Blog

Blog

NASA’s 622 Mbps Link to the Moon: How to Increase Transfer Speeds for Large Files

In a recent press release NASA announced that now they have a 622 Mbps Laser link to the moon. The press release also mentions that NASA was also able to transfer data at 20Mbps from earth to the space craft via this link. I’m wondering what effective rate was NASA getting when transferring data on this link? The data should be transferring at the theoretical limit of 622Mbps. Data Throughput From...
Blog

OpenPGP, PGP, and GPG: What is the Difference?

The privacy capabilities of encryption methods such as Pretty Good Privacy (PGP) allow organizations to achieve a hightened amount of data security and protection. There are various approaches and elements of comparison for these encryption methods , however, and each one comes with their own histories, features, and capabilities. These are: PGP, Open PGP, and GPG. Need to protect your files in...
Blog

Prioritizing Transfers in FileCatalyst Direct

FileCatalyst routinely helps users make full use of your bandwidth for file transfer. Scenarios in which bandwidth is optimized include cases where certain file transfers have higher priority than others, or when files being exchanged with a particular customer are more important than files exchanged with others. FileCatalyst Direct offers up a number of controls in its FileCatalyst HotFolder and...
Blog

Could Your FTP Server Pass a Compliance Audit?

If an auditor showed up to your office tomorrow and wanted to examine your file transfer security policies and procedures for compliance, how confident are you that your organization would pass with flying colors? If there’s any doubt that your file exchange process can meet stringent compliance requirements, a secure managed file transfer solution could ease your mind. Compliance Audit of File...
Blog

REST Development: Why HTTP Status Codes are Important

There are many ways in which REST developers can tackle error handling. Most REST services will send some kind of error condition structure which embeds an error message describing the error and some kind of code. This is a good start. However, for some REST services the HTTP status code is not well defined. In some cases, the REST services send an “OK” status code of 200 regardless of whether an...
Blog

Sending large media files: How free services stack up

Ever run into issues sending large media files via email? The answer is probably yes, especially if you work in a field which requires the transfer of large format video or audio files on a daily basis. While email is great for many types of workplace communications, file size limitations (usually around 10 to 25MB) make it next to impossible to execute video file transfers via email. So what’s...
Blog

What Is Your High Availability Plan for Your SFTP Server?

As organizations and their trading partners become more and more integrated, it's critical that file transfers perform without delays or disruptions. For instance, a document containing a batch of transactions could traditionally be delivered within a window of several hours without causing any issues. But today, in the effort to make business processes as efficient as possible, that same document...
Blog

Keeping File Transfers Secure from Hackers and Cyber Threats

Keep Your Files Secure In the battle to secure information, it helps to know a little bit about how it can be compromised. Using FTP is one way to expose critical vulnerabilities and can allow credentials to be hacked. However, these holes in security can also be easily closed if you know how. How Hackers Discover Vulnerabilities Here's how hackers could access sensitive data sent via FTP. With...
Blog

Java and Windows 7 Services

I recently had an interesting support case that I thought deserved to be shared with everyone. Essentially the customer was unable to run FileCatalyst Server as a service on Windows 7 Premium with the Windows firewall up. After attempting several things we discovered that it was a permissions issue with Java and Windows 7 services. To fix this I edited the fcconf.conf file as an administrator and...
Blog

How to Solve 4 Common Email Security Challenges

Yes. Emailing someone is still one of the easiest ways to share data. However, there are some important caveats to sharing files this way that can put your organization’s file transfers at risk. Email File Transfer Challenges These are the four big challenges that organizations should be aware of when transmitting files via email. Email is sent "in the clear" meaning that it is not encrypted...
Blog

Comparison of web-based file transfer methodologies

Transferring large files over the internet has never been a simple task. Anyone that has ever tried to transfer a file larger than 100MB can vouch for the slow transfer speeds, multiple disconnects, data corruption, complexity of the task and security issues surrounding FTP. The same problem exists for web developers trying to implement web-based file transfer functionality. Ideally, the end user...
Blog

FIPS 140-2 Plays Vital Government Business Role

What is FIPS 140-2? FIPS 140-2 is a standard with which cryptographic-based ( encryption ) security systems must comply when protecting sensitive data in U.S. government agencies and departments. This FIPS 140-2 standard also extends to other entities that may exchange sensitive data with the federal government, including defense contractors, state agencies, county, and city government. Why FIPS...
Blog

REST – HTTP POST vs. HTTP PUT

There seems to always be some confusion as to when to use the HTTP POST versus the HTTP PUT method for REST services. Most developers will try to associate CRUD operations directly to HTTP methods. I will argue that this is not correct and one can not simply associate the CRUD concepts to the HTTP methods. That is: C reate => HTTP PUT R etrieve => HTTP GET U pdate => HTTP POST D elete => HTTP...
Blog

FileCatalyst IBC 2012 Wrap-up

FileCatalyst exhibited at the IBC (International Broadcasting Convention) show in Amsterdam, the expo portion having run from September 7–11. It is one of the biggest shows of its type in the world, and I always find it interesting to be a part of the team in attendance. With IBC 2012 behind us, here are some parting thoughts: It was hectic, and I mean that in the best way. This year’s attendance...
Blog

Why hardware solutions can never truly replace software for file transfer acceleration

In the world of file transfer acceleration, there are multiple approaches using both WAN Optimization appliances or pure software solutions like FileCatalyst. Hardware sometimes give the impression of perceived value; there is a tangibility that you just don’t get with software. But can a hardware solution on its own really replace software for file transfer acceleration? The answer is no...
Blog

How to Build a Framework for HIPAA and HITECH Compliance

HIPAA, established in 1996, was signed into law to outline the appropriate ways to use and disclose patient health information. Read on to learn how to develop a HIPAA- and HITECH-compliant IT framework for your organization. Why Does HITECH Exist? HITECH laws were enacted to up the ante on healthcare organizations to meet HIPAA legal compliance for data security and privacy , which, of course...
Blog

Addressing HIPAA and HITECH Compliance Challenges

HIPAA and HITECH regulations were designed and enacted to increase the security surrounding personal health information from those who should not have access to it. Next to finance, the healthcare industry is one of the most regulated industries around. While debates on the cost, structure, and delivery of healthcare continues, most people agree that keeping personal healthcare information out of...
Blog

Open Source Fast File Transfers

There exist a number of open source projects trying to tackle accelerated file transfer via UDP. Some solutions are more mature than others and also use different technologies to solve the same problem of large data transfer over WAN. This article should provide the reader enough information to compare the different solutions and gauge if an open source project could be used instead of purchasing...
Blog

Analysis On Improving Throughput Part 2: Memory

The life cycle of a file transfer follows this basic pattern: The first and last step in the diagram, Disk IO, were covered in Part 1 of the series: Improving Throughput Part 1: Disk IO . Disk IO is always a good place to start when analysing a system to see why files are not transferring fast enough. In the 2nd article in this series, we’re going to concentrate on that white fluffy cloud—the...
Blog

Are Insurance Companies Managing Their Risk of Data Breach?

Insurance companies are the experts at analyzing and managing risk. They identify, quantify , and set pricing based on the calculated costs of risk. Naturally, the higher the perceived risk, the higher the cost to mitigate the potential losses. Yet , here is the irony. While those in the insurance industry excel at evaluating risk management for their clients, they often neglect risk mitigation...