PocketCloud 1.1: Improved solution to Mobile Computer Access for the Galaxy Tab

PocketCloud 1.1: Improved solution to Mobile Computer Access for the Galaxy Tab

Wyse had successfully integrated the realms of cloud computing, personal computing and remote desktop services by introducing PocketCloud a short while back. Using Pocket Cloud, users and administrators can successfully and securely access user machines from anywhere using their smart phones. It’s like folding up your system and carrying it along in your pocket, wherever you go! There is no limit to what you want to access. It maybe multimedia files, applications, data files or your important excel workbooks. Initially the service was introduced for iPhones and later Wyse extended the utility to the Androids and iPads.

Pocket cloud uses the Remote Desktop Protocol (RDP) to connect to any system that has the RDP protocol enabled. The software needs to be installed on the system that is to be accessed and on the hand-held device that is used to access the system. There are limitations to the operating systems Pocket Cloud supports. Some distinctive features of the Pocket Cloud is that it supports Flash on all the iDevices (Take that Steve Jobs!).

Other features include:

Easy configuration: Compared to other cloud apps, it is very simple to configure and install. Virtual mouse: The application supports a virtual mouse on your mobile device which makes system accessing very easy. Enabled Flash.

In order to access your system, IP, port, username and password of the system need to be known. Also, the system needs to be in the active state in order to be accessed. There are a few glitches with the utility like: It doesn’t support MAC and there are some security issues since Windows firewall needs to be disabled. Moreover, once you are done accessing the PC desktop and get back to the system, you will see some blurry lines on the desktop which can be a nuisance.

With the success of PocketCloud’s original app, it has now released PocketCloud 1.1 for the Galaxy Tab. With the Samsung Galaxy Tab being a potent contender of the iPad, Wyse has made a smart move to support remote desktop on this platform. PocketCloud 1.1 will support the Samsung Galaxy Tablet and the upcoming Cisco Cius. Basic features are the same as the ones offered in the previous version but several features have been tweaked. The new version supports Network Level Authentication (NLA) which will beef up the security. The application remains free but the Pro package costs $14.99 and offers the ultimate mobile cloud computing experience.

PocketCloud has been optimized to work smoothly with Wi-Fi and 3G connections. The utility now covers a whole range of hand-held devices, mobile phones and tablets whereas some advanced features offered by the Pro version include SSL encryption, support for RSA authentication and direct connections with advanced tunneling which will make the outlook of this version even more promising. For all the people who can’t leave the sight of their desktops, PocketCloud can prove to be the best available application which supports mobile computer access.

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Comics
Staying on Top of Your Infrastructure-as-a-Service Security Responsibilities

Staying on Top of Your Infrastructure-as-a-Service Security Responsibilities

Infrastructure-as-a-Service Security It’s no secret many organizations rely on popular cloud providers like Amazon and Microsoft for access to computing infrastructure. The many perks of cloud services, such as the ability to quickly scale resources without the upfront cost of buying physical servers, have helped build a multibillion-dollar cloud industry that continues to grow each year. Still, even though cloud has helped many companies, there are tradeoffs with cloud services such as Infrastructure-as-a-Service (IaaS) that…

Two 2017 Trends From A Galaxy Far, Far Away

Two 2017 Trends From A Galaxy Far, Far Away

Reaching For The Stars People who know me know that I’m a huge Star Wars fan. I recently had the opportunity to see Rogue One: A Star Wars Story. While I won’t give any spoilers away for the few who haven’t seen the movie yet, I do want to mention a couple of trends from the galaxy far, far away that are affecting the ways businesses will do IT in our world in 2017. And…

How The CFAA Ruling Affects Individuals And Password-Sharing

How The CFAA Ruling Affects Individuals And Password-Sharing

Individuals and Password-Sharing With the 1980s came the explosion of computing. In 1980, the Commodore ushered in the advent of home computing. Time magazine declared 1982 was “The Year of the Computer.” By 1983, there were an estimated 10 million personal computers in the United States alone. As soon as computers became popular, the federal government began to legislate their use. In 1986, the Comprehensive Crime Control Act was amended to included the Computer Fraud and…

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported that 87 percent of respondents had faced a disruptive incident with third parties in the last two to three years.…

Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks Does cloud security risks ever bother you? It would be weird if it didn’t. Cloud computing has a lot of benefits, but also a lot of risks if done in the wrong way. So what are the most important risks? The European Network Information Security Agency did extensive research on that, and identified 35 risk categories. This analysis is used by a number of players in the industry, including certain banking regulators.…

Beacons Flopped, But They’re About to Flourish in the Future

Beacons Flopped, But They’re About to Flourish in the Future

Cloud Beacons Flying High When Apple debuted cloud beacons in 2013, analysts predicted 250 million devices capable of serving as iBeacons would be found in the wild within weeks. A few months later, estimates put the figure at just 64,000, with 15 percent confined to Apple stores. Beacons didn’t proliferate as expected, but a few forward-thinking brands did dip their toes. Macy’s, Lord & Taylor, and Sephora deployed beacons to send in-store notifications. Tech-happy airline…

2017 Brings DLP Technology and IoT’s Weaknesses to Light

2017 Brings DLP Technology and IoT’s Weaknesses to Light

DLP Technology In regards to data loss prevention (DLP), in the last five years many companies rushed to implement DLP solutions without taking the time to first identify the data that should not transit egress points. Most of these rushed implementations have not been successful. Security analysts, in particular 451 Research, have been recommending that companies should first identify and classify data before deploying DLP. Unfortunately, we are just now seeing companies execute this approach.…

Cyber Criminals Are Business People Too

Cyber Criminals Are Business People Too

Cyber Crime Business You’re on the morning train on the way to work and take a look at the guy next to you. He’s clean-cut, wearing a crisp suit and holding a leather briefcase just like dozens of others. Just another worker headed to the office, right?. Yes, but not in the way you think he is. That person is going to work but rather than creating reports and spreadsheets, he’s part of a criminal…

Write Once, Run Anywhere: The IoT Machine Learning Shift From Proprietary Technology To Data

Write Once, Run Anywhere: The IoT Machine Learning Shift From Proprietary Technology To Data

The IoT Machine Learning Shift While early artificial intelligence (AI) programs were a one-trick pony, typically only able to excel at one task, today it’s about becoming a jack of all trades. Or at least, that’s the intention. The goal is to write one program that can solve multi-variant problems without the need to be rewritten when conditions change—write once, run anywhere. Digital heavyweights—notably Amazon, Google, IBM, and Microsoft—are now open sourcing their machine learning…