Browse Definitions:

Browse File Extensions by Alphabet

DST - DTX

  • DST - Embroidery machines ...
  • DST - Distribution file (...
  • DSTF - DropStuff
  • DSTF - Smart Manager ...
  • DSTL - Acrobat Distiller
  • DSTUDIO - DownloadStudio ...
  • DSU - ProWORX Nxt Data Setup (...
  • DSV - DeSmuME Save File
  • DSW - Microsoft Developer ...
  • DSW - Desktop settings (...
  • DSX - Visual Basic Active ...
  • DSY - PC Draft Symbol Library
  • DSY - AJC Directory ...
  • DSY - Besta Video File
  • DSY - Directory Synchronizer ...
  • DSY - Daisy Container File ...
  • DSY - AJC Directory ...
  • DSY - DAISY AdAkta container ...
  • DSYM - ArchiCAD for MAC ...
  • DSZ - Win Help Related File
  • DSZ - Orchida Embroidery ...
  • DSZ - Orchida (OES) Embroidery...
  • DSZ - DynaMaSZ Data / ...
  • DT - DAT backup
  • DT - PowerBASIC file
  • DT - Macintosh File Data Fork
  • DT0 - DTED Level 0 File
  • DT1 - Diablo II tile file
  • DT1 - DTED Level 1 file
  • DT1 - DTED Level 1 ( National ...
  • DT2 - Microsoft Live Messenger...
  • DT2 - DTED Level 2 ( National ...
  • DT2 - DTED - Level 2 File
  • DT5 - Brother 's Keeper File
  • DT_ - Data file fork (...
  • DTA - Data file (EZ-Forms)
  • DTA - World Bank's STARS data
  • DTA - Datafile (Turbo C++)
  • DTAPART - Mozilla Firefox ...
  • DTAUS - Misc
  • DTAZV - Misc
  • DTB - Cybermedia Uninstaller
  • DTB - Database Backup for. ...
  • DTB - After Dark
  • DTB - After Dark file
  • DTB2 - Mac File Type
  • DTC - Windows Applog Journal ...
  • DTC - Applog journal
  • DTC - CADE graphic file
  • DTC - JetBrains dotTrace CPU ...
  • DTC - OutStart ...
  • DTC - DYTEC HEADQUARTER
  • DTD - |SGML Document Type ...
  • DTE - Win Applog file
  • DTEA - Diagnosis Template ...
  • DTED - Digital terrain ...
  • DTERMLICENSE - DTerm License File ( ...
  • DTF - Symantec Q&A relational ...
  • DTF - Database file for ACDSee
  • DTF - Database file (...
  • DTFL - Desktop File
  • DTG - Desktop Guitar Score ( ...
  • DTG - Windows Applog File
  • DTG - Win Applog file
  • DTH - Windows Applog file
  • DTI - Delphi 5 diagram ...
  • DTI - Windows Applog file
  • DTI - Delphi design time ...
  • DTI - FIFA 2001 data comon file
  • DTJ - Win Applog file
  • DTJ - Windows Applog File
  • DTL - Windows Applog File ( ...
  • DTL - Microsoft Windows Applog...
  • DTL - Pro/ ENGINEER (PTC)
  • DTL - Django template language...
  • DTL - Studio 400 TitleDeko ...
  • DTM - Module file (DigiTrakker)
  • DTN - TunnelCAD Import / ...
  • DTO - data - Directory Toolkit...
  • DTO - Team Oracle Data File ( ...
  • DTP - Desktop layout file (...
  • DTP - Template file (...
  • DTP - Text Document (Timeworks...
  • DTPC - LaserWriter Configuration
  • DTQ - Database Tools Query
  • DTR - DTREG Project File ( ...
  • DTR - DATroniC Data Recording ...
  • DTR - DiagTransfer Chess ...
  • DTR - Swisslog Downtime ...
  • DTS - iSite Enterprise Medical...
  • DTS - Digital Surround Audio ...
  • DTS - Audio File Format
  • DTS - Data Transformation ...
  • DTS - Structured Storage File
  • DTS - DTS Encoded Audio File
  • DTSCONFIG - Microsoft SQL Server ...
  • DTSHD - DTS-HD Master Audio File
  • DTSX - Microsoft SQL Server ...
  • DTW - Desktop Wallpaper
  • DTX - LaTeX Source and ...

-ADS BY GOOGLE

SearchCompliance

  • cyborg anthropologist

    A cyborg anthropologist is an individual who studies the interaction between humans and technology, observing how technology can ...

  • RegTech

    RegTech, or regulatory technology, is a term used to describe technology that is used to help streamline the process of ...

  • conduct risk

    Conduct risk is the prospect of financial loss to an organization that is caused by the actions of an organization's ...

SearchSecurity

  • application whitelisting

    Application whitelisting is the practice of identifying applications that have been deemed safe for execution and restricting all...

  • security

    Security, in information technology (IT), is the defense of digital information and IT assets against internal and external, ...

  • insider threat

    An insider threat is a malicious hacker (also called a cracker or a black hat) who is an employee or officer of a business, ...

SearchHealthIT

  • HIPAA Privacy Rule

    The Standards for Privacy of Individually Identifiable Health Information, commonly known as the HIPAA Privacy Rule, establishes ...

  • HIPAA business associate agreement (BAA)

    Under the U.S. Health Insurance Portability and Accountability Act of 1996, a HIPAA business associate agreement (BAA) is a ...

  • telemedicine

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

SearchDisasterRecovery

  • data recovery

    Data recovery restores data that has been lost, accidentally deleted, corrupted or made inaccessible. Learn how data recovery ...

  • disaster recovery plan (DRP)

    A company's disaster recovery policy is enhanced with a documented DR plan that formulates strategies, and outlines preparation ...

  • fault-tolerant

    Systems with integrated fault tolerance are designed to withstand multiple hardware failures to ensure continuous availability.

SearchStorage

  • data deduplication

    Deduplication retains one unique data instance to reduce storage and bandwidth consumed by remote backups, replication and ...

  • byte

    In most computer systems, a byte is a unit of data that is eight binary digits long. Bytes are often used to represent a ...

  • Secure Digital card (SD card)

    SD cards use flash memory to provide nonvolatile storage. They are more rugged than traditional storage media and are used in ...

SearchSolidStateStorage

  • flash file system

    Flash file systems are designed specifically for memory devices. A well-designed flash device and flash file system ensure ...

  • IOPS (input/output operations per second)

    IOPS measures the maximum number of reads and writes to non-contiguous storage. It is not an actual benchmark since vendor ...

  • eMMC (embedded MultiMediaCard)

    An embedded MultiMediaCard (eMMC) is a small storage device made up of NAND flash memory and a simple storage controller.

SearchCloudStorage

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

  • Zadara VPSA and ZIOS

    Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA ...

Close