Cloud Apps Of The Week: FitDay

Cloud Apps Of The Week: FitDay

Cloud Apps of the Week

From getting fit to finding your phone, this week’s apps are sure to prove of great use to cloud lovers throughout 2012. Take a look.

Critical to dropping pounds and keeping them off is maintaining a detailed account of every single calorie. Cloud application FitDay makes such meticulous nutrition a breeze. It lets users log a record of their caloric intake no matter the time or their location. Its ease of use is primarily derived from its cloud, where FitDay manages a database of foods and their breakdowns — calories, protein content, types of fiber, et cetera. FitDay also doubles as a diary, an ideal journal for users to vent about having to skip that bear claw for yet another day.

The app’s features do not stop there: it graphs exercise routines and goal completions to boot. 6 million users have already flocked to FitDay for free; a souped-up version of the app is available for $4/month.

Microsoft Office is a classic word processing program that several applications might one day render obsolete. At the front of the line of such apps stands Zoho Office Suite, whose free cost has already netted five million online users. It trumps the standard offering of Microsoft Office in that, as we expect from the cloud, one user or multiple users can work on a single document regardless of the time or location. Critics have hailed Zoho’s interface as superior to Microsoft’s as well, being neater and less cluttered. Zoho has now recently mushroomed into a whole host of subsidiary applications, like Zoho Books (for accounting), Zoho People (for H.R.), Zoho Show (presentations), and Zoho Wiki.

Wish your cell phone (smart, dumb, all scales of “phone-telligence”) could turn into an app itself? Yup, there’s an app for that. Hit European sensation PhoneDeck is helping users to employ their phones as measurements of their social activity and the depth of their participation in various circles of friends, family, business associates, and acquaintances. Without any complicated “unlocking” of an Android phone — the app will soon become available for the iFamily and Blackberry crowds — PhoneDeck lets users maintain data on their calling contacts, summon whole conversation histories at a glance, and instantly update their roster of contacts through Facebook or LinkedIn.

Lose your phone a lot? PhoneDeck yet again comes to the rescue, with a feature that lets you find your device with a click of a button.

By Jeff Norman


About Jeff Norman

Jeff Norman is a freelance writer currently based in New York City. He's moved into writing about cloud computing from substantial work in culture and the arts. He earned his undergraduate degree in English at Stanford and has studied at Oxford and Cambridge.

View All Articles

Sorry, comments are closed for this post.

Three Factors For Choosing Your Long-term Cloud Strategy

Three Factors For Choosing Your Long-term Cloud Strategy

Choosing Your Long-term Cloud Strategy A few weeks ago I visited the global headquarters of a large multi-national company to discuss cloud strategy with the CIO. I arrived 30 minutes early and took a tour of the area where the marketing team showcased their award winning brands. I was impressed by the digital marketing strategy…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

The Security Gap: What Is Your Core Strength?

The Security Gap: What Is Your Core Strength?

The Security Gap You’re out of your mind if you think blocking access to file sharing services is filling a security gap. You’re out of your mind if you think making people jump through hoops like Citrix and VPNs to get at content is secure. You’re out of your mind if you think putting your…

Three Reasons Cloud Adoption Can Close The Federal Government’s Tech Gap

Three Reasons Cloud Adoption Can Close The Federal Government’s Tech Gap

Federal Government Cloud Adoption No one has ever accused the U.S. government of being technologically savvy. Aging software, systems and processes, internal politics, restricted budgets and a cultural resistance to change have set the federal sector years behind its private sector counterparts. Data and information security concerns have also been a major contributing factor inhibiting the…

Disaster Recovery – A Thing Of The Past!

Disaster Recovery – A Thing Of The Past!

Disaster Recovery  Ok, ok – I understand most of you are saying disaster recovery (DR) is still a critical aspect of running any type of operations. After all – we need to secure our future operations in case of disaster. Sure – that is still the case but things are changing – fast. There are…

Lavabit, Edward Snowden and the Legal Battle For Privacy

Lavabit, Edward Snowden and the Legal Battle For Privacy

The Legal Battle For Privacy In early June 2013, Edward Snowden made headlines around the world when he leaked information about the National Security Agency (NSA) collecting the phone records of tens of millions of Americans. It was a dramatic story. Snowden flew to Hong Kong and then Russia to avoid deportation to the US,…

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

DDoS Attacks October 21st, 2016 went into the annals of Internet history for the large scale Distributed Denial of Service (DDoS) attacks that made popular Internet properties like Twitter, SoundCloud, Spotify and Box inaccessible to many users in the US. The DDoS attack happened in three waves targeting DNS service provider Dyn, resulting in a total of about…

How To Humanize Your Data (And Why You Need To)

How To Humanize Your Data (And Why You Need To)

How To Humanize Your Data The modern enterprise is digital. It relies on accurate and timely data to support the information and process needs of its workforce and its customers. However, data suffers from a likability crisis. It’s as essential to us as oxygen, but because we don’t see it, we take it for granted.…

Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks Does cloud security risks ever bother you? It would be weird if it didn’t. Cloud computing has a lot of benefits, but also a lot of risks if done in the wrong way. So what are the most important risks? The European Network Information Security Agency did extensive research on that, and…