Secured2 vs. Pied Piper - who wins at compression? (2024)

Secured2 vs. Pied Piper - who wins at compression? (1)

  • Report this article

Daren Klum Secured2 vs. Pied Piper - who wins at compression? (2)

Daren Klum

CEO - Secured2 Corporation, Inventor, Hardware & Software Engineer, Entrepreneur, Investor & Advisor, Author

Published Jun 1, 2016

+ Follow

If you have been sucked into the television show Pied Piper like me then you know the story of 5 tech entrepreneurstrying to build a 'data compression' start up called Pied Piper in Silicon Valley against all odds. Includingthe threats from the corrupt and misguidedleader Gavin Belson who runs a competingcompany called Hooli. The show offers a ton of laughs and plays on the many situations that allentrepreneursface on the road to success. From funding droughts, patent lawsuits, rival company confrontations and upsetcustomers. This show hits on all the marks but in a hilarious way. If you haven't seen the show be warned-it's very over the top and vulgar. Definitely, not the kind of show to watch with your kids.

So why am I comparing a fictional compression company with my own company? It's simple - everyone asks if we are like Pied Piper from Silicon Valley. So I have to go on the record bysayingwe are not in an incubator run byErlich Bachmann the pot smoking Senior Minority Owner & Chief Executive of Physical Space. I also have to share we have technology that actually works, has been vetted, market testedand isn't being run on home brewed servers in my garage. I also have to explain we actually know how to run a company, raise capital, get patents, sell our tech and provide value to our shareholders. Something that Pied Piper seems to never be able to do. So are there similarities (some) but we are vastly different.

So lets get to the technology. What does Pied Piper do and what does Secured2 do?

In the television show Pied Piper is working on a 'compression' breakthrough called 'middle out compression.' What this means is anyone's guess butthe way it's described in the show is similar to a lossless compression scheme called DCT (discrete cosine transform). This process takes out many of the smaller coefficients while still offering 'lossless compression.' What lossless means is there is no file fidelity loss when you deflate the file after it's been compressed. Lossy (the other form of compression) reduces files to a much greaterextent than lossless compression but at the risk of losing file fidelity. This is why most medical imaging companies don't compress files at all. They don't want to lose the fidelity of the file as any loss of fidelity could mean life or death to a patient.

In contrast, the breakthrough in compression that Secured2 has developed utilizes a process we call 'transmogrification' or in simple terms changing the state of the data. This process transforms the data by binary patternmatching (think of this like matching sequences of numbers and blocking out similar patterns to use less space) and converting the matched sequences into a meta library. We take the content of the meta library and create a unique binary key. It's important to note this key is always 'random' because your data is always random. The data on my computer is not the same as the data on your computer. So your key always changes based on the changes to your data on your computer. As well, this unique key is up to 90% less in size than your original data set. Once a key is created the key gets segmented into 10k chunks, randomized and pushed into multiple storage destinations (this process secures data as well as compresses data downto 10% of it's original size). In fact, our compression works so well we go beyond the levels of any form of lossy or lossless forms of compression to date. As well, the Secured2 method of compression doesn't harm the file and allows us to store more data in less space. Also, we can move large amounts of data faster because there is 90% less to move. As with any algorithm of this kind there is overhead to running the algorithm but this is offset by the size reduction. When you look at traditional data deliverythe formula looks like this (encryptionalgorithm + network latency + writing to disk = time to store in the cloud). For Secured2 it's (transmogrification algorithm (reducing data up to 90%) + network latency (90% less data to send) + writing to disk (90% less to write to disk) = less time to store in the cloud). So in shortwe do take more time 'processing' data upfront to both secure & make it smaller but when you factor in the reduction in size, less to move and less to write to disk we are much faster to move a similar amount of compressed data from point A to point B.

So the reality is the Pied Piper Algorithm is definitely not realbut is loosely based on a compression algorithm for 'lossless compression.' Whereas Secured2 is a true breakthrough in compression and offers size reductions not possible by today's algorithms along with the benefit of securing data. We see incredible promise for our 'transmogrification' technology and we are only just beginning to explore all the possibilities of our platform. So the winner is - SECURED2 (at least I'm biased)!

In closing - fromthe immortal words of Gavin Belson at Hooli "Anyone who tells you their platform compressesfaster than ours better have good lawyers."

Help improve contributions

Mark contributions as unhelpful if you find them irrelevant or not valuable to the article. This feedback is private to you and won’t be shared publicly.

Contribution hidden for you

This feedback is never shared publicly, we’ll use it to show better contributions to everyone.

Scott Litman

Managing Partner, Co-Founder and COO

7y

  • Report this comment

Great post and yes, when I watch I do think about SECURED2. Along with GoT, its my favorite show on TV and Silicon Valley is better then any show in history at capturing the valley, entrepreneurism and the tech space - good laughs, but they did their homework.

Like Reply

1Reaction 2Reactions

David Zimmel

7y

  • Report this comment

Great characters with a very funny actor group. Love that show!!!

Like Reply

1Reaction

Bill Young

7y

  • Report this comment

Sure...but what's your Weissman Score?

Like Reply

1Reaction

See more comments

To view or add a comment, sign in

More articles by this author

No more previous content

  • The cyber war is here, what your business needs to do now! Mar 4, 2024
  • Rethinking Security: The False Promise of Lattice Encryption and the Misplaced Trust in Math-Based Encryption Jan 17, 2024
  • My dire cyber security prediction for 2024. Break out the tin foil hats! Jan 4, 2024
  • Getting secure in 2022 means moving 100% to Linux. Dec 5, 2022
  • The race to prevent Q-Day. Mar 8, 2022
  • Three things we can do today to fix America's cyber vulnerabilities. Nov 2, 2021
  • Hacking a Mac and gaining root control in less than 5 minutes. Jul 12, 2021
  • Secured2, your new line of defense against Malware and Cryptolocker! May 28, 2021
  • Secured2’s Multi-Mesh vs. Composability, Converged, Hyper-converged and Cloud. May 5, 2021

No more next content

See all

Sign in

Stay updated on your professional world

Sign in

By clicking Continue, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.

New to LinkedIn? Join now

Insights from the community

  • Laboratory Management How can you select the right technology for your lab?
  • Technological Innovation What's the best way to identify a tech problem to solve?
  • Operations Research How can you ensure diverse perspectives in your simulations?
  • Technological Innovation What is the most effective way to create an innovative tech vision and mission statement?
  • Signal Processing How do you implement amplitude modulation and demodulation using software-defined radio (SDR)?
  • Financial Technology How do you inspire others to follow your fintech vision?
  • Game Theory What are some common game theory models used to analyze market competition and entry?
  • Technology Transfer How do you leverage your network and resources to identify and access potential technology transfer partners?
  • Invention How do you anticipate and prepare for future market trends and opportunities?
  • Analytical Skills How can game theory help you analyze alternatives in a competitive environment?

Others also viewed

  • Top 3 takeaways from ARMTech 2023 Michael O'Brien 1y
  • Who will be first to the Agtech moon Scott Mckinnon 4y
  • eLeader March 2024 Kathryn Sowa 1mo
  • SXSW Conference Jeff High 8y
  • The Dangers Of Groupthink Karen Webster 8y
  • The Revolution Is Constant Michael Johnson 7y
  • What To Expect from Theranos' Big Presentation Today: Proof that Elizabeth Holmes doesn't think like the rest of us Paul Reynolds 7y
  • The Impact of The Global Tech Invasion Rafe Offer 4y
  • 🌏 Update #21 BFA Global Investors 8mo

Explore topics

  • Sales
  • Marketing
  • Business Administration
  • HR Management
  • Content Management
  • Engineering
  • Soft Skills
  • See All
Secured2 vs. Pied Piper - who wins at compression? (2024)

FAQs

Secured2 vs. Pied Piper - who wins at compression? ›

So the reality is the Pied Piper Algorithm is definitely not real but is loosely based on a compression algorithm for 'lossless compression. ' Whereas Secured2 is a true breakthrough in compression and offers size reductions not possible by today's algorithms along with the benefit of securing data.

Is the compression in Silicon Valley possible? ›

The compression algorithm shown in Silicon Valley is possible in reality, but it would require a lot of computing power. The algorithm takes advantage of the fact that some data is more compressible than other data. For example, text files are usually more compressible than images.

What is the Pied Piper video compression algorithm? ›

The Pied Piper algorithm from the show Silicon Valley is a video compression software program written in C that achieves a Weissman score in the fives. This type of video compression technology is said to be able to actually shrink the internet by as much as 10 percent with widespread adoption.

Is Pied Piper based on a real company? ›

If you haven't seen the show, it focuses on a fictional company called Pied Piper. The goal of Pied Piper's platform is to provide a compression tool for shrinking data down to the smallest possible size. Think of it as WinZip on steroids. The platform is portrayed as a revolutionary game changer for the industry.

Is there an app like Pied Piper? ›

The closest thing to what's described on Silicon Valley might be Storj, a decentralized cloud storage company. Much like Pied Piper, Storj has built a network of people who sell their unused storage capacity.

Top Articles
Difference between REST & SOAP based web services
How to Save on a Road Trip
Devotion Showtimes Near Xscape Theatres Blankenbaker 16
Srtc Tifton Ga
Places 5 Hours Away From Me
Chatiw.ib
1970 Chevrolet Chevelle SS - Skyway Classics
9192464227
Flixtor The Meg
Ati Capstone Orientation Video Quiz
EY – все про компанію - Happy Monday
Top Golf 3000 Clubs
Sitcoms Online Message Board
Miami Valley Hospital Central Scheduling
Summer Rae Boyfriend Love Island – Just Speak News
Playgirl Magazine Cover Template Free
D10 Wrestling Facebook
Condogames Xyz Discord
Daily Voice Tarrytown
Xxn Abbreviation List 2023
Wicked Local Plymouth Police Log 2022
Unterwegs im autonomen Freightliner Cascadia: Finger weg, jetzt fahre ich!
Zalog Forum
Ice Dodo Unblocked 76
Talk To Me Showtimes Near Marcus Valley Grand Cinema
Danielle Ranslow Obituary
Vera Bradley Factory Outlet Sunbury Products
His Only Son Showtimes Near Marquee Cinemas - Wakefield 12
Things to do in Pearl City: Honolulu, HI Travel Guide by 10Best
Davita Salary
Ravens 24X7 Forum
Average weekly earnings in Great Britain
Everstart Jump Starter Manual Pdf
Teenage Jobs Hiring Immediately
Ticketmaster Lion King Chicago
Unifi Vlan Only Network
This 85-year-old mom co-signed her daughter's student loan years ago. Now she fears the lender may take her house
Brandon Spikes Career Earnings
California Craigslist Cars For Sale By Owner
Ethan Cutkosky co*ck
[Teen Titans] Starfire In Heat - Chapter 1 - Umbrelloid - Teen Titans
Gas Buddy Il
Syrie Funeral Home Obituary
Sc Pick 3 Past 30 Days Midday
Ronnie Mcnu*t Uncensored
Upcoming Live Online Auctions - Online Hunting Auctions
Google Flights Missoula
Wieting Funeral Home '' Obituaries
Hcs Smartfind
Convert Celsius to Kelvin
Ark Silica Pearls Gfi
Latest Posts
Article information

Author: Saturnina Altenwerth DVM

Last Updated:

Views: 6556

Rating: 4.3 / 5 (64 voted)

Reviews: 87% of readers found this page helpful

Author information

Name: Saturnina Altenwerth DVM

Birthday: 1992-08-21

Address: Apt. 237 662 Haag Mills, East Verenaport, MO 57071-5493

Phone: +331850833384

Job: District Real-Estate Architect

Hobby: Skateboarding, Taxidermy, Air sports, Painting, Knife making, Letterboxing, Inline skating

Introduction: My name is Saturnina Altenwerth DVM, I am a witty, perfect, combative, beautiful, determined, fancy, determined person who loves writing and wants to share my knowledge and understanding with you.