Browse Definitions :
919 results for:

ICF constructed homes

home building software (residential construction software)

Definition |

Home building software, also known as residential construction software, is a collection of programs, processes and information that lets residential...

construction scheduling software (construction project management software)

Definition |

Construction scheduling software, also known as construction project management software, is a collection of programs, processes and information used...

construction estimating software

Definition |

Construction estimating software is a collection of programs, processes and information used to calculate the total cost of a construction project.

commercial construction software

Definition |

Commercial construction software is a collection of programs and processes that provides contractors with the information necessary to successfully ...

construction takeoff software

Definition |

Construction takeoff software (sometimes spelled take-off or take off) is a collection of programs, processes and information used to perform a part ...

construction software

Definition |

Construction software is the collection of programs, processes and information used to perform various tasks within the building or assembling of a ...

construction accounting software

Definition |

Construction accounting software is collection of programs, processes and information that serves all the essential job functions of general ...

smart home app (home automation app)

Definition | IoT Agenda

A smart home app, sometimes referred to as a home automation app or a smart home automation app, is an application used to remotely control and ...

home server

Definition | SearchNetworking

A home server is a computer that functions as a server in a client-server home network.

smart home hub (home automation hub)

Definition | IoT Agenda

A smart home hub is hardware or software that connects devices on a home automation network and controls communications among them.




  • cybersecurity

    Cybersecurity is the protection of internet-connected systems, including hardware, software and data, from cyberattacks.

  • asymmetric cryptography (public key cryptography)

    Asymmetric cryptography, also called public key cryptography, uses a pair of numerical keys that are mathematically related to ...

  • digital signature

    A digital signature is a mathematical technique used to validate the authenticity and integrity of a message, software or digital...



  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 


  • hard disk drive (HDD)

    A computer hard disk drive (HDD) is a non-volatile memory hardware device that controls the positioning, reading and writing of ...

  • byte

    In most computer systems, a byte is a unit of data that is eight binary digits long. Bytes are often used to represent a ...

  • network-attached storage (NAS)

    Network-attached storage (NAS) is dedicated file storage that enables multiple users and heterogeneous client devices to retrieve...