Browse Definitions:

Browse File Extensions by Alphabet

350 - 3DV

  • 350 - NCBridge XP Series ...
  • 36 - Salt Lake City Game ...
  • 36 - Unknown Apple II File
  • 360 - 360desktop 360- Degree ...
  • 37 - Salt Lake City Game ...
  • 370 - Printer driver file
  • 386 - Windows 3.x swap file
  • 386 - Intel 80386 processor ...
  • 386 - Unknown Apple II File
  • 386 - Windows virtual device ...
  • 38_ - Compr. Tvideo card Neu ...
  • 38_ - Compressed Tvideo Card ...
  • 3A - Unknown Apple II File
  • 3A3 - STABCAL ( stability ...
  • 3A5 - STABCAL ( stability ...
  • 3B - Unknown Apple II File
  • 3B - Data Flex 2.3b (.DAT)
  • 3B1 - Unknown Apple II File
  • 3B3 - STABCAL ( stability ...
  • 3B5 - STABCAL ( stability ...
  • 3C3 - STABCAL ( stability ...
  • 3C5 - STABCAL ( stability ...
  • 3CN - 3D Movie Maker Scene ( ...
  • 3D - Three - dimensional ...
  • 3D - Al- Arabi Publisher ...
  • 3D - Atari Stereo CAD-3D ...
  • 3D - Actify DesignShare ...
  • 3D - Geocadabra
  • 3D - VersaCAD 3D drawing file
  • 3D - Unknown Apple II File
  • 3D - SpinFire Professional ...
  • 3D - i3D browser file
  • 3D - Cadwork 3D CAD file
  • 3D - Advent 3B2 Document
  • 3D0 - Tracks for " Grand Prix ...
  • 3D2 - Stereo CAD-3D Ver. 2.0 ...
  • 3D2 - Stereo CAD-3D 2.0 Image ...
  • 3D2 - 3DPlus2 3D data file
  • 3D2 - Atari Stereo CAD-3D 2.0 ...
  • 3D3 - Grafik Anim file
  • 3D4 - Atari Stereo CAD-3D ...
  • 3D4 - Atari Stereo CAD-3D ...
  • 3D6 - Acorn RISC OS StrongHelp...
  • 3DA - Atmosphere World File ( ...
  • 3DA - 3D Assembly
  • 3DB - 3DMark Database
  • 3DB - 3D Mark Database ( ...
  • 3DC - 3D Canvas 3D Model File ...
  • 3DC - 3DCC Color Scheme
  • 3DC - Canvas 3D model file
  • 3DD - Grafik Anim file
  • 3DF - GQL chart template
  • 3DF - Adobe chart document
  • 3DF - Perspective Chart
  • 3DF - 3D Fonts document
  • 3DF - Quickdraw 3D File
  • 3DF - Seagate charts file
  • 3DF - Combi - Chem file
  • 3DFA - Project File
  • 3DG - 3D Grapher Plot ...
  • 3DH - CADD file
  • 3DI - 3D graphic file
  • 3DI - Delta Force Object ...
  • 3DJ - Pyware 3D Drill File ( ...
  • 3DK - IBM OS/2 floppy disk ...
  • 3DL - LightConverse 3D Model ...
  • 3DM - Cadent 3D Model Header
  • 3DM - Cadent 3D Model ( Cadent...
  • 3DM - Rhino 3D model file
  • 3DM - Quickdraw 3D Metafile ( ...
  • 3DM - Rhinoceros 3D Model ...
  • 3DM - 3D NURBS modeler
  • 3DM - Rhino 3D Model File ( ...
  • 3DMAP - CATIA 3dmap file
  • 3DMF - QuickDraw 3D Metafile
  • 3DMF - MacOS 3D metafile for ...
  • 3DMF - QuickDraw 3D Metafile ( ...
  • 3DML - In3D ( Flatland 3DML ) ...
  • 3DML - 3DML (3 Dimentional ...
  • 3DMLW - 3DMLW File (3D ...
  • 3DO - Tank3 demo file
  • 3DO - Total Annihilation ...
  • 3DOKU - 3Doku game file
  • 3DP - 3D Plus ( Serif )
  • 3DP - Serif 3DPlus File
  • 3DP - 3DMark03 Pro benchmark ...
  • 3DR - 3DMark Benchmark File
  • 3DS - 3D Studio 3D Scene ( ...
  • 3DS - 3D Studio Scene
  • 3DS - Autodesk 3D Studio 3D ...
  • 3DS - 3D Studio Graphics ...
  • 3DT - Texture 3D
  • 3DT - Topicscape Database (3D-...
  • 3DT - PFTRack file
  • 3DT - 3D Topicscape Database
  • 3DT - 3D Greetings Personal ...
  • 3DT - 3D Topicscape File
  • 3DV - Visual Component File
  • 3DV - 3D VRML World
  • 3DV - Grafic 3DV File

-ADS BY GOOGLE

SearchCompliance

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

SearchSecurity

  • computer exploit

    A computer exploit, or exploit, is an attack on a computer system, especially one that takes advantage of a particular ...

  • cyberwarfare

    Cyberwarfare is computer- or network-based conflict involving politically motivated attacks by a nation-state on another ...

  • insider threat

    Insider threat is a generic term for a threat to an organization's security or data that comes from within.

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

  • OpenStack Block Storage (Cinder)

    OpenStack Block Storage (Cinder) is open source software designed to create and manage a service that provides persistent data ...

  • SATA Express (SATAe)

    SATA Express (SATAe or Serial ATA Express) is a bus interface to connect storage devices to a computer motherboard, supporting ...

  • DIMM (dual in-line memory module)

    A DIMM (dual in-line memory module) is the standard memory card used in servers and PCs.

SearchSolidStateStorage

  • hybrid flash array

    A hybrid flash array is a solid-state storage system that contains a mix of flash memory drives and hard disk drives.

  • 3D XPoint

    3D XPoint is memory storage technology jointly developed by Intel and Micron Technology Inc.

  • RRAM or ReRAM (resistive RAM)

    RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...

SearchCloudStorage

  • Google Cloud Storage

    Google Cloud Storage is an enterprise public cloud storage platform that can house large unstructured data sets.

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

Close