3 Missing Cloud Implementations In Mobile Technology

3 Missing Cloud Implementations In Mobile Technology

3 Missing Cloud Implementations In Mobile Technology

I like the mobile technology that surrounds us. I’ve gotten to the point where I wouldn’t function to the same level without my phone, and I don’t even think that’s a bad thing – hey, if a couple of years ago we could have carried our desktop PCs around with us, I bet everybody would’ve jumped at the opportunity. In previous articles, I have talked about how much the mobile industry has advanced by implementing cloud computing. While this is definitely true, it’s still quite a long way from being perfect. Here’s what is left to be introduced, in my opinion:

Backing up app data. In the past few months I went through a couple of Android phones. Unlike the older iPhones, where you had to manually install every app on your phone after going through a software update or switching your phone, this time it was a lot easier: I just had to sign in with my Google account and the apps I had on the previous installation started to pour in from the cloud. The only way I would improve on this would be if all of my app data synced as well – and apps have started to do this by syncing your account with the cloud. However, we’re not there yet, and for a ton of apps you simply lose all of your data.

A proper file management system. And I’m not talking about the files on your phone. I want the stuff from Minority Report, a system where you just “throw” files from one screen to the other. This point is beginning to be true, though, as there are some apps that are already available which kind of do this. But I’d like a more in-depth implementation into the software!

Sci-fi

(Image Source: Shutterstock)

Better yet, better PC integration. And I don’t mean just file management. I’m waiting for a time when your phone will become an extension of your computer, a unified solution which makes your mobile gadget a small extension of your display. This would be easily achievable with cloud computing, and it would make life so easy – got to go somewhere? Grab your phone and don’t even stop what you’re doing on your computer.

Basically, what I’m trying to say is this: we’ve come very far until now in terms of mobile computing, and most of that progress has been due to the cloud. In my opinion, we’re just three steps away from living the way ‘80s and ‘90s Sci-Fi envisioned us, and I think we only need a bit more time to get there.

By Andrei Maguleanu

Sorry, comments are closed for this post.

Lavabit, Edward Snowden and the Legal Battle For Privacy

Lavabit, Edward Snowden and the Legal Battle For Privacy

The Legal Battle For Privacy In early June 2013, Edward Snowden made headlines around the world when he leaked information about the National Security Agency (NSA) collecting the phone records of tens of millions of Americans. It was a dramatic story. Snowden flew to Hong Kong and then Russia to avoid deportation to the US,…

Is Machine Learning Making Your Data Scientists Obsolete?

Is Machine Learning Making Your Data Scientists Obsolete?

Machine Learning and Data Scientists In a recent study, almost all the businesses surveyed stated that big data analytics were fundamental to their business strategies. Although the field of computer and information research scientists is growing faster than any other occupation, the increasing applicability of data science across business sectors is leading to an exponential…

How To Overcome Data Insecurity In The Cloud

How To Overcome Data Insecurity In The Cloud

Data Insecurity In The Cloud Today’s escalating attacks, vulnerabilities, breaches, and losses have cut deeply across organizations and captured the attention of, regulators, investors and most importantly customers. In many cases such incidents have completely eroded customer trust in a company, its services and its employees. The challenge of ensuring data security is far more…

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported…

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups Cloud platforms have become a necessary part of modern business with the benefits far outweighing the risks. However, the risks are real and account for billions of dollars in losses across the globe per year. If you’ve been hacked, you’re not alone. Here are some other companies in the past…

Beacons Flopped, But They’re About to Flourish in the Future

Beacons Flopped, But They’re About to Flourish in the Future

Cloud Beacons Flying High When Apple debuted cloud beacons in 2013, analysts predicted 250 million devices capable of serving as iBeacons would be found in the wild within weeks. A few months later, estimates put the figure at just 64,000, with 15 percent confined to Apple stores. Beacons didn’t proliferate as expected, but a few…

Your Biggest Data Security Threat Could Be….

Your Biggest Data Security Threat Could Be….

Paying Attention To Data Security Your biggest data security threat could be sitting next to you… Data security is a big concern for businesses. The repercussions of a data security breach ranges from embarrassment, to costly lawsuits and clean-up jobs – particularly when confidential client information is involved. But although more and more businesses are…

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And Virtual Reality This is a term I created (Virtual Immersion). Ah…the sweet smell of Virtual Immersion Success! Virtual Immersion© (VI) an extension/expansion of Virtual Reality to include the senses beyond visual and auditory. Years ago there was a television commercial for a bathing product called Calgon. The tagline of the commercial was Calgon…

How The CFAA Ruling Affects Individuals And Password-Sharing

How The CFAA Ruling Affects Individuals And Password-Sharing

Individuals and Password-Sharing With the 1980s came the explosion of computing. In 1980, the Commodore ushered in the advent of home computing. Time magazine declared 1982 was “The Year of the Computer.” By 1983, there were an estimated 10 million personal computers in the United States alone. As soon as computers became popular, the federal government…