News Articles

Over a third of mobile workers choose coffee shops for their WiFi rather than the drinks

A recent survey published by Samsung Electronics has found that 37% of UK workers choose coffee shops based on the availability of free WiFi rather the quality of the tea or coffee.

WiFi was at the top of the list when people chose a ‘mobile working’ venue - 60% of respondents said it was important - with the ability to print coming in second place.

Author: The Fonecast
0 Comments
Article rating: No rating

Top ten gadgets for 2013

Mark Bridge writes:

I’ve recently been talking to Theo Neumann from Wolverhampton City Radio about the top ten gadgets that are likely to hit the headlines in 2013. The most desirable, most likely to be talked about, most exciting… that kind of thing. Although my top 10 list isn’t entirely mobile-related, I thought it was worth sharing here.

Author: The Fonecast
0 Comments
Article rating: No rating

Cortado brings mobile device management to its cloud desktop service

Mark Bridge writes:

Cortado was founded in 1999 as ‘ThinPrint’, with the company’s expansion beyond wireless printing leading it to change its name.

This week it’s expanded even further, combining its cloud desktop services with mobile device management. The result is Cortado Corporate Server 6.0, a new service that enables organisations to offer their staff secure, managed mobile access to corporate files.

Author: The Fonecast
0 Comments
Article rating: No rating

Podcast - 14th May 2012

Carsten Mickeleit of Cortado AG talks to us about wireless printing from mobile devices, cloud-based storage and a new cloud desktop service that includes mobile device management.
Author: The Fonecast
0 Comments
Article rating: No rating

Cortado offers a secure 'cloud desktop' without unnecessary restrictions

Mark Bridge writes:

Security is often a balancing act - and security on mobile devices is no exception. If procedures and processes aren't tough enough, you'll compromise the security of the information you're protecting. But if your security is too tight or if it seems too complicated to an end user, that user is likely to find a way round your security by doing something else instead.

Author: The Fonecast
0 Comments
Article rating: No rating
RSS
12

Follow thefonecast.com

Twitter @TheFonecast RSS podcast feed
Find us on Facebook Subscribe free via iTunes

Archive Calendar

«March 2024»
MonTueWedThuFriSatSun
26272829123
45678910
11121314151617
18192021222324
25262728293031
1234567

Archive

Terms Of Use | Privacy Statement