Hardware  >   Communications Hardware  >   Voice Communications Hardware  >   Consumer Telephony Equipment  >   Telephones  >   Wireless Telephones  >  

Smart Phones

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: SHD, Smart Handheld Devices, Smart Telephones, Smart Handheld Phones, Smartphones
DEFINITION: iPhone is a smartphone made by Apple that combines an iPod, a tablet PC, a digital camera and a cellular phone. The device includes Internet browsing and networking capabilities. See imageWatch an iPhone demonstration (video).iPhone is extremely thin (only 11.6 millimeters thick) but wider and longer than many comparable devices. The display area is a 3.5-inch wide screen multi-touch interface  … 
Definition continues below.
Smart PhonesReports
1 - 25 of 609 Matches Previous Page  | Next Page
OFS and BaaS – Why You Need both
sponsored by Code42
WEBCAST: Watch this webcast to hear ESG Senior Analysts Jason Buffington and Teri McClure discuss the importance of protecting endpoint devices, how OFS and BaaS are similar and why they're both necessary.
Posted: 21 Oct 2014 | Premiered: Dec 4, 2013

Code42

SecureAuth IDP – Device Fingerprinting Low-Friction, BYOD Authentication
sponsored by SecureAuth
WHITE PAPER: This white paper introduces SecureAuth's Device Fingerprinting, which features the flexibility, security, and convenience required to increase layers of authentication without creating high friction for users.
Posted: 20 Oct 2014 | Published: 20 Oct 2014

SecureAuth

Take Authentication Beyond Passwords with Secure Remote Access
sponsored by Bull
VIDEO: This short video describes how you can take authentication beyond passwords with HID Global's ActivID® authentication solutions, which provide secure remote access supporting the latest tablet and mobile devices.
Posted: 20 Oct 2014 | Premiered: 20 Oct 2014

Bull

Secure Identity and Smart Employee ID Solutions
sponsored by Bull
VIDEO: This short video introduces HID Global's innovative approach to access management, in which one single ID credential provides fast, convenient access to doors, data, and cloud applications.
Posted: 17 Oct 2014 | Premiered: 17 Oct 2014

Bull

Performance optimized 802.11ac/n Dual-Radio 3x3:3access point with internal antenna option
sponsored by Aerohive Networks
WHITE PAPER: This white paper details a network solution that was able to deliver rock solid connection even in the most high-density environments. Read on to learn more.
Posted: 16 Oct 2014 | Published: 16 Oct 2014

Aerohive Networks

How to Onboard Thousands of Devices only the Day after Software Implementation
sponsored by IBM
WHITE PAPER: This white paper details a mobile device management solution that was able to begin on-boarding devices by up to 200 a minute at peak, with 15,000 users on the first day. Read on to learn more.
Posted: 16 Oct 2014 | Published: 16 Oct 2014

IBM

Mobile Security Best Practices in a Healthcare Setting
sponsored by Insight
EGUIDE: This expert e-guide discusses 5 tips that you must consider when developing a mobile computing or healthcare BYOD strategy. Additionally, learn why device encryption, access control and third-party apps are common ways to manage and secure the smartphones and tablets used in a health care organization.
Posted: 15 Oct 2014 | Published: 15 Oct 2014

Insight

BYOD, Data Leakage, and Regulatory Compliance
sponsored by BitGlass
WHITE PAPER: This white paper discusses how modern technology can enable BYOD policies while satisfying enterprises' security and compliance needs.
Posted: 09 Oct 2014 | Published: 09 Oct 2014


IT and Enterprise Mobility: IT Is Fully Charged and Ready to Roam
sponsored by CA Technologies.
WHITE PAPER: Do you know how your mobility strategy stacks up against other organizations? This report reveals findings from a Vanson Bourne survey on IT and enterprise mobility.
Posted: 09 Oct 2014 | Published: 09 Oct 2014

CA Technologies.

What Can You Do Differently to Guard Against Threats from Rapidly Evolving Mobile Malware?
sponsored by IBM
WHITE PAPER: Mobile security is about more than the device: It's also about protecting apps on the device. Learn how IBM can help.
Posted: 09 Oct 2014 | Published: 31 Jan 2014

IBM

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

Unlock possibilities with IBM MessageSight
sponsored by IBM
WEBCAST: Check out this brief video to learn about a way to connect sensors and mobile devices safely, securely, and conveniently to the cloud. You'll learn about a new full-featured messaging appliance that connects customer apps and front office systems with back office systems, delivering the performance and simplicity needed for the mobile world.
Posted: 08 Oct 2014 | Premiered: Oct 8, 2014

IBM

Addressing HIPAA privacy compliance on hospital wireless networks
sponsored by Absolute Software
EGUIDE: In this expert e-guide, discover how CIOs can cope with strict HIPAA compliance regulations, and access the 7 trends in mobile device security that helps keep health care data safe and secure.
Posted: 07 Oct 2014 | Published: 07 Oct 2014

Absolute Software

oneSpace; A unified Workspace Solution for Hybrid Environments
sponsored by NComputing
VIDEO: Most employees want a tablet system that can combine their personal assets with business applications and files. This video gives you an in-depth look at a unified workspace for your tablet. See how a leading vendor can help to allow your tablet to make it accesible for both personal assets and business applications in a securely fashion.
Posted: 06 Oct 2014 | Premiered: 01 Oct 2014

NComputing

Creating a unified workspace for your tablet
sponsored by NComputing
VIDEO: Tablets are a great tool to allow employees access to business files and applications, without being tied to a physical desktop. Find out how a leading vendor can transform a tablet so users can have seamless tablet access to everything they need including business applications and files, without breaking budget or resources.
Posted: 06 Oct 2014 | Premiered: 01 Oct 2014

NComputing

IBM SmartCloud for Social Business Mobility
sponsored by IBM
WHITE PAPER: This white paper introduces one company's portfolio of online services, including scalable and security-rich email, web conferencing, and social collaboration, that can help to improve employee responsiveness and effectiveness in support of social business.
Posted: 02 Oct 2014 | Published: 30 Sep 2014

IBM

Smartphones Are Security Solutions
sponsored by HID
WHITE PAPER: This white paper highlights the smartphone's potential for enabling a strong authentication strategy.
Posted: 02 Oct 2014 | Published: 17 Aug 2014

HID

Evolving Toward the Next Phase of Email
sponsored by IBM
WHITE PAPER: This white paper explores current email usage in the workplace, as well as corporate email's anticipated future, including a more cohesive user experience with integrated application functionality, social capabilities, and transparent accessibility.
Posted: 01 Oct 2014 | Published: 30 Jun 2014

IBM

Accelerating Mobile Development with PaaS, SaaS and IaaS
sponsored by IBM
EGUIDE: In this e-guide, experts highlight how Platform-as-a-Service (PaaS), Software-as-a-Service (SaaS), and Infrastructure-as-a-Service (IaaS) can jumpstart your mobile app development processes and get your software out the door faster.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

IBM

Mobile Fraud Trends and Impact
sponsored by iovation, Inc.
WHITE PAPER: Device intelligence uncovers hidden layers of risk in mobile transactions from both web browsers and mobile applications. Get his report to learn more about mobile fraud—risks, insights and priorities.
Posted: 26 Sep 2014 | Published: 26 Sep 2014

iovation, Inc.

Fighting Mobile Fraud: Protecting Businesses and Consumers from Cybercrime
sponsored by iovation, Inc.
WHITE PAPER: This white paper highlights the continuous fight against mobile fraud, and introduces a device-based solution that protects businesses from online threats in real-time.
Posted: 26 Sep 2014 | Published: 26 Sep 2014

iovation, Inc.

Making the Move from Legacy AAA Platforms to Policy Management
sponsored by Aruba Networks
WHITE PAPER: This white paper discusses how the use of policy management in a mobile environment provides a simpler, more cost-effective method of ensuring that productivity isn't lost due to denied access.
Posted: 26 Sep 2014 | Published: 30 Jun 2014

Aruba Networks

Dell Higher Education Solutions Guide
sponsored by Dell, Inc. and Intel®
VIDEO: Accessing network data from remote locations anywhere is no longer a luxury, but an expectation.  End-users expect to not only have the same experience from the network in a mobile setting, but also expect a fast and secure connection.
Posted: 19 Sep 2014 | Premiered: 22 Sep 2014

Dell, Inc. and Intel®

Best Approaches to BYOD and Mobile Security
sponsored by Citrix
EGUIDE: This exclusive e-guide offers advice on developing a strong mobile security plan and examines how some modern corporations approach BYOD and security.
Posted: 02 Oct 2014 | Published: 02 Oct 2014

Citrix

Mobility’s Potential for Productivity and Pitfalls
sponsored by CA Technologies.
RESOURCE: In this resource, CA Technologies product marketing leader Arun Bhattacharya discusses the challenges of bringing mobility into the enterprise and how to overcome these obstacles successfully.
Posted: 26 Sep 2014 | Published: 26 Sep 2014

CA Technologies.
1 - 25 of 609 Matches Previous Page    1 2 3 4    Next Page
 
SMART PHONES DEFINITION (continued): …  with unusually high resolution (160 pixels per inch). Unlike most other smartphones, iPhone does not use a hardware keyboard or a stylus. To navigate, a user uses multiple taps and drags to navigate through a mobile version of Apple's OS X operating system. Like iPod, iPhone synchronizes data with a user's personal computer, using iTunes as a client software and Apple's proprietary USB port. iPhone is compatible with Microsoft's Windows operating systems, including Vista. iPhone's networking features include: Automatic detection of WiFi networks.Support for the 802.11b and 802.11g standards. … 
Smart Phones definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement