Browse Definitions:

Browse File Extensions by Alphabet

DRY - DST

  • DRY - Net2000 Executable
  • DRY - XAIRON Organizer Diary ...
  • DRY - Executable ( Net2000 )
  • DRZ - DReport compressed ...
  • DRZ - Draz Paint image format
  • DRZ - Draz Paint
  • DS - Chemistry software file
  • DS - Desktop Korn Shell file
  • DS - DMDScript File ( Digital...
  • DS - Dynamics Solver Problem ...
  • DS - Dialog Studio file
  • DS - TWAIN Data Source (DLL)
  • DS - SQL Server Data Source (...
  • DS - PhotoMax Drive
  • DS - Furcadia DragonSpeak ...
  • DS - HP OfficeJet T series ...
  • DS - TWAIN Data Source
  • DS - Chemisty Software
  • DS1 - Map file - Diablo II
  • DS2 - Olympus DSS Pro format
  • DS2RES - Dungeon Siege 2 Data ( ...
  • DS4 - Vector Graphics (...
  • DS4 - Micrografx Designer Image
  • DS_ - Compr. Scanner us driver...
  • DS_STORE - Mac OS X file describing...
  • DS_STORE - Mac OS X Folder Settings...
  • DS_STORE - Macintosh OS X Folder ...
  • DSA - DasyTec DASYLab File ...
  • DSA - PKCS7 signature DSA
  • DSASAVE - Dungeon Siege File ( ...
  • DSB - DasyTec DASYLab File
  • DSB - Orchida Embroidery File
  • DSB - Embroidery File
  • DSB - Tajima embroidery file
  • DSB - DiscSafe Backup ( ...
  • DSB - Orchida Embroidery ...
  • DSB - Rayman2 play
  • DSC - Discard file (Oracle)
  • DSCE - Diagnosis Scenario
  • DSCMD - Desktop Sidebar Command ...
  • DSD - Database file (...
  • DSDF - Smart Manager ...
  • DSDICT - DS Dictionary Dictionary...
  • DSDLL - Dungeon Siege Resource ...
  • DSE - WhatsUp Gold Virtual ...
  • DSE - WhatsUp Gold Virtual ...
  • DSES - Diagnosis Session
  • DSF - Micrografx Designer v7.x...
  • DSG - DooM saved game
  • DSH - Dashboard PDA Wallpaper
  • DSI - R- Studio Hard Disk Scan...
  • DSI - DESI Labeling System ...
  • DSI - Digital Sound Module ...
  • DSI - DAZ Studio Layered Image...
  • DSJ - Director 5 Resources ...
  • DSK - Driver file (Novell ...
  • DSK - Project Desktop file (...
  • DSKIN - DockX Skin
  • DSKP - Desktop Patterns
  • DSL - DSSSL Style Sheet
  • DSL - Critical Seeker game file
  • DSL - CriticalSeeker Picture ...
  • DSL - Lingvo User Feature ...
  • DSL - Product Compass Suite ...
  • DSL - Lingvo User Feature ...
  • DSLSETUP - Domain Specific Language...
  • DSM - Digital Sound Module (...
  • DSM - Dynamic Studio music ...
  • DSM - Music module file (DSIK)
  • DSMAP - Dungeon Siege File ( ...
  • DSMR - Mac File Type
  • DSN - Design (Object System ...
  • DSN - Schematic file (Orcad ...
  • DSN - ODBC Data source
  • DSN6 - Ribbons FRODO Map
  • DSO - Tribes 2 file
  • DSO - DataFlex Data _Set
  • DSO - MS Visc 6 Dev studio ...
  • DSP - Display parameters (...
  • DSP - Graphics Display driver ...
  • DSP - Microsoft Developer ...
  • DSPACKAGE - Desktop Sidebar ...
  • DSPACKAGE - Desktop Sidebar Skin / ...
  • DSPARTY - Dungeon Siege File ( ...
  • DSPLUGIN - Desktop Sidebar Plug -in...
  • DSQ - Corel QUERY
  • DSQSAVE - Dungeon Siege File ( ...
  • DSR - Visual Basic Active ...
  • DSR - Driver Resource (...
  • DSRES - Dungeon Siege Resource ...
  • DSS - Screensaver file (DCC)
  • DSS - Digital Sound file (...
  • DSSAVE - Dungeon Siege Saved Game...
  • DSSL - DSSL SGML Style Sheet
  • DSSL - DSSL style sheet SGML ( ...
  • DSSLIDESHOW - Desktop Sidebar ...

-ADS BY GOOGLE

SearchCompliance

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • audit program (audit plan)

    An audit program, also called an audit plan, is an action plan that documents what procedures an auditor will follow to validate ...

SearchSecurity

  • insider threat

    Insider threat is a generic term for a threat to an organization's security or data that comes from within.

  • ransomware

    Ransomware is a subset of malware in which the data on a victim's computer is locked, typically by encryption, and payment is ...

  • hacker

    A hacker is an individual who uses computer, networking or other skills to overcome a technical problem.

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

SearchSolidStateStorage

  • 3D XPoint

    3D XPoint is memory storage technology jointly developed by Intel and Micron Technology Inc.

  • RRAM or ReRAM (resistive RAM)

    RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...

  • JEDEC

    JEDEC is a global industry group that develops open standards for microelectronics.

SearchCloudStorage

  • Google Cloud Storage

    Google Cloud Storage is an enterprise public cloud storage platform that can house large unstructured data sets.

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

Close