Hardware  >   Communications Hardware  >   Voice Communications Hardware  >   Consumer Telephony Equipment  >   Telephones  >   Wireless Telephones  >  

Smart Phones

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: SHD, Smart Handheld Devices, Smart Telephones, Smart Handheld Phones, Smartphones
DEFINITION: iPhone is a smartphone made by Apple that combines an iPod, a tablet PC, a digital camera and a cellular phone. The device includes Internet browsing and networking capabilities. See imageWatch an iPhone demonstration (video).iPhone is extremely thin (only 11.6 millimeters thick) but wider and longer than many comparable devices. The display area is a 3.5-inch wide screen multi-touch interface  … 
Definition continues below.
Smart PhonesReports
226 - 250 of 510 Matches Previous Page  | Next Page
Network Evolution February 2013
sponsored by SearchNetworking.com
EZINE: This month's cover story, "BYOD Challenges That Lurk Beyond Network Security", discusses five specific networking challenges associated with BYOD and examines the steps organizations have taken in an attempt to handle these issues.
Posted: 01 Feb 2013 | Published: 01 Feb 2013

SearchNetworking.com

CW Buyer's Guide: Tablets for business
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: In this 11-page buyer's guide, Computer Weekly looks at the use of tablets in business and how the effect of mass adoption of tablets in the enterprise could be far more significant than either the desktop or laptop computer.
Posted: 14 Jan 2013 | Published: 14 Jan 2013

ComputerWeekly.com

Workplace of the Future: DIY IT
sponsored by Hewlett-Packard Limited
WHITE PAPER: Explore the latest surrounding the trend of consumerization and uncover what your IT department can do to empower users while simultaneously protecting the organization.
Posted: 11 Dec 2012 | Published: 11 Dec 2012

Hewlett-Packard Limited

Mobile NFC in Transport
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This in-depth report from the GSMA explains the opportunities for NFC Mobile communications in transport.
Posted: 23 Nov 2012 | Published: 23 Nov 2012

ComputerWeekly.com

Effective Security in a BYOD Environment: Arming Your Organization Against the Unknown
sponsored by Dell Software
WHITE PAPER: Learn how to get ahead of threats and develop a pragmatic strategy to secure data and assets from malware and theft — without impeding the flexibility, agility and efficiency BYOD can deliver for your enterprise.
Posted: 15 Nov 2012 | Published: 15 Nov 2012

Dell Software

BYOD: An Opportunity for IT Evolution
sponsored by Webroot
EGUIDE: This E-Guide from SearchConsumerization.com details what BYOD and the Millennial generation can bring to your enterprise and explores why aligning business needs with the tools and technologies of BYOD can put your company one step ahead of the competition.
Posted: 26 Feb 2013 | Published: 26 Feb 2013

Webroot

Defining and Enforcing a Clear Mobile Device Security Policy
sponsored by BlackBerry
EGUIDE: If you have not set up your mobile device security plan, this E-Guide from searchSecurity.com can help. Read on to discover the importance of a new mobile security strategy, what to consider, how to address BYOD, and more.
Posted: 18 Feb 2013 | Published: 18 Feb 2013

BlackBerry

WLAN Planning For BYOD
sponsored by Enterasys
EGUIDE: This E-Guide from SearchNetworking.com explores the impact BYOD is having on the WLAN and what you need to do to provide a quality experience to your mobile users without compromising security or control.
Posted: 08 Feb 2013 | Published: 08 Feb 2013

Enterasys

Mobile Collaboration: Strategies and Challenges
sponsored by Sprint
EGUIDE: This E-Guide from SearchUnifiedCommunications.com explores the challenges small screens present to mobile collaboration and unveils how UC strategies and vendors are responding to these issues.
Posted: 25 Jan 2013 | Published: 25 Jan 2013

Sprint

Essential Enterprise Mobile Security Controls
sponsored by IBM
EGUIDE: How will you defend your organization from the threats posed by mobile devices? This expert E-Guide will help you understand the tools and controls you should be implementing to maintain security and protect sensitive data.
Posted: 04 Jan 2013 | Published: 04 Jan 2013

IBM

Managing Mobile Application Security in the BYO Device Era
sponsored by Mocana
EGUIDE: Smartphone success can be greatly attributed to mobile applications. Unfortunately, just as mobile app usage increases, so does the prevalence of malware. Is your organization ready to manage mobile app security in a BYOD world? If not, read this expert E-Guide now!
Posted: 04 Jan 2013 | Published: 04 Jan 2013

Mocana

Top 5 Enterprise Mobile Security Issues
sponsored by Mocana
EGUIDE: While mobile malware often takes the spotlight, it isn't the only mobile security concern you should focus on. This E-Guide explores the top 5 enterprise mobility issues you should be prepared to face, as determined by 487 of today's IT security pros and managers. Read now to learn more!
Posted: 04 Jan 2013 | Published: 04 Jan 2013

Mocana

The Tipping Point: Top Unified Communications Issues for 2012
sponsored by CDW Corporation
EGUIDE: This expert E-Guide from SearchUnifiedCommunications.com explores the top five unified communications issues organizations today are facing and how they will affect the transformation and evolution of UC for the better.
Posted: 10 Dec 2012 | Published: 10 Dec 2012

CDW Corporation

Updating Your Corporate BYOD Program for Success
sponsored by Citrix
EGUIDE: This E-Guide from SearchConsumerization.com explores the issues that bring your own device (BYOD) programs solve and key considerations to ensure the success of your BYOD program.
Posted: 07 Dec 2012 | Published: 07 Dec 2012

Citrix

Communication and Collaboration in 2020: Inside UC’s Faster Future
sponsored by CDW Corporation
EGUIDE: In this E-Guide from SearchUnifiedCommunications.com, we take a trip to the year 2020 in an attempt to uncover how unified communications and collaboration will evolve and what it will mean for your organization.
Posted: 07 Dec 2012 | Published: 07 Dec 2012

CDW Corporation

How MSPs Can Drive Success in the Current Market
sponsored by Kaseya
EGUIDE: This E-Guide from MicroScope.co.UK explains why leveraging the proper monitoring tool can make or break your business. In addition, discover why updating your services portfolio to include mobile management can help you drive business profits, gain customers, and increase efficiency.
Posted: 06 Dec 2012 | Published: 06 Dec 2012

Kaseya

The Cost and Benefits of BYOD
sponsored by Kaseya
EGUIDE: Uncover why 80% of organizations today are ill-prepared for the bring your own device (BYOD) phenomenon as you explore the benefits and security risks of this consumer-driven trend.
Posted: 06 Dec 2012 | Published: 06 Dec 2012

Kaseya

E-Guide: New Malware Threats Require New Antimalware Protection Strategy
sponsored by Dell SecureWorks
EGUIDE: This expert e-guide examines emerging threats and malware that are targeting smartphones, mobile apps, social media, and cloud services. Inside, discover essential strategies and best practices for mitigating these risks and ensuring enterprise security.
Posted: 05 Dec 2012 | Published: 05 Dec 2012

Dell SecureWorks

Desktop Administrator's Guide to BYOD - Pros and Cons of BYOD
sponsored by Symantec Corporation
EBOOK: BYOD and BYOPC can reduce costs, increase flexibility, and help keep your users happy. But to maximize the benefits and minimize the risk, it is essential to put the right policies in place. Read this E-Book to uncover the promises and pitfalls of these trends and how you can embrace them in your enterprise.
Posted: 30 Nov 2012 | Published: 30 Nov 2012

Symantec Corporation

Understanding Consumer Device Management and BYOD
sponsored by Symantec Corporation
EGUIDE: This E-Guide from SearchConsumerization.com provides you with the BYOD resources necessary to ensure a successful implementation, creation, and adoption. View now to learn more!
Posted: 28 Nov 2012 | Published: 28 Nov 2012

Symantec Corporation

Securing Data, Not Endpoints: The Best Way to Control Consumerization
sponsored by Symantec Corporation
EGUIDE: Discover why securing the data – rather than the endpoint – is the best way of controlling consumerization in your organization.
Posted: 27 Nov 2012 | Published: 27 Nov 2012

Symantec Corporation

MDM Software: Benefits of Mobile Configuration Management
sponsored by Fiberlink
EGUIDE: This E-Guide from SearchConsumerization.com explores why configuration management is one of the most important functions of a mobile device management (MDM) policy and describes what you should look for when selecting your MDM solution.
Posted: 27 Nov 2012 | Published: 27 Nov 2012

Fiberlink

About to Buy Guide: Mobile Device Management Software
sponsored by Symantec Corporation
EBOOK: Are you in the market for a mobile device management (MDM) software solution? Be sure to read this e-book from SearchConsumerization.com first for help making a more informed purchasing decision.
Posted: 21 Nov 2012 | Published: 30 Mar 2012

Symantec Corporation

Mobile Security Software Keeps Corporate Data Safe
sponsored by Symantec Corporation
EGUIDE: In this E-Guide from SearchConsumerization.com, discover how implementing mobile security software can help protect your corporate data from the inherent risks of the BYOD phenomenon.
Posted: 20 Nov 2012 | Published: 20 Nov 2012

Symantec Corporation

Presentation Transcript: BYOD: The Risks of Allowing Personal Mobile Devices On Corporate Networks and How to Mitigate Them
sponsored by BlueCoat
PRESENTATION TRANSCRIPT: Uncover why MDM and MAM are inefficient at solving the real problem mobile devices present to your network: traffic.
Posted: 20 Nov 2012 | Published: 20 Nov 2012

BlueCoat
226 - 250 of 510 Matches Previous Page    8 9 10 11 12 13    Next Page
 
SMART PHONES DEFINITION (continued): …  with unusually high resolution (160 pixels per inch). Unlike most other smartphones, iPhone does not use a hardware keyboard or a stylus. To navigate, a user uses multiple taps and drags to navigate through a mobile version of Apple's OS X operating system. Like iPod, iPhone synchronizes data with a user's personal computer, using iTunes as a client software and Apple's proprietary USB port. iPhone is compatible with Microsoft's Windows operating systems, including Vista. iPhone's networking features include: Automatic detection of WiFi networks.Support for the 802.11b and 802.11g standards. … 
Smart Phones definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement