Browse Definitions :

SearchMobileComputing

At SearchMobileComputing.com, you'll discover a reliable source of ongoing ideas and best practices for using mobile computers and wireless infrastructures to build a streamlined business and gain a competitive advantage. We provide comprehensive coverage of all major mobile and wireless news and trends that are of interest to IT management and the enterprise. We also provide hands-on, practical advice for selecting, managing, deploying, tracking, supporting and securing mobile users and devices.

View the complete archive of Enterprise Mobile Computing Management news, research and expert advice.

Go to:  SearchMobileComputing

Recently on  SearchMobileComputing

Compare Intune alternatives to Intune for mobility management

Intune stands out in the EMM market in part due to its incumbency as a PC management platform. IT must evaluate Intune compared to other EMM and UEM platforms' mobility controls.

More Highlights
Definitions
  • tvOS

    TvOS is the operating system that runs on the 4th and 5th generation Apple TV digital media player.

  • remote wipe

    Remote wipe is a security feature that allows a network administrator or device owner to send a command that deletes data to a computing device.

  • LDAP (Lightweight Directory Access Protocol)

    LDAP (Lightweight Directory Access Protocol) is a software protocol for enabling anyone to locate data such as organizations, individuals and other resources such as files and devices in a network -- whether on the public internet or on a corporate intranet.

Browse Mobile Computing Topics

Enterprise mobility management

Learn how to effectively manage your mobile devices with the resources in this mobile device management topic section. Get the latest information on mobile device management and get tips on implementing mobile device management best practices.

Recent Definitions

  • remote wipe

    Remote wipe is a security feature that allows a network administrator or device owner to send a command that deletes data to a computing device.

  • consumerization of IT

    IT consumerization is the blending of personal and business use of technology devices and applications. Gartner traced the trend to the dot-com collapse, when enterprise IT budgets shrank and many IT vendors shifted focus to the potentially bigger consumer IT markets. The result has been a change in the way technology enters the marketplace.

  • RAM (Random Access Memory)

    RAM (Random Access Memory) is the hardware in a computing device where the operating system (OS), application programs and data in current use are kept so they can be quickly reached by the device's processor.

Highlights

More Enterprise mobility management Topics

Back to Top

Applications and infrastructure

Get the latest information on mobile enterprise applications including mobile unified communication products in this topic section. Discover the most strategic resources on mobile enterprise applications available from the major mobile app stores including iTunes and BlackBerry App World. Find resources for evaluating mobile enterprise applications and solutions and discover the most popular mobile business apps available on the market. Learn about the top mobile applications and get help finding the best mobile enterprise applications for your organization. Read best practices for deploying, managing and maintaining your mobile applications. Read the latest news and expert tips on open source mobile apps, industry mobile applications and small business mobile solutions. Find case studies from companies who have successfully implemented the latest mobile enterprise applications and learn from their experience.

Recent Definitions

  • LDAP (Lightweight Directory Access Protocol)

    LDAP (Lightweight Directory Access Protocol) is a software protocol for enabling anyone to locate data such as organizations, individuals and other resources such as files and devices in a network -- whether on the public internet or on a corporate intranet.

  • wireless ad-hoc network (WANET)

    A wireless ad-hoc network (WANET) is a type of local area network (LAN) that is built spontaneously to enable two or more wireless devices to be connected to each other without requiring a central device, such as a router or access point.

  • smartphone

    A smartphone is a cellular telephone with an integrated computer and other features not originally associated with telephones, such as an operating system, web browsing and the ability to run software applications.

Highlights

More Applications and infrastructure Topics

Back to Top

Mobile Device Platforms and Technologies

Get the latest information on mobile device platforms and mobile operating systems in this topic section. Our strategic resources on mobile operating systems will help you give you the tools you need for evaluating the right mobile platform to deliver your mobile applications to your mobile workforce. Learn about the most popular mobile operating systems in the market and how your peers are implementing them for maximum ROI. Get help finding the best mobile platform for your organization and read the latest news and expert tips on major mobile device platforms as well as open source mobile operating systems, applications and solutions.

Recent Definitions

  • tvOS

    TvOS is the operating system that runs on the 4th and 5th generation Apple TV digital media player.

  • Google Pay (Android Pay)

    Google Pay is the search company’s electronic wallet and payment service offering.

  • Apple User Enrollment

    Apple User Enrollment (UE) is a form of mobile device management (MDM) for Apple products that supports iOS 13 and macOS Catalina.

Highlights

More Mobile Device Platforms and Technologies Topics

Back to Top

-ADS BY GOOGLE

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • Port Scan

    A port scan is a series of messages sent by someone attempting to break into a computer to learn which computer network services ...

  • DMZ (networking)

    In computer networks, a DMZ (demilitarized zone), also sometimes known as a perimeter network or a screened subnetwork, is a ...

  • quantum supremacy

    Quantum supremacy is the experimental demonstration of a quantum computer's dominance and advantage over classic computers by ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

Close