Browse Definitions:

Browse File Extensions by Alphabet

TIC - TLT

  • TIC - ArcInfo coordinates file
  • TIC - Lotto Pro 2002 ticket ...
  • TIC - ALLFIX FTN special file
  • TIC - FTN special file with ...
  • TID - AVCHD Thumbnail Index
  • TID - AVCHD Thumbnail Index ...
  • TID - IBM Voice Type languages...
  • TIE - X- wing Alliance Game ...
  • TIF - Tag image bitmap file (...
  • TIFENX - egis Encrypted TIF File ...
  • TIFF - Tag image bitmap file (...
  • TIFFENX - egis Encrypted TIFF File...
  • TIG - Map file (Tiger) (Used ...
  • TII - TI Interactive Workbook ...
  • TII - Apache Lucene term info ...
  • TIK - Script File for Game ...
  • TIL - Fuzzy Logic knowledge ...
  • TILE - Eclipse image file
  • TIM - Texture/Image file (...
  • TIN - MapInfo Professional ...
  • TINF - Mac File Type
  • TIP - Startup Tip File
  • TIP - Tip of the day for ...
  • TIP - TuneUp utilities icon ...
  • TIPROGRAM - TI- Basic Program File
  • TIS - Tile set (MahJongg 3.0)
  • TISV - WabbitDS Save File ( ...
  • TIT - Train Simulator track ...
  • TIX - DivX Video Download ...
  • TIX - Tix Widgets
  • TIX - DivX Video Download ...
  • TIX - ASA for UNIX Terminfo ...
  • TJF - backup files (VAXTPU ...
  • TJL - Backup file - VAXTPU ...
  • TJL - Backup File
  • TJM - Crazy Talk Model File ( ...
  • TJN - Karaoke Song ( ...
  • TJN - Taijin Media Net karaoke...
  • TJP - TaskJuggler Project File
  • TJP - Tiled JPEG File
  • TJS - TRACKJOY - Gravis ...
  • TJS - Sound
  • TK - Tk Script
  • TK - TK Solver File
  • TK - Tk Language Script
  • TK1 - Wintec Tools GPS log
  • TK2 - Take Two/ Easy CD ...
  • TK2 - Roxio / Take Two backup ...
  • TK3 - TK3 eBook ( Night ...
  • TK3 - TK3 Multimedia eBook
  • TKC - tKC Cracking Tutorial ...
  • TKFL - TKLinks Saver Favorite ...
  • TKL - Takeoff Live PDF working...
  • TKL - Holux MapShow305 track ...
  • TKM - Panasonic SD Voice ...
  • TKN - Liberty BASIC ...
  • TKN - Token Redeemer Download ...
  • TKO - DodgeView Take -Off File
  • TKP - MicroImages SML Script ...
  • TKS - TK8 Safe Master Password...
  • TKT - TK Solver File
  • TKW - TK Solver File
  • TL5 - TimeLiner 5.0 Timeline (...
  • TL_ - Doko Compressed Install ...
  • TLA - TuneUp Utilities Startup...
  • TLA - TLA - The Temporal Logic...
  • TLB - OLE type library files (...
  • TLB - Text library (VAX)
  • TLB - Reference table (Bubble ...
  • TLBACKUP - True Launch Bar backup ...
  • TLC - Compiled tool command ...
  • TLD - Disk Image - Teledisk
  • TLD - Teledisk Disk Image
  • TLD - Trellix Document Design ...
  • TLD - Tag Library Descriptor
  • TLE - Two-Line element set (...
  • TLF - Short Message Service ...
  • TLF - Opengl Stonehenge file
  • TLF - Turnpike SCORE link file
  • TLF - Gear Track List File
  • TLF - Avant ! Memory Compiler ...
  • TLG - Trellix WebGem
  • TLG - Beast 2.02 Trojan File
  • TLG - QuickBooks Transaction ...
  • TLH - Typelib generated C/C++ ...
  • TLH - Adder100 Source Code
  • TLH - Adder100 source file
  • TLI - Adder100 Source Code
  • TLI - Adder100 source file
  • TLK - Lands of Lore archive
  • TLK - BioWare Aurora Engine ...
  • TLK - Infinity Game Engine ...
  • TLK - Bioware Infinity game ...
  • TLM - Timeline Maker Timeline ...
  • TLO - SPSS Table Look Header
  • TLO - SPSS user table lookup ...
  • TLP - Project timeline file (...
  • TLS - Zortech 21 Readme file
  • TLS - Timeless Time & Expense ...
  • TLS - Piles 'O' Tiles ...

-ADS BY GOOGLE

SearchCompliance

  • PCAOB (Public Company Accounting Oversight Board)

    The Public Company Accounting Oversight Board (PCAOB) is a Congressionally-established nonprofit that assesses audits of public ...

  • cyborg anthropologist

    A cyborg anthropologist is an individual who studies the interaction between humans and technology, observing how technology can ...

  • RegTech

    RegTech, or regulatory technology, is a term used to describe technology that is used to help streamline the process of ...

SearchSecurity

  • email spam

    Email spam, or junk email, is unsolicited bulk messages sent through email with commercial, fraudulent or malicious intent.

  • distributed denial of service (DDoS) attack

    A distributed denial-of-service attack occurs when an attack originates from multiple computers or devices, usually from multiple...

  • application whitelisting

    Application whitelisting is the practice of identifying applications that have been deemed safe for execution and restricting all...

SearchHealthIT

  • athenahealth Inc.

    Based in Watertown, Mass., athenahealth Inc. is a leading vendor of cloud-based EHRs for small to medium-sized physician ...

  • Affordable Care Act (ACA or Obamacare)

    The Affordable Care Act (ACA) is legislation passed in 2010 that changed how uninsured Americans enroll in and receive healthcare...

  • HIPAA Privacy Rule

    The Standards for Privacy of Individually Identifiable Health Information, commonly known as the HIPAA Privacy Rule, establishes ...

SearchDisasterRecovery

  • disaster recovery as a service (DRaaS)

    One approach to a strong disaster recovery plan is DRaaS, where companies offload data replication and restoration ...

  • data recovery

    Data recovery restores data that has been lost, accidentally deleted, corrupted or made inaccessible. Learn how data recovery ...

  • disaster recovery plan (DRP)

    A company's disaster recovery policy is enhanced with a documented DR plan that formulates strategies, and outlines preparation ...

SearchStorage

  • yottabyte (YB)

    A yottabyte is a measure of theoretical storage capacity and is 2 to the 80th power bytes, or, in decimal, approximately 1,000 ...

  • Kilo, mega, giga, tera, peta, exa, zetta and all that

    Kilo, mega, giga, tera, peta, exa, zetta are among the list of prefixes used to denote the quantity of something, such as a byte ...

  • brontobyte

    A brontobyte is a measure of memory or data storage that is equal to 10 to the 27th power of bytes.

SearchSolidStateStorage

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

  • SSD caching

    SSD caching, also known as flash caching, is the temporary storage of data on NAND flash memory chips in a solid-state drive so ...

  • NVDIMM (Non-Volatile Dual In-line Memory Module)

    An NVDIMM (non-volatile dual in-line memory module) is hybrid computer memory that retains data during a service outage.

SearchCloudStorage

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

  • Zadara VPSA and ZIOS

    Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA ...

Close