Browse Definitions :

Wireless and mobile

Terms related to wireless and mobile technology, including definitions about consumer mobile technology devices and communication technologies such as Wi-Fi, WiMAX and LTE.

SAM - WEB

  • Samsung for Enterprise (SAFE) - Samsung for Enterprise (SAFE) is a line of smartphones and tablets manufactured to meet specific enterprise management and security criteria, including interoperability with third-party mobile device management (MDM) and virtual private network (VPN) software.
  • Samsung Galaxy - Samsung Galaxy is Samsung Electronics' flagship line of Android smartphones and tablets.
  • Samsung Galaxy Note (Samsung GN) - Samsung Galaxy Note is a large Android smartphone with a touchscreen and stylus that is manufactured by Samsung Electronics.
  • Samsung KNOX - Samsung KNOX is a set of enterprise mobility management services that offers mobile device and data protection and management.
  • Samsung Tizen - Samsung Tizen is Samsung's implementation of Tizen, an open source mobile operating system.
  • SAP Afaria - Afaria is a mobile device management (MDM) and mobile application management (MAM) software platform.
  • SAP Mobile Platform (SMP) - SAP Mobile Platform (SMP) facilitates the development and deployment of business-to-enterprise (B2E) and business-to-customer (B2C) applications through reusable components, drag and drop HTML5 apps and other programming tools.
  • satellite - In general, a satellite is anything that orbits something else, as, for example, the moon orbits the earth.
  • satellite Internet connection - A satellite Internet connection is an arrangement in which the upstream (outgoing) and the downstream (incoming) data are sent from, and arrive at, a computer through a satellite.
  • satellite news gathering (SNG) - Satellite news gathering (SNG) is the use of mobile communications equipment for the purpose of worldwide newscasting.
  • scalable video coding (SVC) - Scalable video coding (SVC) is an extension of the H.
  • secure container - A secure container is a lightweight, executable software package that has been isolated from other software or processes running on the same virtual or physical host.
  • selfie - A selfie is a self-portrait, typically a photograph, that is posted online.
  • service set identifier (SSID) - A service set identifier (SSID) is a sequence of characters that uniquely names a wireless local area network (WLAN).
  • Shared Key Authentication (SKA) - Shared Key Authentication (SKA) is a process by which a computer can gain access to a wireless network that uses the Wired Equivalent Privacy (WEP) protocol.
  • Short Message Service (SMS) - SMS (Short Message Service) is a service for sending short messages of up to 160 characters (224 characters if using a 5-bit mode) to mobile devices, including cell phones, smart phones and PDAs.
  • short message service center (SMSC) - A short message service center (SMSC) is the portion of a wireless network that handles SMS operations, such as routing, forwarding and storing incoming text messages on their way to desired endpoints.
  • showrooming - Showrooming is the act of visiting a physical retail store to examine a product in person and then shopping online to purchase the item at a find lower price.
  • sideloading - Sideloading is the installation of an application on a mobile device without using the device’s official application-distribution method.
  • Signalling Connection Control Part (SCCP) - Signalling Connection Control Part (SCCP) is a portion of International Telecommunication Union (ITU) recommendation Q.
  • SIM card - A SIM card, also known as a subscriber identity module, is a smart card that stores identification information that pinpoints a smartphone to a specific mobile network.
  • SIM swap attack (SIM intercept attack) - A SIM Swap Attack, also known as a SIM Intercept Attack, is a form of identity theft in which an attacker convinces a cell phone carrier into switching a victim’s phone number to a new device in order to gain access to bank accounts, credit card numbers, and other sensitive information.
  • SIMO (single input, multiple output) - SIMO (single input, multiple output) is an antenna technology for wireless communications in which multiple antennas are used at the destination (receiver).
  • SIP trunking (Session Initiation Protocol trunking) - Session Initiation Protocol trunking is a service offered by a communications service provider that uses the protocol to provision voice over IP connectivity between an on-premises phone system and the public switched telephone network.
  • Siri - Siri is Apple's personal assistant for iOS, macOS, tvOS and watchOS devices that uses voice recognition and is powered by artificial intelligence (AI).
  • SISO (single input, single output) - SISO (single input, single output) refers to a wireless communications system in which one antenna is used at the source (transmitter) and one antenna is used at the destination (receiver).
  • SMAC (social, mobile, analytics and cloud) - SMAC (social, mobile, analytics and cloud) is the concept that the convergence of four technologies is currently driving business innovation.
  • Small Office Home Office (SOHO) - In information technology, SOHO is a term for the small office or home office environment and business culture.
  • smart hard hat - A smart hard hat is personal protective equipment (PPE) designed to enhance worker performance and safety in construction and related industries through embedded technology.
  • smart home app (home automation app) - A smart home app, sometimes referred to as a home automation app or a smart home automation app, is an application used to remotely control and manage connected non-computing devices in the home, typically from a smartphone or tablet.
  • smart lock - A smart lock is an electronic and mechanical locking device that opens wirelessly with an authorized users’ authentication.
  • smart speaker - A smart speaker is a wireless and smart audio playback device that uses several types of connectivity for additional functions.
  • smartphone - A smartphone is a cellular telephone with an integrated computer and other features not originally associated with telephones, such as an operating system, web browsing and the ability to run software applications.
  • smartphone sensor - A smartphone sensor is any one of a number of different types of sensing devices installed on a user's phone to gather data for various user purposes, often in conjunction with a mobile app.
  • SMiShing (SMS phishing) - SMiShing is a mobile phone security attack in which the user is tricked into downloading a Trojan horse, virus or other malware onto his phone.
  • SMS gateway - An SMS gateway is a website that allows users to send SMS messages from a web browser to people within the cell served by that gateway.
  • SMS spam (cell phone spam or short messaging service spam) - SMS spam (sometimes called cell phone spam) is any junk message delivered to a mobile phone as text messaging through the Short Message Service (SMS).
  • Smurf Suite - The Smurf Suite is a collection of smartphone hacking and spyware tools that can remotely activate iPhones and Android devices and collect user data through eavesdropping and data access.
  • Snapchat World Lenses - Snapchat World Lenses are a collection of augmented reality (AR) 3D enhancements to live real-world environments as viewed through the Snapchat mobile app, which allows users to send and receive 'self-destructing' photos and videos.
  • sniff subrating - Sniff subrating is a Bluetooth feature designed to increase battery life as much as 500 percent for devices whose typical usage involves a significant amount of inactive time.
  • soft reset - A soft reset is a restart of a device, such as a smartphone, tablet, laptop or personal computer (PC).
  • solar-powered laptop - A solar-powered laptop is a notebook computer that uses built-in photo voltaic solar panels to run and recharge its battery.
  • SoLoMo (social, local and mobile) - SoLoMo (social, local and mobile) is a term representing the convergence of collaborative, location-based and on-the-go technologies, primarily used for marketing and discovery purposes.
  • SoMoClo (social, mobile and cloud) - SoMoClo (social, mobile and cloud) is the convergence of collaborative, on-the-go technologies that allow users to access data and applications from anywhere at any time.
  • spatial division multiple access (SDMA) - Also see frequency division multiple access (FDMA) and time division multiple access (TDMA).
  • spectrum efficiency - Spectrum efficiency describes the amount of data transmitted over a given spectrum or bandwidth with minimum transmission errors.
  • Splashtop - Splashtop is a vendor that sells remote connection software which lets users access their PCs or Macs from other computing devices.
  • spray-on antenna - A spray-on antenna is a conductive material that can be sprayed onto nearly any surface to create a thin, lightweight and flexible antenna.
  • spread spectrum - Spread spectrum is a form of wireless communications in which the frequency of the transmitted signal is deliberately varied.
  • Square (Square Register, Square Wallet) - Square is a mobile payment startup co-founded in 2009 by Twitter co-founder Jack Dorsey.
  • SS7 attack - An SS7 attack is a security exploit that takes advantage of a weakness in the design of SS7 (Signaling System 7) to enable data theft, eavesdropping, text interception and location tracking.
  • Sugar - Sugar is a graphical user interface GUI developed for the $100 laptop (XO).
  • Surface (Microsoft Surface tablet) - Surface is a line of tablet computers from Microsoft.
  • T1 (T-1) - Also see the T-carrier system, of which the T1 is a part.
  • talk time - In customer relationship management (CRM), talk time is the amount of time a call center agent spends with a caller during a transaction.
  • telecommunications (telecom) - Telecommunications, also known as telecom, is the exchange of information over significant distances by electronic means and refers to all types of voice, data and video transmission.
  • telepresence robot - A telepresence robot is a remote-controlled, wheeled device that has wireless internet connectivity.
  • telestroke (telestroke services) - Telestroke is a web-based approach to treating stroke victims who have not been admitted to a hospital.
  • tethering - Tethering is the practice of using a mobile device (such as a cell phone) as a modem to connect another device (such as a laptop) to the Internet.
  • text messaging (texting or wireless messaging) - Text messaging is the act of sending short, alphanumeric communications between cellphones, pagers or other hand-held devices, as implemented by a wireless carrier.
  • thing (in the Internet of Things) - A thing, in the context of the Internet of things (IoT), is an entity or physical object that has a unique identifier, an embedded system and the ability to transfer data over a network.
  • Time Division Multiple Access (TDMA) - Time Division Multiple Access (TDMA) is a digital modulation technique used in digital cellular telephone and mobile radio communication.
  • touch screen - A touch screen is a computer display screen that is also an input device.
  • transceiver - A transceiver is a combination transmitter/receiver in a single package.
  • transponder - A transponder is a wireless communications, monitoring, or control device that picks up and automatically responds to an incoming signal.
  • traveling-wave tube (TWT) - A traveling-wave tube (TWT) is a specialized vacuum tube used in wireless communications, especially in satellite systems.
  • triangulation - Triangulation is a process by which the location of a radio transmitter can be determined by measuring either the radial distance, or the direction, of the received signal from two or three different points.
  • tropospheric propogation - Radio waves can propagate over the horizon when the lower atmosphere of the earth bends, scatters, and/or reflects the electromagnetic fields.
  • tweet - A tweet is a post on Twitter.
  • Uber - Uber is a transportation company with an app that allows passengers to hail a ride and drivers to charge fares and get paid.
  • UberFLEET - UberFLEET is a smartphone application that allows partners with Uber, a popular rideshare application, to oversee their fleet drivers.
  • ubiquitous networking - Ubiquitous networking is the pervasion of communications infrastructure and wireless technologies throughout the environment such that they enable continuous connectivity.
  • ultra wideband - Ultra wideband (also known as UWB or as digital pulse wireless) is a wireless technology for transmitting large amounts of digital data over a wide spectrum of frequency bands with very low power for a short distance.
  • ultra-mobile personal computer (UMPC or Ultra-mobile PC) - Ultra-mobile PC (UMPC) is a design specification for a hand-held computer that is larger than a PDA but smaller than a laptop.
  • ultrabook - An ultrabook is a category of thin and light laptop computers designed to bridge the market gap between tablets and premium notebook PCs.
  • UMTS (Universal Mobile Telecommunications Service) - UMTS (Universal Mobile Telecommunications Service) is a third-generation (3G) broadband, packet-based transmission of text, digitized voice, video, and multimedia at data rates up to 2 megabits per second (Mbps).
  • unified endpoint management (UEM) - Unified endpoint management (UEM) is an approach to securing and controlling desktop computers, laptops, smartphones and tablets in a connected, cohesive manner from a single console.
  • unique device identifier (UDID) - A unique device identifier (UDID) is a 40-character string assigned to certain Apple devices including the iPhone, iPad, and iPod Touch.
  • Universal Mobile Telecommunications System (UMTS) - UMTS (Universal Mobile Telecommunications System) is a so-called "third-generation (3G)," broadband, packet -based transmission of text, digitized voice, video, and multimedia at data rates up to and possibly higher than 2 megabits per second (Mbps), offering a consistent set of services to mobile computer and phone users no matter where they are located in the world.
  • URL shortening - URL shortening is the translation of a long Uniform Resource Locator (URL) into an abbreviated alternative that redirects to the longer URL.
  • USSD (Unstructured Supplementary Service Data) - USSD (Unstructured Supplementary Service Data) is a GSM (Global System for Mobile) communications protocol that is used to send text messages.
  • vehicle-to-vehicle communication (V2V communication) - Vehicle-to-vehicle communication (V2V communication) is the wireless transmission of data between motor vehicles.
  • Venmo - Venmo is a smartphone app that designed to transfer payments from one user to another through connected bank accounts.
  • video telephony - Video telephony is full-duplex, real-time audio-visual communication between or among end users.
  • Vine (Vine app) - Vine is a free mobile application that enables users to record and share an unlimited number of short, looping video clips with a maximum length of six seconds.
  • virtual assistant - A virtual assistant is an electronic audio or audio/video avatar-centered program that uses artificial intelligence to perform tasks for the user.
  • VMware AirWatch - VMware AirWatch is an enterprise mobility software provider based in Atlanta.
  • VMware AirWatch - VMware AirWatch is an enterprise mobility software provider based in Atlanta.
  • VMware Horizon Mobile - VMware Horizon Mobile is mobile virtualization and application wrapping software that lets IT administrators control corporate data and applications on end users' smartphones and tablets.
  • VMware Horizon Workspace - VMware Horizon Workspace is enterprise mobility management software that creates a central repository where users can access corporate data, applications and virtual desktops from a variety of endpoint devices.
  • VMware Project AppShift - VMware Project AppShift is technology designed to improve the experience of using virtualized Windows and its applications on non-Windows tablets.
  • VMware Unity Touch - VMware Unity Touch is software that offers a touch-based interface for navigating folders and launching applications when running Windows in a virtual machine on a smartphone or tablet.
  • voice activation detection (VAD) - In Voice over IP (VOiP), voice activation detection (VAD) is a software application that allows a data network carrying voice traffic over the Internet to detect the absence of audio and conserve bandwidth by preventing the transmission of "silent packets" over the network.
  • voice control (voice assistance) - Voice control, also called voice assistance, is a user interface that allows hands-free operation of a digital device.
  • voice morphing - Voice morphing is the software-generated alteration of a person's natural voice.
  • voice search - Voice search is a speech recognition technology that allows users to search by saying terms aloud rather than typing them into a search field.
  • voice-to-text - Voice-to-text is a type of speech recognition program that converts spoken to written language.
  • VoIP phone - A VoIP phone is a hardware- or software-based telephone designed to use voice over Internet Protocol (VoIP) technology to send and receive phone calls over an IP network.
  • VSAT (Very Small Aperture Terminal) - VSAT (Very Small Aperture Terminal) is a satellite communications system that serves home and business users.
  • war driving (access point mapping) - War driving, also called access point mapping, is the act of locating and possibly exploiting connections to wireless local area networks while driving around a city or elsewhere.
SearchCompliance
  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

  • risk profile

    A risk profile is a quantitative analysis of the types of threats an organization, asset, project or individual faces.

  • risk appetite

    Risk appetite is the amount of risk an organization is willing to take in pursuit of objectives it deems have value.

SearchSecurity
SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
  • cloud archive

    A cloud archive is storage as a service for long-term data retention.

  • cache

    A cache -- pronounced CASH -- is hardware or software that is used to store something, usually data, temporarily in a computing ...

  • archive

    An archive is a collection of data moved to a repository for long-term retention, to keep separate for compliance reasons or for ...

Close