Browse Definitions:

Browse File Extensions by Alphabet

TIC - TLT

  • TIC - ArcInfo coordinates file
  • TIC - Lotto Pro 2002 ticket ...
  • TIC - ALLFIX FTN special file
  • TIC - FTN special file with ...
  • TID - AVCHD Thumbnail Index
  • TID - AVCHD Thumbnail Index ...
  • TID - IBM Voice Type languages...
  • TIE - X- wing Alliance Game ...
  • TIF - Tag image bitmap file (...
  • TIFENX - egis Encrypted TIF File ...
  • TIFF - Tag image bitmap file (...
  • TIFFENX - egis Encrypted TIFF File...
  • TIG - Map file (Tiger) (Used ...
  • TII - TI Interactive Workbook ...
  • TII - Apache Lucene term info ...
  • TIK - Script File for Game ...
  • TIL - Fuzzy Logic knowledge ...
  • TILE - Eclipse image file
  • TIM - Texture/Image file (...
  • TIN - MapInfo Professional ...
  • TINF - Mac File Type
  • TIP - Startup Tip File
  • TIP - Tip of the day for ...
  • TIP - TuneUp utilities icon ...
  • TIPROGRAM - TI- Basic Program File
  • TIS - Tile set (MahJongg 3.0)
  • TISV - WabbitDS Save File ( ...
  • TIT - Train Simulator track ...
  • TIX - DivX Video Download ...
  • TIX - Tix Widgets
  • TIX - DivX Video Download ...
  • TIX - ASA for UNIX Terminfo ...
  • TJF - backup files (VAXTPU ...
  • TJL - Backup file - VAXTPU ...
  • TJL - Backup File
  • TJM - Crazy Talk Model File ( ...
  • TJN - Karaoke Song ( ...
  • TJN - Taijin Media Net karaoke...
  • TJP - TaskJuggler Project File
  • TJP - Tiled JPEG File
  • TJS - TRACKJOY - Gravis ...
  • TJS - Sound
  • TK - Tk Script
  • TK - TK Solver File
  • TK - Tk Language Script
  • TK1 - Wintec Tools GPS log
  • TK2 - Take Two/ Easy CD ...
  • TK2 - Roxio / Take Two backup ...
  • TK3 - TK3 eBook ( Night ...
  • TK3 - TK3 Multimedia eBook
  • TKC - tKC Cracking Tutorial ...
  • TKFL - TKLinks Saver Favorite ...
  • TKL - Takeoff Live PDF working...
  • TKL - Holux MapShow305 track ...
  • TKM - Panasonic SD Voice ...
  • TKN - Liberty BASIC ...
  • TKN - Token Redeemer Download ...
  • TKO - DodgeView Take -Off File
  • TKP - MicroImages SML Script ...
  • TKS - TK8 Safe Master Password...
  • TKT - TK Solver File
  • TKW - TK Solver File
  • TL5 - TimeLiner 5.0 Timeline (...
  • TL_ - Doko Compressed Install ...
  • TLA - TuneUp Utilities Startup...
  • TLA - TLA - The Temporal Logic...
  • TLB - OLE type library files (...
  • TLB - Text library (VAX)
  • TLB - Reference table (Bubble ...
  • TLBACKUP - True Launch Bar backup ...
  • TLC - Compiled tool command ...
  • TLD - Disk Image - Teledisk
  • TLD - Teledisk Disk Image
  • TLD - Trellix Document Design ...
  • TLD - Tag Library Descriptor
  • TLE - Two-Line element set (...
  • TLF - Short Message Service ...
  • TLF - Opengl Stonehenge file
  • TLF - Turnpike SCORE link file
  • TLF - Gear Track List File
  • TLF - Avant ! Memory Compiler ...
  • TLG - Trellix WebGem
  • TLG - Beast 2.02 Trojan File
  • TLG - QuickBooks Transaction ...
  • TLH - Typelib generated C/C++ ...
  • TLH - Adder100 Source Code
  • TLH - Adder100 source file
  • TLI - Adder100 Source Code
  • TLI - Adder100 source file
  • TLK - Lands of Lore archive
  • TLK - BioWare Aurora Engine ...
  • TLK - Infinity Game Engine ...
  • TLK - Bioware Infinity game ...
  • TLM - Timeline Maker Timeline ...
  • TLO - SPSS Table Look Header
  • TLO - SPSS user table lookup ...
  • TLP - Project timeline file (...
  • TLS - Zortech 21 Readme file
  • TLS - Timeless Time & Expense ...
  • TLS - Piles 'O' Tiles ...

-ADS BY GOOGLE

SearchCompliance

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • audit program (audit plan)

    An audit program, also called an audit plan, is an action plan that documents what procedures an auditor will follow to validate ...

SearchSecurity

  • insider threat

    Insider threat is a generic term for a threat to an organization's security or data that comes from within.

  • ransomware

    Ransomware is a subset of malware in which the data on a victim's computer is locked, typically by encryption, and payment is ...

  • hacker

    A hacker is an individual who uses computer, networking or other skills to overcome a technical problem.

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

SearchSolidStateStorage

  • 3D XPoint

    3D XPoint is memory storage technology jointly developed by Intel and Micron Technology Inc.

  • RRAM or ReRAM (resistive RAM)

    RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...

  • JEDEC

    JEDEC is a global industry group that develops open standards for microelectronics.

SearchCloudStorage

  • Google Cloud Storage

    Google Cloud Storage is an enterprise public cloud storage platform that can house large unstructured data sets.

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

Close