Hardware  >   Networking Hardware  >   Wireless Hardware  >  

Handheld Devices

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Handhelds, Handheld Computers, Mobile Terminals, Mobile Devices, SHD, Smart Handheld Devices, Wireless Handheld Devices, Handheld Terminals, Handheld Computing Devices, Wireless Terminals, Device Platforms, Portable Terminals
DEFINITION: The mobile Internet device (MID) is a small Internet communications unit designed to provide entertainment, information and location-based services for the consumer market (rather than the enterprise). The MID is a larger form factor than a handheld device but smaller than the Ultra Mobile PC (UMPC). As such, the device has been described as filling a consumer niche between cellular telephones and  … 
Definition continues below.
Handheld DevicesReports
51 - 75 of 147 Matches Previous Page  | Next Page
Mobile Device Management Technical Guide
sponsored by SearchSecurity.com
EZINE: In this TechGuide from SearchSecurity.com, industry expert Lisa Phifer shares her vast knowledge on BYOD, MDM, data security, and more to help you get a handle on top mobile trends rocking the enterprise.
Posted: 06 Mar 2013 | Published: 06 Mar 2013

SearchSecurity.com

Weighing the Options for an Enterprise Mobility Strategy
sponsored by SearchSecurity.com
EGUIDE: In this E-Guide from SearchConsumerization.com, uncover the importance of an enterprise mobility strategy and learn more about the pros and cons of the top three options today: Mobile device management, mobile application management, and mobile information management.
Posted: 06 Mar 2013 | Published: 06 Mar 2013

SearchSecurity.com

Choosing & Managing Mobile Devices - Ch.1: Avoiding Challenges in Mobile Device Management
sponsored by SearchSecurity.com
WHITE PAPER: The rapidly evolving BYOD trend is making management strategies harder and harder to follow through on. Read this expert whitepaper to examine the critical data security and employee-related challenges IT faces with attempting to manage mobile devices.
Posted: 01 Mar 2013 | Published: 01 Mar 2013

SearchSecurity.com

BYOD Platform Support: Why an iOS/Android Strategy Makes Sense
sponsored by SearchSecurity.com
EGUIDE: BYOD is running rampant. Do you have a strategy in place to mitigate the risks? This E-Guide from SearchSecurity.com explores why creating an iOS and Android only strategy makes sense and reduces the chance for errors, complexity, and costs.
Posted: 28 Feb 2013 | Published: 28 Feb 2013

SearchSecurity.com

BYOD Advantages: Save Money, Mobilize Workers, Embrace the Cloud
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchConsumerization.com explores how – with the proper security and management strategies – BYOD can be a win-win for both your employees and your organization. View now to learn more!
Posted: 26 Feb 2013 | Published: 26 Feb 2013

SearchSecurity.com

BYOD: An Opportunity for IT Evolution
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchConsumerization.com details what BYOD and the Millennial generation can bring to your enterprise and explores why aligning business needs with the tools and technologies of BYOD can put your company one step ahead of the competition.
Posted: 26 Feb 2013 | Published: 26 Feb 2013

SearchSecurity.com

Workplace of the Future: DIY IT
sponsored by Hewlett-Packard Limited
WHITE PAPER: Explore the latest surrounding the trend of consumerization and uncover what your IT department can do to empower users while simultaneously protecting the organization.
Posted: 11 Dec 2012 | Published: 11 Dec 2012

Hewlett-Packard Limited

Updating Your Corporate BYOD Program for Success
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchConsumerization.com explores the issues that bring your own device (BYOD) programs solve and key considerations to ensure the success of your BYOD program.
Posted: 07 Dec 2012 | Published: 07 Dec 2012

SearchSecurity.com

The Cost and Benefits of BYOD
sponsored by SearchSecurity.com
EGUIDE: Uncover why 80% of organizations today are ill-prepared for the bring your own device (BYOD) phenomenon as you explore the benefits and security risks of this consumer-driven trend.
Posted: 06 Dec 2012 | Published: 06 Dec 2012

SearchSecurity.com

Understanding Consumer Device Management and BYOD
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchConsumerization.com provides you with the BYOD resources necessary to ensure a successful implementation, creation, and adoption. View now to learn more!
Posted: 28 Nov 2012 | Published: 28 Nov 2012

SearchSecurity.com

Securing Data, Not Endpoints: The Best Way to Control Consumerization
sponsored by SearchSecurity.com
EGUIDE: Discover why securing the data – rather than the endpoint – is the best way of controlling consumerization in your organization.
Posted: 27 Nov 2012 | Published: 27 Nov 2012

SearchSecurity.com

MDM Software: Benefits of Mobile Configuration Management
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchConsumerization.com explores why configuration management is one of the most important functions of a mobile device management (MDM) policy and describes what you should look for when selecting your MDM solution.
Posted: 27 Nov 2012 | Published: 27 Nov 2012

SearchSecurity.com

About to Buy Guide: Mobile Device Management Software
sponsored by SearchSecurity.com
EBOOK: Are you in the market for a mobile device management (MDM) software solution? Be sure to read this e-book from SearchConsumerization.com first for help making a more informed purchasing decision.
Posted: 21 Nov 2012 | Published: 30 Mar 2012

SearchSecurity.com

Mobile Security Software Keeps Corporate Data Safe
sponsored by SearchSecurity.com
EGUIDE: In this E-Guide from SearchConsumerization.com, discover how implementing mobile security software can help protect your corporate data from the inherent risks of the BYOD phenomenon.
Posted: 20 Nov 2012 | Published: 20 Nov 2012

SearchSecurity.com

Presentation Transcript: BYOD: The Risks of Allowing Personal Mobile Devices On Corporate Networks and How to Mitigate Them
sponsored by SearchSecurity.com
PRESENTATION TRANSCRIPT: Uncover why MDM and MAM are inefficient at solving the real problem mobile devices present to your network: traffic.
Posted: 20 Nov 2012 | Published: 20 Nov 2012

SearchSecurity.com

Improve BYOD with the Bonjour Protocol
sponsored by Aerohive Networks
EGUIDE: This E-Guide from SearchNetworking.com explores how the Bonjour protocol can help you handle the Apple devices wishing to access your enterprise networks and systems. In addition, uncover the importance of defining a proper BYOD policy.
Posted: 08 Nov 2012 | Published: 08 Nov 2012

Aerohive Networks

Best Practice Guide to Mobile Device Management
sponsored by Fiberlink
WHITE PAPER: Uncover the top ten mobile device management (MDM) best practices that will help you control the mobile devices used in your workplace, reducing risks to corporate data without jeopardizing employee productivity.
Posted: 23 Oct 2012 | Published: 31 May 2012

Fiberlink

Can BYOD Best Practices Help Mobile UC Mature in the Enterprise?
sponsored by SearchSecurity.com
EGUIDE: Discover why combining bring your own device (BYOD) with enterprise-grade unified communications (UC) applications is such a challenge for organizations and vendors alike and learn about an alternative that can help your organization enjoy the benefits of BYOD and UC simultaneously.
Posted: 22 Oct 2012 | Published: 22 Oct 2012

SearchSecurity.com

Wireless LAN ITDC - Checklist #1
sponsored by SearchSecurity.com
EGUIDE: In the first of SearchNetworking.com's three-part guide on selecting wireless products, this document takes a look at the business and technology issues associated with them and provides expert guidance on the benefits you can reap by taking advantage of the various types of wireless solutions.
Posted: 19 Oct 2012 | Published: 19 Oct 2012

SearchSecurity.com

Your Guide to Mobile Application Management
sponsored by SearchSecurity.com
EGUIDE: This expert E-Guide answers your top questions about mobile application management, mobile device management, consumerization, BYOD, and much more – helping you empower your employees with the freedom of choice without compromising corporate security or control.
Posted: 19 Oct 2012 | Published: 19 Oct 2012

SearchSecurity.com

Delivering Enterprise Information Securely on Android and Apple iOS Devices
sponsored by Citrix
WHITE PAPER: This white paper describes the issues that can arise when incorporating Android and iOS-based tablets and smartphones into the enterprise – with special attention paid to the latest Android 4.0 and iOS 5.1 versions. In addition, uncover the steps you should take to maintain security and control.
Posted: 16 Oct 2012 | Published: 30 Apr 2012

Citrix

October Essentials Guide on Mobile Device Security
sponsored by SearchSecurity.com
ESSENTIAL GUIDE: The October issue of Information Security offers advice on controlling the onslaught of employee-owned devices in your workplace, mitigating the risks of mobile applications, and changing your thought process when it comes to securing the consumerization of IT.
Posted: 10 Oct 2012 | Published: 09 Oct 2012

SearchSecurity.com

How to Create a Mobile Security Policy
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchConsumerization.com offers advice on how to plan and define a successful mobile security policy in your organization to ensure safety and control of your employees and their devices.
Posted: 09 Oct 2012 | Published: 09 Oct 2012

SearchSecurity.com

BYOD and the new network access
sponsored by SearchNetworking.com
EZINE: This month's cover story, "BYOD Challenges That Lurk Beyond Network Security", discusses five specific networking challenges associated with BYOD and examines the steps organizations have taken in an attempt to handle these issues.
Posted: 01 Feb 2013 | Published: 01 Feb 2013

SearchNetworking.com

Transcript: Covering the basics in MDM? Why it’s time to advance your strategy
sponsored by BlackBerry
PRESENTATION TRANSCRIPT: Uncover the latest in the world of enterprise mobility as you uncover today's real world problems, traits of the most secure organizations, the future of mobility, and much more!
Posted: 07 Nov 2012 | Published: 07 Nov 2012

BlackBerry
51 - 75 of 147 Matches Previous Page    1 2 3 4 5 6    Next Page
 
HANDHELD DEVICES DEFINITION (continued): …  tablet PCs. Intel debuted a Linux-powered MID prototype at the company's Developer Conference in April 2007. Intel's MID features include: A diagonal screen measure of 4.5 or 6 inches Faster boot up than a UMPCLower retail cost than a UMPC A streamlined, "small-screen-friendly" interface Wi-Fi connectivity, through wireless local area network (WLAN) technology 256 MB (megabytes) or 512 MB of RAM (random-access memory)A screen resolution of 800 x 480 or 1024 x 600 pixels. Intel predicts a global market for 180 million MID units, annually, by 2010. A number of other companies, including … 
Handheld Devices definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement