Kloudless Blog

Tutorials, case studies and how-tos from our experts

Kloudless announces Autodesk integration

When it comes to companies that need access to a multitude of files and documents across all available cloud file storage options, few surpass those in the construction business. From initial blueprints and submittals, to RFIs and photos; document creation and transferral is the backbone of the construction industry. Hanley Wood, an analytics-driven and construction-focused … Continue Reading

Kloudless announces PlanGrid integration

When it comes to companies that need access to a multitude of files and documents across all available cloud file storage options, few surpass those in the construction business. From initial blueprints and submittals, to RFIs and photos; document creation and transferral is the backbone of the construction industry. Hanley Wood, an analytics-driven and construction-focused … Continue Reading

Kloudless announces Procore integration

When it comes to companies that need access to a multitude of files and documents across all available cloud file storage options, few surpass those in the construction business. From initial blueprints and submittals to RFIs and photos, document creation and transferral is the backbone of the construction industry. Hanley Wood, an analytics-driven and construction-focused … Continue Reading

Working with Documents via the PlanGrid API

Stepping into the Construction scene PlanGrid, the leading construction productivity software, is one of Kloudless’ earliest customers. PlanGrid uses the Kloudless File Explorer to allow contractors to transfer documents and drawings from and to cloud storage services such as Box, Dropbox, Google Drive, and more, using Kloudless’ unified Cloud Storage API. In the recent past, … Continue Reading

Transferring Box file ownership while preserving version history

Data security apps integrate with several different cloud providers via Kloudless, enabling them to offer solutions such as Data Loss Prevention across multiple content repositories without having to learn the ins-and-outs of each one. Security-oriented apps commonly need to identify malicious or compromised files or objects. For example, by scanning through all content in a … Continue Reading