Browse Definitions :
6,525 results for:

Home automation systems

smart home app (home automation app)

Definition | IoT Agenda

A smart home app, sometimes referred to as a home automation app or a smart home automation app, is an application used to remotely control and ...

smart home kit (home automation kit)

Definition | IoT Agenda

A smart home kit, sometimes called a home automation kit or an Internet of Things (IoT) platform, is a product that includes all the hardware and ...

smart home hub (home automation hub)

Definition | IoT Agenda

A smart home hub is hardware or software that connects devices on a home automation network and controls communications among them.

smart home or building (home automation or domotics)

Definition | IoT Agenda

A smart home is a residence that uses internet-connected devices to enable the remote monitoring and management of appliances and systems, such as ...

VHS (Video Home System)

Definition |

VHS (Video Home System) is a widely-adopted videocassette recording (VCR) technology that was developed by Japan Victor Company (JVC) and put on the ...

D-VHS (Digital Video Home System)

Definition |

D-VHS (Digital Video Home System) is a digital enhancement of the Video Home System (VHS) videocassette recording (VCR) technology that was developed...

Automated Best Value System (ABVS)

Definition | SearchITChannel

Automated Best Value System is a calculated formula that assesses past performance based on quality, delivery and packaging performance.

Automated Fingerprint Identification System (AFIS)

Definition | SearchSecurity

The Automated Fingerprint Identification System (AFIS) is a biometric identification (ID) methodology that uses digital imaging technology to obtain,...

home server

Definition | SearchNetworking

A home server is a computer that functions as a server in a client-server home network.


Definition |

JAVA_HOME is an operating system (OS) environment variable which can optionally be set after either the Java Development Kit (JDK) or the Java ...




  • cybersecurity

    Cybersecurity is the protection of internet-connected systems, including hardware, software and data, from cyberattacks.

  • asymmetric cryptography (public key cryptography)

    Asymmetric cryptography, also called public key cryptography, uses a pair of numerical keys that are mathematically related to ...

  • digital signature

    A digital signature is a mathematical technique used to validate the authenticity and integrity of a message, software or digital...



  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 


  • hard disk drive (HDD)

    A computer hard disk drive (HDD) is a non-volatile memory hardware device that controls the positioning, reading and writing of ...

  • byte

    In most computer systems, a byte is a unit of data that is eight binary digits long. Bytes are often used to represent a ...

  • network-attached storage (NAS)

    Network-attached storage (NAS) is dedicated file storage that enables multiple users and heterogeneous client devices to retrieve...