Opinion: Smarter than a smart phone
Find the .PST file. Rename it from whatever it is (probably Outlook.pst) to something else (like Goodbye.pst). The name change will prevent any application from accessing and changing your Outlook data, and will help you go "cold turkey" from Outlook.
But by keeping the file around, you can simply rename the file and be back in business with Outlook if something goes south. Since you had previously established a "Connection" with Plaxo, Outlook and Plaxo will sync, and Outlook will be brought back up to date.
After you've gained trust and comfort with your new, online system you can uninstall Outlook.
Of course, there are downsides to this whole approach. If you're on an airplane, for example, or in a place where you have no Internet connection, you won't have access to your online data. Also, your personal information, although better protected from phone thieves, is less protected from online hackers. Some people aren't comfortable putting their PIM data online.
The upsides, however, are great. You can get your PIM data from any PC or phone, so if you have an unrecoverable crash, you'll still be able get at your vital data. You can pick any phone on any carrier (I've got my eye on the Helio Fin), even those that were eliminated from consideration by the old requirements of Outlook support, PIM applications and the need for a big keyboard. Phone thieves can't steal your data. And, best of all, you can kiss Outlook goodbye forever.
With freedom comes responsibility. So make sure you're using good passwords. Take the time to really learn and master these new services to enjoy their maximum benefits. I've just skimmed the surface with what you can do with Plaxo, Google Calendar, Gubb and Jott. By exploring and trying all the options and features, you'll be able to tailor them to perfectly suit your style of work and play in ways your old setup could never even attempt.
Mike Elgan writes about technology and global tech culture. Contact Mike at firstname.lastname@example.org or his blog, The Raw Feed.
Read more about Mobile/Wireless in Computerworld's Mobile/Wireless Topic Center.
- Silicon Valley's 19 Coolest Places to Work
- Is Windows 8 Development Worth the Trouble?
- 8 Books Every IT Leader Should Read This Year
- 10 Hot Hadoop Startups to Watch
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Assessing ROI for Mobile Acceleration Clients This EMA® paper examines the business case for deploying mobile WAN optimization client software and builds a ROI model based on the experiences...
- The Apple-ization of the Enterprise: Understanding IT's New World Read this paper for how to tackle Apple-ization (and the related consumerization of IT and Bring Your Own Device/BYOD).
- A Practical Introduction to Enterprise Mobility Management Read the white paper to better understand the basic concepts within mobility management and to learn how you can apply EMM technology to...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Mobile Security: Containerizing Enterprise Data In this on-demand webinar, Fixmo's Lee Cocking, VP of corporate strategy, explains why Apple-ization trends like mobility and "bring-your-own-device" (BYOD) are driving the... All Mobile/Wireless White Papers | Webcasts
Our new weekly Consumerization of IT newsletter covers a wide range of trends including BYOD, smartphones, tablets, MDM, cloud, social and what it all means for IT. Subscribe now and stay up to date!