It Is Possible? He states that your IP has value, and if it can be copied with minimum effort, it will be copied. This means you must, therefore, prepare for this reality in advance.
3. Wrong assumptions about china.
Believing that since the company has done what is necessary to secure its rights in North America and Europe, there is nothing special they need to do in China. This is a BIG mistake.
When we asked former lawyer Dan Harris, what’s the most common mistake regarding IP loss in China. Mentioning apart from legal issues, he answered that biggest and most frequent mistake lawyers see. Is on the IT side where foreign companies/start-ups hire a bunch of people in China to write code. These foreign companies do not form a company in China and do not hire coders as employees. In other words, everything these companies do is illegal. Then, years later when the software is done, Chinese partners just walk off with it. At this point there is nothing the foreign company can do about it. This is because the entire operation was illegal in the first place.
4. Not knowing how to keep your trade secrets safe.
A- What is a Trade SECRET?
Be non-public – it must not be known by the general public or by competitors;
B- What is a Trade SECRET?
Have actual or potential commercial value. As in it must give the owner a competitive advantage or be capable of generating economic benefit.
C- What is a Trade SECRET?
It is information that your competitors would want to know and would give them a commercial advantage.
Guarded by confidentiality measures – the owner must take reasonable measures to protect the confidentiality of the information.
Trade secrets may have many forms. include recipes or formulas, know-how, the status of products. Also services under development, valuable business information. This information or data might be in the form of:
cost and price information
suppliers and contractors
marketing strategy and plans
What you need to know about Trade Secrets in Mainland China:
China, like most other countries, provides a legal framework for the protection of trade secrets. As such the law provides for remedies in the case that your trade secrets are unlawfully disclosed. This being said you might know some other forms of IP rights such as patents and copyrights that have a finite term. Otherwise trade secrets can theoretically enjoy an infinite term of protection as long as the trade secret remains just that – a secret. However, once the information becomes public information, it no longer enjoys any legal protection. Therefore prevention is the golden rule when it comes to protecting your trade secrets. This is because once the secret is out, there is usually very little that can be done. In addition keeping trade secrets safe involves using a combination of physical, technical and contractual barriers.
Furthermore “Many firms choose to keep their competitive edge by opting not to patent their inventions and trying instead to keep them as trade secrets”
5. Not adopting preventive measures to protect IP loss.
6. Underestimating the importance of proper IT systems to protect IP loss in China.
Bigger companies have their own established IT teams overseas that might be or may not familiar with IT challenges in China. As a matter of fact and especially with the GFW (the Great Firewall of China). Moreover your company should also choose a right IT company in China for services you might need. For example setting up new IT infrastructure in China tends to be complicated as compared to many other places.
According to Niels-Uwe Behrens, an IT expert long established in the Chinese IT sector; underestimating the importance of the role of IT in IP protection is a very common mistake:
“ I have been working in IT in China for more than 20 years. For instance it never stops surprising me how many companies have completely unsecured and open IT systems.”
Also we asked Niels about the current state of IT security awareness in China.
In my experience, I would say that roughly 80% of SMEs in China have at least one or more serious security issues. What’s more in many cases this breaches could be exploited by amateur opportunistic hackers. Not to mention in most cases it is not the hackers to be worried about. Even when 50-80% of the world’s IP hacks are traced back to China.
SMEs in China
In my experience, there are 2 types of SMEs in China: The first type take security seriously. This means their IT infrastructure is set up properly and in a secure way. Additionally their corporate culture prevents any IP leaks.
The second type of organization is less concerned and chooses not to pay much attention to a proper IT set-up since it works as it is. These companies usually adopt the attitude of; “real hackers go after big corporations, not small SMEs like us”, or “we don’t have any data of such importance. Therefore there is no need to encrypt and be overly concerned about security”.
When we think of IP theft we all tend to imagine that there must be some secret hacker organizations that go inside servers rooms and steals secret data in an action movie like fashion. But in reality, everything is much more simple than that. In most cases, especially in China, most trade secrets are stolen by the employees, former or current, who have access to corporate emails or even data server on their personal laptops. In most cases these laptops are not encrypted and can be easily stolen or hacked. Once someone has access to your corporate email or access to the main server, all your important data are at risk of getting out in the open.
This kind of data leaks can be used and will be used to publish your trade secrets or even out-compete your business. Eventually, this event will be registered as one of IP theft cases that are growing ever since 2005.
Some additional facts of crucial importance about China
In China employee fluctuation can sometimes reach up to 75% annually, therefore, tendency of data leakage is very high. In Chinese mentality, it is very common that once employees get fired, they feel some sort of ownership of the work they have been doing for the company, and sometimes even devices like laptops or computers have been taken from the workspace. It’s is also very common that entire databases are copied to USB flash drives and later on used to start new businesses and compete with a former employer.
For security reasons bigger foreign companies tend not to use Chinese social media, such as Wechat, Baidu Cloud or QQ, for file sharing or chatting, since these are constantly monitored by the Chinese government. It is better to keep your most important IP and communications isolated securely in your own private server, maintained by yourself or a trusted third party.
To maintain safe and reliable IT systems many SMEs are turning to managed service arrangements. From HR point of view, it is much cheaper and more effective to outsource most of the technology hassles to dedicated foreign IT experts, rather than looking for own IT specialists. For an economical monthly fee, these SMEs get a whole IT team responsible for maintaining and updating their systems with the latest security patches.
Regardless of your approach to IT security, keep in mind that organizations are increasingly dependent on technology, and it is, therefore, important to be as proactive as possible to keep technologies up to date and secure important data from both external and internal threats that tend to increase every year.
Do you have a story about China IP loss? Please share your experience in the comments below.