Browse Definitions:

Browse File Extensions by Alphabet

TLT - TOA

  • TLT - Trellix Web Design ...
  • TLT - Topocad ( Chaos Systems ...
  • TLT - TList Data File
  • TLT - AverTV Go 007 Teletext ...
  • TLT - Trellix web design file
  • TLV - TruLASER View Geometry ...
  • TLW - TLWallace.NET Document (...
  • TLX - Data file (Trellix)
  • TLY - Adobe Photoshop Elements...
  • TLZ - Tar LZMA Compressed File
  • TLZ - lzip Compressed File ( ...
  • TM - Technics Keyboard Sound ...
  • TM - TeXmacs Document
  • TM - PCCharge file
  • TM - TM Player ( Techsiti ...
  • TM - EOSAT Landsat Thematic ...
  • TM - Tecmail configuration ...
  • TM - HP Internet Advisor ...
  • TM2 - Typical Meteorological ...
  • TM2 - PlayStation2 TIM2 Bitmap...
  • TMA - DCI TradeManager Catalog...
  • TMAP - Real Pool Image
  • TMB - Movie Magic Screenwriter...
  • TMB - 602Pro PC Suite ...
  • TMB - Timbuktu Pro connection ...
  • TMB - Tmx Editor User File
  • TMB - Timbuktu Pro Connection ...
  • TMC - DCI TradeManager Catalog...
  • TMCONFIG - TaskMerlin Personal ...
  • TMD - TextMaker document from ...
  • TMDB - TaskMerlin Task ...
  • TMDBCONFIG - TaskMerlin Database ...
  • TME - EdgeCAM Licensing Data ...
  • TME - Swisslog TimeStudy Event...
  • TMF - Tagged font metric file ...
  • TMG - The Marketing Game File
  • TMI - TCM-3 Video File
  • TMIMAGES - TaskMerlin Database ...
  • TMK - Turbo Pascal TP_ tour ...
  • TMK - Turbopas Tp_ tour file
  • TML - AIRO timeline file format
  • TML - WZ Editor document or ...
  • TML - Padgen file
  • TML - Table Template Object ...
  • TML - Advanced ID Creator ...
  • TML - PADGen ( Associaton of ...
  • TMO - Ztg global optimizer ...
  • TMP - Temporary file (...
  • TMPL - formVista Template ( ...
  • TMPL - UNIX Template File
  • TMPL - eMule Web interface ...
  • TMPLG - TimeMap Send To TimeMap ...
  • TMPRTF - TimeMap portable file ...
  • TMQ - TestMaster file
  • TMR - Simpsons Cartoon Studio ...
  • TMREG - TaskMerlin Registration ...
  • TMS - Script file (Telemate)
  • TMT - Temporary File
  • TMV - Ashampoo TextMaker ...
  • TMVT - TimeMap Template File ( ...
  • TMW - Translation Memory Data ...
  • TMW - TRADOS Translator 's ...
  • TMW - Timeless Time & Expense ...
  • TMX - Translation Memory ...
  • TMX - Heartsome TMX editor file
  • TMY - Typical Meteorological ...
  • TMY2 - Typical Meteorological ...
  • TN - Photo Image
  • TN1 - Tiny Graphic
  • TN1 - Tiny image format
  • TN2 - Tiny image format
  • TN2 - Tiny Graphic
  • TN3 - Tiny Graphic
  • TN3 - Tiny image format
  • TNA - Topocad ( Chaos Systems ...
  • TNC - TI- Nspire CAS OS Image ...
  • TNC - SuperJPG ThumbNail Cache...
  • TNC - TI- Nspire OS Image ( ...
  • TNEF - Transport Neutral ...
  • TNEF - Transport Neutral ...
  • TNEF - Transport Neutral ...
  • TNF - Transport Neutral ...
  • TNFO - SpyBot Search & ...
  • TNG - Namo WebCanvas vector ...
  • TNG - Audio Utility ...
  • TNG - Yet Another Tengwar Tool...
  • TNI - Virtua Tennis Menufiles ...
  • TNK - Nimbus 7 SAMS Data File
  • TNK - TrunkTrac Scanner Info
  • TNL - Thumbnail image format
  • TNL - Thumbnail
  • TNO - TI- Nspire Handheld ...
  • TNPOLY - Triangulated polygon ...
  • TNS - TI- Nspire Document ( ...
  • TNS - TI- Nspire Document ...
  • TNV - Data file (BitWare)
  • TNX - PCLTool Text Extraction ...
  • TNY - TiNY bitmap image
  • TNY - Atari Tiny Image
  • TO_BE_DELETED - No Specific Program

-ADS BY GOOGLE

SearchCompliance

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • audit program (audit plan)

    An audit program, also called an audit plan, is an action plan that documents what procedures an auditor will follow to validate ...

SearchSecurity

  • insider threat

    Insider threat is a generic term for a threat to an organization's security or data that comes from within.

  • ransomware

    Ransomware is a subset of malware in which the data on a victim's computer is locked, typically by encryption, and payment is ...

  • hacker

    A hacker is an individual who uses computer, networking or other skills to overcome a technical problem.

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

SearchSolidStateStorage

  • 3D XPoint

    3D XPoint is memory storage technology jointly developed by Intel and Micron Technology Inc.

  • RRAM or ReRAM (resistive RAM)

    RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...

  • JEDEC

    JEDEC is a global industry group that develops open standards for microelectronics.

SearchCloudStorage

  • Google Cloud Storage

    Google Cloud Storage is an enterprise public cloud storage platform that can house large unstructured data sets.

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

Close