- Report this article
Daren Klum
Daren Klum
CEO - Secured2 Corporation, Inventor, Hardware & Software Engineer, Entrepreneur, Investor & Advisor, Author
Published Jun 1, 2016
+ Follow
If you have been sucked into the television show Pied Piper like me then you know the story of 5 tech entrepreneurstrying to build a 'data compression' start up called Pied Piper in Silicon Valley against all odds. Includingthe threats from the corrupt and misguidedleader Gavin Belson who runs a competingcompany called Hooli. The show offers a ton of laughs and plays on the many situations that allentrepreneursface on the road to success. From funding droughts, patent lawsuits, rival company confrontations and upsetcustomers. This show hits on all the marks but in a hilarious way. If you haven't seen the show be warned-it's very over the top and vulgar. Definitely, not the kind of show to watch with your kids.
So why am I comparing a fictional compression company with my own company? It's simple - everyone asks if we are like Pied Piper from Silicon Valley. So I have to go on the record bysayingwe are not in an incubator run byErlich Bachmann the pot smoking Senior Minority Owner & Chief Executive of Physical Space. I also have to share we have technology that actually works, has been vetted, market testedand isn't being run on home brewed servers in my garage. I also have to explain we actually know how to run a company, raise capital, get patents, sell our tech and provide value to our shareholders. Something that Pied Piper seems to never be able to do. So are there similarities (some) but we are vastly different.
So lets get to the technology. What does Pied Piper do and what does Secured2 do?
In the television show Pied Piper is working on a 'compression' breakthrough called 'middle out compression.' What this means is anyone's guess butthe way it's described in the show is similar to a lossless compression scheme called DCT (discrete cosine transform). This process takes out many of the smaller coefficients while still offering 'lossless compression.' What lossless means is there is no file fidelity loss when you deflate the file after it's been compressed. Lossy (the other form of compression) reduces files to a much greaterextent than lossless compression but at the risk of losing file fidelity. This is why most medical imaging companies don't compress files at all. They don't want to lose the fidelity of the file as any loss of fidelity could mean life or death to a patient.
In contrast, the breakthrough in compression that Secured2 has developed utilizes a process we call 'transmogrification' or in simple terms changing the state of the data. This process transforms the data by binary patternmatching (think of this like matching sequences of numbers and blocking out similar patterns to use less space) and converting the matched sequences into a meta library. We take the content of the meta library and create a unique binary key. It's important to note this key is always 'random' because your data is always random. The data on my computer is not the same as the data on your computer. So your key always changes based on the changes to your data on your computer. As well, this unique key is up to 90% less in size than your original data set. Once a key is created the key gets segmented into 10k chunks, randomized and pushed into multiple storage destinations (this process secures data as well as compresses data downto 10% of it's original size). In fact, our compression works so well we go beyond the levels of any form of lossy or lossless forms of compression to date. As well, the Secured2 method of compression doesn't harm the file and allows us to store more data in less space. Also, we can move large amounts of data faster because there is 90% less to move. As with any algorithm of this kind there is overhead to running the algorithm but this is offset by the size reduction. When you look at traditional data deliverythe formula looks like this (encryptionalgorithm + network latency + writing to disk = time to store in the cloud). For Secured2 it's (transmogrification algorithm (reducing data up to 90%) + network latency (90% less data to send) + writing to disk (90% less to write to disk) = less time to store in the cloud). So in shortwe do take more time 'processing' data upfront to both secure & make it smaller but when you factor in the reduction in size, less to move and less to write to disk we are much faster to move a similar amount of compressed data from point A to point B.
So the reality is the Pied Piper Algorithm is definitely not realbut is loosely based on a compression algorithm for 'lossless compression.' Whereas Secured2 is a true breakthrough in compression and offers size reductions not possible by today's algorithms along with the benefit of securing data. We see incredible promise for our 'transmogrification' technology and we are only just beginning to explore all the possibilities of our platform. So the winner is - SECURED2 (at least I'm biased)!
In closing - fromthe immortal words of Gavin Belson at Hooli "Anyone who tells you their platform compressesfaster than ours better have good lawyers."
Help improve contributions
Mark contributions as unhelpful if you find them irrelevant or not valuable to the article. This feedback is private to you and won’t be shared publicly.
Contribution hidden for you
This feedback is never shared publicly, we’ll use it to show better contributions to everyone.
Like
Celebrate
Support
Love
Insightful
Funny
18
11 Comments
Scott Litman
Managing Partner, Co-Founder and COO
7y
- Report this comment
Great post and yes, when I watch I do think about SECURED2. Along with GoT, its my favorite show on TV and Silicon Valley is better then any show in history at capturing the valley, entrepreneurism and the tech space - good laughs, but they did their homework.
1Reaction 2Reactions
David Zimmel
7y
- Report this comment
Great characters with a very funny actor group. Love that show!!!
1Reaction
Bill Young
7y
- Report this comment
Sure...but what's your Weissman Score?
1Reaction
See more comments
To view or add a comment, sign in
More articles by this author
No more previous content
- The cyber war is here, what your business needs to do now! Mar 4, 2024
- Rethinking Security: The False Promise of Lattice Encryption and the Misplaced Trust in Math-Based Encryption Jan 17, 2024
- My dire cyber security prediction for 2024. Break out the tin foil hats! Jan 4, 2024
- Getting secure in 2022 means moving 100% to Linux. Dec 5, 2022
- The race to prevent Q-Day. Mar 8, 2022
- Three things we can do today to fix America's cyber vulnerabilities. Nov 2, 2021
- Hacking a Mac and gaining root control in less than 5 minutes. Jul 12, 2021
- Secured2, your new line of defense against Malware and Cryptolocker! May 28, 2021
- Secured2’s Multi-Mesh vs. Composability, Converged, Hyper-converged and Cloud. May 5, 2021
No more next content
Sign in
Stay updated on your professional world
Sign in
By clicking Continue, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
Insights from the community
- Laboratory Management How can you select the right technology for your lab?
- Technological Innovation What's the best way to identify a tech problem to solve?
- Operations Research How can you ensure diverse perspectives in your simulations?
- Technological Innovation What is the most effective way to create an innovative tech vision and mission statement?
- Signal Processing How do you implement amplitude modulation and demodulation using software-defined radio (SDR)?
- Financial Technology How do you inspire others to follow your fintech vision?
- Game Theory What are some common game theory models used to analyze market competition and entry?
- Technology Transfer How do you leverage your network and resources to identify and access potential technology transfer partners?
- Invention How do you anticipate and prepare for future market trends and opportunities?
- Analytical Skills How can game theory help you analyze alternatives in a competitive environment?
Others also viewed
- Top 3 takeaways from ARMTech 2023 Michael O'Brien 1y
- Who will be first to the Agtech moon Scott Mckinnon 4y
- eLeader March 2024 Kathryn Sowa 1mo
- SXSW Conference Jeff High 8y
- The Dangers Of Groupthink Karen Webster 8y
- The Revolution Is Constant Michael Johnson 7y
- What To Expect from Theranos' Big Presentation Today: Proof that Elizabeth Holmes doesn't think like the rest of us Paul Reynolds 7y
- The Impact of The Global Tech Invasion Rafe Offer 4y
- 🌏 Update #21 BFA Global Investors 8mo
Explore topics
- Sales
- Marketing
- Business Administration
- HR Management
- Content Management
- Engineering
- Soft Skills
- See All