General Topics and tips Products and services Storage

SaaS Cloud Storage

An increasing number of businesses are choosing cloud services and adopting the cloud ecosystem day by day. In simple terms, cloud services mean using someone else’s hardware devices and paying only the amount you use. Compared to on-premises, cloud storage as service solutions like IaaS, PaaS, and SaaS offer major benefits in productivity and cost.

As you begin to consider the advantages of the cloud and approach towards switching your business to the cloud, it is more important to understand the key differences and advantages of cloud services.

Infrastructure as a Service IaaS

Basically, infrastructure as service products are made of highly scalable and automated resources and the hardware is fully managed by the provider. This allows the user to use resources and build on-demand solutions.

IaaS delivers computing infrastructure such as servers, network, storage, and bundles up with a unified dashboard and users can access and provision resources using the APIs of those providers. IaaS clients are responsible for managing the resources and data. The service provider just gives the physical hardware setups. Use IaaS if you want to build your solution from scratch and manage throughout on a long-term sustainable scale.

AWS, DigitalOcean, Rackspace, Azure are some of the examples of IaaS providers.

Platform as a Service PaaS

Here the providers will give more components than IaaS. PaaS delivers standard frameworks for general use cases. Then the maintainer can customize it as per requirement.

PaaS provides a platform where users can come and deploy their use cases on managed resources. With these services, you don’t need to worry about the underlying setup. PaaS can streamline workflows when multiple team members work together on the same project. So use PaaS if your requirement starts from some standard layer and add more layers to it.

AWS Elastic Beanstalk, Heroku, Google App engine are some of the examples of PaaS providers.

Software as a Service SaaS

SaaS refers to cloud application services. This represents the most commonly used business option in the cloud world. SaaS utilizes the power of the internet and delivers fully managed services. Most SaaS products run directly on the browser and do not require any installation on the client-side.

SaaS eliminates the need for a separate service management team. As it abstracts all the layers, the service providers manage all potential technical glitches and servers, maintenance, and storage issues. Just plan and push user data into those services and leverage the power.

SaaS provides n number of advantages to employees and companies by reducing time and money spend on time taking tasks like provisioning and maintaining the resources. These services are hosted on centralized servers and accessible via the internet. Short-term projects that require easy and flexible resources use these services.

Google Drive, Dropbox, slack are some of the examples of cloud storage as a service.

Let’s understand these terms with a real-world example:

SaaS Cloud storage vs Iaas vs PaaS
Real-world example

In an on-premises setup, the user has to manage everything. For IaaS, take the readymade incidents and bake on your own. PaaS stands for delivery of customized orders on demand. Furthermore, SaaS refers to restaurants where the person only goes and orders the pizza.

Sesame Disk: A SaaS cloud storage provider:

Sesame Disk is cloud storage as a service and team collaboration product where the clients can purchase storage services in a customized manner and increase team productivity. This service works all over the world including to send files and collaborate with Mainland China, APAC, Europe, USA, etc. In other words the specialty is file sharing nd collaboration.

The products and pricing model are constantly been improving to give better facilities for different workloads and client requirements. The primary focus of the product is to enhance file sharing capabilities including the cloud abstraction layer. The user-friendly dashboard says it all. Whatever your needs may be, we catch it cover.!

Pricing in a Nutshell for our Saas Cloud Storage:

Whether you’re a single person or you run a bigger enterprise, the common goal of collaboration with the team is fulfilled. The pricing model starts with a personal trial plan where you can test your requirements and find alignment to your use case for free. Then you can proceed with the upfront commitment plan where you get fixed storage and other services as per the plan. We have the business service plan available for larger workloads. Any of the fixed price and storage plans are so flexible that one can seamlessly top up the services. At last, the most demanded pricing model “pay-as-you-go” comes into play. Yes.! Only pay for the number of services you provision without any upfront commitment. Also find a general description of all of our products in this link

Some specifications like the number of users, cloud storage, transfer traffic, web and API access, internal shares are common across all plans. And services like backup, API development, history management come with the additional plans.

The key benefits of using cloud storage as a service product are enhanced team collaboration, global file sharing, faster and secured data transfer, and managing large workloads with a unified dashboard with a highly resilient pricing model.

On a closure note

The best suggestion is to consider your use case and choose the best service and pricing that can benefit you over and out. Do checkout team productivity, file sharing articles for more info. Contact our support team if you need assistance in understanding which service best fits your use case.

Hits: 6

Entrepreneurship General Topics and tips Management and Projects Products and services Storage

IP loss in China

IP (Intellectual Property) loss in China; 6 most common mistakes SMEs & entrepreneurs make.

This article is about IP loss landscape in mainland China. We did a summary analysis of the 6 more common mistakes companies make. here are the results, therefore let’s just get to it.

1. First let’s understanding the IP Legal Landscape and why IP loss happens.

IP landscape
IP landscape.

Many of the “complaints” are made by senior executives who actually do not clearly understand the complexities of IP. Aside they also do not know the mistakes their own companies may have made in protecting it. For example, filling a weak patent application or failing to register their IP at all ( an all-too-common mistake)*

We are interested IP loss because At Sesame Disk by Nihao Cloud one of our main goals is to keep the information safe at all times. Second we have had our selves living in china for many years a lot of experiences with IP protection and theft attempts. As a result we created NiHao Cloud in part because of this.

2. Not preparing the way in advance.

IP theft in action
Who are you?

Well known IPR lawyer in China, Dan Harris, in his article Protect Your IP From China: It Is Possible? He states that your IP has value, and if it can be copied with minimum effort, it will be copied. This means you must, therefore, prepare for this reality in advance.

3. Wrong assumptions about china.

Believing that since the company has done what is necessary to secure its rights in North America and Europe, there is nothing special they need to do in China. This is a BIG mistake.

Companies can win in china
Can you really win in China?

When we asked former lawyer Dan Harris, what’s the most common mistake regarding IP loss in China. Mentioning apart from legal issues, he answered that biggest and most frequent mistake lawyers see. Is on the IT side where foreign companies/start-ups hire a bunch of people in China to write code. These foreign companies do not form a company in China and do not hire coders as employees. In other words, everything these companies do is illegal. Then, years later when the software is done, Chinese partners just walk off with it. At this point there is nothing the foreign company can do about it. This is because the entire operation was illegal in the first place.

4. Not knowing how to keep your trade secrets safe.

Protect you data and intellectual property
Good business are based in secrets – Peter Thiel

A- What is a Trade SECRET?

Be non-public – it must not be known by the general public or by competitors;

B- What is a Trade SECRET?

Have actual or potential commercial value. As in it must give the owner a competitive advantage or be capable of generating economic benefit.

C- What is a Trade SECRET?

It is information that your competitors would want to know and would give them a commercial advantage.

Guarded by confidentiality measures – the owner must take reasonable measures to protect the confidentiality of the information.

Trade secrets may have many forms. include recipes or formulas, know-how, the status of products. Also services under development, valuable business information. This information or data might be in the form of:

  • customer lists
  • cost and price information
  • suppliers and contractors
  • contract terms
  • marketing strategy and plans
  • etc.

What you need to know about Trade Secrets in Mainland China:

Find it in China
The Asian Red GIANT

China, like most other countries, provides a legal framework for the protection of trade secrets. As such the law provides for remedies in the case that your trade secrets are unlawfully disclosed. This being said you might know some other forms of IP rights such as patents and copyrights that have a finite term. Otherwise trade secrets can theoretically enjoy an infinite term of protection as long as the trade secret remains just that – a secret. However, once the information becomes public information, it no longer enjoys any legal protection. Therefore prevention is the golden rule when it comes to protecting your trade secrets. This is because once the secret is out, there is usually very little that can be done. In addition keeping trade secrets safe involves using a combination of physical, technical and contractual barriers.

Furthermore “Many firms choose to keep their competitive edge by opting not to patent their inventions and trying instead to keep them as trade secrets”

5. Not adopting preventive measures to protect IP loss.

Ip preventive measures
IP Secrets Security

6. Underestimating the importance of proper IT systems to protect IP loss in China.

Bigger companies have their own established IT teams overseas that might be or may not familiar with IT challenges in China. As a matter of fact and especially with the GFW (the Great Firewall of China). Moreover your company should also choose a right IT company in China for services you might need. For example setting up new IT infrastructure in China tends to be complicated as compared to many other places.

According to Niels-Uwe Behrens, an IT expert long established in the Chinese IT sector; underestimating the importance of the role of IT in IP protection is a very common mistake:

“ I have been working in IT in China for more than 20 years. For instance it never stops surprising me how many companies have completely unsecured and open IT systems.”

Also we asked Niels about the current state of IT security awareness in China.

In my experience, I would say that roughly 80% of SMEs in China have at least one or more serious security issues. What’s more in many cases this breaches could be exploited by amateur opportunistic hackers. Not to mention in most cases it is not the hackers to be worried about. Even when 50-80% of the world’s IP hacks are traced back to China.

Mr. Niels

SMEs in China

In my experience, there are 2 types of SMEs in China: The first type take security seriously. This means their IT infrastructure is set up properly and in a secure way. Additionally their corporate culture prevents any IP leaks.

The second type of organization is less concerned and chooses not to pay much attention to a proper IT set-up since it works as it is. These companies usually adopt the attitude of; “real hackers go after big corporations, not small SMEs like us”, or “we don’t have any data of such importance. Therefore there is no need to encrypt and be overly concerned about security”.

When we think of IP theft we all tend to imagine that there must be some secret hacker organizations that go inside servers rooms and steals secret data in an action movie like fashion. But in reality, everything is much more simple than that. In most cases, especially in China, most trade secrets are stolen by the employees, former or current, who have access to corporate emails or even data server on their personal laptops. In most cases these laptops are not encrypted and can be easily stolen or hacked. Once someone has access to your corporate email or access to the main server, all your important data are at risk of getting out in the open.

This kind of data leaks can be used and will be used to publish your trade secrets or even out-compete your business. Eventually, this event will be registered as one of IP theft cases that are growing ever since 2005.

Stats on IP cases
Civil courts IP cases US vs China

Some additional facts of crucial importance about China

In China employee fluctuation can sometimes reach up to 75% annually, therefore, tendency of data leakage is very high. In Chinese mentality, it is very common that once employees get fired, they feel some sort of ownership of the work they have been doing for the company, and sometimes even devices like laptops or computers have been taken from the workspace. It’s is also very common that entire databases are copied to USB flash drives and later on used to start new businesses and compete with a former employer.

For security reasons bigger foreign companies tend not to use Chinese social media, such as Wechat, Baidu Cloud or QQ, for file sharing or chatting, since these are constantly monitored by the Chinese government. It is better to keep your most important IP and communications isolated securely in your own private server, maintained by yourself or a trusted third party.

Take a look
Insider IP theft

To maintain safe and reliable IT systems many SMEs are turning to managed service arrangements. From HR point of view, it is much cheaper and more effective to outsource most of the technology hassles to dedicated foreign IT experts, rather than looking for own IT specialists. For an economical monthly fee, these SMEs get a whole IT team responsible for maintaining and updating their systems with the latest security patches.


Regardless of your approach to IT security, keep in mind that organizations are increasingly dependent on technology, and it is, therefore, important to be as proactive as possible to keep technologies up to date and secure important data from both external and internal threats that tend to increase every year.

Do you have a story about China IP loss? Please share your experience in the comments below.

Hits: 8