Wyse Introduces Version 2.1 of PocketCloud for iOS

Wyse Introduces Version 2.1 of PocketCloud for iOS

Global Cloud Client Computing specialist Wyse Technology is elevating the iPad experience by introducing version 2.1 of its free PocketCloud for iOS application.
Featuring a tablet-optimized interface, PocketCloud 2.1 leverages the larger screen and also improves performance for all devices.

PocketCloud provides a high quality remote access experience on iOS devices and the company claims it has reached a milestone of more than one million total downloads across iOS and Android devices.
Because version 2.1 adds the optional PocketCloud Premium subscription service to the free app, customers can easily download, print, and email files, as well as stream videos and music from their home or work computers on-the-go.

Elaborating more on the new version, Wyse says that version 2.1 includes a split-screen view while setting up and choosing the computer for user’s remote connection. A new setup wizard makes getting connected even simpler and faster. Thanks to PocketCloud 2.1, users can add the PocketCloud Premium subscription service through an easy in-app purchase.

By paying $1 a month, users can stream video and music from their home or work computers directly to their iPhone or iPad over 3G and Wi-Fi.

This subscription service also includes a file browser, and this means users can quickly search for files on a remote computer and transfer them to an iPhone or iPad a snap.

PocketCloud version 2.1 represents our dedication to providing the most features to our users at a price that anyone can afford,” said Daniel Barreto, general manager of the Mobile Business Unit at Wyse Technology. “The introduction of PocketCloud Premium subscription service gives all our free app users access to the same great features our business users have come to expect.

By Anuradha Shukla

Sorry, comments are closed for this post.

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported…

Is Machine Learning Making Your Data Scientists Obsolete?

Is Machine Learning Making Your Data Scientists Obsolete?

Machine Learning and Data Scientists In a recent study, almost all the businesses surveyed stated that big data analytics were fundamental to their business strategies. Although the field of computer and information research scientists is growing faster than any other occupation, the increasing applicability of data science across business sectors is leading to an exponential…

Using Private Cloud Architecture For Multi-Tier Applications

Using Private Cloud Architecture For Multi-Tier Applications

Cloud Architecture These days, Multi-Tier Applications are the norm. From SharePoint’s front-end/back-end configuration, to LAMP-based websites using multiple servers to handle different functions, a multitude of apps require public and private-facing components to work in tandem. Placing these apps in entirely public-facing platforms and networks simplifies the process, but at the cost of security vulnerabilities. Locating everything…

Four Recurring Revenue Imperatives

Four Recurring Revenue Imperatives

Revenue Imperatives “Follow the money” is always a good piece of advice, but in today’s recurring revenue-driven market, “follow the customer” may be more powerful. Two recurring revenue imperatives highlight the importance of responding to, and cherishing customer interactions. Technology and competitive advantage influence the final two. If you’re part of the movement towards recurring…

Disaster Recovery – A Thing Of The Past!

Disaster Recovery – A Thing Of The Past!

Disaster Recovery  Ok, ok – I understand most of you are saying disaster recovery (DR) is still a critical aspect of running any type of operations. After all – we need to secure our future operations in case of disaster. Sure – that is still the case but things are changing – fast. There are…

How The CFAA Ruling Affects Individuals And Password-Sharing

How The CFAA Ruling Affects Individuals And Password-Sharing

Individuals and Password-Sharing With the 1980s came the explosion of computing. In 1980, the Commodore ushered in the advent of home computing. Time magazine declared 1982 was “The Year of the Computer.” By 1983, there were an estimated 10 million personal computers in the United States alone. As soon as computers became popular, the federal government…

Connecting With Customers In The Cloud

Connecting With Customers In The Cloud

Customers in the Cloud Global enterprises in every industry are increasingly turning to cloud-based innovators like Salesforce, ServiceNow, WorkDay and Aria, to handle critical systems like billing, IT services, HCM and CRM. One need look no further than Salesforce’s and Amazon’s most recent earnings report, to see this indeed is not a passing fad, but…

Cloud Native Trends Picking Up – Legacy Security Losing Ground

Cloud Native Trends Picking Up – Legacy Security Losing Ground

Cloud Native Trends Once upon a time, only a select few companies like Google and Salesforce possessed the knowledge and expertise to operate efficient cloud infrastructure and applications. Organizations patronizing those companies benefitted with apps that offered new benefits in flexibility, scalability and cost effectiveness. These days, the sharp division between cloud and on-premises infrastructure…

Adopting A Cohesive GRC Mindset For Cloud Security

Adopting A Cohesive GRC Mindset For Cloud Security

Cloud Security Mindset Businesses are becoming wise to the compelling benefits of cloud computing. When adopting cloud, they need a high level of confidence in how it will be risk-managed and controlled, to preserve the security of their information and integrity of their operations. Cloud implementation is sometimes built up over time in a business,…