Browse Definitions:

Browse File Extensions by Alphabet

350 - 3DV

  • 350 - NCBridge XP Series ...
  • 36 - Salt Lake City Game ...
  • 36 - Unknown Apple II File
  • 360 - 360desktop 360- Degree ...
  • 37 - Salt Lake City Game ...
  • 370 - Printer driver file
  • 386 - Windows 3.x swap file
  • 386 - Intel 80386 processor ...
  • 386 - Unknown Apple II File
  • 386 - Windows virtual device ...
  • 38_ - Compr. Tvideo card Neu ...
  • 38_ - Compressed Tvideo Card ...
  • 3A - Unknown Apple II File
  • 3A3 - STABCAL ( stability ...
  • 3A5 - STABCAL ( stability ...
  • 3B - Unknown Apple II File
  • 3B - Data Flex 2.3b (.DAT)
  • 3B1 - Unknown Apple II File
  • 3B3 - STABCAL ( stability ...
  • 3B5 - STABCAL ( stability ...
  • 3C3 - STABCAL ( stability ...
  • 3C5 - STABCAL ( stability ...
  • 3CN - 3D Movie Maker Scene ( ...
  • 3D - Three - dimensional ...
  • 3D - Al- Arabi Publisher ...
  • 3D - Atari Stereo CAD-3D ...
  • 3D - Actify DesignShare ...
  • 3D - Geocadabra
  • 3D - VersaCAD 3D drawing file
  • 3D - Unknown Apple II File
  • 3D - SpinFire Professional ...
  • 3D - i3D browser file
  • 3D - Cadwork 3D CAD file
  • 3D - Advent 3B2 Document
  • 3D0 - Tracks for " Grand Prix ...
  • 3D2 - Stereo CAD-3D Ver. 2.0 ...
  • 3D2 - Stereo CAD-3D 2.0 Image ...
  • 3D2 - 3DPlus2 3D data file
  • 3D2 - Atari Stereo CAD-3D 2.0 ...
  • 3D3 - Grafik Anim file
  • 3D4 - Atari Stereo CAD-3D ...
  • 3D4 - Atari Stereo CAD-3D ...
  • 3D6 - Acorn RISC OS StrongHelp...
  • 3DA - Atmosphere World File ( ...
  • 3DA - 3D Assembly
  • 3DB - 3DMark Database
  • 3DB - 3D Mark Database ( ...
  • 3DC - 3D Canvas 3D Model File ...
  • 3DC - 3DCC Color Scheme
  • 3DC - Canvas 3D model file
  • 3DD - Grafik Anim file
  • 3DF - GQL chart template
  • 3DF - Adobe chart document
  • 3DF - Perspective Chart
  • 3DF - 3D Fonts document
  • 3DF - Quickdraw 3D File
  • 3DF - Seagate charts file
  • 3DF - Combi - Chem file
  • 3DFA - Project File
  • 3DG - 3D Grapher Plot ...
  • 3DH - CADD file
  • 3DI - 3D graphic file
  • 3DI - Delta Force Object ...
  • 3DJ - Pyware 3D Drill File ( ...
  • 3DK - IBM OS/2 floppy disk ...
  • 3DL - LightConverse 3D Model ...
  • 3DM - Cadent 3D Model Header
  • 3DM - Cadent 3D Model ( Cadent...
  • 3DM - Rhino 3D model file
  • 3DM - Quickdraw 3D Metafile ( ...
  • 3DM - Rhinoceros 3D Model ...
  • 3DM - 3D NURBS modeler
  • 3DM - Rhino 3D Model File ( ...
  • 3DMAP - CATIA 3dmap file
  • 3DMF - QuickDraw 3D Metafile
  • 3DMF - MacOS 3D metafile for ...
  • 3DMF - QuickDraw 3D Metafile ( ...
  • 3DML - In3D ( Flatland 3DML ) ...
  • 3DML - 3DML (3 Dimentional ...
  • 3DMLW - 3DMLW File (3D ...
  • 3DO - Tank3 demo file
  • 3DO - Total Annihilation ...
  • 3DOKU - 3Doku game file
  • 3DP - 3D Plus ( Serif )
  • 3DP - Serif 3DPlus File
  • 3DP - 3DMark03 Pro benchmark ...
  • 3DR - 3DMark Benchmark File
  • 3DS - 3D Studio 3D Scene ( ...
  • 3DS - 3D Studio Scene
  • 3DS - Autodesk 3D Studio 3D ...
  • 3DS - 3D Studio Graphics ...
  • 3DT - Texture 3D
  • 3DT - Topicscape Database (3D-...
  • 3DT - PFTRack file
  • 3DT - 3D Topicscape Database
  • 3DT - 3D Greetings Personal ...
  • 3DT - 3D Topicscape File
  • 3DV - Visual Component File
  • 3DV - 3D VRML World
  • 3DV - Grafic 3DV File

-ADS BY GOOGLE

SearchCompliance

  • PCAOB (Public Company Accounting Oversight Board)

    The Public Company Accounting Oversight Board (PCAOB) is a Congressionally-established nonprofit that assesses audits of public ...

  • cyborg anthropologist

    A cyborg anthropologist is an individual who studies the interaction between humans and technology, observing how technology can ...

  • RegTech

    RegTech, or regulatory technology, is a term used to describe technology that is used to help streamline the process of ...

SearchSecurity

  • email spam

    Email spam, or junk email, is unsolicited bulk messages sent through email with commercial, fraudulent or malicious intent.

  • distributed denial of service (DDoS) attack

    A distributed denial-of-service attack occurs when an attack originates from multiple computers or devices, usually from multiple...

  • application whitelisting

    Application whitelisting is the practice of identifying applications that have been deemed safe for execution and restricting all...

SearchHealthIT

  • athenahealth Inc.

    Based in Watertown, Mass., athenahealth Inc. is a leading vendor of cloud-based EHRs for small to medium-sized physician ...

  • Affordable Care Act (ACA or Obamacare)

    The Affordable Care Act (ACA) is legislation passed in 2010 that changed how uninsured Americans enroll in and receive healthcare...

  • HIPAA Privacy Rule

    The Standards for Privacy of Individually Identifiable Health Information, commonly known as the HIPAA Privacy Rule, establishes ...

SearchDisasterRecovery

  • disaster recovery as a service (DRaaS)

    One approach to a strong disaster recovery plan is DRaaS, where companies offload data replication and restoration ...

  • data recovery

    Data recovery restores data that has been lost, accidentally deleted, corrupted or made inaccessible. Learn how data recovery ...

  • disaster recovery plan (DRP)

    A company's disaster recovery policy is enhanced with a documented DR plan that formulates strategies, and outlines preparation ...

SearchStorage

  • yottabyte (YB)

    A yottabyte is a measure of theoretical storage capacity and is 2 to the 80th power bytes, or, in decimal, approximately 1,000 ...

  • Kilo, mega, giga, tera, peta, exa, zetta and all that

    Kilo, mega, giga, tera, peta, exa, zetta are among the list of prefixes used to denote the quantity of something, such as a byte ...

  • brontobyte

    A brontobyte is a measure of memory or data storage that is equal to 10 to the 27th power of bytes.

SearchSolidStateStorage

  • SSD caching

    SSD caching, also known as flash caching, is the temporary storage of data on NAND flash memory chips in a solid-state drive so ...

  • NVDIMM (Non-Volatile Dual In-line Memory Module)

    An NVDIMM (non-volatile dual in-line memory module) is hybrid computer memory that retains data during a service outage.

  • NAND mirroring

    NAND mirroring has been proposed to break the security in certain portable devices that use NAND flash memory for encryption.

SearchCloudStorage

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

  • Zadara VPSA and ZIOS

    Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA ...

Close