Browse Definitions :

SearchMobileComputing

At SearchMobileComputing.com, you'll discover a reliable source of ongoing ideas and best practices for using mobile computers and wireless infrastructures to build a streamlined business and gain a competitive advantage. We provide comprehensive coverage of all major mobile and wireless news and trends that are of interest to IT management and the enterprise. We also provide hands-on, practical advice for selecting, managing, deploying, tracking, supporting and securing mobile users and devices.

View the complete archive of Enterprise Mobile Computing Management news, research and expert advice.

Go to:  SearchMobileComputing

Recently on  SearchMobileComputing

5G connectivity won't be enterprise-ready in 2020

Despite hype and new device announcements, experts expect 5G will take time to catch on in the enterprise. The tech has potential, but not all the necessary factors are in place.

More Highlights
Definitions
  • tvOS

    TvOS is the operating system that runs on the 4th and 5th generation Apple TV digital media player.

  • remote wipe

    Remote wipe is a security feature that allows a network administrator or device owner to send a command that deletes data to a computing device.

  • LDAP (Lightweight Directory Access Protocol)

    LDAP (Lightweight Directory Access Protocol) is a software protocol for enabling anyone to locate data such as organizations, individuals and other resources such as files and devices in a network -- whether on the public internet or on a corporate intranet.

Browse Mobile Computing Topics

Enterprise mobility management

Learn how to effectively manage your mobile devices with the resources in this mobile device management topic section. Get the latest information on mobile device management and get tips on implementing mobile device management best practices.

Recent Definitions

  • Uber

    Uber is a transportation company with an app that allows passengers to hail a ride and drivers to charge fares and get paid.

  • remote wipe

    Remote wipe is a security feature that allows a network administrator or device owner to send a command that deletes data to a computing device.

  • consumerization of IT

    IT consumerization is the blending of personal and business use of technology devices and applications. Gartner traced the trend to the dot-com collapse, when enterprise IT budgets shrank and many IT vendors shifted focus to the potentially bigger consumer IT markets. The result has been a change in the way technology enters the marketplace.

Highlights

More Enterprise mobility management Topics

Back to Top

Applications and infrastructure

Get the latest information on mobile enterprise applications including mobile unified communication products in this topic section. Discover the most strategic resources on mobile enterprise applications available from the major mobile app stores including iTunes and BlackBerry App World. Find resources for evaluating mobile enterprise applications and solutions and discover the most popular mobile business apps available on the market. Learn about the top mobile applications and get help finding the best mobile enterprise applications for your organization. Read best practices for deploying, managing and maintaining your mobile applications. Read the latest news and expert tips on open source mobile apps, industry mobile applications and small business mobile solutions. Find case studies from companies who have successfully implemented the latest mobile enterprise applications and learn from their experience.

Recent Definitions

  • flexible display

    A flexible display or foldable tech/smartphone is a visual output surface on a device that is designed to be folded or closed like a book or a device which incorporates such a screen.

  • LDAP (Lightweight Directory Access Protocol)

    LDAP (Lightweight Directory Access Protocol) is a software protocol for enabling anyone to locate data such as organizations, individuals and other resources such as files and devices in a network -- whether on the public internet or on a corporate intranet.

  • wireless ad-hoc network (WANET)

    A wireless ad-hoc network (WANET) is a type of local area network (LAN) that is built spontaneously to enable two or more wireless devices to be connected to each other without requiring a central device, such as a router or access point.

Highlights

More Applications and infrastructure Topics

Back to Top

Mobile Device Platforms and Technologies

Get the latest information on mobile device platforms and mobile operating systems in this topic section. Our strategic resources on mobile operating systems will help you give you the tools you need for evaluating the right mobile platform to deliver your mobile applications to your mobile workforce. Learn about the most popular mobile operating systems in the market and how your peers are implementing them for maximum ROI. Get help finding the best mobile platform for your organization and read the latest news and expert tips on major mobile device platforms as well as open source mobile operating systems, applications and solutions.

Recent Definitions

  • tvOS

    TvOS is the operating system that runs on the 4th and 5th generation Apple TV digital media player.

  • Google Pay (Android Pay)

    Google Pay is the search company’s electronic wallet and payment service offering.

  • Apple User Enrollment

    Apple User Enrollment (UE) is a form of mobile device management (MDM) for Apple products that supports iOS 13 and macOS Catalina.

Highlights

More Mobile Device Platforms and Technologies Topics

Back to Top

-ADS BY GOOGLE

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • cybersecurity insurance (cybersecurity liability insurance)

    Cybersecurity insurance, also called cyber liability insurance or cyber insurance, is a contract that an entity can purchase to ...

  • phishing

    Phishing is a form of fraud in which an attacker masquerades as a reputable entity or person in email or other communication ...

  • cybercrime

    Cybercrime is any criminal activity that involves a computer, networked device or a network.

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

  • NVMe over Fabrics (NVMe-oF)

    NVMe over Fabrics, also known as NVMe-oF and non-volatile memory express over fabrics, is a protocol specification designed to ...

  • logical unit number (LUN)

    A logical unit number (LUN) is a unique identifier for designating an individual or collection of physical or virtual storage ...

  • CIFS (Common Internet File System)

    CIFS (Common Internet File System) is a protocol that gained popularity around the year 2000, as vendors worked to establish an ...

Close