Browse Definitions :

SearchMobileComputing

At SearchMobileComputing.com, you'll discover a reliable source of ongoing ideas and best practices for using mobile computers and wireless infrastructures to build a streamlined business and gain a competitive advantage. We provide comprehensive coverage of all major mobile and wireless news and trends that are of interest to IT management and the enterprise. We also provide hands-on, practical advice for selecting, managing, deploying, tracking, supporting and securing mobile users and devices.

View the complete archive of Enterprise Mobile Computing Management news, research and expert advice.

Go to:  SearchMobileComputing

Recently on  SearchMobileComputing

Improve a mobile security strategy with the right policies

IT must factor mobile users into its security plan. Intrusive applications and stolen devices are major security issues, but IT can account for these threats with proper planning.

More Highlights
Definitions
  • Google Mobile Services (GMS)

    Google Mobile Services (GMS) is a collection of applications and API’s developed by Google that are available for Android devices, such as smartphones and tablets.

  • wearable technology

    Wearable technology is any kind of electronic device designed to be worn on the user’s body.

  • Google Play (Android Market)

    Google Play, formerly known as Android Market, is the official distribution storefront for Android applications and other digital media, such a music, movies and books, from Google.

Browse Mobile Computing Topics

Enterprise mobility management

Learn how to effectively manage your mobile devices with the resources in this mobile device management topic section. Get the latest information on mobile device management and get tips on implementing mobile device management best practices.

Recent Definitions

  • RAM (Random Access Memory)

    RAM (Random Access Memory) is the hardware in a computing device where the operating system (OS), application programs and data in current use are kept so they can be quickly reached by the device's processor.

  • secure container

    A secure container is a lightweight, executable software package that has been isolated from other software or processes running on the same virtual or physical host.

  • Google Mobile Services (GMS)

    Google Mobile Services (GMS) is a collection of applications and API’s developed by Google that are available for Android devices, such as smartphones and tablets.

Highlights

More Enterprise mobility management Topics

Back to Top

Applications and infrastructure

Get the latest information on mobile enterprise applications including mobile unified communication products in this topic section. Discover the most strategic resources on mobile enterprise applications available from the major mobile app stores including iTunes and BlackBerry App World. Find resources for evaluating mobile enterprise applications and solutions and discover the most popular mobile business apps available on the market. Learn about the top mobile applications and get help finding the best mobile enterprise applications for your organization. Read best practices for deploying, managing and maintaining your mobile applications. Read the latest news and expert tips on open source mobile apps, industry mobile applications and small business mobile solutions. Find case studies from companies who have successfully implemented the latest mobile enterprise applications and learn from their experience.

Recent Definitions

  • micro app

    A micro app is a small, task-based application used to maximize consumer efficiency.

  • A2P messaging (application to person messaging)

    A2P messaging (application to person messaging), also known as enterprise or business SMS, is a type of SMS messaging technique where a text is sent from a software application run by an enterprise to a consumer's device.

  • IRL (in real life)

    IRL (in real life) is an abbreviation used to explain when person is speaking about something real and outside the digital world of communication, gaming or virtual reality.

Highlights

More Applications and infrastructure Topics

Back to Top

Mobile Device Platforms and Technologies

Get the latest information on mobile device platforms and mobile operating systems in this topic section. Our strategic resources on mobile operating systems will help you give you the tools you need for evaluating the right mobile platform to deliver your mobile applications to your mobile workforce. Learn about the most popular mobile operating systems in the market and how your peers are implementing them for maximum ROI. Get help finding the best mobile platform for your organization and read the latest news and expert tips on major mobile device platforms as well as open source mobile operating systems, applications and solutions.

Recent Definitions

  • wearable computer

    A wearable computer is any small technological device capable of storing and processing data that can be worn on the body.

  • wearable technology

    Wearable technology is any kind of electronic device designed to be worn on the user’s body.

  • Google Play (Android Market)

    Google Play, formerly known as Android Market, is the official distribution storefront for Android applications and other digital media, such a music, movies and books, from Google.

Highlights

More Mobile Device Platforms and Technologies Topics

Back to Top

-ADS BY GOOGLE

SearchCompliance

  • compliance audit

    A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

SearchSecurity

  • reverse brute-force attack

    A reverse brute-force attack is a type of brute-force attack in which an attacker uses a common password against multiple ...

  • orphan account

    An orphan account, also referred to as an orphaned account, is a user account that can provide access to corporate systems, ...

  • voice squatting (skill squatting)

    Voice squatting is an attack vector for voice user interfaces (VUIs) that exploits homonyms (words that sound the same but are ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity policy

    Business continuity policy is the set of standards and guidelines an organization enforces to ensure resilience and proper risk ...

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • warm site

    A warm site is a type of facility an organization uses to recover its technology infrastructure when its primary data center goes...

SearchStorage

  • RAM (Random Access Memory)

    RAM (Random Access Memory) is the hardware in a computing device where the operating system (OS), application programs and data ...

  • primary storage (main storage)

    Primary storage is the collective methods and technologies used to capture and retain digital information that is in active use ...

  • cache memory

    Cache memory, also called CPU memory, is high-speed static random access memory (SRAM) that a computer microprocessor can access ...

Close