Definition Guide

Top 7 mobile computing definitions for the mobile enterprise

These days, most organizations are a mobile enterprise, whether their IT departments want them to be or not.

As end users rely more on tablets, smartphones and even their personal laptops, IT needs to keep up with the latest mobile computing definitions and trends. Devices, operating systems and apps evolve quickly, so IT pros in a mobile enterprise must stay on top of the latest software and strategies for managing, securing and taking advantage of new technologies.

Start with these mobile computing definitions to get a good grasp on the major mobile enterprise trends and how to address them.

    Requires Free Membership to View

Enterprise mobility
With enterprise mobility, end users aren't chained to their desks and PCs anymore. More employees do work outside the office with smartphones and tablets, sharing and accessing data via cloud services. Enterprise mobility can improve employee productivity but also create security risks.

Mobile operating system
A mobile operating system is software that lets devices run apps, connect to cellular and wireless networks, and perform other tasks. Popular mobile OSes include Apple's iOS, Google's Android, Research In Motion's BlackBerry OS and Microsoft's Windows Phone.

Mobile browser
Smartphones and tablets have much smaller screens than desktops and laptops, so they run Web browsers that render websites for optimal viewing. Mobile browsers also utilize lightweight software to address mobile devices' memory and bandwidth limitations. Most browsers display the mobile versions of sites by default but can display regular HTML sites if mobile versions aren't available.

Mobile device fragmentation
When there are different versions of the same mobile operating system in current use, that's known as mobile device fragmentation. Android provides the best example of a fragmented operating system: Wireless carriers control the timing of OS updates to different devices, so there are often delays (deliberate or otherwise) in delivery. Some devices in a mobile enterprise may be on Android 4.1 Jelly Bean, while others may still run Android 2.3 Gingerbread, and there's nothing IT can do to standardize.

Mobile device management
Mobile device management (MDM) software lets IT deliver apps, data and configuration settings to smartphones and tablets. A mobile enterprise typically deploys MDM for security reasons; most commonly, MDM lets IT see what users are doing on their mobile devices, blacklist and whitelist apps and remotely wipe devices in case of loss or theft.

BYOD policy
A bring-your-own-device (BYOD) policy governs how employees may use their personal smartphones, tablets and computers at work -- and the extent to which corporate IT will support these devices. BYOD policies vary widely between organizations, because no two companies will have the same use cases, IT resources and security concerns. A BYOD policy will typically state who can do what with particular apps on certain devices.

Device-agnostic
Apps and websites that work with most operating systems and device types are device-agnostic, but the term also applies to any hardware or software that is compatible across different systems without special adaptations. App development has begun to lean toward device agnosticism to help IT departments avoid unmanageable support demands. When apps work across a broad range of devices, they're better for users and for IT.

This was first published in August 2012

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

Disclaimer: Our Tips Exchange is a forum for you to share technical advice and expertise with your peers and to learn from other enterprise IT professionals. TechTarget provides the infrastructure to facilitate this sharing of information. However, we cannot guarantee the accuracy or validity of the material submitted. You agree that your use of the Ask The Expert services and your reliance on any questions, answers, information or other materials received through this Web site is at your own risk.