Browse Definitions:

Browse File Extensions by Alphabet

3DW - 45

  • 3DW - Cadai 3D World ...
  • 3DX - Rhino 3D Model File
  • 3DX - Rhino 3D graphic
  • 3DXML - Dassault Systemes 3D XML...
  • 3DXML - 3D XML files ( zipped ) ...
  • 3DXML - 3D XML file
  • 3DZ - Easy 3D Creator Project ...
  • 3F - Advent 3B2 Template
  • 3F - Advent 3B2 template file
  • 3F - Al- Arabi Publisher ...
  • 3FR - Hasselblad 3F RAW image
  • 3FX - CorelChart 3D effects
  • 3FX - Effect - CorelChart
  • 3FX - 3D effects
  • 3G2 - 3GPP2 multimedia audio /...
  • 3G2 - 3GPP2 Multimedia File
  • 3GGP2 - 3GPP2 Multimedia File
  • 3GN - Imaging Fax image file
  • 3GP - 3GPP Multimedia File
  • 3GP - Multimedia files for ...
  • 3GP - Nokia 7650 Video ...
  • 3GP2 - 3GPP Multimedia File
  • 3GP2 - 3GPP2 Multimedia File
  • 3GPP - 3GPP Media File
  • 3GPP - 3GPP Multimedia File
  • 3GPP - 3GPP Third generation ...
  • 3GPP2 - 3GPP2 Multimedia File
  • 3GR - 386 Grabber File - Win
  • 3GR - Device Driver
  • 3GR - Windows Screen Grabber ...
  • 3GR - VGA Graphics driver / ...
  • 3H - Al- Arabi Publisher tag ...
  • 3H - Advent 3B2 Tag Header
  • 3IN - Configuration MSN Setup ...
  • 3IN - MSN Setup Information
  • 3K - Advent 3B2 keyboard ...
  • 3K - Advent 3B2 Keyboard ...
  • 3K - Al- Arabi Publisher ...
  • 3M - Al- Arabi Publisher Macro
  • 3M - Advent 3B2 Macro
  • 3ME - TurboTax Form File
  • 3MM - 3D Movie Maker ( generic...
  • 3MM - Microsoft 3D Movie Maker...
  • 3MM - 3D Movie Maker Movie ...
  • 3MP - TTCN -3 Toolbox Source ...
  • 3NG - AT Time ! Internal Log (...
  • 3O - Advent 3B2 Object Graphic
  • 3O3 - STABCAL ( stability ...
  • 3O5 - STABCAL ( stability ...
  • 3P - Advent 3B2 Document ...
  • 3P2 - 3GPP Multimedia File
  • 3PE - TurboTax 2008 Form File
  • 3PG - 3D Digital Gallery file
  • 3PI - ShapeGrabber scanner file
  • 3PI - 3rd PlanIt file
  • 3PI - 3rd PlanIt
  • 3R - Al- Arabi Publisher ...
  • 3R - Advent 3B2 Raster Image
  • 3RF - Advent 3B2 Extensions ...
  • 3S - Advent 3B2 Paragraph ...
  • 3T - Unknown Apple II File
  • 3T - Advent 3B2 Text
  • 3T - Often man file
  • 3T4 - Binary file converter to...
  • 3T4 - Util3 binary file ...
  • 3TA - Triple -T Animation
  • 3TF - Crystal Reports ( ...
  • 3TH - 3D Movie Maker Thumbnail...
  • 3TH - 3D Movie Maker ( generic...
  • 3TP - Triple -T Plug -in
  • 3X - Advent 3B2 Entity
  • 3X - cygwin man file
  • 3X5 - 3x5 Knowledge base file
  • 3X5 - 3 x 5 Knowledge Base
  • 3XE - 3DLinX Entity
  • 3~6 - Win3 System file
  • 3~6 - Windows 3.xx System file
  • 4 - Salt Lake City Game ...
  • 4 - IBM Embedded ViaVoice ...
  • 4 - Screen Log File
  • 4 - Unformatted manual page ...
  • 40 - AOL 4 Organizer File
  • 40 - Aol40 organizer file
  • 400 - Designer graphics file
  • 4000 - Unknown Apple II File
  • 4001 - Unknown Apple II File
  • 402 - Unknown Apple II File
  • 404 - FruityLoops Channel ...
  • 404 - Fruitypro Samples Ts404 ...
  • 404 - Muon DS404 patch file
  • 41 - Unknown Apple II File
  • 411 - Data file
  • 411 - Sony Mavica picture ...
  • 411 - Sony Mavica Data File
  • 42 - Salt Lake City Game ...
  • 42 - Unknown Apple II File
  • 426 - Speed Touch DSL Modem ...
  • 44 - CWCDATA file
  • 44 - Clipstream 32 Kb Stream

-ADS BY GOOGLE

SearchCompliance

  • PCAOB (Public Company Accounting Oversight Board)

    The Public Company Accounting Oversight Board (PCAOB) is a Congressionally-established nonprofit that assesses audits of public ...

  • cyborg anthropologist

    A cyborg anthropologist is an individual who studies the interaction between humans and technology, observing how technology can ...

  • RegTech

    RegTech, or regulatory technology, is a term used to describe technology that is used to help streamline the process of ...

SearchSecurity

  • email spam

    Email spam, or junk email, is unsolicited bulk messages sent through email with commercial, fraudulent or malicious intent.

  • distributed denial of service (DDoS) attack

    A distributed denial-of-service attack occurs when an attack originates from multiple computers or devices, usually from multiple...

  • application whitelisting

    Application whitelisting is the practice of identifying applications that have been deemed safe for execution and restricting all...

SearchHealthIT

  • athenahealth Inc.

    Based in Watertown, Mass., athenahealth Inc. is a leading vendor of cloud-based EHRs for small to medium-sized physician ...

  • Affordable Care Act (ACA or Obamacare)

    The Affordable Care Act (ACA) is legislation passed in 2010 that changed how uninsured Americans enroll in and receive healthcare...

  • HIPAA Privacy Rule

    The Standards for Privacy of Individually Identifiable Health Information, commonly known as the HIPAA Privacy Rule, establishes ...

SearchDisasterRecovery

  • disaster recovery as a service (DRaaS)

    One approach to a strong disaster recovery plan is DRaaS, where companies offload data replication and restoration ...

  • data recovery

    Data recovery restores data that has been lost, accidentally deleted, corrupted or made inaccessible. Learn how data recovery ...

  • disaster recovery plan (DRP)

    A company's disaster recovery policy is enhanced with a documented DR plan that formulates strategies, and outlines preparation ...

SearchStorage

  • virtual memory

    Virtual memory is a memory management capability of an OS that allows a computer to compensate for physical memory shortages by ...

  • yottabyte (YB)

    A yottabyte is a measure of theoretical storage capacity and is 2 to the 80th power bytes, or, in decimal, approximately 1,000 ...

  • Kilo, mega, giga, tera, peta, exa, zetta and all that

    Kilo, mega, giga, tera, peta, exa, zetta are among the list of prefixes used to denote the quantity of something, such as a byte ...

SearchSolidStateStorage

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

  • SSD caching

    SSD caching, also known as flash caching, is the temporary storage of data on NAND flash memory chips in a solid-state drive so ...

  • NVDIMM (Non-Volatile Dual In-line Memory Module)

    An NVDIMM (non-volatile dual in-line memory module) is hybrid computer memory that retains data during a service outage.

SearchCloudStorage

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

  • Zadara VPSA and ZIOS

    Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA ...

Close