Resources

Blog

GoAnywhere MFT Given Info-Tech Research Group's "Best Overall Value" Vendor Landscape Award

  Note from the Editor: This article shares highlights from Info-Tech Research Group's Managed File Transfer Vendor Landscape. Read our article about the 2021 Info-Tech MFT Data Quadrant Report for an updated landscape, or download the latest copy.   The Managed File Transfer Landscape Info-Tech Research Group, an IT research and analysis...
Blog

An introduction to data gravity

A couple of months ago, our President and Co-Founder John Tkaczewski had the honour of presenting an introduction to data gravity at the NAB virtual conference. While the concept of data gravity has been around for a few years, it isn’t talked about very often, especially in relation to our business – file transfer. Coined in 2010 by Dave McCrory, the basic concept of data gravity is that...
Blog

Truly Secure On-Premises Document Management for HR

    HR departments receive, generate, and accumulate substantial volumes of documents such as job postings, employment applications, resumes, reference checks, testing data, personnel files, wage and hour records, payroll records, and disciplinary files.   GoDrive by GoAnywhere is a secure file storage and collaboration solution that's ideally...
Blog

FileCatalyst: What does it do (part 3)

Think of the internet as garden hose. Now let’s say that this hose has a kink and the amount of water flowing through the hose is constricted. By bringing in acceleration technology, the kink is removed and now the flow can be as much as the hose can take. The diameter of the hose will be your bandwidth, the higher the diameter the more data we can push, but we can’t push anymore data than the...
Blog

The effect of digital technology adoption in the oil and gas industry

A recent article by CIO UK points out how digital technology is rising exponentially in the oil and gas sector. From seismic imaging to e-learning, 80% of senior executives in the industry believe digital advancements have revolutionized how they work. The remaining 20% believe digital technology has had a tangible impact. No matter who you ask, it’s evident the adoption is positively affecting...
Blog

Managed File Transfer 101: What's in it for Me?

  Note from the Editor: This blog is a recap of an older webinar. To view the most recent webinars, you can do so here. Meet MFT The term MFT (Managed File Transfer) is not new, but you may have begun to hear it more frequently. Changes in data security and transmission regulations have brought this established technology to the forefront,...
Blog

A Corporate Cloud-Based Large File Attachment Solution

Looking for a corporate cloud-based large file attachment solution? With file sizes growing and email servers still having file size restrictions, companies are in desperate need of a solution. The options most companies have are: free or paid online service hosted by a third party, in-house file transfer mechanism, or self-hosted solution on the cloud. Going with the free or paid solution...
Blog

SFTP Server in the DMZ or Private Network

Many organizations have an SFTP server installed where their trading partners can connect to securely upload and download sensitive files.   SFTP Server in the DMZ Traditionally SFTP Servers have been installed in the DMZ (or public facing) segment of the network since organizations were fearful of opening inbound ports into the Private (internal) network.   ...
Blog

The Do’s and Don’ts of Cleaning Coding, Clean Code Series (Part 2)

Sometimes the hardest part of clean code is getting everyone else on board.In my last post on clean coding I talked about why clean code was important, how it saves money in the long run and increases productivity. Now I want to talk a little bit about some of the do’s and don’ts of clean coding. Proper clean code without side effects takes discipline –...
Blog

Archives – A Perfect Fit for File Transfer Acceleration

A recent article at tvtechnology.com, discusses the ambiguity of the term “archive,” and uses the Library of Congress archives as an example of how digital media is changing the way films are preserved for future access and use. It was not within the scope of the article to discuss how files are shuttled between locations, but it seems clear that file transfer acceleration would be extremely...
Blog

Driving Efficient Video Game Production: 5 Invaluable File Transfer Features

 Video game development requires vast amounts of communication and collaboration at every step of the process. As development occurs, teams must share and exchange files within the office, across the country or even around the world. During development, Electronic Arts’ “Battlefield 4” game files were as large as 50GB, making file transfer a technical...
Blog

NASA’s 622 Mbps Link to the Moon: How to Increase Transfer Speeds for Large Files

In a recent press release NASA announced that now they have a 622 Mbps Laser link to the moon. The press release also mentions that NASA was also able to transfer data at 20Mbps from earth to the space craft via this link. I’m wondering what effective rate was NASA getting when transferring data on this link? The data should be transferring at the theoretical limit of 622Mbps. Data Throughput...
Blog

OpenPGP, PGP, and GPG: What is the Difference?

  The privacy capabilities of encryption methods such as Pretty Good Privacy (PGP) allow organizations to achieve a hightened amount of data security and protection. There are various approaches and elements of comparison for these encryption methods, however, and each one comes with their own histories, features, and capabilities. These are: PGP,...
Blog

Prioritizing Transfers in FileCatalyst Direct

FileCatalyst routinely helps users make full use of your bandwidth for file transfer. Scenarios in which bandwidth is optimized include cases where certain file transfers have higher priority than others, or when files being exchanged with a particular customer are more important than files exchanged with others. FileCatalyst Direct offers up a number of controls in its FileCatalyst HotFolder and...
Blog

Could Your FTP Server Pass a Compliance Audit?

  If an auditor showed up to your office tomorrow and wanted to examine your file transfer security policies and procedures for compliance, how confident are you that your organization would pass with flying colors? If there’s any doubt that your file exchange process can meet stringent compliance requirements, a secure managed file transfer solution...
Blog

REST Development: Why HTTP Status Codes are Important

There are many ways in which REST developers can tackle error handling. Most REST services will send some kind of error condition structure which embeds an error message describing the error and some kind of code. This is a good start. However, for some REST services the HTTP status code is not well defined. In some cases, the REST services send an “OK” status code of 200 regardless of whether an...
Blog

Sending large media files: How free services stack up

Ever run into issues sending large media files via email? The answer is probably yes, especially if you work in a field which requires the transfer of large format video or audio files on a daily basis. While email is great for many types of workplace communications, file size limitations (usually around 10 to 25MB) make it next to impossible to execute...
Blog

What Is Your High Availability Plan for Your SFTP Server?

  As organizations and their trading partners become more and more integrated, it's critical that file transfers perform without delays or disruptions. For instance, a document containing a batch of transactions could traditionally be delivered within a window of several hours without causing any issues. But today, in the effort to make business...
Blog

Keeping File Transfers Secure from Hackers and Cyber Threats

  Keep Your Files Secure In the battle to secure information, it helps to know a little bit about how it can be compromised. Using FTP is one way to expose critical vulnerabilities and can allow credentials to be hacked. However, these holes in security can also be easily closed if you know how. How Hackers Discover Vulnerabilities Here's how...
Blog

Java and Windows 7 Services

I recently had an interesting support case that I thought deserved to be shared with everyone. Essentially the customer was unable to run FileCatalyst Server as a service on Windows 7 Premium with the Windows firewall up. After attempting several things we discovered that it was a permissions issue with Java and Windows 7 services. To fix this I edited the fcconf.conf file as an administrator and...