Browse Definitions:

Browse File Extensions by Alphabet

DST - DTX

  • DST - Embroidery machines ...
  • DST - Distribution file (...
  • DSTF - DropStuff
  • DSTF - Smart Manager ...
  • DSTL - Acrobat Distiller
  • DSTUDIO - DownloadStudio ...
  • DSU - ProWORX Nxt Data Setup (...
  • DSV - DeSmuME Save File
  • DSW - Microsoft Developer ...
  • DSW - Desktop settings (...
  • DSX - Visual Basic Active ...
  • DSY - PC Draft Symbol Library
  • DSY - AJC Directory ...
  • DSY - Besta Video File
  • DSY - Directory Synchronizer ...
  • DSY - Daisy Container File ...
  • DSY - AJC Directory ...
  • DSY - DAISY AdAkta container ...
  • DSYM - ArchiCAD for MAC ...
  • DSZ - Win Help Related File
  • DSZ - Orchida Embroidery ...
  • DSZ - Orchida (OES) Embroidery...
  • DSZ - DynaMaSZ Data / ...
  • DT - DAT backup
  • DT - PowerBASIC file
  • DT - Macintosh File Data Fork
  • DT0 - DTED Level 0 File
  • DT1 - Diablo II tile file
  • DT1 - DTED Level 1 file
  • DT1 - DTED Level 1 ( National ...
  • DT2 - Microsoft Live Messenger...
  • DT2 - DTED Level 2 ( National ...
  • DT2 - DTED - Level 2 File
  • DT5 - Brother 's Keeper File
  • DT_ - Data file fork (...
  • DTA - Data file (EZ-Forms)
  • DTA - World Bank's STARS data
  • DTA - Datafile (Turbo C++)
  • DTAPART - Mozilla Firefox ...
  • DTAUS - Misc
  • DTAZV - Misc
  • DTB - Cybermedia Uninstaller
  • DTB - Database Backup for. ...
  • DTB - After Dark
  • DTB - After Dark file
  • DTB2 - Mac File Type
  • DTC - Windows Applog Journal ...
  • DTC - Applog journal
  • DTC - CADE graphic file
  • DTC - JetBrains dotTrace CPU ...
  • DTC - OutStart ...
  • DTC - DYTEC HEADQUARTER
  • DTD - |SGML Document Type ...
  • DTE - Win Applog file
  • DTEA - Diagnosis Template ...
  • DTED - Digital terrain ...
  • DTERMLICENSE - DTerm License File ( ...
  • DTF - Symantec Q&A relational ...
  • DTF - Database file for ACDSee
  • DTF - Database file (...
  • DTFL - Desktop File
  • DTG - Desktop Guitar Score ( ...
  • DTG - Windows Applog File
  • DTG - Win Applog file
  • DTH - Windows Applog file
  • DTI - Delphi 5 diagram ...
  • DTI - Windows Applog file
  • DTI - Delphi design time ...
  • DTI - FIFA 2001 data comon file
  • DTJ - Win Applog file
  • DTJ - Windows Applog File
  • DTL - Windows Applog File ( ...
  • DTL - Microsoft Windows Applog...
  • DTL - Pro/ ENGINEER (PTC)
  • DTL - Django template language...
  • DTL - Studio 400 TitleDeko ...
  • DTM - Module file (DigiTrakker)
  • DTN - TunnelCAD Import / ...
  • DTO - data - Directory Toolkit...
  • DTO - Team Oracle Data File ( ...
  • DTP - Desktop layout file (...
  • DTP - Template file (...
  • DTP - Text Document (Timeworks...
  • DTPC - LaserWriter Configuration
  • DTQ - Database Tools Query
  • DTR - DTREG Project File ( ...
  • DTR - DATroniC Data Recording ...
  • DTR - DiagTransfer Chess ...
  • DTR - Swisslog Downtime ...
  • DTS - iSite Enterprise Medical...
  • DTS - Digital Surround Audio ...
  • DTS - Audio File Format
  • DTS - Data Transformation ...
  • DTS - Structured Storage File
  • DTS - DTS Encoded Audio File
  • DTSCONFIG - Microsoft SQL Server ...
  • DTSHD - DTS-HD Master Audio File
  • DTSX - Microsoft SQL Server ...
  • DTW - Desktop Wallpaper
  • DTX - LaTeX Source and ...

-ADS BY GOOGLE

SearchCompliance

  • PCAOB (Public Company Accounting Oversight Board)

    The Public Company Accounting Oversight Board (PCAOB) is a Congressionally-established nonprofit that assesses audits of public ...

  • cyborg anthropologist

    A cyborg anthropologist is an individual who studies the interaction between humans and technology, observing how technology can ...

  • RegTech

    RegTech, or regulatory technology, is a term used to describe technology that is used to help streamline the process of ...

SearchSecurity

  • Advanced Encryption Standard (AES)

    The Advanced Encryption Standard, or AES, is a symmetric block cipher used by the U.S. government to protect classified ...

  • identity theft

    Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable ...

  • spear phishing

    Spear phishing is an email-spoofing attack that targets a specific organization or individual, seeking unauthorized access to ...

SearchHealthIT

SearchDisasterRecovery

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

  • mass notification system (MNS)

    A mass notification system is a platform that sends one-way messages to inform employees and the public of an emergency.

  • disaster recovery as a service (DRaaS)

    One approach to a strong disaster recovery plan is DRaaS, where companies offload data replication and restoration ...

SearchStorage

  • CIFS (Common Internet File System)

    CIFS (Common Internet File System) is a protocol that gained popularity around the year 2000, as vendors worked to establish an ...

  • GlusterFS (Gluster File System)

    GlusterFS (Gluster File System) is an open source distributed file system that can scale out in building-block fashion to store ...

  • virtual memory

    Virtual memory is a memory management capability of an OS that allows a computer to compensate for physical memory shortages by ...

SearchSolidStateStorage

  • Tier 0

    Tier 0 (tier zero) is a level of data storage that is faster, and perhaps more expensive, than any other level in the storage ...

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

  • SSD caching

    SSD caching, also known as flash caching, is the temporary storage of data on NAND flash memory chips in a solid-state drive so ...

SearchCloudStorage

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

  • Zadara VPSA and ZIOS

    Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA ...

Close