Mobile Computing
Login Register
Explore the Network
  • TechTarget Network
  • Networking
  • Unified Communications
  • Security
  • Mobile Computing
    • Mobile Application Strategy
    • Mobile Infrastructure
    • Mobile Management
    • Mobile Security
    • Operating Systems & Devices
    Other Content
    • News
    • Features
    • Tips
    • Webinars
    • 2024 IT Salary Survey Results
    • Sponsored Sites
    • More
      • Answers
      • Conference Guides
      • Definitions
      • Opinions
      • Podcasts
      • Quizzes
      • Tech Accelerators
      • Tutorials
      • Videos
  • Follow:

Photo Stories

  • Top 10 disruptive technology vendors in the enterprise

    Technology evolves so quickly that it’s getting harder and harder for IT to keep up. These disruptive technology vendors lead the charge.

Podcasts

  • iOS 13 analysis with Aaron, Russ, and Jack - BrianMadden.com Podcast #140

View all Podcasts
Latest TechTarget resources
  • Networking
  • Unified Communications
  • Security
Search Networking
  • 14 common network protocols and their functions explained

    Networking makes the internet work, but neither can succeed without protocols. Common network protocols and their functions are ...

  • 5 principles of change management in networking

    Network change management includes five principles, including risk analysis and peer review. These best practices can help ...

  • A guide to Li-Fi technology

    Li-Fi is an emerging wireless technology that uses visible light to transmit data instead of radio frequencies. Though still ...

Search Unified Communications
  • Understanding VoIP multi-codec transcoding

    VoIP relies on codecs that permit the seamless connection between callers and networks. But there are many codecs and multiple ...

  • Pros and cons of a hybrid contact center architecture

    A hybrid cloud architecture can provide modern capabilities to legacy contact centers. Explore the benefits and challenges of ...

  • What do huddle rooms look like in a post-pandemic workplace?

    Huddle room hype has waned, but it helped promote the concept of simplifying video in the workplace. Now, organizations could ...

Search Security
  • New York State fines Geico, Travelers $11.3M over data breaches

    The two insurance giants were fined millions by New York State regulators and are required to enhance security protocols around ...

  • Russian hackers exploit Firefox, Windows zero days in wild

    RomCom threat actors chained two Firefox and Windows zero-day vulnerabilities together in order to execute arbitrary code in ...

  • AWS CISO details automated cybersecurity tools for customers

    Chris Betz, CISO at AWS, discusses how three internal tools are designed to automatically identify and mitigate threats for the ...

  • About Us
  • Editorial Ethics Policy
  • Meet The Editors
  • Contact Us
  • Advertisers
  • Partner with Us
  • Media Kit
  • Corporate Site
  • Contributors
  • Reprints
  • Answers
  • Definitions
  • E-Products
  • Events
  • Features
  • Guides
  • Opinions
  • Photo Stories
  • Quizzes
  • Tips
  • Tutorials
  • Videos

All Rights Reserved, Copyright 2003 - 2024, TechTarget

Privacy Policy
Cookie Preferences
Cookie Preferences
Do Not Sell or Share My Personal Information

Close