Browse Definitions:

SearchMobileComputing

At SearchMobileComputing.com, you'll discover a reliable source of ongoing ideas and best practices for using mobile computers and wireless infrastructures to build a streamlined business and gain a competitive advantage. We provide comprehensive coverage of all major mobile and wireless news and trends that are of interest to IT management and the enterprise. We also provide hands-on, practical advice for selecting, managing, deploying, tracking, supporting and securing mobile users and devices.

View the complete archive of Enterprise Mobile Computing Management news, research and expert advice.

Go to:  SearchMobileComputing

Recently on  SearchMobileComputing

Blockchain identity management simplifies personal security

When users have to share identifying data with a third party, security risk is high. A new tool puts users in charge of their identity and attempts to make ID management seamless.

More Highlights
Definitions
  • EFSS (Enterprise file sync-and-share)

    Enterprise file sync-and-share is a service that allows users to save files in cloud or on-premises storage and then access them on desktop and mobile devices.

  • enterprise mobility management (EMM)

    Enterprise mobility management (EMM) is software that allows organizations to securely enable employee use of mobile devices and applications.

  • mobile device management

    Mobile device management is software that allows IT administrators to control, secure and enforce policies on smartphones, tablets and other endpoints.

Browse Mobile Computing Topics

Enterprise mobility management

Learn how to effectively manage your mobile devices with the resources in this mobile device management topic section. Get the latest information on mobile device management and get tips on implementing mobile device management best practices.

Recent Definitions

  • EFSS (Enterprise file sync-and-share)

    Enterprise file sync-and-share is a service that allows users to save files in cloud or on-premises storage and then access them on desktop and mobile devices.

  • enterprise mobility management (EMM)

    Enterprise mobility management (EMM) is software that allows organizations to securely enable employee use of mobile devices and applications.

  • microphone hacking

    Microphone hacking is the unauthorized interception of audio data captured through the microphone on a computer, smartphone or other device.

Highlights

More Enterprise mobility management Topics

Back to Top

Applications and infrastructure

Get the latest information on mobile enterprise applications including mobile unified communication products in this topic section. Discover the most strategic resources on mobile enterprise applications available from the major mobile app stores including iTunes and BlackBerry App World. Find resources for evaluating mobile enterprise applications and solutions and discover the most popular mobile business apps available on the market. Learn about the top mobile applications and get help finding the best mobile enterprise applications for your organization. Read best practices for deploying, managing and maintaining your mobile applications. Read the latest news and expert tips on open source mobile apps, industry mobile applications and small business mobile solutions. Find case studies from companies who have successfully implemented the latest mobile enterprise applications and learn from their experience.

Recent Definitions

  • EFSS (Enterprise file sync-and-share)

    Enterprise file sync-and-share is a service that allows users to save files in cloud or on-premises storage and then access them on desktop and mobile devices.

  • mobile application development platform (MADP)

    A mobile application development platform (MADP) is a type of software that allows a business to rapidly build, test and perhaps deploy mobile apps for smartphones and tablets.

  • Zigbee

    Zigbee is a standards-based wireless technology developed to enable low-cost, low-power wireless machine-to-machine (M2M) and internet of things (IoT) networks.

Highlights

More Applications and infrastructure Topics

Back to Top

Mobile Device Platforms and Technologies

Get the latest information on mobile device platforms and mobile operating systems in this topic section. Our strategic resources on mobile operating systems will help you give you the tools you need for evaluating the right mobile platform to deliver your mobile applications to your mobile workforce. Learn about the most popular mobile operating systems in the market and how your peers are implementing them for maximum ROI. Get help finding the best mobile platform for your organization and read the latest news and expert tips on major mobile device platforms as well as open source mobile operating systems, applications and solutions.

Recent Definitions

  • RFID (radio frequency identification)

    RFID (radio frequency identification) is a form of wireless communication that incorporates the use of electromagnetic or electrostatic coupling in the radio frequency portion of the electromagnetic spectrum to uniquely identify an object, animal or person.

  • adaptive cruise control

    Adaptive cruise control (ACC) is a driver assistance technology that sets a maximum speed for vehicles and automatically slows the speed of the car when traffic is sensed in front of the vehicle. The technology is also known as autonomous cruise control.

  • iCloud

    Apple's free iCloud service stores subscribers' photos, videos, documents, apps and more and updates everything across users' synced devices.

Highlights

More Mobile Device Platforms and Technologies Topics

Back to Top

-ADS BY GOOGLE

SearchCompliance

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

SearchSecurity

  • biometrics

    Biometrics is the measurement and statistical analysis of people's unique physical and behavioral characteristics.

  • principle of least privilege (POLP)

    The principle of least privilege (POLP), an important concept in computer security, is the practice of limiting access rights for...

  • identity management (ID management)

    Identity management (ID management) is the organizational process for identifying, authenticating and authorizing individuals or ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

SearchSolidStateStorage

  • hybrid hard disk drive (HDD)

    A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.

Close