Browse Definitions:

Browse File Extensions by Alphabet

ITM - IX

  • ITM - Item / Article / Zone ...
  • ITM - Item / Article / Zone
  • ITM - iThink Model File
  • ITM - Infinity Game Engine ...
  • ITM - Diablo II Item ( ...
  • ITN - Itinerary file - TomTom ...
  • ITN - TomTom Navigator ...
  • ITP - IconTweaker Plug -in
  • ITP - BioWare Aurora Engine ...
  • ITP - riteMail Mail and Notes ...
  • ITP - ITEM ToolKit Project ...
  • ITR - Icy Tower file
  • ITR - Icy Tower Replay Header
  • ITR - IntroCreator project file
  • ITS - Sample file (Impulse ...
  • ITS - Internet document set (...
  • ITSS - MS- ITSS File open with ...
  • ITT - IconTweaker Theme File
  • ITU - Sheffield dictionary file
  • ITW - IT Works application ...
  • ITW - InTouch With Database ...
  • ITW - Icetips wizard Editor ...
  • ITX - Texture IMAGINE file
  • ITX - ITX Form Template
  • ITX - Texture IMAGINE
  • ITX - Igor Chromatogram File
  • ITX - ITRANS Multilingual ...
  • ITX - ISB Raw Song Format
  • ITX - Impulse Imagine for ...
  • ITZ - Impulse Tracker Music ...
  • ITZ - Amiga and PC Tracker ...
  • IUD - Oratcl applications IUD ...
  • IUM - infoUSA Network Meter ...
  • IV - Open Inventor file
  • IV-VRML - Inventor VRML Format ...
  • IV2I - Ghost Disk Drive Image (...
  • IV2I - Norton Ghost Incremental...
  • IVA - Dementia. 4207 Virus File
  • IVA - Surveillance Video File
  • IVB - Truevision Targa Format ...
  • IVB - Truevision Targa format ...
  • IVC - iView MediaPro catalogue...
  • IVC - InterVoice audio
  • IVD - Microdata dimension or ...
  • IVE - OpenSceneGraph native ...
  • IVE - OpenSceneGraph 3D model
  • IVF - Indeo Video File ( Intel...
  • IVF - Intel Indeo Video File ...
  • IVF - Indeo Video File
  • IVI - Image file - ImmerVision
  • IVI - MSDN InfoViewer 5.0 ...
  • IVL - Lensflare file - ...
  • IVM - Interactive Visual Media...
  • IVN - iView MediaPro Catalog ...
  • IVNU - Inetba Web Page ( Inetba...
  • IVP - User subset profile (...
  • IVQ - MSDN InfoViewer 5.0 ...
  • IVR - Image World
  • IVR - RealPlayer Internet ...
  • IVR - Virtual Reality World ...
  • IVR - RealNetworks Internet ...
  • IVS - ImageView Storage File (...
  • IVS - iVisit
  • IVS - Internet Streaming Video
  • IVT - Table or aggregate data ...
  • IVU - User Interface file - ...
  • IVU - ImmerVision XML User ...
  • IVU - IVUE Live Picture Drawing
  • IVU - ImmerVision XML user ...
  • IVUE - Live Picture multi - ...
  • IVWD - IntelliVIEW Designer ...
  • IVWL - IntelliVIEW Designer ...
  • IVWR - IntelliVIEW Designer ...
  • IVX - Microdata directory (...
  • IW - Presentation flowchart (...
  • IW - Screensaver (Idlewild)
  • IW2 - Information Workshop ...
  • IW3 - InfoWeb 3 Web Page ( ...
  • IW4 - DjVu File
  • IW4 - DjVu image format
  • IW44 - DjVu image format
  • IWA - Text file (IBM Writing ...
  • IWC - Install Watch document
  • IWD - Call of Duty Map - Game ...
  • IWD - Call of Duty file
  • IWD - Call of Duty Game Data ...
  • IWI - Ignite image optimiser ...
  • IWI - Call of Duty Skin ( ...
  • IWM - Start file (IconAuthor)
  • IWP - Text file (Wang)
  • IWR - i* write 2.0 File
  • IWR_BAK - i* write 2.0 Backup File
  • IWS - Information Workshop ...
  • IWS - InstallWatch Scan File
  • IWS - InstallWatch Scan ...
  • IWS - IntelliJ IDEA Web Page
  • IWT - Sunnysoft InterWrite ...
  • IWZ - InstallShield Express 2 ...
  • IWZ - ItemWizard.exe

-ADS BY GOOGLE

SearchCompliance

  • PCAOB (Public Company Accounting Oversight Board)

    The Public Company Accounting Oversight Board (PCAOB) is a Congressionally-established nonprofit that assesses audits of public ...

  • cyborg anthropologist

    A cyborg anthropologist is an individual who studies the interaction between humans and technology, observing how technology can ...

  • RegTech

    RegTech, or regulatory technology, is a term used to describe technology that is used to help streamline the process of ...

SearchSecurity

  • email spam

    Email spam, or junk email, is unsolicited bulk messages sent through email with commercial, fraudulent or malicious intent.

  • distributed denial of service (DDoS) attack

    A distributed denial-of-service attack occurs when an attack originates from multiple computers or devices, usually from multiple...

  • application whitelisting

    Application whitelisting is the practice of identifying applications that have been deemed safe for execution and restricting all...

SearchHealthIT

  • athenahealth Inc.

    Based in Watertown, Mass., athenahealth Inc. is a leading vendor of cloud-based EHRs for small to medium-sized physician ...

  • Affordable Care Act (ACA or Obamacare)

    The Affordable Care Act (ACA) is legislation passed in 2010 that changed how uninsured Americans enroll in and receive healthcare...

  • HIPAA Privacy Rule

    The Standards for Privacy of Individually Identifiable Health Information, commonly known as the HIPAA Privacy Rule, establishes ...

SearchDisasterRecovery

  • disaster recovery as a service (DRaaS)

    One approach to a strong disaster recovery plan is DRaaS, where companies offload data replication and restoration ...

  • data recovery

    Data recovery restores data that has been lost, accidentally deleted, corrupted or made inaccessible. Learn how data recovery ...

  • disaster recovery plan (DRP)

    A company's disaster recovery policy is enhanced with a documented DR plan that formulates strategies, and outlines preparation ...

SearchStorage

  • yottabyte (YB)

    A yottabyte is a measure of theoretical storage capacity and is 2 to the 80th power bytes, or, in decimal, approximately 1,000 ...

  • Kilo, mega, giga, tera, peta, exa, zetta and all that

    Kilo, mega, giga, tera, peta, exa, zetta are among the list of prefixes used to denote the quantity of something, such as a byte ...

  • brontobyte

    A brontobyte is a measure of memory or data storage that is equal to 10 to the 27th power of bytes.

SearchSolidStateStorage

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

  • SSD caching

    SSD caching, also known as flash caching, is the temporary storage of data on NAND flash memory chips in a solid-state drive so ...

  • NVDIMM (Non-Volatile Dual In-line Memory Module)

    An NVDIMM (non-volatile dual in-line memory module) is hybrid computer memory that retains data during a service outage.

SearchCloudStorage

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

  • Zadara VPSA and ZIOS

    Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA ...

Close