Search Networking
Login Register
Explore the Network
  • TechTarget Network
  • Unified Communications
  • Mobile Computing
  • Data Center
  • IT Channel
  • Search Networking
    • Cloud & Data Center
    • Infrastructure
    • Management
    • Mobile & Wireless
    • Network Security
    • More Topics
      • Networking Careers & Certifications
      • Strategy & Planning
      • WAN
    Other Content
    • News
    • Features
    • Tips
    • Webinars
    • Sponsored Sites
    • More
      • Answers
      • Conference Guides
      • Definitions
      • Opinions
      • Podcasts
      • Quizzes
      • Tech Accelerators
      • Tutorials
      • Videos
  • Follow:

H - Definitions

  • Share this item with your network:
Search Definitions
Most Recent Definitions
  • What is multi-access edge computing? Benefits and use cases
  • What is 5G?
  • What is a small cell in wireless networks?
  • What is 6G? Overview of 6G networks & technology
  • phase-locked loop (PLL)
Latest TechTarget resources
  • Unified Communications
  • Mobile Computing
  • Data Center
  • IT Channel
Search Unified Communications
  • 5 UC and collaboration trends reshaping the market in 2026

    The UC trends driving strategic priorities in 2026 include agentic AI, connected workspaces and security advancements to boost ...

  • 5 key video conferencing trends to watch in 2026

    AI assistants in video conferencing have advanced beyond meeting transcripts and summaries to become key team members. Explore ...

  • AI rewrites ROI for next-generation video conferencing

    As AI drives the advancement of video systems, IT leaders must reevaluate infrastructure needs and develop new ROI frameworks ...

Search Mobile Computing
  • Understanding QR code security issues for enterprise devices

    QR codes have many uses for organizations and their employees, but cybercriminals can take advantage of them, too. IT should keep...

  • Preventing attacks on mobile applications in the enterprise

    As mobile devices gain popularity as enterprise devices, mobile apps become a greater target for hackers. Understand the risks ...

  • Android vs. iPhone: Which one is more secure?

    Apple has built a reputation for strong device security, but reputation alone can't protect corporate data. While iOS and Android...

Search Data Center
  • Data center safety checklist: 10 best practices to follow

    Data center facilities pose various risks to those who operate them. Here are 10 best practices to follow when implementing data ...

  • Space-based data centers: Edge computing in space

    Space-based data centers, which enable edge computing in space, have the potential to revolutionize data management by reducing ...

  • Enhance operations with decentralized data centers

    Decentralized data centers enhance scalability, reduce latency and improve data compliance, offering a strategic shift for ...

Search ITChannel
  • Geography, skills drive IT Services M&A for Presidio, Accenture

    Presidio has acquired transACT Technology Solutions, a digital transformation specialist based in the United Kingdom, while ...

  • Consultants, SIs back AWS agentic AI marketplace launch

    Accenture, Cognizant and Deloitte are among the partners with offerings on AWS' AI Agents and Tools marketplace, which is ...

  • Partners begin to target agentic AI marketplace platforms

    Cloud marketplaces are emerging as key venues for adoption of AI agents. Consultants and integrators aim to offer the technology ...

  • About Us
  • Editorial Ethics Policy
  • Meet The Editors
  • Contact Us
  • Advertisers
  • Partner with Us
  • Media Kit
  • Corporate Site
  • Contributors
  • Reprints
  • Answers
  • Definitions
  • E-Products
  • Events
  • Features
  • Guides
  • Opinions
  • Photo Stories
  • Quizzes
  • Tips
  • Tutorials
  • Videos

©2025 TechTarget, Inc. d/b/a Informa TechTarget. All Rights Reserved.

Privacy Policy
Cookie Preferences
Cookie Preferences
Do Not Sell or Share My Personal Information

Close