PocketCloud 1.1: Improved solution to Mobile Computer Access for the Galaxy Tab

PocketCloud 1.1: Improved solution to Mobile Computer Access for the Galaxy Tab

Wyse had successfully integrated the realms of cloud computing, personal computing and remote desktop services by introducing PocketCloud a short while back. Using Pocket Cloud, users and administrators can successfully and securely access user machines from anywhere using their smart phones. It’s like folding up your system and carrying it along in your pocket, wherever you go! There is no limit to what you want to access. It maybe multimedia files, applications, data files or your important excel workbooks. Initially the service was introduced for iPhones and later Wyse extended the utility to the Androids and iPads.

Pocket cloud uses the Remote Desktop Protocol (RDP) to connect to any system that has the RDP protocol enabled. The software needs to be installed on the system that is to be accessed and on the hand-held device that is used to access the system. There are limitations to the operating systems Pocket Cloud supports. Some distinctive features of the Pocket Cloud is that it supports Flash on all the iDevices (Take that Steve Jobs!).

Other features include:

Easy configuration: Compared to other cloud apps, it is very simple to configure and install. Virtual mouse: The application supports a virtual mouse on your mobile device which makes system accessing very easy. Enabled Flash.

In order to access your system, IP, port, username and password of the system need to be known. Also, the system needs to be in the active state in order to be accessed. There are a few glitches with the utility like: It doesn’t support MAC and there are some security issues since Windows firewall needs to be disabled. Moreover, once you are done accessing the PC desktop and get back to the system, you will see some blurry lines on the desktop which can be a nuisance.

With the success of PocketCloud’s original app, it has now released PocketCloud 1.1 for the Galaxy Tab. With the Samsung Galaxy Tab being a potent contender of the iPad, Wyse has made a smart move to support remote desktop on this platform. PocketCloud 1.1 will support the Samsung Galaxy Tablet and the upcoming Cisco Cius. Basic features are the same as the ones offered in the previous version but several features have been tweaked. The new version supports Network Level Authentication (NLA) which will beef up the security. The application remains free but the Pro package costs $14.99 and offers the ultimate mobile cloud computing experience.

PocketCloud has been optimized to work smoothly with Wi-Fi and 3G connections. The utility now covers a whole range of hand-held devices, mobile phones and tablets whereas some advanced features offered by the Pro version include SSL encryption, support for RSA authentication and direct connections with advanced tunneling which will make the outlook of this version even more promising. For all the people who can’t leave the sight of their desktops, PocketCloud can prove to be the best available application which supports mobile computer access.

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Cloud Services Providers – Learning To Keep The Lights On

Cloud Services Providers – Learning To Keep The Lights On

The True Meaning of Availability What is real availability? In our line of work, cloud service providers approach availability from the inside out. And in many cases, some never make it past their own front door given how challenging it is to keep the lights on at home let alone factors that are out of…

Using Private Cloud Architecture For Multi-Tier Applications

Using Private Cloud Architecture For Multi-Tier Applications

Cloud Architecture These days, Multi-Tier Applications are the norm. From SharePoint’s front-end/back-end configuration, to LAMP-based websites using multiple servers to handle different functions, a multitude of apps require public and private-facing components to work in tandem. Placing these apps in entirely public-facing platforms and networks simplifies the process, but at the cost of security vulnerabilities. Locating everything…

Achieving Network Security In The IoT

Achieving Network Security In The IoT

Security In The IoT The network security market is experiencing a pressing and transformative change, especially around access control and orchestration. Although it has been mature for decades, the network security market had to transform rapidly with the advent of the BYOD trend and emergence of the cloud, which swept enterprises a few years ago.…

Beacons Flopped, But They’re About to Flourish in the Future

Beacons Flopped, But They’re About to Flourish in the Future

Cloud Beacons Flying High When Apple debuted cloud beacons in 2013, analysts predicted 250 million devices capable of serving as iBeacons would be found in the wild within weeks. A few months later, estimates put the figure at just 64,000, with 15 percent confined to Apple stores. Beacons didn’t proliferate as expected, but a few…

5% Of Companies Have Embraced The Digital Innovation Fostered By Cloud Computing

5% Of Companies Have Embraced The Digital Innovation Fostered By Cloud Computing

Embracing The Cloud We love the stories of big complacent industry leaders having their positions sledge hammered by nimble cloud-based competitors. Saleforce.com chews up Oracle’s CRM business. Airbnb has a bigger market cap than Marriott. Amazon crushes Walmart (and pretty much every other retailer). We say: “How could they have not seen this coming?” But, more…

Lavabit, Edward Snowden and the Legal Battle For Privacy

Lavabit, Edward Snowden and the Legal Battle For Privacy

The Legal Battle For Privacy In early June 2013, Edward Snowden made headlines around the world when he leaked information about the National Security Agency (NSA) collecting the phone records of tens of millions of Americans. It was a dramatic story. Snowden flew to Hong Kong and then Russia to avoid deportation to the US,…

Are Cloud Solutions Secure Enough Out-of-the-box?

Are Cloud Solutions Secure Enough Out-of-the-box?

Out-of-the-box Cloud Solutions Although people may argue that data is not safe in the Cloud because using cloud infrastructure requires trusting another party to look after mission critical data, cloud services actually are more secure than legacy systems. In fact, a recent study on the state of cloud security in the enterprise market revealed that…

Staying on Top of Your Infrastructure-as-a-Service Security Responsibilities

Staying on Top of Your Infrastructure-as-a-Service Security Responsibilities

Infrastructure-as-a-Service Security It’s no secret many organizations rely on popular cloud providers like Amazon and Microsoft for access to computing infrastructure. The many perks of cloud services, such as the ability to quickly scale resources without the upfront cost of buying physical servers, have helped build a multibillion-dollar cloud industry that continues to grow each…

Having Your Cybersecurity And Eating It Too

Having Your Cybersecurity And Eating It Too

The Catch 22 The very same year Marc Andreessen famously said that software was eating the world, the Chief Information Officer of the United States was announcing a major Cloud First goal. That was 2011. Five years later, as both the private and public sectors continue to adopt cloud-based software services, we’re interested in this…