Browse Definitions :

BACKGROUND IMAGE: iSTOCK/GETTY IMAGES

This content is part of the Essential Guide: Enterprise mobile security smackdown: iOS vs. Android vs. Windows
Definition

iOS 7

Contributor(s): Matthew Haughn

iOS 7 is the seventh version of Apple’s proprietary mobile operating system for iPhone, iPad and iPodTouch. Like earlier versions, iOS 7 is based on Macintosh OS X and supports multi-touch gesture recognition for user actions including pinching, tapping and swiping.

Some of the main features of iOS 7 include:

  • A revamped interface, moving from realistic skeuomorphism to a graphic flat design.
  • Transparency and animation effects include parallaxing layers and apps based on motion.
  • Improved multitasking and easier app switching.
  • Predictive content loading in the background.
  • iTunes radio, a free personalized streaming radio service that adapts to the user’s taste.
  • AirDrop feature enables one-to-one or one-to-many file sharing over an encrypted Wi-Fi or Bluetooth connection.
  • Fingerprint recognition in the home button.

See a video preview of iOS 7:

 

This was last updated in July 2013

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • compliance audit

    A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

SearchSecurity

  • Cybercrime

    Cybercrime is any criminal activity that involves a computer, networked device or a network.

  • data breach

    A data breach is a confirmed incident in which sensitive, confidential or otherwise protected data has been accessed and/or ...

  • zero-day (computer)

    A zero-day vulnerability, also known as a computer zero day, is a flaw in software, hardware or firmware that is unknown to the ...

SearchHealthIT

SearchDisasterRecovery

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

  • business continuity software

    Business continuity software is an application or suite designed to make business continuity planning/business continuity ...

  • business continuity policy

    Business continuity policy is the set of standards and guidelines an organization enforces to ensure resilience and proper risk ...

SearchStorage

  • business impact analysis (BIA)

    Business impact analysis (BIA) is a systematic process to determine and evaluate the potential effects of an interruption to ...

  • RAID (redundant array of independent disks)

    RAID (redundant array of independent disks) is a way of storing the same data in different places on multiple hard disks to ...

  • dedicated cloud

    A dedicated cloud is a single-tenant cloud infrastructure, which essentially acts as an isolated, single-tenant public cloud.

Close