Browse Definitions:

Browse File Extensions by Alphabet

TAF - TBR

  • TAF - ADRIFT Text Adventure ( ...
  • TAF - Rational ClearCase ...
  • TAF - Birdstep Technologies ...
  • TAF - Tonline Db file
  • TAG - Query tag name file (...
  • TAGS - MIME Tag types site
  • TAH - Turbo assembler help ...
  • TAI - INMOS Transputer ...
  • TAJIMA - Tajima DST file format (...
  • TAK - Tom's lossless Audio ...
  • TAL - Text illustration file (...
  • TALK - Text to speech
  • TAM - Tame Program Settings ...
  • TAM - Tame Program Settings
  • TAN - Amazon Kindle file
  • TAO - Duplicator CD File
  • TAO - IsoBuster file
  • TAP - ZX Spectrum Tape image ...
  • TAP - Embroidery file
  • TAP - ZX Spectrum tape file ( ...
  • TAP - Geopath editor file
  • TAP - Oric Atmos snapshot file
  • TAP - Commodore 64 Cassette ...
  • TAP - Oric Atmos snapshot ...
  • TAP - C64 Raw Cassette Tape ...
  • TAP - Tape File
  • TAP - Tape file - ZX Spectrum ...
  • TAP - Wave Sound Action Wave
  • TAP - Jupiter Ace Tape image
  • TAR - Tape Archive
  • TAR - Compressed archive (TAR)
  • TAR-GZ - Gzip compressed TAR ...
  • TARGA - Truevision Targa Bitmap
  • TARGA - Truevision TarGA bitmap ...
  • TAS - ADRIFT Text Adventure ...
  • TAS - ADRIFT Text Adventure ...
  • TASP - TASP Strategy Planner ...
  • TAT - Grafic TWAIN Toolkit File
  • TAT - Geographic Text ...
  • TAT - Text File
  • TAX - TurboTax return file ...
  • TAX - TurboTax Tax Return
  • TAX - TurboTax data file
  • TAX2008 - TurboTax 2008 Tax Return...
  • TAX2008 - TurboTax 2008 Tax Return
  • TAX2009 - Turbotax 2009 Tax Return
  • TAXX - Dr. Tax Open XML Format ...
  • TAZ - Compressed ASCII archive...
  • TAZ - Compressed ASCII archive...
  • TAZ - Gzip/Tape archive (Unix)
  • TB - Tabbery Tab File
  • TB - Tab file ( Virtual ...
  • TB - Rhino 3D Toolbar ...
  • TB1 - Font file (Borland Turbo...
  • TB2 - Font file (Borland Turbo...
  • TB3 - Intel VTune Performance ...
  • TB5 - Intel VTune Performance ...
  • TB_ - Visc15 Adressen Setup ...
  • TBA - PASSOLO Licensed ...
  • TBA - DB/ TextWorks Database ...
  • TBALIC400 - PASSOLO Translation ...
  • TBASICC - thinBasic Console Script...
  • TBASICCX - thinBasic Console Script...
  • TBASICX - thinBasic GUI Script ( ...
  • TBB - The Bat! Message Base ...
  • TBB - Microsoft Office toolbar...
  • TBB - The Bat! E- mail Hives (...
  • TBC - Formula 1 Car Race 2001 ...
  • TBC - Inovate Tool Bar ...
  • TBD - Microsoft Mse file
  • TBD - Document System Document...
  • TBD - Microsoft Visual Studio ...
  • TBD - Dansk System Industr ...
  • TBD - Visual Studio File ( ...
  • TBE - TMPGEnc List File
  • TBF - Fax document (Imavox ...
  • TBH - Mah Jongg for Windows ...
  • TBH - Turbo Basic Help File
  • TBI - Image for Windows Disk ...
  • TBI - Image for Windows Disk ...
  • TBI - Fifa 2001 Be Command File
  • TBI - The Bat! hive index
  • TBK - Memo backup file (...
  • TBK - Toolbook file (Asymetrix...
  • TBK - Memo backup file (dBase ...
  • TBK - Interactive multimedia ...
  • TBL - Graphics (Native format)...
  • TBL - Table of values (OS/2)
  • TBM - Tableau bookmark file
  • TBM - DB/ TextWorks Database ...
  • TBM - DB/ TextWorks Database ...
  • TBM - Toribash mod file
  • TBND - Communication Tool
  • TBO - Turbo Architecture ...
  • TBP - Look @Me Timbuktu plug -...
  • TBP - Toon Boom Studio file
  • TBP - The Bat! plug -in file
  • TBP - Tabbery plug -in file
  • TBP - TAS books accounts
  • TBPA - Tektronix Bluetooth ...

-ADS BY GOOGLE

SearchCompliance

  • cyborg anthropologist

    A cyborg anthropologist is an individual who studies the interaction between humans and technology, observing how technology can ...

  • RegTech

    RegTech, or regulatory technology, is a term used to describe technology that is used to help streamline the process of ...

  • conduct risk

    Conduct risk is the prospect of financial loss to an organization that is caused by the actions of an organization's ...

SearchSecurity

  • security

    Security, in information technology (IT), is the defense of digital information and IT assets against internal and external, ...

  • insider threat

    An insider threat is a malicious hacker (also called a cracker or a black hat) who is an employee or officer of a business, ...

  • virus (computer virus)

    A computer virus is malicious code that replicates by copying itself to another program, computer boot sector or document.

SearchHealthIT

  • HIPAA Privacy Rule

    The Standards for Privacy of Individually Identifiable Health Information, commonly known as the HIPAA Privacy Rule, establishes ...

  • HIPAA business associate agreement (BAA)

    Under the U.S. Health Insurance Portability and Accountability Act of 1996, a HIPAA business associate agreement (BAA) is a ...

  • telemedicine

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

SearchDisasterRecovery

  • data recovery

    Data recovery restores data that has been lost, accidentally deleted, corrupted or made inaccessible. Learn how data recovery ...

  • disaster recovery plan (DRP)

    A company's disaster recovery policy is enhanced with a documented DR plan that formulates strategies, and outlines preparation ...

  • fault-tolerant

    Systems with integrated fault tolerance are designed to withstand multiple hardware failures to ensure continuous availability.

SearchStorage

  • Secure Digital card (SD card)

    SD cards use flash memory to provide nonvolatile storage. They are more rugged than traditional storage media and are used in ...

  • data storage

    In a computer, storage is the place where data is held in an electromagnetic or optical form for access by a computer processor.

  • flash storage

    Flash-based storage, based on flash memory, is used for data repositories, storage systems and consumer devices, such as USB ...

SearchSolidStateStorage

  • flash file system

    Flash file systems are designed specifically for memory devices. A well-designed flash device and flash file system ensure ...

  • IOPS (input/output operations per second)

    IOPS measures the maximum number of reads and writes to non-contiguous storage. It is not an actual benchmark since vendor ...

  • eMMC (embedded MultiMediaCard)

    An embedded MultiMediaCard (eMMC) is a small storage device made up of NAND flash memory and a simple storage controller.

SearchCloudStorage

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

  • Zadara VPSA and ZIOS

    Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA ...

Close