Search Networking
Login Register
Explore the Network
  • TechTarget Network
  • Unified Communications
  • Mobile Computing
  • Data Center
  • IT Channel
  • Search Networking
    • Cloud & Data Center
    • Infrastructure
    • Management
    • Mobile & Wireless
    • Network Security
    • More Topics
      • Networking Careers & Certifications
      • Strategy & Planning
      • WAN
    Other Content
    • News
    • Features
    • Tips
    • Webinars
    • Sponsored Sites
    • More
      • Answers
      • Conference Guides
      • Definitions
      • Opinions
      • Podcasts
      • Quizzes
      • Tech Accelerators
      • Tutorials
      • Videos
  • Follow:

B - Definitions

  • Share this item with your network:
Search Definitions
Most Recent Definitions
  • What is multi-access edge computing? Benefits and use cases
  • What is 5G?
  • What is a small cell in wireless networks?
  • What is 6G? Overview of 6G networks & technology
  • phase-locked loop (PLL)
Latest TechTarget resources
  • Unified Communications
  • Mobile Computing
  • Data Center
  • IT Channel
Search Unified Communications
  • 5 UC and collaboration trends reshaping the market in 2026

    The UC trends driving strategic priorities in 2026 include agentic AI, connected workspaces and security advancements to boost ...

  • 5 key video conferencing trends to watch in 2026

    AI assistants in video conferencing have advanced beyond meeting transcripts and summaries to become key team members. Explore ...

  • AI rewrites ROI for next-generation video conferencing

    As AI drives the advancement of video systems, IT leaders must reevaluate infrastructure needs and develop new ROI frameworks ...

Search Mobile Computing
  • Understanding QR code security issues for enterprise devices

    QR codes have many uses for organizations and their employees, but cybercriminals can take advantage of them, too. IT should keep...

  • Preventing attacks on mobile applications in the enterprise

    As mobile devices gain popularity as enterprise devices, mobile apps become a greater target for hackers. Understand the risks ...

  • Android vs. iPhone: Which one is more secure?

    Apple has built a reputation for strong device security, but reputation alone can't protect corporate data. While iOS and Android...

Search Data Center
  • What is HPE GreenLake and how does it work?

    GreenLake allows users to pay only for the IT resources they use. Discover how it works for HCI, composable infrastructure and ...

  • Data center safety checklist: 10 best practices to follow

    Data center facilities pose various risks to those who operate them. Here are 10 best practices to follow when implementing data ...

  • Space-based data centers: Edge computing in space

    Space-based data centers, which enable edge computing in space, have the potential to revolutionize data management by reducing ...

Search ITChannel
  • Geography, skills drive IT Services M&A for Presidio, Accenture

    Presidio has acquired transACT Technology Solutions, a digital transformation specialist based in the United Kingdom, while ...

  • Consultants, SIs back AWS agentic AI marketplace launch

    Accenture, Cognizant and Deloitte are among the partners with offerings on AWS' AI Agents and Tools marketplace, which is ...

  • Partners begin to target agentic AI marketplace platforms

    Cloud marketplaces are emerging as key venues for adoption of AI agents. Consultants and integrators aim to offer the technology ...

  • About Us
  • Editorial Ethics Policy
  • Meet The Editors
  • Contact Us
  • Advertisers
  • Partner with Us
  • Media Kit
  • Corporate Site
  • Contributors
  • Reprints
  • Answers
  • Definitions
  • E-Products
  • Events
  • Features
  • Guides
  • Opinions
  • Photo Stories
  • Quizzes
  • Tips
  • Tutorials
  • Videos

©2025 TechTarget, Inc. d/b/a Informa TechTarget. All Rights Reserved.

Privacy Policy
Cookie Preferences
Cookie Preferences
Do Not Sell or Share My Personal Information

Close