Hardware  >   Communications Hardware  >   Voice Communications Hardware  >   Consumer Telephony Equipment  >   Telephones  >   Wireless Telephones  >  

Smart Phones

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: SHD, Smart Handheld Devices, Smart Telephones, Smart Handheld Phones, Smartphones
DEFINITION: iPhone is a smartphone made by Apple that combines an iPod, a tablet PC, a digital camera and a cellular phone. The device includes Internet browsing and networking capabilities. See imageWatch an iPhone demonstration (video).iPhone is extremely thin (only 11.6 millimeters thick) but wider and longer than many comparable devices. The display area is a 3.5-inch wide screen multi-touch interface  … 
Definition continues below.
Smart PhonesReports
226 - 250 of 519 Matches Previous Page  | Next Page
Mobile Device Management Systems Help Mitigate BYOD Risks
sponsored by Citrix Systems, Inc.
EGUIDE: This whitepaper will help you learn how mobile device management (MDM) can be used to mitigate the risks associated with mobility and BYOD. Learn more about multi-platform MDM, lifecycle management, enforcing compliance, and other topics.
Posted: 12 Mar 2013 | Published: 12 Mar 2013

Citrix Systems, Inc.

Mobile Device Management Technical Guide
sponsored by SearchSecurity.com
EZINE: In this TechGuide from SearchSecurity.com, industry expert Lisa Phifer shares her vast knowledge on BYOD, MDM, data security, and more to help you get a handle on top mobile trends rocking the enterprise.
Posted: 06 Mar 2013 | Published: 06 Mar 2013

SearchSecurity.com

Choosing an MDM System: Fundamental Features for Success
sponsored by Webroot
EGUIDE: There's a huge number of mobile device management (MDM) functions that exist today. Read this expert E-Guide to get a condensed list of the major MDM system features that most organizations require.
Posted: 28 Feb 2013 | Published: 28 Feb 2013

Webroot

CW Buyer's Guide: Tablets for business
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: In this 11-page buyer's guide, Computer Weekly looks at the use of tablets in business and how the effect of mass adoption of tablets in the enterprise could be far more significant than either the desktop or laptop computer.
Posted: 14 Jan 2013 | Published: 14 Jan 2013

ComputerWeekly.com

Managing Mobile Application Security in the BYO Device Era
sponsored by Mocana
EGUIDE: Smartphone success can be greatly attributed to mobile applications. Unfortunately, just as mobile app usage increases, so does the prevalence of malware. Is your organization ready to manage mobile app security in a BYOD world? If not, read this expert E-Guide now!
Posted: 04 Jan 2013 | Published: 04 Jan 2013

Mocana

Workplace of the Future: DIY IT
sponsored by Hewlett-Packard Limited
WHITE PAPER: Explore the latest surrounding the trend of consumerization and uncover what your IT department can do to empower users while simultaneously protecting the organization.
Posted: 11 Dec 2012 | Published: 11 Dec 2012

Hewlett-Packard Limited

Mobile EndPoint Security and Management - Best Practices
sponsored by Dell, Inc.
EGUIDE: Learn more about today's mobility concerns and how to address them in this mobile security and management E-Guide. Read on and discover more about issues to address, tools to use and steps to take.
Posted: 08 Mar 2013 | Published: 08 Mar 2013

Dell, Inc.

Weighing the Options for an Enterprise Mobility Strategy
sponsored by Dimension Data
EGUIDE: In this E-Guide from SearchConsumerization.com, uncover the importance of an enterprise mobility strategy and learn more about the pros and cons of the top three options today: Mobile device management, mobile application management, and mobile information management.
Posted: 06 Mar 2013 | Published: 06 Mar 2013

Dimension Data

Getting a Grasp on ALM Requirements
sponsored by SearchSoftwareQuality.com
EBOOK: This three-part guide offers expert advice to help you get a handle on application lifecycle management (ALM) requirements. Uncover the new challenges introduced by increasingly dispersed teams and mobile apps, and learn how you can drive requirements management success by reading on now.
Posted: 04 Mar 2013 | Published: 04 Mar 2013

SearchSoftwareQuality.com

BYOD Platform Support: Why an iOS/Android Strategy Makes Sense
sponsored by Symantec Corporation
EGUIDE: BYOD is running rampant. Do you have a strategy in place to mitigate the risks? This E-Guide from SearchSecurity.com explores why creating an iOS and Android only strategy makes sense and reduces the chance for errors, complexity, and costs.
Posted: 28 Feb 2013 | Published: 28 Feb 2013

Symantec Corporation

BYOD Advantages: Save Money, Mobilize Workers, Embrace the Cloud
sponsored by Webroot
EGUIDE: This E-Guide from SearchConsumerization.com explores how – with the proper security and management strategies – BYOD can be a win-win for both your employees and your organization. View now to learn more!
Posted: 26 Feb 2013 | Published: 26 Feb 2013

Webroot

BYOD: An Opportunity for IT Evolution
sponsored by Webroot
EGUIDE: This E-Guide from SearchConsumerization.com details what BYOD and the Millennial generation can bring to your enterprise and explores why aligning business needs with the tools and technologies of BYOD can put your company one step ahead of the competition.
Posted: 26 Feb 2013 | Published: 26 Feb 2013

Webroot

Defining and Enforcing a Clear Mobile Device Security Policy
sponsored by BlackBerry
EGUIDE: If you have not set up your mobile device security plan, this E-Guide from searchSecurity.com can help. Read on to discover the importance of a new mobile security strategy, what to consider, how to address BYOD, and more.
Posted: 18 Feb 2013 | Published: 18 Feb 2013

BlackBerry

WLAN Planning For BYOD
sponsored by Enterasys
EGUIDE: This E-Guide from SearchNetworking.com explores the impact BYOD is having on the WLAN and what you need to do to provide a quality experience to your mobile users without compromising security or control.
Posted: 08 Feb 2013 | Published: 08 Feb 2013

Enterasys

Network Evolution February 2013
sponsored by SearchNetworking.com
EZINE: This month's cover story, "BYOD Challenges That Lurk Beyond Network Security", discusses five specific networking challenges associated with BYOD and examines the steps organizations have taken in an attempt to handle these issues.
Posted: 01 Feb 2013 | Published: 01 Feb 2013

SearchNetworking.com

Mobile Collaboration: Strategies and Challenges
sponsored by Sprint
EGUIDE: This E-Guide from SearchUnifiedCommunications.com explores the challenges small screens present to mobile collaboration and unveils how UC strategies and vendors are responding to these issues.
Posted: 25 Jan 2013 | Published: 25 Jan 2013

Sprint

Essential Enterprise Mobile Security Controls
sponsored by IBM
EGUIDE: How will you defend your organization from the threats posed by mobile devices? This expert E-Guide will help you understand the tools and controls you should be implementing to maintain security and protect sensitive data.
Posted: 04 Jan 2013 | Published: 04 Jan 2013

IBM

Top 5 Enterprise Mobile Security Issues
sponsored by Mocana
EGUIDE: While mobile malware often takes the spotlight, it isn't the only mobile security concern you should focus on. This E-Guide explores the top 5 enterprise mobility issues you should be prepared to face, as determined by 487 of today's IT security pros and managers. Read now to learn more!
Posted: 04 Jan 2013 | Published: 04 Jan 2013

Mocana

The Tipping Point: Top Unified Communications Issues for 2012
sponsored by CDW Corporation
EGUIDE: This expert E-Guide from SearchUnifiedCommunications.com explores the top five unified communications issues organizations today are facing and how they will affect the transformation and evolution of UC for the better.
Posted: 10 Dec 2012 | Published: 10 Dec 2012

CDW Corporation

Updating Your Corporate BYOD Program for Success
sponsored by Citrix
EGUIDE: This E-Guide from SearchConsumerization.com explores the issues that bring your own device (BYOD) programs solve and key considerations to ensure the success of your BYOD program.
Posted: 07 Dec 2012 | Published: 07 Dec 2012

Citrix

Communication and Collaboration in 2020: Inside UC’s Faster Future
sponsored by CDW Corporation
EGUIDE: In this E-Guide from SearchUnifiedCommunications.com, we take a trip to the year 2020 in an attempt to uncover how unified communications and collaboration will evolve and what it will mean for your organization.
Posted: 07 Dec 2012 | Published: 07 Dec 2012

CDW Corporation

How MSPs Can Drive Success in the Current Market
sponsored by Kaseya
EGUIDE: This E-Guide from MicroScope.co.UK explains why leveraging the proper monitoring tool can make or break your business. In addition, discover why updating your services portfolio to include mobile management can help you drive business profits, gain customers, and increase efficiency.
Posted: 06 Dec 2012 | Published: 06 Dec 2012

Kaseya

The Cost and Benefits of BYOD
sponsored by Kaseya
EGUIDE: Uncover why 80% of organizations today are ill-prepared for the bring your own device (BYOD) phenomenon as you explore the benefits and security risks of this consumer-driven trend.
Posted: 06 Dec 2012 | Published: 06 Dec 2012

Kaseya

E-Guide: New Malware Threats Require New Antimalware Protection Strategy
sponsored by Dell SecureWorks
EGUIDE: This expert e-guide examines emerging threats and malware that are targeting smartphones, mobile apps, social media, and cloud services. Inside, discover essential strategies and best practices for mitigating these risks and ensuring enterprise security.
Posted: 05 Dec 2012 | Published: 05 Dec 2012

Dell SecureWorks

Desktop Administrator's Guide to BYOD - Pros and Cons of BYOD
sponsored by Symantec Corporation
EBOOK: BYOD and BYOPC can reduce costs, increase flexibility, and help keep your users happy. But to maximize the benefits and minimize the risk, it is essential to put the right policies in place. Read this E-Book to uncover the promises and pitfalls of these trends and how you can embrace them in your enterprise.
Posted: 30 Nov 2012 | Published: 30 Nov 2012

Symantec Corporation
226 - 250 of 519 Matches Previous Page    8 9 10 11 12 13    Next Page
 
SMART PHONES DEFINITION (continued): …  with unusually high resolution (160 pixels per inch). Unlike most other smartphones, iPhone does not use a hardware keyboard or a stylus. To navigate, a user uses multiple taps and drags to navigate through a mobile version of Apple's OS X operating system. Like iPod, iPhone synchronizes data with a user's personal computer, using iTunes as a client software and Apple's proprietary USB port. iPhone is compatible with Microsoft's Windows operating systems, including Vista. iPhone's networking features include: Automatic detection of WiFi networks.Support for the 802.11b and 802.11g standards. … 
Smart Phones definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement