Browse Definitions:

Browse File Extensions by Alphabet

IS - ITL

  • IS - Unknown Apple II File
  • IS - Modula -3 Intermediate ...
  • IS - InStereo audio file
  • IS2 - IRT Cronista Infrared ...
  • ISA - Adobe Photoshop file
  • ISB - IS- Builder Link File (...
  • ISBN - HM3 Tutorial Software
  • ISC - Xilinx Device ...
  • ISC - GRDSOZ4W ISCII File
  • ISC - RVS-COM Prepaid SMS ...
  • ISC - Xilinx Integrated ...
  • ISC - Internet Servide ...
  • ISC - iScreensaver Designer ...
  • ISD - Spell checker dictionary...
  • ISE - Installshield Express ...
  • ISF - Tektronix instrument ...
  • ISF - Inspiration Concept Map ...
  • ISF - Inspiration Mind Mapping...
  • ISF - InfoNet Snapshot File ( ...
  • ISF - ModelPress highly ...
  • ISF - ZerOS Saved Show ( Zero ...
  • ISF - Inspiration Software ...
  • ISFF - Intergraph Standard File...
  • ISFF - Intergraph Standard File...
  • ISH - Compressed archive (ISH)
  • ISK - Command File
  • ISL - The Universal game ...
  • ISL - InstallShield temporary ...
  • ISL - Inno Setup 1.3 file
  • ISL - DB- MAIN Scheme File
  • ISM - ITI SimulationX ...
  • ISM - MySQL ISAM Table Handler...
  • ISM - InstallShield Project ...
  • ISM - ArchiCAD Geometric ...
  • ISM - Image System ( ...
  • ISM - SimulationX Encrypted ...
  • ISMA - Output Video file - ...
  • ISN - Installer Source Files
  • ISO - Lists the files on a ...
  • ISO - ISO (International ...
  • ISO-11172 - mpeg 1 spec.(iso 11172 )
  • ISOD - CloneDVD ISO Image ( ...
  • ISP - Sign-up file(X-Internet)
  • ISQ - MicroCT Image ( SCANCO ...
  • ISR - Streets & Trips Route ...
  • ISR - Go- Moku game file
  • ISS - ISS image format
  • ISS - InstallShield Response ...
  • ISS - ISS Audio Header
  • ISS - Inno Setup Script
  • ISS - The Longest Journey ...
  • ISS - Inno Setup Script ( ...
  • ISS - Caseware IDEA IDEAScript
  • ISS - InstallShield Silent ...
  • ISSP - Internet Search Sitelesrc
  • IST - Instrument file (...
  • ISTG - Imagine Staging Stage ...
  • ISTG - Imagine Stage Edit
  • ISTR - IsoStar Library of ...
  • ISTR - IsoStar Library of ...
  • ISU - Uninstall script (...
  • ISYM - ArchiCAD for MAC ...
  • ISZ - ISo Zipped format Header
  • ISZ - Compressed disk image ...
  • ISZ - WinMount Compressed ISO ...
  • ISZ - Zipped ISO Disk Image
  • IT - Settings file (intalk)
  • IT - Music module (MOD) (...
  • IT3 - Internet Timer 3 Log File
  • ITA - Italian localization ...
  • ITA - Personal Paint user ...
  • ITA - IconTweaker Theme Archive
  • ITA - IconTweaker theme
  • ITA - Italian README File
  • ITC - Uthscsa Imagetool ...
  • ITC - Image File
  • ITC - iTunes CoverFlow data ...
  • ITC - iTunes Cover Flow Data ...
  • ITC2 - iTunes Cover Flow Data ...
  • ITCL - tcl 00 Extension
  • ITCL - cygwin iwidgets3.0.0 ...
  • ITD - SDL Trados Translation ...
  • ITD - System Dll file
  • ITDB - iTunes Database File
  • ITE - E- Tabs Reader File
  • ITE - Iterare project file
  • ITF - Interface file (JPI ...
  • ITG - Intergraph format bitmap...
  • ITG - Intergraph Format ( ...
  • ITH - InTether Receiver File (...
  • ITH - InTether technology ...
  • ITHMB - iPod photo Thumbnail ...
  • ITHMB - Apple iPod / iPhone ...
  • ITI - Instrument file (Impulse...
  • ITK - Cygwin itk3.0 file
  • ITL - iTunes Library File
  • ITL - iTunes Music Library ...
  • ITL - ITEM ToolKit Library ( ...
  • ITL - IntelliTipster League ...
  • ITL - iTunes music database ...

-ADS BY GOOGLE

SearchCompliance

  • cyborg anthropologist

    A cyborg anthropologist is an individual who studies the interaction between humans and technology, observing how technology can ...

  • RegTech

    RegTech, or regulatory technology, is a term used to describe technology that is used to help streamline the process of ...

  • conduct risk

    Conduct risk is the prospect of financial loss to an organization that is caused by the actions of an organization's ...

SearchSecurity

  • application whitelisting

    Application whitelisting is the practice of identifying applications that have been deemed safe for execution and restricting all...

  • security

    Security, in information technology (IT), is the defense of digital information and IT assets against internal and external, ...

  • insider threat

    An insider threat is a malicious hacker (also called a cracker or a black hat) who is an employee or officer of a business, ...

SearchHealthIT

  • HIPAA Privacy Rule

    The Standards for Privacy of Individually Identifiable Health Information, commonly known as the HIPAA Privacy Rule, establishes ...

  • HIPAA business associate agreement (BAA)

    Under the U.S. Health Insurance Portability and Accountability Act of 1996, a HIPAA business associate agreement (BAA) is a ...

  • telemedicine

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

SearchDisasterRecovery

  • data recovery

    Data recovery restores data that has been lost, accidentally deleted, corrupted or made inaccessible. Learn how data recovery ...

  • disaster recovery plan (DRP)

    A company's disaster recovery policy is enhanced with a documented DR plan that formulates strategies, and outlines preparation ...

  • fault-tolerant

    Systems with integrated fault tolerance are designed to withstand multiple hardware failures to ensure continuous availability.

SearchStorage

  • data deduplication

    Deduplication retains one unique data instance to reduce storage and bandwidth consumed by remote backups, replication and ...

  • byte

    In most computer systems, a byte is a unit of data that is eight binary digits long. Bytes are often used to represent a ...

  • Secure Digital card (SD card)

    SD cards use flash memory to provide nonvolatile storage. They are more rugged than traditional storage media and are used in ...

SearchSolidStateStorage

  • flash file system

    Flash file systems are designed specifically for memory devices. A well-designed flash device and flash file system ensure ...

  • IOPS (input/output operations per second)

    IOPS measures the maximum number of reads and writes to non-contiguous storage. It is not an actual benchmark since vendor ...

  • eMMC (embedded MultiMediaCard)

    An embedded MultiMediaCard (eMMC) is a small storage device made up of NAND flash memory and a simple storage controller.

SearchCloudStorage

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

  • Zadara VPSA and ZIOS

    Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA ...

Close