Browse Definitions:

Browse File Extensions by Alphabet

TLT - TOA

  • TLT - Trellix Web Design ...
  • TLT - Topocad ( Chaos Systems ...
  • TLT - TList Data File
  • TLT - AverTV Go 007 Teletext ...
  • TLT - Trellix web design file
  • TLV - TruLASER View Geometry ...
  • TLW - TLWallace.NET Document (...
  • TLX - Data file (Trellix)
  • TLY - Adobe Photoshop Elements...
  • TLZ - Tar LZMA Compressed File
  • TLZ - lzip Compressed File ( ...
  • TM - Technics Keyboard Sound ...
  • TM - TeXmacs Document
  • TM - PCCharge file
  • TM - TM Player ( Techsiti ...
  • TM - EOSAT Landsat Thematic ...
  • TM - Tecmail configuration ...
  • TM - HP Internet Advisor ...
  • TM2 - Typical Meteorological ...
  • TM2 - PlayStation2 TIM2 Bitmap...
  • TMA - DCI TradeManager Catalog...
  • TMAP - Real Pool Image
  • TMB - Movie Magic Screenwriter...
  • TMB - 602Pro PC Suite ...
  • TMB - Timbuktu Pro connection ...
  • TMB - Tmx Editor User File
  • TMB - Timbuktu Pro Connection ...
  • TMC - DCI TradeManager Catalog...
  • TMCONFIG - TaskMerlin Personal ...
  • TMD - TextMaker document from ...
  • TMDB - TaskMerlin Task ...
  • TMDBCONFIG - TaskMerlin Database ...
  • TME - EdgeCAM Licensing Data ...
  • TME - Swisslog TimeStudy Event...
  • TMF - Tagged font metric file ...
  • TMG - The Marketing Game File
  • TMI - TCM-3 Video File
  • TMIMAGES - TaskMerlin Database ...
  • TMK - Turbo Pascal TP_ tour ...
  • TMK - Turbopas Tp_ tour file
  • TML - AIRO timeline file format
  • TML - WZ Editor document or ...
  • TML - Padgen file
  • TML - Table Template Object ...
  • TML - Advanced ID Creator ...
  • TML - PADGen ( Associaton of ...
  • TMO - Ztg global optimizer ...
  • TMP - Temporary file (...
  • TMPL - formVista Template ( ...
  • TMPL - UNIX Template File
  • TMPL - eMule Web interface ...
  • TMPLG - TimeMap Send To TimeMap ...
  • TMPRTF - TimeMap portable file ...
  • TMQ - TestMaster file
  • TMR - Simpsons Cartoon Studio ...
  • TMREG - TaskMerlin Registration ...
  • TMS - Script file (Telemate)
  • TMT - Temporary File
  • TMV - Ashampoo TextMaker ...
  • TMVT - TimeMap Template File ( ...
  • TMW - Translation Memory Data ...
  • TMW - TRADOS Translator 's ...
  • TMW - Timeless Time & Expense ...
  • TMX - Translation Memory ...
  • TMX - Heartsome TMX editor file
  • TMY - Typical Meteorological ...
  • TMY2 - Typical Meteorological ...
  • TN - Photo Image
  • TN1 - Tiny Graphic
  • TN1 - Tiny image format
  • TN2 - Tiny image format
  • TN2 - Tiny Graphic
  • TN3 - Tiny Graphic
  • TN3 - Tiny image format
  • TNA - Topocad ( Chaos Systems ...
  • TNC - TI- Nspire CAS OS Image ...
  • TNC - SuperJPG ThumbNail Cache...
  • TNC - TI- Nspire OS Image ( ...
  • TNEF - Transport Neutral ...
  • TNEF - Transport Neutral ...
  • TNEF - Transport Neutral ...
  • TNF - Transport Neutral ...
  • TNFO - SpyBot Search & ...
  • TNG - Namo WebCanvas vector ...
  • TNG - Audio Utility ...
  • TNG - Yet Another Tengwar Tool...
  • TNI - Virtua Tennis Menufiles ...
  • TNK - Nimbus 7 SAMS Data File
  • TNK - TrunkTrac Scanner Info
  • TNL - Thumbnail image format
  • TNL - Thumbnail
  • TNO - TI- Nspire Handheld ...
  • TNPOLY - Triangulated polygon ...
  • TNS - TI- Nspire Document ( ...
  • TNS - TI- Nspire Document ...
  • TNV - Data file (BitWare)
  • TNX - PCLTool Text Extraction ...
  • TNY - TiNY bitmap image
  • TNY - Atari Tiny Image
  • TO_BE_DELETED - No Specific Program

-ADS BY GOOGLE

SearchCompliance

  • PCAOB (Public Company Accounting Oversight Board)

    The Public Company Accounting Oversight Board (PCAOB) is a Congressionally-established nonprofit that assesses audits of public ...

  • cyborg anthropologist

    A cyborg anthropologist is an individual who studies the interaction between humans and technology, observing how technology can ...

  • RegTech

    RegTech, or regulatory technology, is a term used to describe technology that is used to help streamline the process of ...

SearchSecurity

  • email spam

    Email spam, or junk email, is unsolicited bulk messages sent through email with commercial, fraudulent or malicious intent.

  • distributed denial of service (DDoS) attack

    A distributed denial-of-service attack occurs when an attack originates from multiple computers or devices, usually from multiple...

  • application whitelisting

    Application whitelisting is the practice of identifying applications that have been deemed safe for execution and restricting all...

SearchHealthIT

  • athenahealth Inc.

    Based in Watertown, Mass., athenahealth Inc. is a leading vendor of cloud-based EHRs for small to medium-sized physician ...

  • Affordable Care Act (ACA or Obamacare)

    The Affordable Care Act (ACA) is legislation passed in 2010 that changed how uninsured Americans enroll in and receive healthcare...

  • HIPAA Privacy Rule

    The Standards for Privacy of Individually Identifiable Health Information, commonly known as the HIPAA Privacy Rule, establishes ...

SearchDisasterRecovery

  • disaster recovery as a service (DRaaS)

    One approach to a strong disaster recovery plan is DRaaS, where companies offload data replication and restoration ...

  • data recovery

    Data recovery restores data that has been lost, accidentally deleted, corrupted or made inaccessible. Learn how data recovery ...

  • disaster recovery plan (DRP)

    A company's disaster recovery policy is enhanced with a documented DR plan that formulates strategies, and outlines preparation ...

SearchStorage

  • yottabyte (YB)

    A yottabyte is a measure of theoretical storage capacity and is 2 to the 80th power bytes, or, in decimal, approximately 1,000 ...

  • Kilo, mega, giga, tera, peta, exa, zetta and all that

    Kilo, mega, giga, tera, peta, exa, zetta are among the list of prefixes used to denote the quantity of something, such as a byte ...

  • brontobyte

    A brontobyte is a measure of memory or data storage that is equal to 10 to the 27th power of bytes.

SearchSolidStateStorage

  • SSD caching

    SSD caching, also known as flash caching, is the temporary storage of data on NAND flash memory chips in a solid-state drive so ...

  • NVDIMM (Non-Volatile Dual In-line Memory Module)

    An NVDIMM (non-volatile dual in-line memory module) is hybrid computer memory that retains data during a service outage.

  • NAND mirroring

    NAND mirroring has been proposed to break the security in certain portable devices that use NAND flash memory for encryption.

SearchCloudStorage

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

  • Zadara VPSA and ZIOS

    Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA ...

Close