Browse Definitions:

SearchMobileComputing

At SearchMobileComputing.com, you'll discover a reliable source of ongoing ideas and best practices for using mobile computers and wireless infrastructures to build a streamlined business and gain a competitive advantage. We provide comprehensive coverage of all major mobile and wireless news and trends that are of interest to IT management and the enterprise. We also provide hands-on, practical advice for selecting, managing, deploying, tracking, supporting and securing mobile users and devices.

View the complete archive of Enterprise Mobile Computing Management news, research and expert advice.

Go to:  SearchMobileComputing

Recently on  SearchMobileComputing

Get personal with mobile biometric authentication

Mobile biometric authentication sounds like a mouthful, but in reality, it's easy to break down. Don't be afraid to get up close with this essential mobile security software.

More Highlights
  • MobileIron CEO out in favor of CFO: Why now?

    The departure of MobileIron CEO Barry Mainz and the appointment of the CFO as his successor raise questions about the standalone EMM vendor's future.

  • Is shadow IT really that bad?

    Shadow IT can be a good thing if users communicate their needs with IT, and administrators listen. But security still needs to be top of mind.

  • IT reveals keys to Box user adoption

    Organizations considering Box or deploying it to employees know that communication is paramount to user buy-in. Learn other tips for moving to Box.

Definitions
  • mobile application development platform (MADP)

    A mobile application development platform (MADP) is a type of software that allows a business to rapidly build, test and perhaps deploy mobile apps for smartphones and tablets.

  • enterprise mobility

    Enterprise mobility is an approach to work in which employees can do their jobs from anywhere using a variety of devices and applications.

  • MobileIron

    MobileIron is a company that provides management and security software for mobile apps, content and devices.

Browse Mobile Computing Topics

Enterprise mobility management

Learn how to effectively manage your mobile devices with the resources in this mobile device management topic section. Get the latest information on mobile device management and get tips on implementing mobile device management best practices.

Recent Definitions

  • enterprise mobility

    Enterprise mobility is an approach to work in which employees can do their jobs from anywhere using a variety of devices and applications.

  • Ivanti

    Ivanti is a software company that provides IT management products and services, particularly around endpoint computing.

  • MobileIron

    MobileIron is a company that provides management and security software for mobile apps, content and devices.

Highlights

More Enterprise mobility management Topics

Back to Top

Applications and infrastructure

Get the latest information on mobile enterprise applications including mobile unified communication products in this topic section. Discover the most strategic resources on mobile enterprise applications available from the major mobile app stores including iTunes and BlackBerry App World. Find resources for evaluating mobile enterprise applications and solutions and discover the most popular mobile business apps available on the market. Learn about the top mobile applications and get help finding the best mobile enterprise applications for your organization. Read best practices for deploying, managing and maintaining your mobile applications. Read the latest news and expert tips on open source mobile apps, industry mobile applications and small business mobile solutions. Find case studies from companies who have successfully implemented the latest mobile enterprise applications and learn from their experience.

Recent Definitions

  • mobile application development platform (MADP)

    A mobile application development platform (MADP) is a type of software that allows a business to rapidly build, test and perhaps deploy mobile apps for smartphones and tablets.

  • Zigbee

    Zigbee is a standards-based wireless technology developed to enable low-cost, low-power wireless machine-to-machine (M2M) and internet of things (IoT) networks.

  • end-user computing (EUC)

    End-user computing (EUC) refers to the devices, applications and data that workers need to perform their jobs, and the technologies used to deploy, manage and secure those resources.

Highlights

More Applications and infrastructure Topics

Back to Top

Mobile Device Platforms and Technologies

Get the latest information on mobile device platforms and mobile operating systems in this topic section. Our strategic resources on mobile operating systems will help you give you the tools you need for evaluating the right mobile platform to deliver your mobile applications to your mobile workforce. Learn about the most popular mobile operating systems in the market and how your peers are implementing them for maximum ROI. Get help finding the best mobile platform for your organization and read the latest news and expert tips on major mobile device platforms as well as open source mobile operating systems, applications and solutions.

Recent Definitions

  • iCloud

    Apple's free iCloud service stores subscribers' photos, videos, documents, apps and more and updates everything across users' synced devices.

  • voice assistant

    A voice assistant is a digital assistant that uses voice recognition, natural language processing and speech synthesis to provide aid to users through phones and voice recognition applications.

  • Google Assistant

    Google Assistant is Google’s voice assistant AI for Android devices. It provides a virtual personal assistant experience through a natural language speech interface to perform a variety of tasks.

Highlights

More Mobile Device Platforms and Technologies Topics

Back to Top

-ADS BY GOOGLE

SearchCompliance

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

SearchSecurity

  • computer exploit

    A computer exploit, or exploit, is an attack on a computer system, especially one that takes advantage of a particular ...

  • cyberwarfare

    Cyberwarfare is computer- or network-based conflict involving politically motivated attacks by a nation-state on another ...

  • insider threat

    Insider threat is a generic term for a threat to an organization's security or data that comes from within.

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

  • OpenStack Block Storage (Cinder)

    OpenStack Block Storage (Cinder) is open source software designed to create and manage a service that provides persistent data ...

  • SATA Express (SATAe)

    SATA Express (SATAe or Serial ATA Express) is a bus interface to connect storage devices to a computer motherboard, supporting ...

  • DIMM (dual in-line memory module)

    A DIMM (dual in-line memory module) is the standard memory card used in servers and PCs.

SearchSolidStateStorage

  • hybrid flash array

    A hybrid flash array is a solid-state storage system that contains a mix of flash memory drives and hard disk drives.

  • 3D XPoint

    3D XPoint is memory storage technology jointly developed by Intel and Micron Technology Inc.

  • RRAM or ReRAM (resistive RAM)

    RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...

SearchCloudStorage

  • Google Cloud Storage

    Google Cloud Storage is an enterprise public cloud storage platform that can house large unstructured data sets.

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

Close