yourfanat wrote: I am using another tool for Oracle developers - dbForge Studio for Oracle. This IDE has lots of usefull features, among them: oracle designer, code competion and formatter, query builder, debugger, profiler, erxport/import, reports and many others. The latest version supports Oracle 12C. More information here.
Cloud Expo on Google News
Cloud Expo & Virtualization 2009 East
Smarter Business Solutions Through Dynamic Infrastructure
Smarter Insights: How the CIO Becomes a Hero Again
Windows Azure
Why VDI?
Maximizing the Business Value of Virtualization in Enterprise and Cloud Computing Environments
Messaging in the Cloud - Email, SMS and Voice
Freedom OSS
Stairway to the Cloud
Sun's Incubation Platform: Helping Startups Serve the Enterprise
Cloud Computing & Enterprise IT: Cost & Operational Benefits
How and Why is a Flexible IT Infrastructure the Key To the Future?
Click For 2008 West
Event Webcasts
How Cloud Startups Are Tackling the Challenges with Digital Data Theft
Digital theft is a lot more common than you would think

Digital theft is a lot more common than you would think. Worse, a lot of people committing these crimes may not even be aware of the laws they break. The internet has made it possible for anybody to find digital assets (like photographs, videos, articles, music, etc.) online and use this content for their own personal or commercial projects. This is not only a violation of laws, but is also a serious loss of revenue for the content creator.

Digital data theft is a real problem for a number of cloud-based startups. Software developers constantly deal with their work being duplicated and distributed for free online. Many times, this is done anonymously and this makes it harder for these asset owners to go after the data thieves. However, there are a number of ways businesses can check digital data theft. Here are some of the more popular tactics.


Watermarking is by far the most popular method to deal with digital data theft. If you sell photos or videos online, it is a good idea to make only a clearly watermarked version of your content online available. This way, people who do want to use your content will need to pay for it. This is not a hundred percent secure though. A number of legitimate content buyers use these digital assets online on blogs, research reports and brochures. This serves as an avenue for digital content to be picked by other users for free use.

There is also digital watermarking. These are unique markers that are covertly embedded into an audio, video or image file and can be used to trace back a stolen copy to its origin. A number of modern digital cameras come with ‘lossless data embedding’ that protects a digital image from distortion and can thus serve as forensic evidence of authenticity in a court of law. Other software makers (including the likes of Microsoft Windows) use digital watermarking to determine a legitimate copy of their software from a duplicated one. Although violators are not criminally prosecuted in a majority of the cases, the information helps the software maker target their message about counterfeiting to the select group of violators.


No matter how well a digital asset has been watermarked, these images and videos can still be counterfeited with little effort. It may not be feasible to restrict the use of copyrighted photos that have become viral on social media networks. In such instances, it is a good idea to work towards monetization of these assets. According to this article on Shopify, content owners can make use of a two-pronged strategy to recover lost revenue from digital data theft - it is recommended to send a ‘cease and desist’ notice to commercial entities that are illegally making use of your digital assets. You may also complement this with an invoice towards licensing of these digital files. This way, cloud startups that own these assets may succeed in either restricting illegal use or make money from such illegal use.

Secure Access

There are not many ways one could restrict accessibility to digital content like images, videos and music where there is a thin line that separates free, legal access from illegal counterfeiting. However, cloud startups that own other forms of digital assets (like confidential customer data) cannot rely solely on the use of licensing or watermarking of content. Depending on the type of content, licensing or selling content could be illegal in many cases. In such instances, the onus is on the content owner to secure their system and restrict access to the data itself. There are multiple ways this could be achieved.

2FA - Two factor and multi-factor authentication systems make use of unique identifiers like biometrics or SMS authentication to authorize access to specific individuals.

Tokens - These are on-demand tokens that let cloud systems authenticate access. For instance, the popular RSA tokens provide authorized users with a secure hardware that generates time-bound tokens that must be inputted into the system for access. Losing a token would lead to an inability to access the cloud system.

Firewall - Firewalls restrict the access of a cloud system from within pre-approved set of IP addresses. This is however not a feasible solution if your customers are located across the country or the world. In such cases, you could request access to your cloud system through a pre-approved VPN system which is however not feasible for every use-case.

Security against cloud data theft is a growing industry and is estimated to be worth billions of dollars. But there is no one foolproof way to secure your assets against data thieves. In some ways, it is a cat and mouse game between the asset creators and thieves. Ultimately it is the responsibility of the business owners to keep their systems safe and secure with the latest innovations in the industry.

About Harry Trott
Harry Trott is an IT consultant from Perth, WA. He is currently working on a long term project in Bangalore, India. Harry has over 7 years of work experience on cloud and networking based projects. He is also working on a SaaS based startup which is currently in stealth mode.

Latest Cloud Developer Stories
Enterprises have taken advantage of IoT to achieve important revenue and cost advantages. What is less apparent is how incumbent enterprises operating at scale have, following success with IoT, built analytic, operations management and software development capabilities - ranging ...
Poor data quality and analytics drive down business value. In fact, Gartner estimated that the average financial impact of poor data quality on organizations is $9.7 million per year. But bad data is much more than a cost center. By eroding trust in information, analytics and the...
Daniel Jones is CTO of EngineerBetter, helping enterprises deliver value faster. Previously he was an IT consultant, indie video games developer, head of web development in the finance sector, and an award-winning martial artist. Continuous Delivery makes it possible to exploit f...
The standardization of container runtimes and images has sparked the creation of an almost overwhelming number of new open source projects that build on and otherwise work with these specifications. Of course, there's Kubernetes, which orchestrates and manages collections of cont...
Predicting the future has never been more challenging - not because of the lack of data but because of the flood of ungoverned and risk laden information. Microsoft states that 2.5 exabytes of data are created every day. Expectations and reliance on data are being pushed to the l...
Subscribe to the World's Most Powerful Newsletters
Subscribe to Our Rss Feeds & Get Your SYS-CON News Live!
Click to Add our RSS Feeds to the Service of Your Choice:
Google Reader or Homepage Add to My Yahoo! Subscribe with Bloglines Subscribe in NewsGator Online
myFeedster Add to My AOL Subscribe in Rojo Add 'Hugg' to Newsburst from CNET Kinja Digest View Additional SYS-CON Feeds
Publish Your Article! Please send it to editorial(at)!

Advertise on this site! Contact advertising(at)! 201 802-3021

SYS-CON Featured Whitepapers