Browse Definitions:

Browse File Extensions by Alphabet

DST - DTX

  • DST - Embroidery machines ...
  • DST - Distribution file (...
  • DSTF - DropStuff
  • DSTF - Smart Manager ...
  • DSTL - Acrobat Distiller
  • DSTUDIO - DownloadStudio ...
  • DSU - ProWORX Nxt Data Setup (...
  • DSV - DeSmuME Save File
  • DSW - Microsoft Developer ...
  • DSW - Desktop settings (...
  • DSX - Visual Basic Active ...
  • DSY - PC Draft Symbol Library
  • DSY - AJC Directory ...
  • DSY - Besta Video File
  • DSY - Directory Synchronizer ...
  • DSY - Daisy Container File ...
  • DSY - AJC Directory ...
  • DSY - DAISY AdAkta container ...
  • DSYM - ArchiCAD for MAC ...
  • DSZ - Win Help Related File
  • DSZ - Orchida Embroidery ...
  • DSZ - Orchida (OES) Embroidery...
  • DSZ - DynaMaSZ Data / ...
  • DT - DAT backup
  • DT - PowerBASIC file
  • DT - Macintosh File Data Fork
  • DT0 - DTED Level 0 File
  • DT1 - Diablo II tile file
  • DT1 - DTED Level 1 file
  • DT1 - DTED Level 1 ( National ...
  • DT2 - Microsoft Live Messenger...
  • DT2 - DTED Level 2 ( National ...
  • DT2 - DTED - Level 2 File
  • DT5 - Brother 's Keeper File
  • DT_ - Data file fork (...
  • DTA - Data file (EZ-Forms)
  • DTA - World Bank's STARS data
  • DTA - Datafile (Turbo C++)
  • DTAPART - Mozilla Firefox ...
  • DTAUS - Misc
  • DTAZV - Misc
  • DTB - Cybermedia Uninstaller
  • DTB - Database Backup for. ...
  • DTB - After Dark
  • DTB - After Dark file
  • DTB2 - Mac File Type
  • DTC - Windows Applog Journal ...
  • DTC - Applog journal
  • DTC - CADE graphic file
  • DTC - JetBrains dotTrace CPU ...
  • DTC - OutStart ...
  • DTC - DYTEC HEADQUARTER
  • DTD - |SGML Document Type ...
  • DTE - Win Applog file
  • DTEA - Diagnosis Template ...
  • DTED - Digital terrain ...
  • DTERMLICENSE - DTerm License File ( ...
  • DTF - Symantec Q&A relational ...
  • DTF - Database file for ACDSee
  • DTF - Database file (...
  • DTFL - Desktop File
  • DTG - Desktop Guitar Score ( ...
  • DTG - Windows Applog File
  • DTG - Win Applog file
  • DTH - Windows Applog file
  • DTI - Delphi 5 diagram ...
  • DTI - Windows Applog file
  • DTI - Delphi design time ...
  • DTI - FIFA 2001 data comon file
  • DTJ - Win Applog file
  • DTJ - Windows Applog File
  • DTL - Windows Applog File ( ...
  • DTL - Microsoft Windows Applog...
  • DTL - Pro/ ENGINEER (PTC)
  • DTL - Django template language...
  • DTL - Studio 400 TitleDeko ...
  • DTM - Module file (DigiTrakker)
  • DTN - TunnelCAD Import / ...
  • DTO - data - Directory Toolkit...
  • DTO - Team Oracle Data File ( ...
  • DTP - Desktop layout file (...
  • DTP - Template file (...
  • DTP - Text Document (Timeworks...
  • DTPC - LaserWriter Configuration
  • DTQ - Database Tools Query
  • DTR - DTREG Project File ( ...
  • DTR - DATroniC Data Recording ...
  • DTR - DiagTransfer Chess ...
  • DTR - Swisslog Downtime ...
  • DTS - iSite Enterprise Medical...
  • DTS - Digital Surround Audio ...
  • DTS - Audio File Format
  • DTS - Data Transformation ...
  • DTS - Structured Storage File
  • DTS - DTS Encoded Audio File
  • DTSCONFIG - Microsoft SQL Server ...
  • DTSHD - DTS-HD Master Audio File
  • DTSX - Microsoft SQL Server ...
  • DTW - Desktop Wallpaper
  • DTX - LaTeX Source and ...

-ADS BY GOOGLE

SearchCompliance

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • audit program (audit plan)

    An audit program, also called an audit plan, is an action plan that documents what procedures an auditor will follow to validate ...

SearchSecurity

  • insider threat

    Insider threat is a generic term for a threat to an organization's security or data that comes from within.

  • ransomware

    Ransomware is a subset of malware in which the data on a victim's computer is locked, typically by encryption, and payment is ...

  • hacker

    A hacker is an individual who uses computer, networking or other skills to overcome a technical problem.

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

SearchSolidStateStorage

  • 3D XPoint

    3D XPoint is memory storage technology jointly developed by Intel and Micron Technology Inc.

  • RRAM or ReRAM (resistive RAM)

    RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...

  • JEDEC

    JEDEC is a global industry group that develops open standards for microelectronics.

SearchCloudStorage

  • Google Cloud Storage

    Google Cloud Storage is an enterprise public cloud storage platform that can house large unstructured data sets.

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

Close