Mobile operating system

Results: 918



#Item
711Science / Librarian / Library 2.0 / Library / Public library / Participatory culture / Mobile operating system / Web 2.0 / Mobile phone / Library science / Technology / Mobile technology

Serving the User When and Where They Are: Hyperlinked Libraries Michael Stephens, Assistant Professor, SJSU SLIS Note: This is a draft of a chapter for the upcoming book An Introduction to Today’s Information Services

Add to Reading List

Source URL: tametheweb.com

Language: English - Date: 2014-07-18 11:11:54
712Computer architecture / Windows XP / Windows Server / Windows CE / Windows Mobile / Windows Vista / Operating system / Windows / Microsoft Reader / Microsoft Windows / Windows NT / Software

Updated May 5, 2014 OS and PC Requirements: Licenses or Client Workstations The following is a guide. Actual requirements will depend upon your specific application architecture. Minimum Requirements Servers or Workstat

Add to Reading List

Source URL: www.trihedral.com

Language: English - Date: 2014-05-05 09:08:46
713Mobile technology / E-learning / Mobile operating system / Educational technology / MLearning / Mobile Computer Supported Collaborative Learning / Education / Distance education / Technology

CIOReview EDUCATION TECHNOLOGY SPECIAL CXO INSIGHT Technological Trends Impacting

Add to Reading List

Source URL: www.corp.att.com

Language: English - Date: 2014-01-02 16:07:23
714Mobile technology / Computer security / Data security / Smartphone / Mobile banking / Two-factor authentication / Mobile operating system / Mobile phone / Personal digital assistant / Technology / Information appliances / Electronic commerce

Cyber Specs Showcasing cybersecurity innovations January 2011 Smartphones: Benefits and Security

Add to Reading List

Source URL: www.itic.org

Language: English - Date: 2012-06-28 07:55:04
715Electronics / Wi-Fi / Hotspot / MiFi / Mobile operating system / Wireless security / Smartphone / Personal digital assistant / Internet / Technology / Information appliances / Computing

The following are major trends within information security and some of their implications for state government

Add to Reading List

Source URL: www.oregon.gov

Language: English - Date: 2012-02-28 20:43:16
716Android devices / Classes of computers / IPad / Android / Samsung Galaxy Tab / Amazon Kindle / Mobile operating system / Archos / Kindle Fire / Software / Computing / Tablet computers

Tablets for Kids Which deliver the most bang for the buck? By WARREN BUCKLEITNER The Chicago O’Hare TSA agent was curious, eying the stack of colorful tablets I was trying to hurry through airport screening. I

Add to Reading List

Source URL: childrenstech.com

Language: English - Date: 2013-01-17 15:13:13
717Software / Mobile apps / Mobile operating system / IPhone / Mobile ticketing / Mobile business intelligence / Smartphones / Technology / Computing

Washington Goes Mobile Tax Rate Lookup App Simplifying how businesses collect and track sales tax Washington Goes Mobile

Add to Reading List

Source URL: www.taxadmin.org

Language: English - Date: 2013-06-08 11:06:58
718Trusted Computing Group / Trusted Execution Technology / Ring / Firmware / Booting / Operating system / BitLocker Drive Encryption / Disk encryption / Computer security / Trusted computing / Trusted Platform Module

Trusted Mobile Devices: Requirements for a Mobile Trusted Platform Module Kathleen N. McGill n recent years, mobile devices have replaced desktop PCs as the computing platform of choice for many users. Unfortunately, mos

Add to Reading List

Source URL: www.jhuapl.edu

Language: English - Date: 2013-09-26 17:27:04
719Smartphones / IPhone / ITunes / App Store / IPad / BlackBerry App World / Android Market / Mobile apps / Mobile operating system / Software / Apple Inc. / Computing

Download Conference App We are excited to announce our partnership with Grupio to provide you a unique mobile experience at the NASC Annual Conference. Download the mobile app and access information about our event from

Add to Reading List

Source URL: thenasc.org

Language: English - Date: 2014-08-05 08:53:49
720Computer security / Malware / Rootkit / Hypervisor / Loadable kernel module / Linux kernel / Operating system / Keystroke logging / Ring / System software / Software / Computer architecture

Security versus Energy Tradeoffs in Host-Based Mobile Malware Detection Jeffrey Bickford H. Andrés Lagar-Cavilla

Add to Reading List

Source URL: lagarcavilla.org

Language: English - Date: 2011-04-29 10:04:42
UPDATE