Browse Definitions:

Browse File Extensions by Alphabet

DPS - DRX

  • DPS - DivX Player 2 Skin
  • DPS - DivX Skin Header
  • DPS - dpsVelocity Split Video ...
  • DPS - DPS Reality Video ...
  • DPS - DataPower script file
  • DPT - Publication file (...
  • DPV - PrintView Raw Text ( ...
  • DPX - Animation file
  • DPX - Kodak Cineon image format
  • DPX - VASCO DIGIPASS File
  • DPX - Animation
  • DPX - Digital Picture Exchange...
  • DPX - Digital Moving Picture ...
  • DPX - Digital Moving Picture ...
  • DPY - PROGNOSIS Display ...
  • DP~ - Bc31 Bin file
  • DQA - Daqarta Extended WAV ...
  • DQB - D-PAS Portfolio Manager ...
  • DQC - CP/M Disk Information ...
  • DQD - itaz Default doQument ...
  • DQY - Excel ODBC Query File ( ...
  • DQY - Excel Query File
  • DR - Sewage Treatment project...
  • DR - Digital Rights file
  • DR - Disaster Recovery file
  • DR - DRM Rights Object
  • DR - Open Digital Rights ...
  • DR - Open Digital Rights ...
  • DR$ - Modem Bitware Fax disk2 ...
  • DR3D - CorelDream 3D
  • DR9 - Directory file
  • DRA - Dragon NaturallySpeaking...
  • DRAG - Mac File Type
  • DRAG - Drag and Drop
  • DRAW - Acorn's object-based ...
  • DRB - Dr. Beam file
  • DRC - Design rules check ...
  • DRD - PL Designer document
  • DRE - DReport exported report ...
  • DREAM - Unknown Apple II File
  • DREAM - Dream Animated Wallpaper...
  • DREAM - DreamScene Dream File ( ...
  • DRES - Diagnosis Results
  • DRF - Nicolet DataViewer ...
  • DRF - Photoline drawing filter...
  • DRF - 3D Studio Max scene file
  • DRF - Dr. Frame file
  • DRF - Photoline Drawing Filter
  • DRF - Hummingbird DOCS Open ...
  • DRG - AllyCAD file
  • DRG - Motion Software Dyno2000...
  • DRG - VLBI and Tied Array ...
  • DRI - Microsoft SQL Server ...
  • DRINDX - Indexer Index of FIles (...
  • DRL - Music Source File
  • DRL - Gerber Drill Rack File
  • DRL - Drazlace IFLI (C64) ...
  • DRL - DocObject Resource ...
  • DRM - MRS-802 Drum Kit Data ( ...
  • DRM - Yamaha Drum Kits ( ...
  • DRM - Cubase Drum File ( ...
  • DRM - Drumlin Secured PDF ...
  • DRM - Zoom MRS-802 drum kit ...
  • DRM - Pro/ ENGINEER file
  • DRM - Cubase Drum map setup ...
  • DRML - Protected Digital ...
  • DRMX - Drumlin Fully Secured ...
  • DRN - Darn for DOS
  • DRO - D- Robots robot Header
  • DRO - D- Robots robot file
  • DRO - DOSBox Raw OPL format
  • DRP - Web3D File - Web3D
  • DRP - DReport report file
  • DRPF - DinkeyRemote Parameter ...
  • DRS - Display Resource file (...
  • DRST - Drive Setup
  • DRT - EPOS Data Recovery Tool ...
  • DRT - egseing direct mode file
  • DRT - Windows Draw Template ( ...
  • DRT - Dispatch Route File
  • DRT - PCB Designer with PSpice...
  • DRT - Adobe Director shockwave...
  • DRT - CADAM export format
  • DRT - DataPilot RingTone (Old ...
  • DRT - DirectRT Styles File ( ...
  • DRU - Wfm384s Demo File
  • DRU - EAGLE design rul
  • DRUG - Masked Extension
  • DRV - Device Driver (Required ...
  • DRV - Driver file
  • DRVF - FaxSTF Driver
  • DRW - Caddie CAD drawing
  • DRW - Lotus Freelance image
  • DRW - Micrografx vector ...
  • DRW - Pro/E drawing
  • DRW2 - Canvas 3.5 Drawing
  • DRW5 - Canvas 5 Drawing
  • DRWDOT - SolidWorks drawing ...
  • DRWG - Mac File Type
  • DRWPRP - SolidWorks drawing ...

-ADS BY GOOGLE

SearchCompliance

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

SearchSecurity

  • computer exploit

    A computer exploit, or exploit, is an attack on a computer system, especially one that takes advantage of a particular ...

  • cyberwarfare

    Cyberwarfare is computer- or network-based conflict involving politically motivated attacks by a nation-state on another ...

  • insider threat

    Insider threat is a generic term for a threat to an organization's security or data that comes from within.

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

  • OpenStack Block Storage (Cinder)

    OpenStack Block Storage (Cinder) is open source software designed to create and manage a service that provides persistent data ...

  • SATA Express (SATAe)

    SATA Express (SATAe or Serial ATA Express) is a bus interface to connect storage devices to a computer motherboard, supporting ...

  • DIMM (dual in-line memory module)

    A DIMM (dual in-line memory module) is the standard memory card used in servers and PCs.

SearchSolidStateStorage

  • 3D XPoint

    3D XPoint is memory storage technology jointly developed by Intel and Micron Technology Inc.

  • RRAM or ReRAM (resistive RAM)

    RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...

  • JEDEC

    JEDEC is a global industry group that develops open standards for microelectronics.

SearchCloudStorage

  • Google Cloud Storage

    Google Cloud Storage is an enterprise public cloud storage platform that can house large unstructured data sets.

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

Close