Browse Definitions:

Browse File Extensions by Alphabet

TPO - TRN

  • TPO - Arena Template File ( ...
  • TPO - 3D graphic file
  • TPO - TOPO ! mapXchange ...
  • TPP - Project file (Teleport ...
  • TPP - Protected mode units (...
  • TPQ - TOPO !Pro Map Image ( ...
  • TPR - TMPEG Enc Video ...
  • TPR - GROMACS Portable Binary ...
  • TPR - Together Project ...
  • TPR - TMPGEnc Project File
  • TPR - TIGCC IDE Project File (...
  • TPR - Clarion for Windows ...
  • TPS - Multi Channel ...
  • TPS - Crazy Talk expression ...
  • TPS - Clarion TopSpeed Data ...
  • TPS - Micro Perfect Products
  • TPS - Clarion Topspeed Data ...
  • TPS - Clarion for Windows top ...
  • TPS - Multi Channel ...
  • TPS - Supposed compressed ...
  • TPT - ThumbsPlus thumbnail ...
  • TPT - Thumbs32 file
  • TPT - Sidekick 98 File
  • TPT - PCLTool Transformation ...
  • TPU - Turbo Pascal Unit (Turbo...
  • TPU - Command file (VAXTPU ...
  • TPV - Packed graphics file (...
  • TPW - Session-state file (...
  • TPW - Packed wave files (...
  • TPW - Turbo Pascal Unit (BGI) ...
  • TPX - Image file (ULead Photo ...
  • TPZ - Compressed archive (TAR)
  • TPZ - Compressed archive (...
  • TQD - Torq -DJ Song ...
  • TQF - Chemical test ( Chemical...
  • TQL - Microsoft SQL Server ...
  • TQL - Tree Query Language File
  • TQL - Insure ++ File
  • TQM - Session File
  • TR - Session-state settings (...
  • TR0 - SPICE Transient Analysis...
  • TR1 - 'IBM Voice Type ' ...
  • TR1 - Novell LANalyzer Capture...
  • TR2 - Session-state settings (...
  • TR3 - SPICE Transient Analysis...
  • TR3 - TomeRaider eBook ( ...
  • TR3 - TomeRaider eBook File
  • TR4 - SPICE Transient Analysis...
  • TR5 - Tree Professional File
  • TR5 - OnyxTree Professional ...
  • TR5 - TRIM reference file
  • TR6 - SPICE Transient Analysis...
  • TR7 - SPICE Transient Analysis...
  • TR8 - SPICE Transient Analysis...
  • TR9 - SPICE Transient Analysis...
  • TRA - Saved game file (Coaster)
  • TRACE - WebSTAR Mail Server ...
  • TRACE - Debugging File
  • TRACE - TcpDump Output File
  • TRADALOG - Tradalog Catalog File
  • TRAN - Document Convert
  • TRANS - Amaya file
  • TRANS - Amaya
  • TRASHINFO - Trash storage metadata ...
  • TRB - Animation Master ...
  • TRC - Debug support file (...
  • TRD - Datafile - 'file ...
  • TRD - TR Assistant dictionary
  • TRD - 'Definitions Package
  • TRD - Lingea Lexicon ...
  • TRD - TR-DOS Floppy Image
  • TRD - defs package Header
  • TRD - TR Assist Dictionary ...
  • TRE - Directory tree file (...
  • TRF - LFToolkit Transformation...
  • TRF - DocuMagix File
  • TRF - LFToolkit Transformation...
  • TRF - Train Simulator traffic ...
  • TRG - XMap Flight Plan or ...
  • TRG - Symantec LiveUpdate File...
  • TRH - Traverse PC Handheld ...
  • TRI - Trigram File
  • TRI - Cart3D triangulation
  • TRI - Alias Triangle
  • TRI - Alias TRIangle file
  • TRI - Ribbons FRODO Contours (...
  • TRI - LiveUpdate Product ...
  • TRI - 3D Space Triangulated ...
  • TRI - Quake texmake Utility ...
  • TRIA - Data - Greg Hood 's ...
  • TRIB - Data - Greg Hood 's ...
  • TRIF - Tiled Raster Interchange...
  • TRIPLE-S - Surveying file format
  • TRK - Script file (Kermit)
  • TRK3 - Rail3D 2KD/2k3 Layout ...
  • TRL - Topocad ( Chaos Systems ...
  • TRM - Terminal file (Generic)
  • TRM - Terminal settings file (...
  • TRN - Project usage log (MKS ...
  • TRN - Translation support file...

-ADS BY GOOGLE

SearchCompliance

  • PCAOB (Public Company Accounting Oversight Board)

    The Public Company Accounting Oversight Board (PCAOB) is a Congressionally-established nonprofit that assesses audits of public ...

  • cyborg anthropologist

    A cyborg anthropologist is an individual who studies the interaction between humans and technology, observing how technology can ...

  • RegTech

    RegTech, or regulatory technology, is a term used to describe technology that is used to help streamline the process of ...

SearchSecurity

  • email spam

    Email spam, or junk email, is unsolicited bulk messages sent through email with commercial, fraudulent or malicious intent.

  • distributed denial of service (DDoS) attack

    A distributed denial-of-service attack occurs when an attack originates from multiple computers or devices, usually from multiple...

  • application whitelisting

    Application whitelisting is the practice of identifying applications that have been deemed safe for execution and restricting all...

SearchHealthIT

  • athenahealth Inc.

    Based in Watertown, Mass., athenahealth Inc. is a leading vendor of cloud-based EHRs for small to medium-sized physician ...

  • Affordable Care Act (ACA or Obamacare)

    The Affordable Care Act (ACA) is legislation passed in 2010 that changed how uninsured Americans enroll in and receive healthcare...

  • HIPAA Privacy Rule

    The Standards for Privacy of Individually Identifiable Health Information, commonly known as the HIPAA Privacy Rule, establishes ...

SearchDisasterRecovery

  • disaster recovery as a service (DRaaS)

    One approach to a strong disaster recovery plan is DRaaS, where companies offload data replication and restoration ...

  • data recovery

    Data recovery restores data that has been lost, accidentally deleted, corrupted or made inaccessible. Learn how data recovery ...

  • disaster recovery plan (DRP)

    A company's disaster recovery policy is enhanced with a documented DR plan that formulates strategies, and outlines preparation ...

SearchStorage

  • yottabyte (YB)

    A yottabyte is a measure of theoretical storage capacity and is 2 to the 80th power bytes, or, in decimal, approximately 1,000 ...

  • Kilo, mega, giga, tera, peta, exa, zetta and all that

    Kilo, mega, giga, tera, peta, exa, zetta are among the list of prefixes used to denote the quantity of something, such as a byte ...

  • brontobyte

    A brontobyte is a measure of memory or data storage that is equal to 10 to the 27th power of bytes.

SearchSolidStateStorage

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

  • SSD caching

    SSD caching, also known as flash caching, is the temporary storage of data on NAND flash memory chips in a solid-state drive so ...

  • NVDIMM (Non-Volatile Dual In-line Memory Module)

    An NVDIMM (non-volatile dual in-line memory module) is hybrid computer memory that retains data during a service outage.

SearchCloudStorage

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

  • Zadara VPSA and ZIOS

    Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA ...

Close