Browse Definitions:

Browse File Extensions by Alphabet

IS - ITM

  • IS - Unknown Apple II File
  • IS - Modula -3 Intermediate ...
  • IS - InStereo audio file
  • IS2 - IRT Cronista Infrared ...
  • ISA - Adobe Photoshop file
  • ISB - IS- Builder Link File (...
  • ISBN - HM3 Tutorial Software
  • ISC - Xilinx Device ...
  • ISC - GRDSOZ4W ISCII File
  • ISC - RVS-COM Prepaid SMS ...
  • ISC - Xilinx Integrated ...
  • ISC - Internet Servide ...
  • ISC - iScreensaver Designer ...
  • ISD - Spell checker dictionary...
  • ISE - Installshield Express ...
  • ISF - Tektronix instrument ...
  • ISF - Inspiration Concept Map ...
  • ISF - Inspiration Mind Mapping...
  • ISF - InfoNet Snapshot File ( ...
  • ISF - ModelPress highly ...
  • ISF - ZerOS Saved Show ( Zero ...
  • ISF - Inspiration Software ...
  • ISFF - Intergraph Standard File...
  • ISFF - Intergraph Standard File...
  • ISH - Compressed archive (ISH)
  • ISK - Command File
  • ISL - The Universal game ...
  • ISL - InstallShield temporary ...
  • ISL - Inno Setup 1.3 file
  • ISL - DB- MAIN Scheme File
  • ISM - ITI SimulationX ...
  • ISM - MySQL ISAM Table Handler...
  • ISM - InstallShield Project ...
  • ISM - ArchiCAD Geometric ...
  • ISM - Image System ( ...
  • ISM - SimulationX Encrypted ...
  • ISMA - Output Video file - ...
  • ISN - Installer Source Files
  • ISO - Lists the files on a ...
  • ISO - ISO (International ...
  • ISO-11172 - mpeg 1 spec.(iso 11172 )
  • ISOD - CloneDVD ISO Image ( ...
  • ISP - Sign-up file(X-Internet)
  • ISQ - MicroCT Image ( SCANCO ...
  • ISR - Streets & Trips Route ...
  • ISR - Go- Moku game file
  • ISS - ISS image format
  • ISS - InstallShield Response ...
  • ISS - ISS Audio Header
  • ISS - Inno Setup Script
  • ISS - The Longest Journey ...
  • ISS - Inno Setup Script ( ...
  • ISS - Caseware IDEA IDEAScript
  • ISS - InstallShield Silent ...
  • ISSP - Internet Search Sitelesrc
  • IST - Instrument file (...
  • ISTG - Imagine Staging Stage ...
  • ISTG - Imagine Stage Edit
  • ISTR - IsoStar Library of ...
  • ISTR - IsoStar Library of ...
  • ISU - Uninstall script (...
  • ISYM - ArchiCAD for MAC ...
  • ISZ - ISo Zipped format Header
  • ISZ - Compressed disk image ...
  • ISZ - WinMount Compressed ISO ...
  • ISZ - Zipped ISO Disk Image
  • IT - Settings file (intalk)
  • IT - Music module (MOD) (...
  • IT3 - Internet Timer 3 Log File
  • ITA - Italian localization ...
  • ITA - Personal Paint user ...
  • ITA - IconTweaker Theme Archive
  • ITA - IconTweaker theme
  • ITA - Italian README File
  • ITC - Uthscsa Imagetool ...
  • ITC - Image File
  • ITC - iTunes CoverFlow data ...
  • ITC - iTunes Cover Flow Data ...
  • ITC2 - iTunes Cover Flow Data ...
  • ITCL - tcl 00 Extension
  • ITCL - cygwin iwidgets3.0.0 ...
  • ITD - SDL Trados Translation ...
  • ITD - System Dll file
  • ITDB - iTunes Database File
  • ITE - E- Tabs Reader File
  • ITE - Iterare project file
  • ITF - Interface file (JPI ...
  • ITG - Intergraph format bitmap...
  • ITG - Intergraph Format ( ...
  • ITH - InTether Receiver File (...
  • ITH - InTether technology ...
  • ITHMB - iPod photo Thumbnail ...
  • ITHMB - Apple iPod / iPhone ...
  • ITI - Instrument file (Impulse...
  • ITK - Cygwin itk3.0 file
  • ITL - iTunes Library File
  • ITL - iTunes Music Library ...
  • ITL - ITEM ToolKit Library ( ...
  • ITL - IntelliTipster League ...
  • ITL - iTunes music database ...

-ADS BY GOOGLE

SearchCompliance

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • audit program (audit plan)

    An audit program, also called an audit plan, is an action plan that documents what procedures an auditor will follow to validate ...

SearchSecurity

  • insider threat

    Insider threat is a generic term for a threat to an organization's security or data that comes from within.

  • ransomware

    Ransomware is a subset of malware in which the data on a victim's computer is locked, typically by encryption, and payment is ...

  • hacker

    A hacker is an individual who uses computer, networking or other skills to overcome a technical problem.

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

SearchSolidStateStorage

  • 3D XPoint

    3D XPoint is memory storage technology jointly developed by Intel and Micron Technology Inc.

  • RRAM or ReRAM (resistive RAM)

    RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...

  • JEDEC

    JEDEC is a global industry group that develops open standards for microelectronics.

SearchCloudStorage

  • Google Cloud Storage

    Google Cloud Storage is an enterprise public cloud storage platform that can house large unstructured data sets.

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

Close