Browse Definitions:

Browse File Extensions by Alphabet

T - TAF

  • T - IRIS Spreadsheet ( ...
  • T - Tape archive (TAR) (...
  • T - Alchemy chemical ...
  • T - terse Language Source ...
  • T - Tads Source File
  • T - TADS source
  • T - Tester symbol file
  • T - Tester symbol file (...
  • T - Paradox Database File
  • T - roff / troff unformatted...
  • T - Turing Programming ...
  • T - Source file (TADS)
  • T - Timber Compiler Source ...
  • T - TAR Tape Archive Without...
  • T - Turing Source Code File
  • T - Microsoft Windows ...
  • T - ReaGeniX Code Generator ...
  • T$ - Modem Bitware Fax disk5 ...
  • T$2A - Mac File Type
  • T$AB - Mac File Type
  • T$M - Found in Windows ( Vista...
  • T$M - AVG Temporary File (AVG ...
  • T$M - AVG Internet Security ...
  • T00 - Unknown file extension
  • T01 - TAXWIZ Deluxe tax file
  • T01 - TaxCut 2001 Tax Return ...
  • T01 - TaxCut 2001 File
  • T01 - Tonline Netscape File
  • T02 - Tonline Netscape File
  • T02 - TaxCut 2002 File
  • T02 - TaxCut 2002 tax return ...
  • T02 - TAXWIZ Deluxe Canadian ...
  • T03 - TaxCut 2003 Tax Return ...
  • T03 - TaxCut 2003 File
  • T04 - TaxCut 2004 File
  • T04 - TaxCut 2004 Tax Return ...
  • T05 - TaxCut 2005 Tax Return ...
  • T05 - TaxCut 2005 Tax Return
  • T06 - TaxCut 2006 Tax Return ...
  • T06 - TaxCut 2006 Tax Return
  • T07 - TaxCut Tax Return File
  • T07 - TaxCut 2007 tax return ...
  • T08 - TaxCut 2008 tax return ...
  • T08 - TaxCut 2008 Tax Return
  • T09 - At Home 2009 tax return ...
  • T09 - At Home 2009 Tax Return
  • T1 - EARS Component File
  • T1 - Male MRI image format
  • T10 - IRIG 106 Data Transfer ...
  • T2 - TrueType Font
  • T2 - Textease 2000 File
  • T2 - Unknown Apple II File
  • T2 - Male MRI image format
  • T2B - Bookeen Cybook thumbnail...
  • T2K - Teach2000 document file
  • T2K - VISIA image file
  • T2K - Mirror Suite Image ( ...
  • T2KS - Teach2000 Exam Results ...
  • T2KT - Teach2000 Exam File (bas...
  • T2L - True2Life file format - ...
  • T2T - Modeling software file (...
  • T2W - Ntgraph Turbo Pascal file
  • T3 - Tarshare file
  • T3 - TADS 3 game
  • T3001 - TARGET 3001 ! Circuit ...
  • T32 - Drive Image5 file
  • T3D - Swift 3D 3D Graphic ( ...
  • T3D - TicTacTi Advertisement ...
  • T3D - Epic Unreal engine 3D ...
  • T3D - Game : FiFa2000 ...
  • T3D - Unreal Engine 3D Brush ...
  • T3M - Swift 3D Material ( ...
  • T3X - TYPO3 Compressed ...
  • T4 - TerrAlign alignment ...
  • T44 - Temporary file for ...
  • T4G - Tscad4 file
  • T4G - Tommy Software CAD Draw ...
  • T64 - Emulator tape image file...
  • T65 - Adobe PageMaker Template
  • T65 - PageMaker Template ( ...
  • T98 - Kiplinger Tax Cut File (...
  • TA0 - TaxACT Tax Year 2000 ...
  • TA1 - TaxACT Tax Year 2001 ...
  • TA2 - TaxACT Tax Year 2002 ...
  • TA3 - TaxACT Tax Year 2003 ...
  • TA4 - TaxACT Tax Year 2004 ...
  • TA5 - TaxACT Tax Year 2005 ...
  • TA6 - TaxACT Tax Year 2006 ...
  • TA8 - TaxACT Tax Year 1998 ...
  • TA9 - TaxACT Tax Year 1999 ...
  • TAAC - Sun TAAC bitmap image
  • TAAC - Sun TAAC File
  • TAB - Table file (MapInfo GIS)
  • TAB - Guitar Tablature file
  • TAC - JSim Time Activity Curve...
  • TACO - TacoSoft System File ( ...
  • TAD - TA Demo Saved Game Data ...

-ADS BY GOOGLE

SearchCompliance

  • PCAOB (Public Company Accounting Oversight Board)

    The Public Company Accounting Oversight Board (PCAOB) is a Congressionally-established nonprofit that assesses audits of public ...

  • cyborg anthropologist

    A cyborg anthropologist is an individual who studies the interaction between humans and technology, observing how technology can ...

  • RegTech

    RegTech, or regulatory technology, is a term used to describe technology that is used to help streamline the process of ...

SearchSecurity

  • email spam

    Email spam, or junk email, is unsolicited bulk messages sent through email with commercial, fraudulent or malicious intent.

  • distributed denial of service (DDoS) attack

    A distributed denial-of-service attack occurs when an attack originates from multiple computers or devices, usually from multiple...

  • application whitelisting

    Application whitelisting is the practice of identifying applications that have been deemed safe for execution and restricting all...

SearchHealthIT

  • athenahealth Inc.

    Based in Watertown, Mass., athenahealth Inc. is a leading vendor of cloud-based EHRs for small to medium-sized physician ...

  • Affordable Care Act (ACA or Obamacare)

    The Affordable Care Act (ACA) is legislation passed in 2010 that changed how uninsured Americans enroll in and receive healthcare...

  • HIPAA Privacy Rule

    The Standards for Privacy of Individually Identifiable Health Information, commonly known as the HIPAA Privacy Rule, establishes ...

SearchDisasterRecovery

  • disaster recovery as a service (DRaaS)

    One approach to a strong disaster recovery plan is DRaaS, where companies offload data replication and restoration ...

  • data recovery

    Data recovery restores data that has been lost, accidentally deleted, corrupted or made inaccessible. Learn how data recovery ...

  • disaster recovery plan (DRP)

    A company's disaster recovery policy is enhanced with a documented DR plan that formulates strategies, and outlines preparation ...

SearchStorage

  • yottabyte (YB)

    A yottabyte is a measure of theoretical storage capacity and is 2 to the 80th power bytes, or, in decimal, approximately 1,000 ...

  • Kilo, mega, giga, tera, peta, exa, zetta and all that

    Kilo, mega, giga, tera, peta, exa, zetta are among the list of prefixes used to denote the quantity of something, such as a byte ...

  • brontobyte

    A brontobyte is a measure of memory or data storage that is equal to 10 to the 27th power of bytes.

SearchSolidStateStorage

  • SSD caching

    SSD caching, also known as flash caching, is the temporary storage of data on NAND flash memory chips in a solid-state drive so ...

  • NVDIMM (Non-Volatile Dual In-line Memory Module)

    An NVDIMM (non-volatile dual in-line memory module) is hybrid computer memory that retains data during a service outage.

  • NAND mirroring

    NAND mirroring has been proposed to break the security in certain portable devices that use NAND flash memory for encryption.

SearchCloudStorage

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

  • Zadara VPSA and ZIOS

    Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA ...

Close