SwiftKey Beta Updated With Awesome Clipboard Feature

...

The SwiftKey beta application is receiving an update today, bringing with it a new Clipboard feature for users. When using, the Clipboard will allow users to maintain, albeit for a limited amount of time, a list of text that is copied (or cut) on Android. Items that are copied or cut will remain on the list for an hour, granting quick access to the information you copied via SwiftKey Hub. 

According to the changelog, if there is a copied item you need for longer, you can “pin” it, making sure it won’t get deleted. Users can also add commonly used snippets, such as phone numbers, email addresses, or web links. Instead of having to type that info in numerous times, simply copy it from your Hub, then paste it into a text field. Pretty ingenious, if I do say so myself.

For those who are not running the beta, you can download it onto your by following the Google Play link below the changelog.

Categories
E-COMMERCE
0 Comment

Leave a Reply

Captcha image


RELATED BY

  • 5300c769af79e

    Business Agility and the Platform

    A common perception of business agility is that it revolves around quickness, especially quickness in the service of accelerating a deal or transaction.That's a good starting point, but agility actually goes deeper -- especially now that so many structural changes, like cloud computing and subscriptions, have turned up the dial on everyday business.
  • 5300c769af79e

    How Cloud-based Identity & Access Management Powers Digital Business

    Download Most IT decision makers are struggling to master identity management in an infrastructure where modern cloud-based software must function with legacy on premise systems.According to a recent IDG Research study, 91 percent of respondents say solving this identity management conundrum is critical or very important to succeeding at their digital initiatives.
  • 5300c769af79e

    Wired and Wireless Policy-based Network Security

    Download Many companies embracing a "wireless first" approach to networking are creating a chasm between wired and wireless network security.This has led to two sets of policies, processes, and controls for network security, resulting in vulnerabilities and operational overhead.
  • 5300c769af79e

    Burr-Feinstein Encryption Bill Rankles Tech Community

    Prompted by Apple's refusal to create new software to unlock an encrypted iPhone for the FBI, US Sens.), chairman and vice chairman, respectively, of the Senate Select Committee on Intelligence, introduced draft legislation April 13 that's receiving pushback of its own.