Browse Definitions:

Browse File Extensions by Alphabet

DST - DTX

  • DST - Embroidery machines ...
  • DST - Distribution file (...
  • DSTF - DropStuff
  • DSTF - Smart Manager ...
  • DSTL - Acrobat Distiller
  • DSTUDIO - DownloadStudio ...
  • DSU - ProWORX Nxt Data Setup (...
  • DSV - DeSmuME Save File
  • DSW - Microsoft Developer ...
  • DSW - Desktop settings (...
  • DSX - Visual Basic Active ...
  • DSY - PC Draft Symbol Library
  • DSY - AJC Directory ...
  • DSY - Besta Video File
  • DSY - Directory Synchronizer ...
  • DSY - Daisy Container File ...
  • DSY - AJC Directory ...
  • DSY - DAISY AdAkta container ...
  • DSYM - ArchiCAD for MAC ...
  • DSZ - Win Help Related File
  • DSZ - Orchida Embroidery ...
  • DSZ - Orchida (OES) Embroidery...
  • DSZ - DynaMaSZ Data / ...
  • DT - DAT backup
  • DT - PowerBASIC file
  • DT - Macintosh File Data Fork
  • DT0 - DTED Level 0 File
  • DT1 - Diablo II tile file
  • DT1 - DTED Level 1 file
  • DT1 - DTED Level 1 ( National ...
  • DT2 - Microsoft Live Messenger...
  • DT2 - DTED Level 2 ( National ...
  • DT2 - DTED - Level 2 File
  • DT5 - Brother 's Keeper File
  • DT_ - Data file fork (...
  • DTA - Data file (EZ-Forms)
  • DTA - World Bank's STARS data
  • DTA - Datafile (Turbo C++)
  • DTAPART - Mozilla Firefox ...
  • DTAUS - Misc
  • DTAZV - Misc
  • DTB - Cybermedia Uninstaller
  • DTB - Database Backup for. ...
  • DTB - After Dark
  • DTB - After Dark file
  • DTB2 - Mac File Type
  • DTC - Windows Applog Journal ...
  • DTC - Applog journal
  • DTC - CADE graphic file
  • DTC - JetBrains dotTrace CPU ...
  • DTC - OutStart ...
  • DTC - DYTEC HEADQUARTER
  • DTD - |SGML Document Type ...
  • DTE - Win Applog file
  • DTEA - Diagnosis Template ...
  • DTED - Digital terrain ...
  • DTERMLICENSE - DTerm License File ( ...
  • DTF - Symantec Q&A relational ...
  • DTF - Database file for ACDSee
  • DTF - Database file (...
  • DTFL - Desktop File
  • DTG - Desktop Guitar Score ( ...
  • DTG - Windows Applog File
  • DTG - Win Applog file
  • DTH - Windows Applog file
  • DTI - Delphi 5 diagram ...
  • DTI - Windows Applog file
  • DTI - Delphi design time ...
  • DTI - FIFA 2001 data comon file
  • DTJ - Win Applog file
  • DTJ - Windows Applog File
  • DTL - Windows Applog File ( ...
  • DTL - Microsoft Windows Applog...
  • DTL - Pro/ ENGINEER (PTC)
  • DTL - Django template language...
  • DTL - Studio 400 TitleDeko ...
  • DTM - Module file (DigiTrakker)
  • DTN - TunnelCAD Import / ...
  • DTO - data - Directory Toolkit...
  • DTO - Team Oracle Data File ( ...
  • DTP - Desktop layout file (...
  • DTP - Template file (...
  • DTP - Text Document (Timeworks...
  • DTPC - LaserWriter Configuration
  • DTQ - Database Tools Query
  • DTR - DTREG Project File ( ...
  • DTR - DATroniC Data Recording ...
  • DTR - DiagTransfer Chess ...
  • DTR - Swisslog Downtime ...
  • DTS - iSite Enterprise Medical...
  • DTS - Digital Surround Audio ...
  • DTS - Audio File Format
  • DTS - Data Transformation ...
  • DTS - Structured Storage File
  • DTS - DTS Encoded Audio File
  • DTSCONFIG - Microsoft SQL Server ...
  • DTSHD - DTS-HD Master Audio File
  • DTSX - Microsoft SQL Server ...
  • DTW - Desktop Wallpaper
  • DTX - LaTeX Source and ...

-ADS BY GOOGLE

SearchCompliance

  • PCAOB (Public Company Accounting Oversight Board)

    The Public Company Accounting Oversight Board (PCAOB) is a Congressionally-established nonprofit that assesses audits of public ...

  • cyborg anthropologist

    A cyborg anthropologist is an individual who studies the interaction between humans and technology, observing how technology can ...

  • RegTech

    RegTech, or regulatory technology, is a term used to describe technology that is used to help streamline the process of ...

SearchSecurity

  • email spam

    Email spam, or junk email, is unsolicited bulk messages sent through email with commercial, fraudulent or malicious intent.

  • distributed denial of service (DDoS) attack

    A distributed denial-of-service attack occurs when an attack originates from multiple computers or devices, usually from multiple...

  • application whitelisting

    Application whitelisting is the practice of identifying applications that have been deemed safe for execution and restricting all...

SearchHealthIT

  • athenahealth Inc.

    Based in Watertown, Mass., athenahealth Inc. is a leading vendor of cloud-based EHRs for small to medium-sized physician ...

  • Affordable Care Act (ACA or Obamacare)

    The Affordable Care Act (ACA) is legislation passed in 2010 that changed how uninsured Americans enroll in and receive healthcare...

  • HIPAA Privacy Rule

    The Standards for Privacy of Individually Identifiable Health Information, commonly known as the HIPAA Privacy Rule, establishes ...

SearchDisasterRecovery

  • disaster recovery as a service (DRaaS)

    One approach to a strong disaster recovery plan is DRaaS, where companies offload data replication and restoration ...

  • data recovery

    Data recovery restores data that has been lost, accidentally deleted, corrupted or made inaccessible. Learn how data recovery ...

  • disaster recovery plan (DRP)

    A company's disaster recovery policy is enhanced with a documented DR plan that formulates strategies, and outlines preparation ...

SearchStorage

  • virtual memory

    Virtual memory is a memory management capability of an OS that allows a computer to compensate for physical memory shortages by ...

  • yottabyte (YB)

    A yottabyte is a measure of theoretical storage capacity and is 2 to the 80th power bytes, or, in decimal, approximately 1,000 ...

  • Kilo, mega, giga, tera, peta, exa, zetta and all that

    Kilo, mega, giga, tera, peta, exa, zetta are among the list of prefixes used to denote the quantity of something, such as a byte ...

SearchSolidStateStorage

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

  • SSD caching

    SSD caching, also known as flash caching, is the temporary storage of data on NAND flash memory chips in a solid-state drive so ...

  • NVDIMM (Non-Volatile Dual In-line Memory Module)

    An NVDIMM (non-volatile dual in-line memory module) is hybrid computer memory that retains data during a service outage.

SearchCloudStorage

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

  • Zadara VPSA and ZIOS

    Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA ...

Close