Browse Definitions :

Wireless and mobile

Terms related to wireless and mobile technology, including definitions about consumer mobile technology devices and communication technologies such as Wi-Fi, WiMAX and LTE.

MOB - SAM

  • Mobile Active Defense (MAD) - Mobile Active Defense’s main product is the Mobile Enterprise Compliance and Security Server (MECS).
  • mobile app - A mobile app is a software application designed for use on mobile devices, such as smartphones and tablets, rather than desktop or laptop computers.
  • mobile app reputation - Mobile app reputation is an assessment of the security and privacy of an app, typically expressed as a numerical rating.
  • mobile app security - Mobile app security is the extent of protection that mobile device application programs (apps) have from malware and the activities of crackers and other criminals.
  • mobile application development - Mobile application development is the set of processes and procedures involved in writing software for small, wireless computing devices.
  • Mobile Application Management (MAM) - Mobile application management (MAM) is software that secures and enables IT control over enterprise applications on end users' corporate and personal smartphones and tablets.
  • mobile application processor - A mobile application processor is a system on a chip (SoC) designed to support applications running in a mobile operating system environment such as Android, Apple iOS, Windows CE/Mobile or Symbian.
  • mobile browser - A mobile browser is one that is optimized for the small display screen and limited resources of a handheld computing device such as a smart phone.
  • mobile card reader - A mobile card reader, such as Square or PayPal Here, allows the user to accept payments through their mobile devices.
  • mobile collaboration - Mobile collaboration is the use of mobile devices and collaborative apps to allow geographically dispersed people to work together on endeavors ranging from small personal projects to high-profile enterprise teamwork.
  • mobile computing (nomadic computing) - Mobile computing is the use of portable computing devices in conjunction with mobile technology that enables users to access the internet and data on mobile devices anytime, anywhere.
  • mobile data - Mobile data is internet content delivered to mobile devices such as smartphones and tablets over a wireless cellular connection.
  • mobile deep linking - Mobile deep linking makes it easier for people to access resources on smartphones, tablets and other mobile devices because it decreases the number of actions they have to take to get to their target destination.
  • mobile device - A mobile device is essentially a handheld computer.
  • mobile device attack - A mobile device attack is an exploit targeting handheld communications devices, such as smartphones and tablets.
  • mobile device fragmentation - Mobile device fragmentation is a phenomenon that occurs when some mobile users are running older versions of an operating system, while other users are running newer versions.
  • mobile device management (MDM) - Mobile device management (MDM) is software that allows IT administrators to control, secure and enforce policies on smartphones, tablets and other endpoints.
  • mobile device management software - Mobile device management software is any application that gives IT administrators a way to troubleshoot and manage employee mobile devices remotely.
  • mobile enterprise application platform (MEAP) - A mobile enterprise application platform (MEAP) is a development environment that provides tools and middleware to develop, test, deploy and manage corporate software running on mobile devices.
  • mobile expense management - Mobile expense management is the processes, assisted by specialized software, that an organization uses to manage the costs of its mobile communications network.
  • mobile first - Mobile first is an approach to business process and technology that assumes smartphones, tablets and task-specific apps are employees' primary tools for getting work done.
  • mobile governance - Mobile governance refers to the processes and policies used to manage mobile device access to an organization's network or its data.
  • mobile hotspot - A mobile hotspot is an ad hoc wireless access point that is created by a dedicated hardware device or a smartphone feature that shares the phone's cellular data.
  • mobile information management (MIM) - Mobile information management (MIM) is a device-agnostic security strategy that involves keeping sensitive data encrypted and allowing only approved applications to access or transmit it.
  • mobile Internet device (MID) - The mobile Internet device (MID) is a mini-tablet communications unit aimed at the consumer market and designed to provide entertainment, information and location-based services.
  • Mobile IP - Mobile IP is an Internet Engineering Task Force (IETF) standard communications protocol that is designed to allow mobile device users to move from one network to another while maintaining their permanent IP address.
  • Mobile IPv6 (MIPv6 or Mobile Internet Protocol version 6) - Mobile IPv6 (MIPv6) is a protocol developed as a subset of Internet Protocol version 6 (IPv6) to support mobile connections.
  • mobile marketing - Mobile marketing is promotional activity designed for delivery to cell phones, smart phones and other handheld devices, usually as a component of a multi-channel campaign.
  • mobile middleware - Mobile middleware is software that connects disparate mobile applications, programs and systems.
  • mobile number privacy - Mobile number privacy is the protection of the phone user’s number from unwanted access.
  • mobile operating system - A mobile operating system (OS) is software that allows smartphones, tablet PCs (personal computers) and other devices to run applications and programs.
  • mobile payment (m-payment) - Mobile payment is a point-of-sale transaction made through a mobile device.
  • mobile platform as a service (MPaaS) - Mobile Platform as a Service (mPaaS) is the paid provision of an Interactive Development Environment (IDE) for the creation of mobile apps.
  • mobile printing - Mobile printing is the process of sending data to a printer wirelessly from a smartphone or tablet.
  • mobile search - Mobile search is the practice of querying a search engine from an Internet-connected handheld device, such as a smart phone.
  • mobile security (wireless security) - Mobile security is the protection of smartphones, tablets, laptops and other portable computing devices, and the networks they connect to, from threats and vulnerabilities associated with wireless computing.
  • Mobile service provider - A mobile service provider (MSP) is a company that offers mobile communication services to users of mobile devices such as smartphones and tablet PCs.
  • mobile spyware - Mobile spyware is monitoring software that is installed on a mobile device without the end user's knowledge.
  • Mobile Threat Defense (MTD) - Mobile Threat Defense (MTD) software is meant to protect organizations and individual users from security threats on mobile platforms.
  • mobile ticketing - Mobile ticketing is the purchase of admission to events through a mobile device, including the delivery of digital tickets to a smartphone for use in place of traditional paper tickets.
  • mobile UI (mobile user interface) - A mobile UI is the user interface on a mobile device, usually including a touch screen display and all the other elements of the device that allow the user to interact with it.
  • mobile virtual network operator (MVNO) - A mobile virtual network operator (MVNO) is a services provider in the mobile device industry that provides wireless communications services including voice and data to customers over a wireless network infrastructure owned by a third-party mobile network operator (MNO).
  • mobile virtualization - Mobile virtualization is an approach to mobile device management in which two virtual platforms are installed on a single wireless device.
  • mobile workforce management (MWM) - Mobile workforce management (MWM) is a category of software and related services used to manage employees working outside the company premises; the term is often used in reference to field teams.
  • mobile workstation - A mobile workstation is a notebook computer with high-end computing features not typical of the notebook.
  • mobile-to-mobile convergence (MMC) - Mobile-to-mobile convergence (MMC) is a technology that facilitates the interoperability of mobile communications devices without the need for any fixed capabilities or proprietary service provider.
  • moblog (mobile blog) - A moblog (mobile blog) is a blog that is maintained by using a mobile device such as a PDA (personal digital assistant) or cell phone.
  • modular smartphone - A modular smartphone is a cellphone that can be upgraded through the attachment or replacement of discrete components.
  • Morphis - Morphis is a Java -based open source wireless transcoding platform from Kargo, Inc.
  • multi-touch - Multi-touch, in a computing context, is an interface technology that enables input through pressure and gestures on multiple points on the surface of a device.
  • Multimedia Messaging Service (MMS) - Multimedia Messaging Service (MMS) - sometimes called Multimedia Messaging System - is a communications technology developed by 3GPP (Third Generation Partnership Project) that allows users to exchange multimedia communications between capable mobile phones and other devices.
  • NANDroid backup - NANDroid backups are typically created by Android device owners who have gained root access to their phone’s operating system in order to use aftermarket distributions of the Android OS.
  • native app - A native application is a software program that is developed for use on a particular platform or device.
  • net bias - Net bias is discrimination of price, content quality, connection reliability and speed that Internet service providers (ISP) can enact on users based on arbitrary conditions.
  • netbook - A netbook is a small, light, low-power notebook computer that has less processing power than a full-sized laptop but is still suitable for word processing, running a Web browser and connecting wirelessly to the Internet.
  • Nexus - Nexus is a series of smartphones and tablets manufactured by Google and its hardware partners.
  • niche app - A niche app is a specialized application, typically designed with social networking built in and optimized for mobile devices.
  • Nokia Lumia - Nokia Lumia is a series of touch-based Windows Phone 7 and Windows Phone 8 smartphones that debuted in 2011.
  • nomophobia - Nomophobia is the irrational fear of being without your mobile phone or being unable to use your phone for some reason, such as the absence of a signal, a low battery or running out of minutes.
  • NOR flash memory - NOR flash memory is one of two types of non-volatile storage technologies.
  • ODIN (Open Device Identification Number) - ODIN (Open Device Identification Number) is a unique identifier derived from a mobile device�s Wi-fi �media access control (MAC) address.
  • OLPC (One Laptop Per Child) - The One Laptop Per Child project (OLPC) is an initiative aimed at providing inexpensive laptop computers to children in the developing world as a means of bridging the digital divide.
  • omnidirectional antenna - An omnidirectional antenna is a wireless transmitting or receiving antenna that radiates or intercepts radio-frequency (RF) electromagnetic fields equally well in all horizontal directions in a flat, two-dimensional (2D) geometric plane.
  • Open Handset Alliance (OHA) - The Open Handset Alliance (OHA) is a coalition of more than 30 technology and mobile companies that introduced Android, an open source mobile phone operating system.
  • Open Multimedia Application Platform (OMAP) - Open Multimedia Application Platform (OMAP) is the name of Texas Instrument’s application processor.
  • ORTC (Object Real-Time Communications) - ORTC (object real-time communications) is an open source component of WebRTC that enables mobile endpoints to talk to servers and Web browsers with real-time communications capabilities.
  • orthogonal frequency-division multiplexing (OFDM) - Orthogonal frequency-division multiplexing (OFDM) is a method of data transmission where a single information stream is split among several closely spaced narrowband subchannel frequencies instead of a single wideband channel frequency.
  • OTA update (over-the-air update) - An over-the-air (OTA) update is the wireless delivery of new software, firmware, or other data to mobile devices.
  • passive cooling - Passive cooling is an approach to cooling computer components through slowing the speed at which the component, such as the processor, is operating.
  • PCS (personal communications service) - PCS (personal communications service) is a wireless phone service similar to cellular telephone service but emphasizing personal service and extended mobility.
  • PEAP (Protected Extensible Authentication Protocol) - PEAP (Protected Extensible Authentication Protocol) is a version of EAP, the authentication protocol used in wireless networks and Point-to-Point connections.
  • Personal Access Communications System (PACS) - Personal Access Communications System (PACS) is a type of wireless telephone network compatible with telephone sets, answering machines, fax machines, and computers.
  • pervasive computing (ubiquitous computing) - Pervasive computing, also called ubiquitous computing, is the growing trend of embedding computational capability (generally in the form of microprocessors) into everyday objects to make them effectively communicate and perform useful tasks in a way that minimizes the end user's need to interact with computers as computers.
  • phablet - A phablet is a computing device with a screen size between five and seven inches long.
  • phase-locked loop (PLL) - A phase-locked loop (PLL) is an electronic circuit with a voltage or voltage-driven oscillator that constantly adjusts to match the frequency of an input signal.
  • phased antenna system - .
  • piezoelectricity - Piezoelectricity, also called the piezoelectric effect, is the ability of certain materials to generate an AC (alternating current) voltage when subjected to mechanical stress or vibration, or to vibrate when subjected to an AC voltage, or both.
  • PIN lock - The PIN lock is an authentication measure for mobile phones that requires the entry of a personal identification number (PIN) code before a device can be used.
  • pirate radio - Pirate radio is the transmission of communications over radio waves by unlicensed amateurs; such broadcasts are illegal because they are not in accordance with FCC transmission requirements.
  • pocket PC (pocket personal computer) - A pocket PC (pocket personal computer) is a hardware specification for a small, handheld computer, personal digital assistant (PDA) or smartphone.
  • Pokémon GO - Pokémon GO is a mobile augmented reality (AR) version of the popular Pokémon video game for iPhone or Android systems.
  • polite cell phone - A polite cell phone is a mobile telephone with built-in intelligence so that it adapts to its current environment and behaves appropriately.
  • predictive text - Predictive text is an input technology that facilitates typing on a mobile device by suggesting words the end user may wish to insert in a text field.
  • presence leveraging - Presence leveraging refers to any technology that supports and expands presence, the ability of a network subscriber to locate and identify any other user's computing device as soon as the other user connects to the network.
  • Pretty Please mode - Pretty Please mode is a feature added to require the use of “please” and “thank you” in voice commands for Google Assistant as used on Android devices and Google Home.
  • Project Vault - Project Vault is a secure minicomputer contained on a Micro SD card; Vault is under development at Google ATAP, the company’s lab group for disruptive technologies.
  • projector phone - A projector phone is a smartphone with an embedded pico projector.
  • proximity marketing (hyperlocal marketing) - Proximity marketing, sometimes referred to as hyperlocal marketing, is the wireless delivery of promotional material to mobile users in a specific location.
  • push notification - Push notification, also called server push notification, is the delivery of information from a software application to a computing device without a specific request from the client.
  • Push to Talk (PTT) - Push to talk (PTT), is a means of instantaneous communication commonly employed in wireless cellular phone services that uses a button to switch a device from voice transmission mode to voice reception mode.
  • push voice - Push Voice is a service that enables functionality normally associated with PBX-based phone systems for cellular phones or other mobile handsets.
  • QAM (quadrature amplitude modulation) - QAM (quadrature amplitude modulation) is a method of combining two amplitude modulation (AM) signals into a single channel.
  • qHD (quarter high definition) - qHD (quarter high definition) is a resolution standard for mobile devices.
  • QNX - QNX is a mobile operating system that was originally developed for embedded systems.
  • QR code (quick response code) - A QR code (quick response code) is a type of 2D bar code that provides easy access to information through a smartphone camera.
  • QuickType - QuickType is a predictive text feature released with Apple's iOS 8 that uses machine learning to incorporate the user's vocabulary into its dictionary and so improve its capacity and accuracy.
  • radiant energy - Radiant energy is, simply, energy that radiates from a source of electromagnetic radiation, such as the light and heat radiating from the sun.
  • radio charging - Radio charging is a wireless charging method used to charge items with small batteries and low power requirements, such as watches, hearing aids and wireless keyboards and mice.
  • React Native - React Native is an open source JavaScript framework for mobile application development.
  • real-time location system (RTLS) - A real-time location system (RTLS) is one of a number of technologies used to pinpoint the current geographic position and location of a target.
SearchCompliance
  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

  • risk avoidance

    Risk avoidance is the elimination of hazards, activities and exposures that can negatively affect an organization and its assets.

  • risk profile

    A risk profile is a quantitative analysis of the types of threats an organization, asset, project or individual faces.

SearchSecurity
SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
  • cloud archive

    A cloud archive is storage as a service for long-term data retention.

  • cache

    A cache -- pronounced CASH -- is hardware or software that is used to store something, usually data, temporarily in a computing ...

  • archive

    An archive is a collection of data moved to a repository for long-term retention, to keep separate for compliance reasons or for ...

Close