Search Networking
Login Register
Explore the Network
  • TechTarget Network
  • Unified Communications
  • Mobile Computing
  • Data Center
  • IT Channel
  • Search Networking
    • Cloud & Data Center
    • Infrastructure
    • Management
    • Mobile & Wireless
    • Network Security
    • More Topics
      • Networking Careers & Certifications
      • Strategy & Planning
      • WAN
    Other Content
    • News
    • Features
    • Tips
    • Webinars
    • 2024 IT Salary Survey Results
    • Sponsored Sites
    • More
      • Answers
      • Conference Guides
      • Definitions
      • Opinions
      • Podcasts
      • Quizzes
      • Tech Accelerators
      • Tutorials
      • Videos
  • Follow:

H - Definitions

  • Share this item with your network:
Search Definitions
Most Recent Definitions
  • What is an SD-branch?
  • What is attenuation?
  • What is the domain name system (DNS)?
  • What is a coaxial cable?
  • What is a network management system?
Latest TechTarget resources
  • Unified Communications
  • Mobile Computing
  • Data Center
  • IT Channel
Search Unified Communications
  • The insights and benefits of unified communications analytics

    With the help of unified communications analytics, organizations can gain valuable insights into network performance, ...

  • Understand and manage Apple Safari WebRTC

    Apple's implementation of WebRTC is more rigid than competitors Chrome and Firefox. But that's not a bad thing.

  • Webex calling vs. Teams calling: Compare the telephony tools

    Although both products have several similarities, Cisco Webex Calling and Microsoft Teams Phone have key differences around ...

Search Mobile Computing
  • How to detect and fix a jailbroken iPhone

    Jailbroken devices can give rise to security threats for users and organizations alike. Learn how to prevent, detect and remove ...

  • How to choose and set up a mobile VPN for an Android phone

    A tailored approach to network security is crucial when managing smartphones in the enterprise. IT teams should consider Android ...

  • How to choose and set up a mobile VPN for an iPhone

    Many users perform work tasks on their iPhones, relying on mobile VPNs to securely access corporate resources. Learn about VPN ...

Search Data Center
  • AI in the data center: Transforming operations and careers

    AI is transforming data center jobs by enhancing efficiency, security and management. Strategic AI use enables staff to focus on ...

  • Top 12 Linux certifications

    Choosing among Linux certifications can seem daunting, but there are differences to all options that can help you decide which is...

  • Virtualization alternatives and AI: Lessons from HPE Discover

    IT vendors continue to deliver VMware alternatives and expand infrastructure systems they offer to support enterprise AI ...

Search ITChannel
  • Partners begin to target agentic AI marketplace platforms

    Cloud marketplaces are emerging as key venues for adoption of AI agents. Consultants and integrators aim to offer the technology ...

  • MSSP automation amps managed service delivery, opens markets

    MSSPs are updating and broadening their technology stacks, emphasizing automation to break security service price barriers and ...

  • AI plays key role in NWN-InterVision IT services M&A deal

    NWN's acquisition of InterVision will combine generative AI services with contact center, cybersecurity and cloud offerings. It ...

  • About Us
  • Editorial Ethics Policy
  • Meet The Editors
  • Contact Us
  • Advertisers
  • Partner with Us
  • Media Kit
  • Corporate Site
  • Contributors
  • Reprints
  • Answers
  • Definitions
  • E-Products
  • Events
  • Features
  • Guides
  • Opinions
  • Photo Stories
  • Quizzes
  • Tips
  • Tutorials
  • Videos

©2025 TechTarget, Inc. d/b/a Informa TechTarget. All Rights Reserved.

Privacy Policy
Cookie Preferences
Cookie Preferences
Do Not Sell or Share My Personal Information

Close