Search Mobile Computing
Login Register
Explore the Network
  • TechTarget Network
  • Networking
  • Unified Communications
  • Security
  • Search Mobile Computing
    • Mobile Application Strategy
    • Mobile Infrastructure
    • Mobile Management
    • Mobile Security
    • Operating Systems & Devices
    Other Content
    • News
    • Features
    • Tips
    • Webinars
    • Sponsored Sites
    • More
      • Answers
      • Conference Guides
      • Definitions
      • Opinions
      • Podcasts
      • Quizzes
      • Tech Accelerators
      • Tutorials
      • Videos
  • Follow:

X - Definitions

  • Share this item with your network:
Search Definitions
Most Recent Definitions
  • What is Microsoft OneDrive and how do you use it?
  • What is mobile threat defense (MTD)?
  • What is iCloud?
  • What is a mobile operating system?
  • What is Samsung Galaxy?
Latest TechTarget resources
  • Networking
  • Unified Communications
  • Security
Search Networking
  • How network modernization creates measurable ROI

    Modern networks improve performance, resiliency, security and flexibility. These gains translate into measurable direct and ...

  • 5 principles of change management in networking

    Network change management includes five principles, including risk analysis and peer review. These best practices can help ...

  • How network efficiency advances ESG goals

    From SDN to green electricity, network optimization plays a critical role in helping enterprises reduce emissions, cut costs and ...

Search Unified Communications
  • From packet loss to productivity: The new era of video KPIs

    AI has reshaped video meetings, and success can no longer be judged by jitter or latency. Explore why IT leaders must adopt new ...

  • Understanding the origins of complexity in enterprise software

    Enterprise software portfolio complexity grows quietly as ERP, HR, CX and UC platforms integrate with AI and legacy systems, ...

  • Enterprise Connect 2026 brings AI from hype to reality

    Enterprise Connect 2026 addresses AI adoption practicalities for UC and CX, including governance policies, AI silos, deepfake ...

Search Security
  • The case for why better breach transparency matters

    It's become a standard practice for organizations to disclose the bare minimum about a data breach, or worse -- not disclose the ...

  • AI agent overload: How to solve the workload identity crisis

    Workloads keep getting more complicated and organizations are struggling to keep up. So what's the play?

  • RSAC 2026 Conference: Key news and industry analysis

    Follow SearchSecurity's RSAC 2025 guide for pre-conference insights and reports on notable presentations and breaking news at the...

  • About Us
  • Editorial Ethics Policy
  • Meet The Editors
  • Contact Us
  • Advertisers
  • Partner with Us
  • Media Kit
  • Corporate Site
  • Contributors
  • Reprints
  • Answers
  • Definitions
  • E-Products
  • Events
  • Features
  • Guides
  • Opinions
  • Photo Stories
  • Quizzes
  • Tips
  • Tutorials
  • Videos

©2025 TechTarget, Inc. d/b/a Informa TechTarget. All Rights Reserved.

Privacy Policy
Cookie Preferences
Cookie Preferences
Do Not Sell or Share My Personal Information

Close