Vulnerabilities / Threats // Insider Threats
6/10/2010
11:15 PM
Connect Directly
RSS
E-Mail
50%
50%

Box.net Syncs Cloud With Desktop

Box Sync automatically syncs files from desktop to the cloud and syncs files from the cloud to the desktop with two clicks.

Box.net has expanded its online document collaboration service with the ability to synchronize files on a Windows desktop with those in the cloud.

The Box Sync feature, launched Thursday, is targeted at businesses where employees keep a large number of documents stored on their office computers. The new service makes it easier for those employees to work on documents together, without leaving their cubicles.

To use Box Sync, a customer must first download the Box Sync client, which creates a "My Box Files" folder under "My Documents" in Windows Explorer. To sync folders stored in the cloud on Box.net with the desktop, a user only has to right click the Box folder and select "Sync Folder to Desktop."

An image of the chosen folder appears in the "My Box Files" folder, and any changes made to files in the Box folder will lead to a notification to a person's collaborators. Changes to desktop files are automatically transferred to the same files stored on Box.net.

In addition, folders dragged and dropped from the office computer to the "My Box Files" folder is automatically uploaded to Box.net, with the same synchronization features in place.

In cases where two people edit a document at the same time, Box Sync can merge simple changes and save copies of a file, so collaborators can review potential version conflicts later.

Nordic River launched in February launched a TextFlow application to make revision management easier Box.net's cloud content management system. Integrated with the Box.net system, TextFlow makes it simple to see changes side by side and choose which one to accept.

Box.net plans to roll out Box Sync in waves to its business and enterprise customers at no charge throughout the summer. The company also plans to make a modified version of Box Sync available later in the year to users of the site's free version and individuals who pay $9.95 a month for 10 GB of Web storage and a file size limit of 1 GB.

Business collaboration services are available for $15 a month per user for 45 GB of storage and a file size limit of 2 GB.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-0972
Published: 2014-08-01
The kgsl graphics driver for the Linux kernel 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, does not properly prevent write access to IOMMU context registers, which allows local users to select a custom page table, and consequently write ...

CVE-2014-2627
Published: 2014-08-01
Unspecified vulnerability in HP NonStop NetBatch G06.14 through G06.32.01, H06 through H06.28, and J06 through J06.17.01 allows remote authenticated users to gain privileges for NetBatch job execution via unknown vectors.

CVE-2014-3009
Published: 2014-08-01
The GDS component in IBM InfoSphere Master Data Management - Collaborative Edition 10.0 through 11.0 and InfoSphere Master Data Management Server for Product Information Management 9.0 and 9.1 does not properly handle FRAME elements, which makes it easier for remote authenticated users to conduct ph...

CVE-2014-3302
Published: 2014-08-01
user.php in Cisco WebEx Meetings Server 1.5(.1.131) and earlier does not properly implement the token timer for authenticated encryption, which allows remote attackers to obtain sensitive information via a crafted URL, aka Bug ID CSCuj81708.

CVE-2014-3534
Published: 2014-08-01
arch/s390/kernel/ptrace.c in the Linux kernel before 3.15.8 on the s390 platform does not properly restrict address-space control operations in PTRACE_POKEUSR_AREA requests, which allows local users to obtain read and write access to kernel memory locations, and consequently gain privileges, via a c...

Best of the Web
Dark Reading Radio