Mobile phone guilty pleasures

Having a mobile phone that can do everything it great, but it does mean productivity can dive bomb. We take a look at the top guilty mobile pleasures.

If you're a regular Twitter user, you'll probably find that it uses up a fair chunk of your time when on your computer. With a wealth of tweeting clients available on all platforms, it's no wonder tweeting from everywhere could cause issues.

Whether you prefer official Twitter clients, have downloaded Twitterrific, Tweetdeck or Tweetie, the likelihood of you refraining from tweeting at all in one day is very slim.

Twitter is also a great business tool, so maybe don't stop using it altogether, just try to cut back on your tweeting time. After all, only a handful of people can justify checking out the latest tweets from Justin Bieber and Stephen Fry as work-related.

Maps

Advertisement
Advertisement - Article continues below

Whether you use Google Maps, BlackBerry Maps or any other non-cached mapping application on your mobile, you can be sure your data is being hit hard.

Unlike cached maps such as Ovi Maps, Google Maps can consume data faster than you can say navigate. On a 300-mile trip, with Google Maps permanently downloading data, you could use up to 15MB of your allowance. That's quite a lot if your limit is 500MB and you travel a lot.

The negative point about cached mapping systems such as Ovi Maps, is that your first time download will take a while. It's best to use Wi-Fi for this, although that's not always easy when you're on the go.

Cached mapping apps can also use up a lot of your internal memory, so make sure you have sufficient space, or even better, download them onto a memory card. This way, you can swap between different maps. This is especially useful if you want to swap between countries.

Featured Resources

The essential guide to cloud-based backup and disaster recovery

Support business continuity by building a holistic emergency plan

Download now

Trends in modern data protection

A comprehensive view of the data protection landscape

Download now

How do vulnerabilities get into software?

90% of security incidents result from exploits against defects in software

Download now

Delivering the future of work - now

The CIO’s guide to building the unified digital workspace for today’s hybrid and multi-cloud strategies.

Download now
Advertisement

Most Popular

Visit/business-strategy/digital-transformation/354201/boston-dynamics-dog-like-robots-sniff-out-bombs-for
digital transformation

Boston Dynamics dog-like robots sniff out bombs for Massachusetts police

26 Nov 2019
Visit/mobile/google-android/354189/samsung-galaxy-a90-5g-review-simply-the-best-value-5g-phone
Google Android

Samsung Galaxy A90 5G review: Simply the best value 5G phone

22 Nov 2019
Visit/mobile/mobile-phones/354222/samsung-sails-past-apples-market-share-despite-smartphone-market-slump
Mobile Phones

Samsung sails past Apple's market share despite smartphone market slump

28 Nov 2019
Visit/business-strategy/mergers-and-acquisitions/354191/xerox-to-pursue-hostile-hp-takeover-after-30bn
mergers and acquisitions

Xerox to pursue hostile HP takeover after $30bn gambit fails

28 Nov 2018