Browse Definitions:

Browse File Extensions by Alphabet

RSH - RTT

  • RSH - Warhammer 40 000 Texture...
  • RSH - 3DReshaper Project
  • RSH - Warhammer 40K textures ...
  • RSL - Paradox 7 reports (...
  • RSM - Resume file
  • RSML - RealSystem ML File
  • RSML - Real Player File
  • RSN - Propellerhead Reason ...
  • RSN - Reason Project File
  • RSO - NXT Brick Audio File
  • RSP - Response file (Generic)
  • RSR - Poser Model Preview File
  • RSR - 4th Dimension Database ...
  • RSRC - Xcode Compiled Rez ...
  • RSRC - Resource File
  • RSRC - MAC OS X resource file
  • RSRC - Apple Xcode compiled ...
  • RSS - Rockwell Logix 500 SLC-5...
  • RSS - PlanMan image
  • RSS - Rich Site Summary
  • RSS - Symbian Application ...
  • RSS - Resource source file ( ...
  • RSS - RSS File
  • RSS - ReliaSoft BlockSim file
  • RSS - EPOC Resource Source File
  • RSSC - Claris Resolve Script
  • RST - Report Sharp - Shooter ...
  • RST - LochMaster Strip Board (...
  • RST - SaralTDS eTDS Software ...
  • RST - IBM Voice Type Language ...
  • RST - reStructuredText File
  • RST - ANSYS Results
  • RSTRNT - Insight II Distance ...
  • RSV - RSView32 Project File
  • RSW - ReliaSoft BlockSim
  • RSW - R& R SQL Report ...
  • RSWKS - Romes settings file
  • RSX - Temporary Red Alert ...
  • RSY - FLEXIT Multishot Survey ...
  • RSY - FLEXIT Multishot survey ...
  • RSYM - ArchiCAD for MAC ...
  • RT - Behemot 3D scene file
  • RT - RealText Streaming Text ...
  • RT - RealText file
  • RT - RealText ( Real Networks...
  • RT - Rich Text
  • RT$ - Ntgraph Visual c wizzard...
  • RT2 - OziExplorerCE route file
  • RT_ - Winhelp file ( ...
  • RT_ - Winhelp Compressed File
  • RTA - RoboHelp Configuration
  • RTA - 'IBM Voice Type ' ...
  • RTAB - RandyTab Guitar Tablature
  • RTB - Behemot binary 3d Scene ...
  • RTB - NAT proxy servers file
  • RTC - Rich Text Compressed file
  • RTCP - Realtime Transport ...
  • RTD - RagTime Document
  • RTD - ROBOT Structure File ( ...
  • RTD - RagTime data file
  • RTD - Retina Network Security ...
  • RTD - RagTime Examples Render ...
  • RTE - MicroSim PCBoard routes
  • RTE - RTE Encoded File
  • RTE - Garmin PCX5 route file
  • RTE - Revit Project Template
  • RTE - RTEncoder RTE Encoded ...
  • RTE - Fugawi Global Navigator ...
  • RTE - Autodesk Revit ...
  • RTE - Microsoft Exchange ...
  • RTE - Navigation Route
  • RTF - Rich Text Format document
  • RTF - Help file script (...
  • RTF_ - RTF File
  • RTF_ - Rich text format file - ...
  • RTFD - Rich Text Format ...
  • RTFD - NeXT RTF- Packet Rich ...
  • RTFD - RTF- Packet - NeXT
  • RTFENX - egis Encrypted RTF File ...
  • RTH - ANSYS Results
  • RTH - Astrotite offline data ...
  • RTH - ANSYS results file
  • RTI - Real Tracker Instrument
  • RTK - Used by RoboHELP to ...
  • RTL - Run Time library (NU 7.0)
  • RTL - Text file (Generic)
  • RTM - Music module (MOD) (Real...
  • RTMDL - Rational Rose RealTime ...
  • RTN - Unknown file extension
  • RTP - Software update package ...
  • RTPI - 3rdTech Scanner File
  • RTPL - Nokia Phone Ring Tone ( ...
  • RTR - Astrotite 200X Astrotite...
  • RTR - IBM Voice Type Language ...
  • RTS - Runtime library file (...
  • RTS - RoboHELP to speed ...
  • RTS - RTSL document (RealAudio)
  • RTSL - Real document
  • RTSP - Apple QuickTime real - ...

-ADS BY GOOGLE

SearchCompliance

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • audit program (audit plan)

    An audit program, also called an audit plan, is an action plan that documents what procedures an auditor will follow to validate ...

SearchSecurity

  • insider threat

    Insider threat is a generic term for a threat to an organization's security or data that comes from within.

  • ransomware

    Ransomware is a subset of malware in which the data on a victim's computer is locked, typically by encryption, and payment is ...

  • hacker

    A hacker is an individual who uses computer, networking or other skills to overcome a technical problem.

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

SearchSolidStateStorage

  • 3D XPoint

    3D XPoint is memory storage technology jointly developed by Intel and Micron Technology Inc.

  • RRAM or ReRAM (resistive RAM)

    RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...

  • JEDEC

    JEDEC is a global industry group that develops open standards for microelectronics.

SearchCloudStorage

  • Google Cloud Storage

    Google Cloud Storage is an enterprise public cloud storage platform that can house large unstructured data sets.

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

Close