Browse Definitions :

Wireless and mobile

Terms related to wireless and mobile technology, including definitions about consumer mobile technology devices and communication technologies such as Wi-Fi, WiMAX and LTE.

MOB - SIM

  • Mobile Active Defense (MAD) - Mobile Active Defense’s main product is the Mobile Enterprise Compliance and Security Server (MECS).
  • mobile app - A mobile app is a software application designed for use on mobile devices, such as smartphones and tablets, rather than desktop or laptop computers.
  • mobile application development - Mobile application development is the set of processes and procedures involved in writing software for small, wireless computing devices.
  • Mobile Application Management (MAM) - Mobile application management (MAM) is software that secures and enables IT control over enterprise applications on end users' corporate and personal smartphones and tablets.
  • mobile application processor - A mobile application processor is a system on a chip (SoC) designed to support applications running in a mobile operating system environment such as Android, Apple iOS, Windows CE/Mobile or Symbian.
  • mobile browser - A mobile browser is one that is optimized for the small display screen and limited resources of a handheld computing device such as a smart phone.
  • mobile card reader - A mobile card reader, such as Square or PayPal Here, allows the user to accept payments through their mobile devices.
  • mobile collaboration - Mobile collaboration is the use of mobile devices and collaborative apps to allow geographically dispersed people to work together on endeavors ranging from small personal projects to high-profile enterprise teamwork.
  • mobile computing - Mobile computing refers to the set of IT technologies, products, services and operational strategies and procedures that enable end users to access computation, information and related resources and capabilities while mobile.
  • mobile data - Mobile data is internet content delivered to mobile devices such as smartphones and tablets over a wireless cellular connection.
  • mobile device - A mobile device is essentially a handheld computer.
  • mobile device attack - A mobile device attack is an exploit targeting handheld communications devices, such as smartphones and tablets.
  • mobile device fragmentation - Mobile device fragmentation is a phenomenon that occurs when some mobile users are running older versions of an operating system, while other users are running newer versions.
  • mobile device management (MDM) - Mobile device management (MDM) is software that allows IT administrators to control, secure and enforce policies on smartphones, tablets and other endpoints.
  • mobile device management software - Mobile device management software is any application that gives IT administrators a way to troubleshoot and manage employee mobile devices remotely.
  • mobile enterprise application platform (MEAP) - A mobile enterprise application platform (MEAP) is a development environment that provides tools and middleware to develop, test, deploy and manage corporate software running on mobile devices.
  • mobile first - Mobile first is an approach to business process and technology that assumes smartphones, tablets and task-specific apps are employees' primary tools for getting work done.
  • mobile hotspot - A mobile hotspot is an ad hoc wireless access point that is created by a dedicated hardware device or a smartphone feature that shares the phone's cellular data.
  • mobile information management (MIM) - Mobile information management (MIM) is a device-agnostic security strategy that involves keeping sensitive data encrypted and allowing only approved applications to access or transmit it.
  • mobile Internet device (MID) - The mobile Internet device (MID) is a mini-tablet communications unit aimed at the consumer market and designed to provide entertainment, information and location-based services.
  • Mobile IP - Mobile IP is an Internet Engineering Task Force (IETF) standard communications protocol that is designed to allow mobile device users to move from one network to another while maintaining their permanent IP address.
  • Mobile IPv6 (MIPv6 or Mobile Internet Protocol version 6) - Mobile IPv6 (MIPv6) is a protocol developed as a subset of Internet Protocol version 6 (IPv6) to support mobile connections.
  • mobile marketing - Mobile marketing is promotional activity designed for delivery to cell phones, smart phones and other handheld devices, usually as a component of a multi-channel campaign.
  • mobile middleware - Mobile middleware is software that connects disparate mobile applications, programs and systems.
  • mobile number privacy - Mobile number privacy is the protection of the phone user’s number from unwanted access.
  • mobile operating system - A mobile operating system (OS) is software that allows smartphones, tablet PCs (personal computers) and other devices to run applications and programs.
  • mobile payment (m-payment) - Mobile payment is a point-of-sale transaction made through a mobile device.
  • mobile platform as a service (mPaaS) - Mobile platform as a service (mPaaS) is a specialized type of PaaS designed to provide an integrated development environment (IDE), deployment platform, lifecycle management and analytics for mobile/web applications.
  • mobile printing - Mobile printing is the process of sending data to a printer wirelessly from a smartphone or tablet.
  • mobile search - Mobile search is the practice of querying a search engine from an Internet-connected handheld device, such as a smart phone.
  • mobile security (wireless security) - Mobile security is the protection of smartphones, tablets, laptops and other portable computing devices, and the networks they connect to, from threats and vulnerabilities associated with wireless computing.
  • mobile service provider - A mobile service provider (MSP) is a company that offers mobile communication services to users of mobile devices such as smartphones and tablet PCs.
  • mobile spyware - Mobile spyware is monitoring software that is installed on a mobile device without the end user's knowledge.
  • Mobile Threat Defense (MTD) - Mobile Threat Defense (MTD) software is meant to protect organizations and individual users from security threats on mobile platforms.
  • mobile ticketing - Mobile ticketing is the purchase of admission to events through a mobile device, including the delivery of digital tickets to a smartphone for use in place of traditional paper tickets.
  • mobile UI (mobile user interface) - A mobile UI is the user interface on a mobile device, usually including a touch screen display and all the other elements of the device that allow the user to interact with it.
  • mobile virtual network operator (MVNO) - A mobile virtual network operator (MVNO) is a services provider in the mobile device industry that provides wireless communications services including voice and data to customers over a wireless network infrastructure owned by a third-party mobile network operator (MNO).
  • mobile virtualization - Mobile virtualization is an approach to mobile device management in which two virtual platforms are installed on a single wireless device.
  • mobile workforce management (MWM) - Mobile workforce management (MWM) is a category of software and related services used to manage employees working outside the company premises; the term is often used in reference to field teams.
  • mobile workstation - A mobile workstation is a notebook computer with high-end computing features not typical of the notebook.
  • mobile-to-mobile convergence (MMC) - Mobile-to-mobile convergence (MMC) is a technology that facilitates the interoperability of mobile communications devices without the need for any fixed capabilities or proprietary service provider.
  • Morphis - Morphis is a Java -based open source wireless transcoding platform from Kargo, Inc.
  • mPOS (mobile point of sale) - An mPOS (mobile point-of-sale) is a smartphone, tablet or dedicated wireless device that performs the functions of a cash register or electronic point-of-sale terminal (POS terminal) wirelessly.
  • multi-touch - Multi-touch, in a computing context, is an interface technology that enables input through pressure and gestures on multiple points on the surface of a device.
  • multi-user MIMO - Multi-user MIMO (MU-MIMO) is a wireless communication technology that uses multiple antennas to improve communication by creating multiple connections to the same device at the same time.
  • Multimedia Messaging Service (MMS) - Multimedia Messaging Service (MMS) - sometimes called Multimedia Messaging System - is a communications technology developed by 3GPP (Third Generation Partnership Project) that allows users to exchange multimedia communications between capable mobile phones and other devices.
  • multiplexing - Multiplexing, or muxing, is a way of sending multiple signals or streams of information over a communications link at the same time in the form of a single, complex signal.
  • NANDroid backup - NANDroid backups are typically created by Android device owners who have gained root access to their phone’s operating system in order to use aftermarket distributions of the Android OS.
  • native app - A native application is a software program that is developed for use on a particular platform or device.
  • netbook - A netbook is a small, light, low-power notebook computer that has less processing power than a full-sized laptop but is still suitable for word processing, running a Web browser and connecting wirelessly to the Internet.
  • network protocol - A network protocol is a set of established rules that dictate how to format, transmit and receive data so that computer network devices -- from servers and routers to endpoints -- can communicate, regardless of the differences in their underlying infrastructures, designs or standards.
  • network slicing - Network slicing overlays multiple virtual networks on top of a shared network domain, that is, a set of shared network and computing resources.
  • Nexus - Nexus is a series of smartphones and tablets manufactured by Google and its hardware partners.
  • niche app - A niche app is a specialized application, typically designed with social networking built in and optimized for mobile devices.
  • no-swipe credit card - A no-swipe credit card is a credit card equipped with a radio frequency (RF) transponder that allows for purchases without the need for passing the card through a traditional magnetic-stripe detection machine.
  • nomadicity - Nomadicity is the tendency of a person, or group of people, to move with relative frequency.
  • nomophobia - Nomophobia is the irrational fear of being without your mobile phone or being unable to use your phone for some reason, such as the absence of a signal, a low battery or running out of minutes.
  • NOR flash memory - NOR flash memory is one of two types of non-volatile storage technologies.
  • OFDMA (orthogonal frequency-division multiple access) - Orthogonal frequency-division multiple access (OFDMA) is a feature of Wi-Fi 6 (802.
  • OLPC (One Laptop Per Child) - The One Laptop Per Child project (OLPC) is an initiative aimed at providing inexpensive laptop computers to children in the developing world as a means of bridging the digital divide.
  • omnidirectional antenna - An omnidirectional antenna is a wireless transmitting or receiving antenna that radiates or intercepts radio-frequency (RF) electromagnetic fields equally well in all horizontal directions in a flat, two-dimensional (2D) geometric plane.
  • Open Handset Alliance (OHA) - The Open Handset Alliance (OHA) is a coalition of more than 30 technology and mobile companies that introduced Android, an open source mobile phone operating system.
  • Open Multimedia Application Platform (OMAP) - Open Multimedia Application Platform (OMAP) is the name of Texas Instrument’s application processor.
  • Open System Authentication (OSA) - Open System Authentication (OSA) is a process by which a computer could gain access to a wireless network that uses the Wired Equivalent Privacy (WEP) protocol.
  • Orbi Outdoor Satellite - Orbi Outdoor Satellite is a device used to extend Wi-Fi network coverage and signal strength for Netgear’s Orbi Wi-Fi router, allowing the use of mobile devices from beyond a house and into a bigger area, such as a large backyard.
  • ORTC (Object Real-Time Communications) - ORTC (object real-time communications) is an open source component of WebRTC that enables mobile endpoints to talk to servers and Web browsers with real-time communications capabilities.
  • orthogonal frequency-division multiplexing (OFDM) - Orthogonal frequency-division multiplexing (OFDM) is a method of data transmission where a single information stream is split among several closely spaced narrowband subchannel frequencies instead of a single wideband channel frequency.
  • OTA update (over-the-air update) - An over-the-air (OTA) update is the wireless delivery of new software, firmware, or other data to mobile devices.
  • passive cooling - Passive cooling is an approach to cooling computer components through slowing the speed at which the component, such as the processor, is operating.
  • PEAP (Protected Extensible Authentication Protocol) - PEAP (Protected Extensible Authentication Protocol) is a version of EAP, the authentication protocol used in wireless networks and Point-to-Point connections.
  • personal operating space (POS) - A personal operating space (POS) is a roughly spherical region that surrounds a portable or handheld digital wireless device operated by a person.
  • pervasive computing (ubiquitous computing) - Pervasive computing, also called ubiquitous computing, is the growing trend of embedding computational capability (generally in the form of microprocessors) into everyday objects to make them effectively communicate and perform useful tasks in a way that minimizes the end user's need to interact with computers as computers.
  • pervasive Wi-Fi - Pervasive Wi-Fi is the intercommunication of wireless networks in order to form a communications network that permeates the networked world.
  • phablet - A phablet is a computing device with a screen size between five and seven inches long.
  • phase-locked loop (PLL) - A phase-locked loop (PLL) is an electronic circuit with a voltage or voltage-driven oscillator that constantly adjusts to match the frequency of an input signal.
  • phased antenna system - .
  • piezoelectricity - Piezoelectricity, also called the piezoelectric effect, is the ability of certain materials to generate an AC (alternating current) voltage when subjected to mechanical stress or vibration, or to vibrate when subjected to an AC voltage, or both.
  • piggybacking - Piggybacking, in a wireless communications context, is the unauthorized use of a wireless LAN.
  • PIN lock - The PIN lock is an authentication measure for mobile phones that requires the entry of a personal identification number (PIN) code before a device can be used.
  • pocket PC (pocket personal computer) - A pocket PC (pocket personal computer) is a hardware specification for a small, handheld computer, personal digital assistant (PDA) or smartphone.
  • polite cell phone - A polite cell phone is a mobile telephone with built-in intelligence so that it adapts to its current environment and behaves appropriately.
  • predictive text - Predictive text is an input technology that facilitates typing on a mobile device by suggesting words the end user may wish to insert in a text field.
  • Pretty Please mode - Pretty Please mode is a feature added to require the use of “please” and “thank you” in voice commands for Google Assistant as used on Android devices and Google Home.
  • projector phone - A projector phone is a smartphone with an embedded pico projector.
  • push notification - Push notification, also called server push notification, is the delivery of information from a software application to a computing device without a specific request from the client.
  • Push to Talk (PTT) - Push to talk (PTT), is a means of instantaneous communication commonly employed in wireless cellular phone services that uses a button to switch a device from voice transmission mode to voice reception mode.
  • QAM (quadrature amplitude modulation) - QAM (quadrature amplitude modulation) is a method of combining two amplitude modulation (AM) signals into a single channel.
  • qHD (quarter high definition) - qHD (quarter high definition) is a resolution standard for mobile devices.
  • QNX - QNX is a mobile operating system that was originally developed for embedded systems.
  • QR code (quick response code) - A QR code (quick response code) is a type of 2D bar code that provides easy access to information through a smartphone camera.
  • radiant energy - Radiant energy is, simply, energy that radiates from a source of electromagnetic radiation, such as the light and heat radiating from the sun.
  • radio access network (RAN) - A radio access network (RAN) is a major component of a wireless telecommunications system that connects individual devices to other parts of a network through a radio link.
  • radio charging - Radio charging is a wireless charging method used to charge items with small batteries and low power requirements, such as watches, hearing aids and wireless keyboards and mice.
  • React Native - React Native is an open source JavaScript framework for mobile application development.
  • real-time location system (RTLS) - A real-time location system (RTLS) is one of a number of technologies used to pinpoint the current geographic position and location of a target.
  • rechargeable battery - Rechargeable batteries allow for multiple usages from a cell, reducing waste and generally providing a better long-term investment in terms of dollars spent for usable device time.
  • reconfigurable tactile display (RTD) - A reconfigurable tactile display (RTD) is a control interface that provides physical touch input, but that can be configured by programming.
  • recycling - Recycling is the practice of reusing items that would otherwise be discarded as waste.
  • remote desktop - A remote desktop is a program or an operating system feature that allows a user to connect to a computer in another location, see that computer's desktop and interact with it as if it were local.
  • remote wipe - Remote wipe is a security feature that allows a network administrator or device owner to send a command that deletes data to a computing device.
SearchNetworking
SearchSecurity
  • man in the browser (MitB)

    Man in the browser (MitB) is a security attack where the perpetrator installs a Trojan horse on the victim's computer that is ...

  • Patch Tuesday

    Patch Tuesday is the unofficial name of Microsoft's monthly scheduled release of security fixes for the Windows operating system ...

  • parameter tampering

    Parameter tampering is a type of web-based cyber attack in which certain parameters in a URL are changed without a user's ...

SearchCIO
  • e-business (electronic business)

    E-business (electronic business) is the conduct of business processes on the internet.

  • business resilience

    Business resilience is the ability an organization has to quickly adapt to disruptions while maintaining continuous business ...

  • chief procurement officer (CPO)

    The chief procurement officer, or CPO, leads an organization's procurement department and oversees the acquisitions of goods and ...

SearchHRSoftware
SearchCustomerExperience
  • first call resolution (FCR)

    First call resolution (FCR) is when customer service agents properly address a customer's needs the first time they call.

  • customer intelligence (CI)

    Customer intelligence (CI) is the process of collecting and analyzing detailed customer data from internal and external sources ...

  • clickstream data (clickstream analytics)

    Clickstream data and clickstream analytics are the processes involved in collecting, analyzing and reporting aggregate data about...

Close