Browse Definitions:

Browse File Extensions by Alphabet

TIC - TLS

  • TIC - ArcInfo coordinates file
  • TIC - Lotto Pro 2002 ticket ...
  • TIC - ALLFIX FTN special file
  • TIC - FTN special file with ...
  • TID - AVCHD Thumbnail Index
  • TID - AVCHD Thumbnail Index ...
  • TID - IBM Voice Type languages...
  • TIE - X- wing Alliance Game ...
  • TIF - Tag image bitmap file (...
  • TIFENX - egis Encrypted TIF File ...
  • TIFF - Tag image bitmap file (...
  • TIFFENX - egis Encrypted TIFF File...
  • TIG - Map file (Tiger) (Used ...
  • TII - TI Interactive Workbook ...
  • TII - Apache Lucene term info ...
  • TIK - Script File for Game ...
  • TIL - Fuzzy Logic knowledge ...
  • TILE - Eclipse image file
  • TIM - Texture/Image file (...
  • TIN - MapInfo Professional ...
  • TINF - Mac File Type
  • TIP - Startup Tip File
  • TIP - Tip of the day for ...
  • TIP - TuneUp utilities icon ...
  • TIPROGRAM - TI- Basic Program File
  • TIS - Tile set (MahJongg 3.0)
  • TISV - WabbitDS Save File ( ...
  • TIT - Train Simulator track ...
  • TIX - DivX Video Download ...
  • TIX - Tix Widgets
  • TIX - DivX Video Download ...
  • TIX - ASA for UNIX Terminfo ...
  • TJF - backup files (VAXTPU ...
  • TJL - Backup file - VAXTPU ...
  • TJL - Backup File
  • TJM - Crazy Talk Model File ( ...
  • TJN - Karaoke Song ( ...
  • TJN - Taijin Media Net karaoke...
  • TJP - TaskJuggler Project File
  • TJP - Tiled JPEG File
  • TJS - TRACKJOY - Gravis ...
  • TJS - Sound
  • TK - Tk Script
  • TK - TK Solver File
  • TK - Tk Language Script
  • TK1 - Wintec Tools GPS log
  • TK2 - Take Two/ Easy CD ...
  • TK2 - Roxio / Take Two backup ...
  • TK3 - TK3 eBook ( Night ...
  • TK3 - TK3 Multimedia eBook
  • TKC - tKC Cracking Tutorial ...
  • TKFL - TKLinks Saver Favorite ...
  • TKL - Takeoff Live PDF working...
  • TKL - Holux MapShow305 track ...
  • TKM - Panasonic SD Voice ...
  • TKN - Liberty BASIC ...
  • TKN - Token Redeemer Download ...
  • TKO - DodgeView Take -Off File
  • TKP - MicroImages SML Script ...
  • TKS - TK8 Safe Master Password...
  • TKT - TK Solver File
  • TKW - TK Solver File
  • TL5 - TimeLiner 5.0 Timeline (...
  • TL_ - Doko Compressed Install ...
  • TLA - TuneUp Utilities Startup...
  • TLA - TLA - The Temporal Logic...
  • TLB - OLE type library files (...
  • TLB - Text library (VAX)
  • TLB - Reference table (Bubble ...
  • TLBACKUP - True Launch Bar backup ...
  • TLC - Compiled tool command ...
  • TLD - Disk Image - Teledisk
  • TLD - Teledisk Disk Image
  • TLD - Trellix Document Design ...
  • TLD - Tag Library Descriptor
  • TLE - Two-Line element set (...
  • TLF - Short Message Service ...
  • TLF - Opengl Stonehenge file
  • TLF - Turnpike SCORE link file
  • TLF - Gear Track List File
  • TLF - Avant ! Memory Compiler ...
  • TLG - Trellix WebGem
  • TLG - Beast 2.02 Trojan File
  • TLG - QuickBooks Transaction ...
  • TLH - Typelib generated C/C++ ...
  • TLH - Adder100 Source Code
  • TLH - Adder100 source file
  • TLI - Adder100 Source Code
  • TLI - Adder100 source file
  • TLK - Lands of Lore archive
  • TLK - BioWare Aurora Engine ...
  • TLK - Infinity Game Engine ...
  • TLK - Bioware Infinity game ...
  • TLM - Timeline Maker Timeline ...
  • TLO - SPSS Table Look Header
  • TLO - SPSS user table lookup ...
  • TLP - Project timeline file (...
  • TLS - Zortech 21 Readme file
  • TLS - Timeless Time & Expense ...
  • TLS - Piles 'O' Tiles ...

-ADS BY GOOGLE

SearchCompliance

  • cyborg anthropologist

    A cyborg anthropologist is an individual who studies the interaction between humans and technology, observing how technology can ...

  • RegTech

    RegTech, or regulatory technology, is a term used to describe technology that is used to help streamline the process of ...

  • conduct risk

    Conduct risk is the prospect of financial loss to an organization that is caused by the actions of an organization's ...

SearchSecurity

  • application whitelisting

    Application whitelisting is the practice of identifying applications that have been deemed safe for execution and restricting all...

  • security

    Security, in information technology (IT), is the defense of digital information and IT assets against internal and external, ...

  • insider threat

    An insider threat is a malicious hacker (also called a cracker or a black hat) who is an employee or officer of a business, ...

SearchHealthIT

  • HIPAA Privacy Rule

    The Standards for Privacy of Individually Identifiable Health Information, commonly known as the HIPAA Privacy Rule, establishes ...

  • HIPAA business associate agreement (BAA)

    Under the U.S. Health Insurance Portability and Accountability Act of 1996, a HIPAA business associate agreement (BAA) is a ...

  • telemedicine

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

SearchDisasterRecovery

  • data recovery

    Data recovery restores data that has been lost, accidentally deleted, corrupted or made inaccessible. Learn how data recovery ...

  • disaster recovery plan (DRP)

    A company's disaster recovery policy is enhanced with a documented DR plan that formulates strategies, and outlines preparation ...

  • fault-tolerant

    Systems with integrated fault tolerance are designed to withstand multiple hardware failures to ensure continuous availability.

SearchStorage

  • data deduplication

    Deduplication retains one unique data instance to reduce storage and bandwidth consumed by remote backups, replication and ...

  • byte

    In most computer systems, a byte is a unit of data that is eight binary digits long. Bytes are often used to represent a ...

  • Secure Digital card (SD card)

    SD cards use flash memory to provide nonvolatile storage. They are more rugged than traditional storage media and are used in ...

SearchSolidStateStorage

  • flash file system

    Flash file systems are designed specifically for memory devices. A well-designed flash device and flash file system ensure ...

  • IOPS (input/output operations per second)

    IOPS measures the maximum number of reads and writes to non-contiguous storage. It is not an actual benchmark since vendor ...

  • eMMC (embedded MultiMediaCard)

    An embedded MultiMediaCard (eMMC) is a small storage device made up of NAND flash memory and a simple storage controller.

SearchCloudStorage

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

  • Zadara VPSA and ZIOS

    Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA ...

Close