> Technology > Wireless > Smart Phones

Smart Phones

A smartphone or sphone is any electronic handheld device that integrates the functionality of a mobile phone, personal digital assistant (PDA) or other information appliance. This is often achieved by adding telephone functions to an existing PDA (PDA Phone) or putting "smart" capabilities, such as PDA functions, into a mobile phone. A key feature of a smartphone is that additional native applications can be installed on the device. The applications can be developed by the manufacturer of the handheld device, by the operator or by any other third-party software developer.
Results 151 - 175 of 341Sort Results By: Published Date | Title | Company Name
White Paper Published By: Citrix     Published Date: Oct 15, 2013
Explore ten reasons why virtual desktops should be the foundation of your layered approach to information security.
Tags : 
citrix, byod, secure data, mobile workers, mobile security
    
Citrix
White Paper Published By: Citrix     Published Date: Apr 15, 2013
The ability to take Windows applications and desktops mobile has many advantages, but the variation in mobile device types, including form factor and platform, makes the process of identifying a single solution to address all the employees’ requirements complex. This paper discusses how Citrix can help take Windows mobile on any device.
Tags : 
citrix, windows, mobile device, mobile workers, microsoft
    
Citrix
White Paper Published By: Citrix     Published Date: Aug 15, 2012
Mobility and consumerization are little more than buzzwords without the applications that drive business activities. A successful enterprise mobility strategy places priority on applications first, mapping their mission to the variety of use cases out in the field. This paper describes how you can simplify application mobilization with Citrix.
Tags : 
citrix, xenapp, windows applications, microsoft applications, windows
    
Citrix
Webinar Published By: Citrix Online     Published Date: Feb 24, 2011
Last chance to register: learn how to get your desktop virtualization started at at a special eventonline broadcast.
Tags : 
citrix, live event, virtual desktop, desktop virtualization, mobile device
    
Citrix Online
Webinar Published By: Citrix Online     Published Date: Feb 24, 2011
Last chance to register: learn how to get your desktop virtualization started at at a special eventonline broadcast.
Tags : 
citrix, live event, virtual desktop, desktop virtualization, mobile device
    
Citrix Online
White Paper Published By: Citrix Systems     Published Date: Feb 23, 2011
Citrix solution brief explains the technical functionality of Citrix solutions that enable a successful BYO program.
Tags : 
citrix systems australia, byo program, employee productivity, windows desktop, bring your own computer
    
Citrix Systems
White Paper Published By: Citrix Systems, Inc.     Published Date: Jan 27, 2016
Traveling executives and Millennials alike expect to communicate, collaborate and access their important work applications and data from anywhere on whatever device they choose.
Tags : 
citrix, enterprise, application, enterprise, network security
    
Citrix Systems, Inc.
White Paper Published By: Citrix Systems, Inc.     Published Date: Jan 27, 2016
To help IT regain control over employee file sharing, Citrix offers ShareFile—an enterprise-class, IT-managed, secure file sync and sharing service. ShareFile offers IT the ability to control sensitive corporate data while meeting the mobility and collaboration needs of users. Download white paper and learn more.
Tags : 
citrix, sharefile, enterprise, security, email security
    
Citrix Systems, Inc.
White Paper Published By: Citrix Systems, Inc.     Published Date: Jan 27, 2016
Gartner evaluates nine vendors’ enterprise mobility management (EMM) solutions against 11 critical capabilities in the 2015 Critical Capabilities for Enterprise Mobility Management Suites report.
Tags : 
citrix, gartner, enterprise, mobility, management
    
Citrix Systems, Inc.
White Paper Published By: Citrix Systems, Inc.     Published Date: Jan 27, 2016
To unlock the full potential of enterprise mobility, IT needs to allow people the freedom to access all their apps and data from any device, seamlessly and conveniently. White paper attached
Tags : 
citrix, mobility, security, data, mobile workers
    
Citrix Systems, Inc.
White Paper Published By: Citrix Systems, Inc.     Published Date: Jan 19, 2016
The mobile web doesn’t just exist in your smartphone or tablet’s browser—there’s also an invisible but critical layer at the back end that powers mobile app services from content delivery to networking and collaboration.
Tags : 
citrix, netscaler, security, mobile, applications
    
Citrix Systems, Inc.
White Paper Published By: Cloudant, an IBM Company     Published Date: Nov 13, 2013
Great mobile apps should work well both on- and offline, and require a new way of thinking about data modeling for easy portability across devices — telecom and otherwise. Download now to learn more.
Tags : 
infrastructure, mobile data systems, smart phones, wireless infrastructure, database development
    
Cloudant, an IBM Company
White Paper Published By: Cotendo     Published Date: Nov 18, 2011
Learn about the technology limitations killing the performance of mobile websites and mobile applications, plus how innovations in mobile content delivery networks (CDNs) can transform users' experience of the mobile Web.
Tags : 
mobile cloud, mobile web performance, mobile website performance, mobile application performance, mobile content delivery
    
Cotendo
Webinar Published By: Cotendo     Published Date: Nov 18, 2011
Learn what's slowing down your dynamic mobile websites and mobile apps-and how to fix it. In this on-demand webinar, join Mobile IT leaders discussing best practices and a new case study on how to speed up the mobile end user experience.
Tags : 
mobile web best practices, mobile content delivery, mobile acceleration, mobile web performance, mobile website performance
    
Cotendo
White Paper Published By: Data Guard Systems     Published Date: Aug 21, 2009
Customer Resource Management (CRM) and marketing are essential parts of today's cellular/wireless retail business. Given the ever-increasing competition for every consumer dollar, being able to develop effective and directed marketing programs can define the longevity of a cellular retailer's success.
Tags : 
customer resource management, cell phone, telecom, telecommunications, cellular retailer
    
Data Guard Systems
White Paper Published By: Dell     Published Date: Mar 02, 2012
By now the fundamentals of computer and network security are familiar to almost everyone who interacts with a PC on a regular basis: install antivirus software, choose good passwords and protect them and download and install software updates. Despite these measures, businesses of all sizes continue to suffer security breaches.
Tags : 
dell, mobile data, mobile devices, smartphones, it planning
    
Dell
White Paper Published By: Dell     Published Date: Mar 02, 2012
When you think about all the choices you have in computing devices for your workforce, it's easy to feel overwhelmed. There are so many different form factors, and for each, there are slight variations in shape, size, and physical features.
Tags : 
dell, mobile devices, tablets, mobile phones, workplace sofftware
    
Dell
White Paper Published By: Dell Mobility     Published Date: Oct 12, 2011
Download this report and learn where you need to invest your mobile money.
Tags : 
dell, mobility, solutions, servers, storage
    
Dell Mobility
White Paper Published By: Dell Mobility     Published Date: Oct 12, 2011
Download this report and learn how to build your mobile consumerization strategy
Tags : 
dell, mobility, solutions, servers, storage
    
Dell Mobility
White Paper Published By: Dell Mobility     Published Date: Oct 12, 2011
Download this report and learn which mobile initiatives IT organizations are investing in most aggressively and what's driving those decisions.
Tags : 
dell, mobility, solutions, servers, storage
    
Dell Mobility
White Paper Published By: Dell Mobility     Published Date: Oct 12, 2011
Download this report to find out how technology professionals rate factors like security, integration with existing infrastructure, ease of use, etc.
Tags : 
dell, mobility, solutions, servers, storage
    
Dell Mobility
White Paper Published By: Dextra Technologies     Published Date: Aug 30, 2013
It’s no longer sufficient talk about the importance of mobility for IT-enabled operations. Instead, think about the concept of pervasive mobility, where the current generation of traditional devices like notebooks are augmented, and perhaps eventually replaced, by a new armada of consumer-class devices at the edge of the network. In fact, the bulk of information now being created and stored on corporate networks comes from notebooks, tablets and smartphones.
Tags : 
best practices, pervasive mobility, information technology, mobile, network
    
Dextra Technologies
White Paper Published By: EarthLink Business     Published Date: May 15, 2014
This white paper underscores why it’s critical for SMEs to protect all endpoints – not just mobile devices – in the operating environment. It also explains the challenges of applying stringent security across all endpoints and balancing that with convenience and ease-of-use for employees.
Tags : 
earthlink, smb, small business, medium business, sme
    
EarthLink Business
White Paper Published By: EMC     Published Date: May 28, 2015
For this report, IDC conducted a survey of large enterprises around the globe to explore public, private, and hybrid cloud IT adoption trends.
Tags : 
emc, cloud computing, hybrid cloud, it cloud strategies, infrastructure
    
EMC
White Paper Published By: Entrust Datacard     Published Date: Aug 03, 2011
Whether it's a smartcard for physical and logical access, soft tokens on a mobile device, or a unique grid card for strong authentication to a VPN, organizations can consolidate all authentication processes with a single, proven solution.
Tags : 
digital certificate, digital certificates, pki, pki security, two factor authentication
    
Entrust Datacard
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.