Browse Definitions:

Browse File Extensions by Alphabet

SL2 - SM2

  • SL20 - HLSW Game Server Tool ...
  • SL21 - HLSW Game Server Tool ...
  • SL23 - HLSW Game Server Tool ...
  • SL24 - HLSW Game Server Tool ...
  • SL25 - HLSW Game Server Tool ...
  • SL26 - HLSW Game Server Tool ...
  • SL27 - HLSW Game Server Tool ...
  • SL28 - HLSW Game Server Tool ...
  • SL29 - HLSW Game Server Tool ...
  • SL30 - HLSW Game Server Tool ...
  • SL8 - SIMUL8 simulation file
  • SLA - Scribus document Header
  • SLA - Scribus Document ( Franz...
  • SLB - Slide Library File (...
  • SLC - Compiled SALT script (...
  • SLD - Slide File (AutoCAD)
  • SLD3 - Mac File Type
  • SLD3 - Power Point 3
  • SLD8 - PowerPoint 98 Slide
  • SLD8 - Mac File Type
  • SLDASM - SolidWorks Assembly File
  • SLDBLK - SolidWorks blocks file
  • SLDBOMBT - SolidWorks BOM template ...
  • SLDDRT - SolidWorks drawing sheet...
  • SLDDRW - SolidWorks Drawing File
  • SLDDWG - SolidWorks drawing 2D ( ...
  • SLDGTOLFVT - SolidWorks geometric ...
  • SLDHOLTBT - SolidWorks hole table ...
  • SLDLFP - SolidWorks Library ...
  • SLDM - Microsoft Office ...
  • SLDPRT - SolidWorks Part File
  • SLDREVTBT - SolidWorks revision ...
  • SLDS - Mac File Type
  • SLDSFFVT - SolidWorks surface ...
  • SLDTBT - SolidWorks general table...
  • SLDWELDFVT - SolidWorks weld style ...
  • SLDWLDTBT - SolidWorks Weldment ...
  • SLDX - Microsoft Office ...
  • SLE - Surfplan kite project ...
  • SLE - Sisulizer Exchange ( ...
  • SLE - SurfPlan Kite Project ( ...
  • SLE - Steganos Security Suite ...
  • SLE - Sisulizer Package File
  • SLF - Stand List file format (...
  • SLF - Jagged Alliance 2
  • SLF - Segment layout file
  • SLF - Select -a-Net language ...
  • SLF - Mail Warden
  • SLF - Symantec License File ( ...
  • SLF - BitDefender file
  • SLF - SortWizard Export Format
  • SLF - Scene Language for ...
  • SLF - Symantec license file
  • SLF - Shopcalc list file
  • SLF - NTgraph Setup30 File
  • SLF - SuperLink Folder Manager...
  • SLG - Safend Protector ...
  • SLG - AutoCAD file
  • SLG - WellSight Oil Well Log ...
  • SLG - Chromeleon Audit Trail ...
  • SLG - Chromeleon Audit Trail
  • SLI - Slide file (MAGICorp ...
  • SLIP - CodeGear License File ( ...
  • SLK - Symbolic link ...
  • SLL - Sound data file (Generic)
  • SLM - Visual FoxPro ( ...
  • SLM - Microsoft Visual FoxPro ...
  • SLN - Asterisk file
  • SLN - Visual Studio Solution ...
  • SLN - Microsoft Visual ...
  • SLN - Windows Installer XML (...
  • SLN - Microsoft Visual Studio ...
  • SLN - MS Visual Studio.Net ...
  • SLN - Microsoft Visual Studio ...
  • SLO - Dazzle Dazzle ...
  • SLO - Webalizer.01 Lang file
  • SLP - Autodesk pipe size and ...
  • SLP - Sisulizer Project File
  • SLP - Rise of Nations campaign...
  • SLP - Timeslips Data File
  • SLP - Pro/E rendering file
  • SLP - SLP command file created...
  • SLP - Pro/ ENGINEER rendering ...
  • SLS - Image Playlist
  • SLS3 - Excel 3 Template
  • SLS4 - Excel 4
  • SLS5 - Excel 5
  • SLS8 - Excel 98 Template
  • SLST - On Schedule Schedule ...
  • SLSTL - On Schedule Schedule ...
  • SLT - Script application ...
  • SLTNG - StarLogo TNG Open ...
  • SLU - Business Integrator ...
  • SLV - Silva Export / Import ...
  • SLW - Settler LITE for Windows...
  • SLX - FinSafe Terminal XML ...
  • SLY - Complete Works ...
  • SM - Script file (ScriptMaker)
  • SM - Source code file (...
  • SM - Simple MODRATEC Graphic

-ADS BY GOOGLE

SearchCompliance

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • audit program (audit plan)

    An audit program, also called an audit plan, is an action plan that documents what procedures an auditor will follow to validate ...

SearchSecurity

  • computer worm

    A computer worm is a type of malicious software program whose primary function is to infect other computers while remaining ...

  • black hat

    Black hat refers to a hacker who breaks into a computer system or network with malicious intent.

  • copyright

    Copyright is a legal term describing ownership of control of the rights to the use and distribution of certain works of creative ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

  • mass notification system (MNS)

    A mass notification system is a platform that sends one-way messages to inform employees and the public of an emergency.

SearchStorage

SearchSolidStateStorage

  • RRAM or ReRAM (resistive RAM)

    RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...

  • JEDEC

    JEDEC is a global industry group that develops open standards for microelectronics.

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification written for internally mounted storage...

SearchCloudStorage

  • Google Cloud Storage

    Google Cloud Storage is an enterprise public cloud storage platform that can house large unstructured data sets.

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

Close