Hardware  >   Communications Hardware  >   Voice Communications Hardware  >   Consumer Telephony Equipment  >   Telephones  >   Wireless Telephones  >  

Smart Phones

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: SHD, Smart Handheld Devices, Smart Telephones, Smart Handheld Phones, Smartphones
DEFINITION: iPhone is a smartphone made by Apple that combines an iPod, a tablet PC, a digital camera and a cellular phone. The device includes Internet browsing and networking capabilities. See imageWatch an iPhone demonstration (video).iPhone is extremely thin (only 11.6 millimeters thick) but wider and longer than many comparable devices. The display area is a 3.5-inch wide screen multi-touch interface  … 
Definition continues below.
Smart Phones Reports
26 - 50 of 610 Matches Previous Page  |  Next Page
Mobile Device Management 101: Why Leasing Beats Buying Every Time
sponsored by Sprint
WHITE PAPER: This exclusive white paper takes an in-depth look at one strategy that not only gives employees the best devices for work, but can even save you thousands. Read on to learn more.
Posted: 26 Feb 2015 | Published: 26 Feb 2015

Sprint

BYOD and Beyond: Device Leasing
sponsored by Sprint
WHITE PAPER: This exclusive white paper details a way to minimize up-front costs and keep your employees and your business up-to-date: device leasing. Read on to learn more.
Posted: 26 Feb 2015 | Published: 26 Feb 2015

Sprint

Scalable and Affordable Wi-Fi for Campuses
sponsored by Xirrus
WHITE PAPER: This exclusive white paper details a Wi-Fi solution that was able to deliver a rock-solid connection to the masses, allowing everyone on the network to be more productive. Read on to learn more.
Posted: 25 Feb 2015 | Published: 25 Feb 2015

Xirrus

Is Your Phone System Holding You Back?
sponsored by XO Communications
WHITE PAPER: This exclusive white paper takes an in-depth look at some of the biggest challenges for enterprise communications and phone systems.  Read on to learn more.
Posted: 25 Feb 2015 | Published: 25 Feb 2015

XO Communications

Application Security 101: How to Build an Effective Defense
sponsored by WhiteCryption
WHITE PAPER: This exclusive white paper dives into a solution that can ensure secure app access and keep business moving. Read on to learn more.
Posted: 24 Feb 2015 | Published: 24 Feb 2015

WhiteCryption

Apps to the Future: Predicting Enterprise Mobility in 2015
sponsored by Maas360 by IBM
WEBCAST: This webcast dives into the future of mobile enterprise apps as Fiberlink's own Director of Marketing, Jonathan Dale, is joined by IDC's VP for mobility research, John Jackson for a discussion on enterprise app predictions in 2015, and to share advice for mobile success in 2015. Read on to learn more.
Posted: 24 Feb 2015 | Premiered: Feb 24, 2015

Maas360 by IBM

5 Ways Mobility Will Change Your Contact Center
sponsored by Unify
WHITE PAPER: This exclusive white paper explains how the physical contact center is alive and well, and will be for a long time. It also explains why mobility changed the contact center to be untethered, allowing workers to complete tasks from anywhere around the world. Read on to learn more.
Posted: 17 Feb 2015 | Published: 17 Feb 2015

Unify

Changing Face of Mobility: Raises The Stakes For Endpoint Data Protection
sponsored by CommVault
WHITE PAPER: This white paper highlights some potentially troubling byproducts of that movement. Read on to learn more.
Posted: 16 Feb 2015 | Published: 16 Feb 2015

CommVault

A New Approach to Endpoint Data Protection for Mobile Enterprise
sponsored by Druva Software
WEBCAST: Tune into this webinar to learn about a new approach to endpoint backup that takes cloud infrastructure and mobile enterprise into account.
Posted: 12 Feb 2015 | Premiered: Feb 12, 2015

Druva Software

Best practices to Focus on as Mobile and PC Management Merge
sponsored by Citrix
WHITE PAPER: This e-guide provides tips and tricks to focus on when choosing a vendor to meet your mobility needs – feature breadth, deployment model and support for new operating systems should all be top of mind. Learn what Citrix is doing with mobility today, and how their Worx environment is key to its XenMobile.
Posted: 12 Feb 2015 | Published: 12 Feb 2015

Citrix

Avoid the information governance traps of BYOD management
sponsored by Dell, Inc. and Intel®
WHITE PAPER: In this e-guide, learn the steps you must take to achieve a solid governance and mobile device management strategy to help your organization avoid these information governance traps. Read on to learn more.
Posted: 10 Feb 2015 | Published: 10 Feb 2015

Dell, Inc. and Intel®

BYOD or COPE - Which enterprise mobility strategy is right for you?
sponsored by Dell, Inc. and Intel®
WHITE PAPER: This e-guide highlights comparison points for the two models, including control,privacy, productivity, and more. Learn which model would be the best fit for your organization.
Posted: 09 Feb 2015 | Published: 09 Feb 2015

Dell, Inc. and Intel®

Bluemix Trial download
sponsored by IBM
TRIAL SOFTWARE: Bluemix offers a single solution environment with the instant resources and infrastructure you need to develop and deploy apps across multiple domains – fast.Build apps and add services for 30 days with this free demo. Click now to sign up.
Posted: 06 Feb 2015 | Premiered: 06 Feb 2015

IBM

Move Forward with BYOD Security
sponsored by BitGlass
WHITE PAPER: This exclusive resource explains why mobility and BYOD can be held back by sub-optimal security strategies, and offers one that was able to deliver rock-solid security without affecting end-user privacy. Read on to learn more.
Posted: 04 Feb 2015 | Published: 04 Feb 2015

BitGlass

Simplifying the Management of Macs and Mobile Devices
sponsored by Centrify Corporation
WHITE PAPER: This exclusive whitepaper takes an in-depth look at simplifying the management of Macs and mobile devices. Read on to learn more and take the first step towards improved mobile device management.
Posted: 02 Feb 2015 | Published: 02 Feb 2015

Centrify Corporation

8 Ways to Better Monitor Network Security Threats in the Age of BYOD
sponsored by Hewlett-Packard Company
WHITE PAPER: This helpful white paper takes a look at a number of ways in which security professionals can gain better control of the BYOD explosion and mitigate risk factors before they impact the enterprise.
Posted: 01 Feb 2015 | Published: 14 Jan 2014

Hewlett-Packard Company

Assuring Application Security: Deploying Code that Keeps Data Safe (Slashguide)
sponsored by Hewlett-Packard Company
WHITE PAPER: This SlashGuide discusses the evolution of malware attack surfaces, from endpoint to server to app; what to look for when sourcing or developing code; and which tests you should be performing now to keep malicious code out and enterprise data safe.
Posted: 01 Feb 2015 | Published: 18 Nov 2014

Hewlett-Packard Company

Embracing BYOD with Mobile Device Management
sponsored by IBM
WEBCAST: This exclusive webcast takes an in-depth look at how organizations are embracing BYOD corporate philosophy and how dynamic mobile device management can take your strategy to the next level. View now to learn more.
Posted: 30 Jan 2015 | Premiered: Jan 30, 2015

IBM

Case Study: Implementing Mobile File Management for Secure Remote File Access
sponsored by Acronis
CASE STUDY: Employees want the convenience of working from a mobile device, and employers want to make sure their corporate data is secure. Read on to learn about Bedford Industries, who wanted to incorporate tablets into its business, but wanted to keep important files safe.
Posted: 19 Jan 2015 | Published: 19 Jan 2015

Acronis

Why IT Leaders Should Take Strategic Action in Mobile and Endpoint Computing in 2015
sponsored by Absolute Software
WHITE PAPER: This white paper explains why enterprises should develop a broader-based, long-term endpoint strategy that connects to business goals, processes, and practices.
Posted: 19 Jan 2015 | Published: 25 Apr 2014

Absolute Software

Endpoint Data Protection: A Buyer's Checklist
sponsored by CommVault
WHITE PAPER: This exclusive white paper takes an in-depth look a end point security for enterprise mobility, and why end point data backup is critical for organizations today. Read on to learn more.
Posted: 14 Jan 2015 | Published: 14 Jan 2015

CommVault

Protecting DNS Infrastructure: An Internet Utility That Demands New Security Solutions
sponsored by Cloudmark
WHITE PAPER: This exclusive white paper details key factors about the DNS threat landscape and offers a look at different security risks and types of attacks hackers are using to disrupt the network today. Read on to learn more.
Posted: 13 Jan 2015 | Published: 13 Jan 2015

Cloudmark

The 15 MDM Providers That Matter Most, and How They Stack Up
sponsored by Symantec Corporation
WHITE PAPER: In this white paper, Forrester identifies, evaluates, and compares the 15 foremost MDM providers, detailing how well each vendor fulfills key requirements and where each provider stands in relation to the others.
Posted: 08 Jan 2015 | Published: 30 Sep 2014

Symantec Corporation

How Mobile Security Is Shifting From Device To Data, Apps
sponsored by CommVault
WHITE PAPER: In this e-guide, learn why enterprise mobile security is no longer as simple as protecting an employee's device, and how CommVault is shifting with the industry and providing backup to people other than storage admins. Read on to learn more.
Posted: 08 Jan 2015 | Published: 08 Jan 2015

CommVault

Provide Reliable and Fast Customer Service Over Your Mobile Network
sponsored by Fluke Networks
WHITE PAPER: Check out this white paper to learn how to deliver the right customer experience on your network.
Posted: 31 Dec 2014 | Published: 31 Dec 2014

Fluke Networks
26 - 50 of 610 Matches Previous Page    1 2 3 4 5    Next Page
 
SMART PHONES DEFINITION (continued): …  with unusually high resolution (160 pixels per inch). Unlike most other smartphones, iPhone does not use a hardware keyboard or a stylus. To navigate, a user uses multiple taps and drags to navigate through a mobile version of Apple's OS X operating system. Like iPod, iPhone synchronizes data with a user's personal computer, using iTunes as a client software and Apple's proprietary USB port. iPhone is compatible with Microsoft's Windows operating systems, including Vista. iPhone's networking features include: Automatic detection of WiFi networks.Support for the 802.11b and 802.11g standards. … 
Smart Phones definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement