Search Networking
Login Register
Explore the Network
  • TechTarget Network
  • Unified Communications
  • Mobile Computing
  • Data Center
  • IT Channel
  • Search Networking
    • Cloud & Data Center
    • Infrastructure
    • Management
    • Mobile & Wireless
    • Network Security
    • More Topics
      • Networking Careers & Certifications
      • Strategy & Planning
      • WAN
    Other Content
    • News
    • Features
    • Tips
    • Webinars
    • 2024 IT Salary Survey Results
    • Sponsored Sites
    • More
      • Answers
      • Conference Guides
      • Definitions
      • Opinions
      • Podcasts
      • Quizzes
      • Tech Accelerators
      • Tutorials
      • Videos
  • Follow:

B - Definitions

  • Share this item with your network:
Search Definitions
Most Recent Definitions
  • What is the application layer?
  • What is a self-organizing network (SON) and do you need one?
  • What is an enterprise private network (EPN)?
  • What is telecommunications (telecom)?
  • What is network security? Definition and best practices
Latest TechTarget resources
  • Unified Communications
  • Mobile Computing
  • Data Center
  • IT Channel
Search Unified Communications
  • Navigating 911 compliance in the hybrid workplace

    Companies find it challenging to comply with 911 regulations. Learn how you can minimize risk and ensure your workforce remains ...

  • Test your knowledge of E911 compliance requirements

    Compliance with E911 regulations must be a core part of an organization's phone system strategy. Take this quiz to see how well ...

  • Gen Z communication reshapes UC buying decisions

    The entry of Gen Z into the workplace changes how employees communicate and collaborate. How IT leaders buy and deploy UC tools ...

Search Mobile Computing
  • Best mobile antivirus software for the enterprise

    Antivirus protection is a built-in feature on most desktop computers, but what about mobile devices? Many smartphones need the ...

  • How to prevent and remove mobile spyware

    Mobile devices can store a lot of data, from sensitive user information to work apps and files. Mobile spyware gives bad actors ...

  • What Android security threats should IT know about?

    IT must understand the nature of the most recent Android security issues to protect users. Learn the current top threats and ...

Search Data Center
  • How to use ChatGPT in mainframe modernization

    ChatGPT can help IT admins manage mainframe applications by converting, optimizing and improving code. It can also create ...

  • Experts: Intel government stake won't fix long-term woes

    A deal giving the U.S. federal government a 10% stake in Intel in exchange for funds won't necessarily ensure the company's ...

  • AWS launches virtual servers with custom Intel Xeon 6 chips

    The companies tout a collaboration that will offer better price performance and memory bandwidth for memory-intensive workloads.

Search ITChannel
  • Geography, skills drive IT Services M&A for Presidio, Accenture

    Presidio has acquired transACT Technology Solutions, a digital transformation specialist based in the United Kingdom, while ...

  • Consultants, SIs back AWS agentic AI marketplace launch

    Accenture, Cognizant and Deloitte are among the partners with offerings on AWS' AI Agents and Tools marketplace, which is ...

  • Partners begin to target agentic AI marketplace platforms

    Cloud marketplaces are emerging as key venues for adoption of AI agents. Consultants and integrators aim to offer the technology ...

  • About Us
  • Editorial Ethics Policy
  • Meet The Editors
  • Contact Us
  • Advertisers
  • Partner with Us
  • Media Kit
  • Corporate Site
  • Contributors
  • Reprints
  • Answers
  • Definitions
  • E-Products
  • Events
  • Features
  • Guides
  • Opinions
  • Photo Stories
  • Quizzes
  • Tips
  • Tutorials
  • Videos

©2025 TechTarget, Inc. d/b/a Informa TechTarget. All Rights Reserved.

Privacy Policy
Cookie Preferences
Cookie Preferences
Do Not Sell or Share My Personal Information

Close