At Onehub, we want to provide our customers with an arsenal of privacy tools to better protect their data. So in addition to features like granular permissions and secure links, Onehub allows you to create Workspace agreements that your users must accept before accessing content.
Agreements are a powerful tool for establishing rules governing access to the content you are sharing. With Onehub, you can use a default agreement, or create a customized one tailored to the specific files you are sharing.
Setting up an agreement is easy. Go to the Settings of your Workspsace. Continue reading
Even though we are in frothy times, raising money is still a grind for startups. If you are a founder, you want to focus on your product, not manage minscule logistics of the pitch process.
Startups need more than just secure and easy online document sharing. They need to share the same information with multiple potential investors — without those investors discovering who else is in contention. And sharing your pitch doesn’t have to be a one-way street! There is data to be mined from the way potential investors interact with your materials that Onehub can help you surface.
If you are a startup founder, Onehub can make the whole process of raising money easier and more productive, whether you are seeking your seed or your Series A – Z: Continue reading
High profile hack attacks have (sadly) almost become pedestrian there have been so many. Recently, Anthem, one of the country’s largest health insurance companies had its data breached. Among the reasons the Anthem hack is receiving so much attention is the fact that the company did not encrypt its data.
Document previews are one of the most important features of Onehub. We have one of the best document previewing experiences around, but that didn’t stop us from making it even better. Today, I’m excited to announce the launch of our brand new document previewer.
Our new previewer is HTML-based, rather than Flash-based. This not only means that you no longer need to have Flash installed but, crucially, you can now view any Onehub preview from your mobile devices. In addition, this allowed us to implement accurate, text-based searching of your documents directly from the preview. As a side benefit, selecting/copying/pasting text is easier now as well. On top of these technical improvements, we also revamped the interface and increased the fidelity for all previews. Here is a full list of the improvements you can expect from the new Onehub previews:
- Mobile-friendly previews
- Full-text search from your previews
- Higher fidelity previews
- Improved design
- Automatic zooming
- Jump to a specific page in your preview
- Support for native browser full screen modes
The new Onehub previewer puts us ahead of the curve and we hope it delights our customers as well. If you have any feedback, tweet us @onehub or email us at firstname.lastname@example.org.
In this month’s team post, we’d like to introduce you to Andrew Juarez. Andrew is the newest member of the Onehub Design team and recently completed is first half marathon.
Q – How did you get into long distance running?
A – About 9 years ago, a year after graduating high school, I started to develop a (somewhat) regular fitness routine. Lifting weights and strength training were my focus, but I would add in about 20 to 30 minutes of pavement or treadmill running a few times a week.
For several years, I would run the same distance of about 3 to 4 miles each time. It wasn’t until about the end of 2011 that I began to push my distance further. I started tracking my runs with a smart phone app that stores various bits of data such as distance, duration, mile times, altitude, calories, etc. I would use the data as motivation to push myself on subsequent runs.
In the fall of 2012 when I moved to Seattle, I discovered some great areas for running. I spent a lot of time improving my distance by running around Green Lake as well as areas of the Burke Gilman Trail. I also did some research on midsole running techniques, proper footwear, and nutrition. By 2013, I was comfortable running 8 to 10 miles with an average mile time of about 8 minutes. Continue reading
Documents and files are considered the key component behind any business process. Organizations, regardless of their size or type, create, share, and collaborate on these files to perform their core operations. From simple process workflow to key decision-making, managers and executives rely heavily on the data stored in such documents and files. Timely and secure access to the files is highly essential for them.
Cloud based enterprise file sharing is an efficient file sharing approach that is making quick and successful inroads in enterprise content management and collaboration. It enables managers and executives to have secure, reliable, quick, and global access to their files and team members’ projects. It not only enables storing and sharing files but also provides a collaborative work environment for managers and employees. Continue reading
We’re excited to announce that you can now archive your Workspaces in Onehub. This is an Account Administrator feature we have been considering for some time and a recent round of customer interviews provided the final pieces of feedback we needed to make it happen.
Has the project you created that Workspace for come to an end? Do you have a Workspace that you use for a recurring client or event? If there are stale Workspaces in your account, here is how you can clean things up for your users. Continue reading
Earlier this week the New York Times reported a story on a large scale electronic payment scheme aimed at Brazil. Hundreds of thousands of computers are potentially affected, and it is estimated that the equivalent of billions of dollars have been pilfered. However, you don’t have to be sending “Boletos” to be an appealing target. Any login or credential information you use on your computer is appealing and has potential value to cybercriminals.
With ever-increasing use of personal devices and laptops on networks everywhere, it’s more important than ever to be mindful of information security. For example, just visiting a malicious web site can compromise a vulnerable computer, and enroll it in a botnet. The computer may appear to be functioning normally, but it is serving more than one master. Botnets such as “Kelihos” can install additional malware, which (among other things) can monitor outgoing traffic on well-known email and FTP ports, watching for passwords and other interesting traffic. It can also listen to other computers on the same network segment (depending on the network topology), capturing credentials if they are sent in the clear. These captured credentials are aggregated and sold by whoever is controlling the botnet. Continue reading