Mobile phone guilty pleasures
Having a mobile phone that can do everything it great, but it does mean productivity can dive bomb. We take a look at the top guilty mobile pleasures.
If you're a regular Twitter user, you'll probably find that it uses up a fair chunk of your time when on your computer. With a wealth of tweeting clients available on all platforms, it's no wonder tweeting from everywhere could cause issues.
Whether you prefer official Twitter clients, have downloaded Twitterrific, Tweetdeck or Tweetie, the likelihood of you refraining from tweeting at all in one day is very slim.
Twitter is also a great business tool, so maybe don't stop using it altogether, just try to cut back on your tweeting time. After all, only a handful of people can justify checking out the latest tweets from Justin Bieber and Stephen Fry as work-related.
Whether you use Google Maps, BlackBerry Maps or any other non-cached mapping application on your mobile, you can be sure your data is being hit hard.
Unlike cached maps such as Ovi Maps, Google Maps can consume data faster than you can say navigate. On a 300-mile trip, with Google Maps permanently downloading data, you could use up to 15MB of your allowance. That's quite a lot if your limit is 500MB and you travel a lot.
The negative point about cached mapping systems such as Ovi Maps, is that your first time download will take a while. It's best to use Wi-Fi for this, although that's not always easy when you're on the go.
Cached mapping apps can also use up a lot of your internal memory, so make sure you have sufficient space, or even better, download them onto a memory card. This way, you can swap between different maps. This is especially useful if you want to swap between countries.
In This Article
The essential guide to cloud-based backup and disaster recovery
Support business continuity by building a holistic emergency planDownload now
Trends in modern data protection
A comprehensive view of the data protection landscapeDownload now
How do vulnerabilities get into software?
90% of security incidents result from exploits against defects in softwareDownload now
Delivering the future of work - now
The CIO’s guide to building the unified digital workspace for today’s hybrid and multi-cloud strategies.Download now