Hardware  >   Communications Hardware  >   Voice Communications Hardware  >   Consumer Telephony Equipment  >   Telephones  >   Wireless Telephones  >  

Smart Phones

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: SHD, Smart Handheld Devices, Smart Telephones, Smart Handheld Phones, Smartphones
DEFINITION: iPhone is a smartphone made by Apple that combines an iPod, a tablet PC, a digital camera and a cellular phone. The device includes Internet browsing and networking capabilities. See imageWatch an iPhone demonstration (video).iPhone is extremely thin (only 11.6 millimeters thick) but wider and longer than many comparable devices. The display area is a 3.5-inch wide screen multi-touch interface  … 
Definition continues below.
Smart PhonesReports
151 - 175 of 596 Matches Previous Page  | Next Page
Mobility Management Selection Guide
sponsored by SearchSecurity.com
WHITE PAPER: This exclusive paper takes an in-depth look at the criteria you can use to select the optimal enterprise mobility management system that can meet your specific, fast-paced, and consistently changing requirements.
Posted: 22 Jan 2014 | Published: 22 Jan 2014

SearchSecurity.com

IT Priorities 2014: UK Europe, France and Germany
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Benchmark your IT spending plans, with our in-depth study of IT spending priorities in the UK, France, Germany, and Europe in 2014.
Posted: 17 Jan 2014 | Published: 17 Jan 2014

TOPICS:  Application Development | Backup for Virtualized Servers | Backup Server Hardware | Backup Software | Backups | Budgeting | Business Continuity Planning | Business Intelligence | Business Process Automation | Business Process Management | Cloud Archive | Cloud Backup | Cloud Computing | Cloud CRM | Cloud Disaster Recovery | Cloud Management | Cloud Security | Cloud Storage | Cloud Storage Services | Cloud Storage Strategy | Compliance Best Practices | CRM | CRM Software | Data Analytics | Data Center Consolidation | Data Center Networking | Data Centers | Data Deduplication | Data Loss Prevention (DLP) | Database Management Software | Desktop Virtualization | Disaster Recovery | ERP | ERP Software | Ethernet Networks | Green Data Center | Green Storage | Hardware | Hybrid clouds | Identity Management | Infrastructure as a Service (IaaS) | ITIL | Mobile CRM | Mobile Device Management | Mobile Device Management Software | Mobile Middleware | Mobile Payments | Mobile Workers | NAS | NAS Software | Network Appliances | Network Architectures | Network Configuration Management | Network Infrastructure | Network Management | Network Monitoring Software | Network Operating Systems | Network Performance Management Software | Network Processors | Network Provisioning | Network Security | Network Security Appliances | Network Security Hardware | Network Security Software | Networking | Networking Hardware | Office Suites | Outsourcing | Platform as a service | Private Cloud | Public Cloud | Remote Access Hardware | Risk Assessment | Risk Management | Security | Security Architectures | Security Audits | Security Best Practices | Security Event Management | Security Hardware | Security Industry | Security Infrastructure | Security Management | Security Managers | Security Policies | Security Software | Security Spending | Security Standards | Security Systems | Security Threats | Security Tokens | Server Appliances | Server Consolidation | Server Hardware | Server Provisioning | Server Software | Server Virtualization | Smart Phones | Social Computing | Software | Software as a Service | Software Implementation | Software Virtualization | Storage Appliances | Storage Architectures | Storage Consolidation | Storage Devices | Storage for File Virtualization/NAS Virtualization | Storage for Virtualized Servers | Storage Hardware | Storage Management | Storage Management Services | Storage Management Software | Storage Media | Storage Resource Management Software | Storage Security | Storage Spending | Storage Switches | Storage Systems | Storage Virtualization | Storage Virtualization Software | Supply Chain Software | Tablet PC | Tape Backups | Testing | Video Services | Videoconferencing Hardware | Videoconferencing Services | Videoconferencing Software | Virtual Desktop Infrastructure | Virtual Machine | Virtualization Security | Vulnerability Management | WAN | WAN Hardware | WAN Switches | WAN Switching | Windows | Windows 7 | Windows Server Software | Windows XP | WLAN | Workforce Management Software
ComputerWeekly.com

BYOD Predictions for 2014 - Webinar
sponsored by Extreme Networks
WEBCAST: This exclusive webcast takes an in-depth look at the future of mobile computing in the enterprise, discussing predictions by industry experts and examining what your organization can do to prepare for what's ahead.
Posted: 16 Jan 2014 | Premiered: Jan 16, 2014

Extreme Networks

Enterprise Mobility University: Consumerization and the Cloud
sponsored by SearchConsumerization.com
VIRTUAL ENVIRONMENT: Converging consumerization trends affect how organizations maintain control while enabling users.
Posted: 10 Jan 2014 | Premiered: 28 Jan 2014


Top Use Cases for Desktop Virtualization
sponsored by Citrix
WHITE PAPER: Find out what’s really driving businesses to deliver Windows-as-a-Service and empower their workforce get a better look at the true potential of desktop virtualization.
Posted: 09 Jan 2014 | Published: 09 Jan 2014

Citrix

Embracing BYOD through secure app and data delivery EMM
sponsored by Citrix
WHITE PAPER: This exclusive paper discusses an enterprise mobility management (EMM) solution that empowers consumerization and bring your own device (BYOD) programs through secure application and data delivery allowing for a diverse, productive and efficient mobile environment.
Posted: 30 Dec 2013 | Published: 30 Dec 2013

Citrix

The next generation of firewalls for the mobile age
sponsored by Palo Alto Networks
WHITE PAPER: Access this white paper to discover a next-generation firewall that integrates with mobile device management solutions to ensure secure mobile network access from any device that authorized users choose.
Posted: 23 Dec 2013 | Published: 23 Dec 2013

Palo Alto Networks

The Mobile Engagement Market: Top Providers and Offerings
sponsored by Hewlett-Packard Limited
ANALYST REPORT: This report from Forrester Research examines why and how mobility is becoming the foundation for customer engagement and offers key recommendations to help CIOs find mobile engagement success.
Posted: 20 Dec 2013 | Published: 06 Aug 2013

Hewlett-Packard Limited

Blackberry Acquisition, Grim Financials Accelerate Mobile Migrations
sponsored by Fiberlink
EGUIDE: This expert guide examines how organizations are reacting to a once-dominating mobile vendor that has shown a fair amount of financial instability. Read on to learn what signs you should look for that indicate it may be time to migrate.
Posted: 18 Dec 2013 | Published: 18 Dec 2013

Fiberlink

Next-Generation Knowledge Workers Accelerating the Disruption in Business Mobility
sponsored by Cisco Systems, Inc.
WHITE PAPER: This exclusive resource discusses how organizations can push the limits of enterprise mobility in order to drive greater innovation and open new streams of revenue, all while dramatically increasing worker satisfaction and productivity.
Posted: 11 Dec 2013 | Published: 11 Dec 2013

Cisco Systems, Inc.

BYOD Security: How to Remotely Wipe iPhone and Android Devices
sponsored by SearchSecurity.com
EGUIDE: In this expert e-guide, explore the need for remote data wipe on top of mandatory PINs and passwords to ensure optimum data protection in this BYOD age. Click now to get started!
Posted: 09 Dec 2013 | Published: 09 Dec 2013

SearchSecurity.com

Big Data Gets Personal
sponsored by SAP America, Inc.
WHITE PAPER: In this report from the MIT Technology Review, discover 10 must-read articles about the relationship between personal data and big data. Find out how companies are leveraging customer information and the pros and cons of releasing personal data via the Web or otherwise.
Posted: 27 Jan 2014 | Published: 27 Jan 2014

SAP America, Inc.

Top 5 Mobility Security Concerns with Consumerization
sponsored by More Direct
EGUIDE: This expert guide from SearchConsumerization.com examines how your organization can overcome the security problems that consumerization can bring. Read on to learn how to ensure mobile data security and compliance while supplying enough network bandwidth for BYOD.
Posted: 27 Jan 2014 | Published: 27 Jan 2014

More Direct

Secure Mobile Collaboration
sponsored by Cisco Systems, Inc.
WHITE PAPER: Mobility adoption in the enterprise has accelerated. To stay current, you need to know the latest IT trends for secure mobile collaboration. Get an overview of what’s shaping corporate mobility in this Forrester Consulting Technology Adoption Profile.
Posted: 22 Jan 2014 | Published: 22 Jan 2014

Cisco Systems, Inc.

Accelerating the deployment of a secure mobile enterprise
sponsored by IBM
WHITE PAPER: In this insightful white paper, explore key challenges you'll face in ensuring the security of enterprise mobile devices, learn strategies that will help you reduce risk, and discover new ways that you can be more secure in your use of mobile technology.
Posted: 15 Jan 2014 | Published: 31 Oct 2013

IBM

Securing mobile devices in the business environment
sponsored by IBM
WHITE PAPER: As smartphones and other mobile devices gain traction in consumers' personal lives, they're also being introduced into their work environments. In this white paper, learn how to safely introduce personal or corporate-owned mobile devices into the workplace, identify and prevent the risks to corporate data, and ultimately drive more business value.
Posted: 15 Jan 2014 | Published: 31 Oct 2011

IBM

Embracing Opportunities With Smartphone and Tablets While Eliminating Risks
sponsored by SafeNet Asia Ltd
WHITE PAPER: In this white paper, discover a unified platform that simplifies authentication controls for the ever-growing amount of endpoints to reduce the fear of unauthorized access to sensitive data.
Posted: 09 Jan 2014 | Published: 20 Oct 2011

SafeNet Asia Ltd

5 Approaches that will kill your mobility project
sponsored by Citrix
WEBCAST: This crucial webcast takes an in-depth look at five common enterprise mobility mistakes that may not seem that bad, but can end up killing your mobile initiatives.
Posted: 06 Jan 2014 | Premiered: Jan 6, 2014

Citrix

Checklist: 5 Impactful Tips for Securing BYOD in the Enterprise
sponsored by Code42
WHITE PAPER: This comprehensive checklist includes 5 critical things to consider when constructing a mobile security strategy so that your organization can confidently utilize BYOD initiatives without worry of risk.
Posted: 24 Dec 2013 | Published: 24 Dec 2013

Code42

Checklist: A Checklist for BYOD in the Enterprise
sponsored by Code42
WHITE PAPER: This exclusive resource provides a helpful checklist that can establish a guide for determining the BYOD strategy for your organization, from infrastructure considerations to security requirements.
Posted: 23 Dec 2013 | Published: 23 Dec 2013

Code42

Top Five Ways to Cut Corporate-Liable Mobile Costs
sponsored by Dimension Data
WHITE PAPER: In this resource, discover how mobile security really starts from mobile device management. Click now to unveil 5 best practices to reduce complexity in mobile environments so that you can improve vulnerability monitoring capabilities.
Posted: 20 Dec 2013 | Published: 20 Dec 2013

Dimension Data

Burning Dollars: Three Myths of Telecom Savings
sponsored by Dimension Data
WHITE PAPER: In this white paper, explore 3 telecom savings myths debunked, and how organizations must achieve greater visibility in their networks to differentiate perceived and realized value of their mobile investments.
Posted: 20 Dec 2013 | Published: 20 Dec 2013

Dimension Data

Supporting workplace mobility with ERP
sponsored by Sage (UK) Limited
WHITE PAPER: This white paper examines the business impact of mobile enterprise resource planning (ERP) and why mid-size organizations are flocking to this technology. Also inside, uncover key benefits and potential challenges of mobile ERP.
Posted: 20 Dec 2013 | Published: 31 Oct 2013

Sage (UK) Limited

With the MobileIron Platform, Sally Beauty puts a new face on its sales team
sponsored by MobileIron
CASE STUDY: This exclusive case study examines how an international specialty retailer was able to use an enterprise mobility management (EMM) platform in order to better empower their mobile workforce, resulting in increased productivity and efficiency while minimizing costs.
Posted: 17 Dec 2013 | Published: 17 Dec 2013

MobileIron

Getting Ready for BlackBerry Enterprise Service 10.2
sponsored by BlackBerry
WEBCAST: This exclusive video examines how your organization can get your system ready for one of the latest mobile management tools, detailing what steps you can take to ensure that your transition is seamless, simple and pain-free.
Posted: 11 Dec 2013 | Premiered: Dec 11, 2013

BlackBerry
151 - 175 of 596 Matches Previous Page    5 6 7 8 9 10    Next Page
 
SMART PHONES DEFINITION (continued): …  with unusually high resolution (160 pixels per inch). Unlike most other smartphones, iPhone does not use a hardware keyboard or a stylus. To navigate, a user uses multiple taps and drags to navigate through a mobile version of Apple's OS X operating system. Like iPod, iPhone synchronizes data with a user's personal computer, using iTunes as a client software and Apple's proprietary USB port. iPhone is compatible with Microsoft's Windows operating systems, including Vista. iPhone's networking features include: Automatic detection of WiFi networks.Support for the 802.11b and 802.11g standards. … 
Smart Phones definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement