Browse Definitions:

Browse File Extensions by Alphabet

LSG - LVF

  • LSG - LocStudio Glossary ( ...
  • LSI - Corel Layout ...
  • LSI - Xerox Lightscribe label ...
  • LSI - Audio file
  • LSI - Audio
  • LSL - Script library (Lotus)
  • LSL - Saved library (Corel ...
  • LSLANG - Ad- Aware Language File ...
  • LSM - Linux Software Map
  • LSM - Film LOTUS
  • LSN - MS Works File
  • LSN - Works File ( Microsoft ...
  • LSO - Logic Audio Song file
  • LSO - Logic Audio Project
  • LSO - Bhv Tonstudio Platin file
  • LSP - AutoLISP, CommonLISP, ...
  • LSQ - 'IBM Voice Type ' ...
  • LSQ - VAX CRYSTALS Chemical ...
  • LSQ - IBM Voice Type Language ...
  • LSR - LANsurveyor Report
  • LSR - Logos Library System 2.x...
  • LSS - Spreadsheet (Legato)
  • LSSAVE - Memory Hacking Software ...
  • LST - Keyboard macro (1st ...
  • LST - List file (Generic)
  • LST - Spool file (Oracle)
  • LST - SAS text output
  • LSU - LANsurveyor Map
  • LSV - Tonline Ob4hbci Layout ...
  • LSW - Golf Swapfiles file
  • LSW - Technics Keyboard ...
  • LSX - Streaming Audio / Video ...
  • LSX - Advanced Streaming ...
  • LSZ - Adressmn Default.dbu file
  • LSZ - LiteStep Installer Theme...
  • LSZ - Adressmn file
  • LSZ - Litestep theme Header
  • LSZ - WinFax file
  • LT - PC LTAS Printer ...
  • LT2 - Poser Light Set File
  • LT2 - Curious Labs Poser ...
  • LTA - Data - LithTech ASCII 3D...
  • LTB - Amma Lsb v1.0
  • LTB - Amma Little Setup ...
  • LTC - LTC LightTools command ...
  • LTE - Adressmn
  • LTE - Adressmn file
  • LTF - Frogans Short -cut Header
  • LTF - Frogans Short -cut (STG ...
  • LTF - Frogans Shortcut File
  • LTG - Lasertank Bitmap Graphics
  • LTH - Easy CD Creator Theme ...
  • LTH - Roxio Label Creator ...
  • LTH - Sierra Print artist ...
  • LTL - Linear Temporal Logic ...
  • LTM - Form (Lotus Forms)
  • LTMC - Mac File Type
  • LTN - CDROM driver file
  • LTP - ZX Spectrum emulator file
  • LTPL - Insight II Layout ...
  • LTR - ACT! file
  • LTR - Letter File
  • LTT - SDR99 Speech Recognition...
  • LTT - HP Library and Tape ...
  • LTT - MicroImages Text Layout ...
  • LTX - S.T.A.L.K.E.R. game file
  • LTX - Atari Jaguar GASM ...
  • LTX - Mathematical text ...
  • LTZ - Compressed Poser Light ...
  • LU - Library unit file (...
  • LUA - Lua Player for PSP ...
  • LUA - Prototype script file
  • LUA - Apple Safari template ...
  • LUA - Lua Source File
  • LUA - Homeworld generic lua ...
  • LUA - Lua Source ( Tecgraf - ...
  • LUB - Star Wars Game File ( ...
  • LUCS - Amaya tools file
  • LUCS - Amaya Tools
  • LUDI_PSEUDO_PROTEIN - Insight II Exclusion ...
  • LUE - Norton LiveUpdate Log ...
  • LUF - Lipikar Text ( Santanu ...
  • LUF - Lipikar Uniform Format ...
  • LUG - The Movies game file
  • LUG - Black & White II file
  • LUL - OzWin CompuServe E- mail...
  • LUN - DB- MAIN Project File ( ...
  • LUP - OzWin CompuServe E- mail...
  • LUT - Osiris Preferences ...
  • LUT - Osiris Prefs Colordir ...
  • LUT - LUT File
  • LUX - Spectramap Database ( ...
  • LV1 - Boulder Rash Original ...
  • LV5 - Return to Wonderland ...
  • LV6 - Return to Wonderland ...
  • LVA - Logitech Video Effects ...
  • LVA - Logitech Video Effects ...
  • LVB - Outlaws Binary Mission ...
  • LVD - LPA- View Data File (MP ...

-ADS BY GOOGLE

SearchCompliance

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

SearchSecurity

  • computer exploit

    A computer exploit, or exploit, is an attack on a computer system, especially one that takes advantage of a particular ...

  • cyberwarfare

    Cyberwarfare is computer- or network-based conflict involving politically motivated attacks by a nation-state on another ...

  • insider threat

    Insider threat is a generic term for a threat to an organization's security or data that comes from within.

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

  • SATA Express (SATAe)

    SATA Express (SATAe or Serial ATA Express) is a bus interface to connect storage devices to a computer motherboard, supporting ...

  • DIMM (dual in-line memory module)

    A DIMM (dual in-line memory module) is the standard memory card used in servers and PCs.

  • nearline storage

    Nearline storage is the on-site storage of data on removable media.

SearchSolidStateStorage

  • 3D XPoint

    3D XPoint is memory storage technology jointly developed by Intel and Micron Technology Inc.

  • RRAM or ReRAM (resistive RAM)

    RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...

  • JEDEC

    JEDEC is a global industry group that develops open standards for microelectronics.

SearchCloudStorage

  • Google Cloud Storage

    Google Cloud Storage is an enterprise public cloud storage platform that can house large unstructured data sets.

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

Close