‘Why I Did This’ By Sollensys CEO, Don Beavers

One day I got a call from my mother, who was frantic because of a recent hack into her home computer, and she couldn’t access any of her files. Her family pictures, a recipe book, and other critical documents vanished in a moment. As the family “computer guy,” it took me days of work to clean up her computer and get everything back.

The primary motivation behind creating Sollensys Data Security System is to protect these people who are absolutely devastated by cyber-attacks. Even though I could track down who did this to my mom, there wasn’t much I could do to punish the hacker. So, I looked for another way to help.

Where Traditional Cloud-Based File Storage Solutions Fall Short
Your favorite cloud storage software does a great job of storing and perhaps even encrypting your data, but your files are far from secured because you can upload and download information anywhere with the internet. If a cybercriminal gains access to your cloud credentials, your uploaded files can be modified or deleted entirely, leaving you no way to recover your data.

Sollensium is a private, double blockchain that allows you to upload, encrypt, secure, and safely recall any data, including video assets, which is a first for blockchain technology.

Learn More

 

About Don Beavers
Don is a database and blockchain applications specialist. He has pursued aerospace and defense projects and was the Educational Coordinator/Facility Lead for the Space Coast FabLab in association with MIT’s Center for Bits and Atoms.

Don is known for his burning desire to solve the unsolvable. From developing his first line of GPU computers, rivaling popular CPU models for efficiency, cost and power, to creating his GPU Operating System “PSOS,” Don has always pushed the boundaries of technology using math and science to tackle the impossible. With decades of technology and leadership experience that share deep roots in honesty, integrity, hard work, and a desire to ask “why.”

Connect On LinkedIn

Learn More About Our Team

Previous
Previous

What Is The Blockchain Archive Server?

Next
Next

Can Data Security Be Resistant To Attack By Quantum Computer?