Browse Definitions:

Browse File Extensions by Alphabet

7LS - 890

  • 7LSD - @ THINK C Debugger
  • 7PS - Manual PS file
  • 7PS - Man Ps file
  • 7T - Unknown Apple II File
  • 7XE - Keeboo web book import ...
  • 7z - 7-Zip open source file ...
  • 7ZIP - 7z Compressed Archive ...
  • 8 - Source file (Assembly) (...
  • 80 - Unknown Apple II File
  • 800 - PC- Config Vers. 8
  • 800 - Unknown Apple II File
  • 8000 - Unknown Apple II File
  • 8001 - Unknown Apple II File
  • 8002 - Unknown Apple II File
  • 8004 - Unknown Apple II File
  • 8006 - Unknown Apple II File
  • 800A - Unknown Apple II File
  • 8010 - Unknown Apple II File
  • 802F - Unknown Apple II File
  • 8031 - Unknown Apple II File
  • 81 - Unknown Apple II File
  • 82 - Unknown Apple II File
  • 820 - Whatsnew.820 = PC- ...
  • 822 - Pro/ Engineer WildFire ...
  • 82B - TI-82 Backup ( Texas ...
  • 82D - TI-82 GDB ( Texas ...
  • 82G - Texas Instruments TI-82 ...
  • 82I - TI-82 Bitmap ( Texas ...
  • 82L - TI-82 List ( Texas ...
  • 82M - TI-82 Matrix ( Texas ...
  • 82N - TI-82 Real Number ( ...
  • 82P - TI-82 Calculator Program...
  • 82T - TI-82 Text ( Texas ...
  • 82W - TI-82 Window Setup ( ...
  • 82Y - Texas Instruments TI-82 ...
  • 82Z - Texas Instruments TI-82 ...
  • 83B - TI-83 Backup ( Texas ...
  • 83C - TI-83 Complex Number ( ...
  • 83D - TI-83 Debugger File ( ...
  • 83G - TI-83 Group ( Texas ...
  • 83I - TI-83 Bitmap ( Texas ...
  • 83L - TI-83 List ( Texas ...
  • 83M - Texas Instruments TI-83 ...
  • 83N - TI-83 Real Number ( ...
  • 83P - TI-83 Calculator File
  • 83P - TI-83 calculator program
  • 83S - TI-83 String ( Texas ...
  • 83SD - TI-83 Plus Silver ...
  • 83T - TI-83 Text ( Texas ...
  • 83W - Texas Instruments TI-83 ...
  • 83Y - TI-83 ( Texas ...
  • 83Z - TI-83 Zoom ( Texas ...
  • 85 - 85x85 dpi display font -...
  • 85 - Unknown Apple II File
  • 85 - Ventura Publisher 85x85 ...
  • 850 - Visual Foxpro 98 File
  • 850 - Msdev Visual Foxpro 98 ...
  • 852 - Visual Foxpro 98 File
  • 852 - Msdev Visual Foxpro 98 ...
  • 854 - Bitmap image file
  • 854 - 8514 Resolution BMP ...
  • 85B - TI-85 Backup ( Texas ...
  • 85C - TI-85 Complex Number ( ...
  • 85D - TI-85 GDB ( Texas ...
  • 85E - Texas Instruments TI-85 ...
  • 85G - Texas Instruments TI-85 ...
  • 85I - TI Bitmap
  • 85I - TI-85 Bitmap ( Texas ...
  • 85K - TI-85 Constant ( Texas ...
  • 85L - TI-85 List ( Texas ...
  • 85M - TI-85 Matrix ( Texas ...
  • 85N - TI-85 Real Number ( ...
  • 85P - TI-85 Calculator Program...
  • 85R - TI-85 Range ( Texas ...
  • 85S - TI-85 String ( Texas ...
  • 85V - TI-85 Vector ( Texas ...
  • 85W - TI-85 Window Setup ( ...
  • 85Y - TI-85 Y Variable ( Texas...
  • 85Z - TI-85 Zoom ( Texas ...
  • 866 - Msdev Visual Foxpro 98 ...
  • 866 - Visual Foxpro 98 File
  • 86C - TI-86 Complex Expression...
  • 86D - TI-86 GDB ( Texas ...
  • 86E - Texas Instruments TI-86 ...
  • 86G - TI-86 Group ( Texas ...
  • 86I - TI-86 Bitmap ( Texas ...
  • 86K - TI-86 Constant ( Texas ...
  • 86L - TI-86 List ( Texas ...
  • 86M - TI-86 Matrix ( Texas ...
  • 86N - TI-86 Real Number ( ...
  • 86P - TI-86 Calculator File
  • 86R - TI-86 Range ( Texas ...
  • 86S - TI-86 String ( Texas ...
  • 86V - TI-86 Vector ( Texas ...
  • 86W - TI-86 Window Setup ( ...
  • 86Y - TI-86 Y Variable ( Texas...
  • 86Z - TI-86 Zoom ( Texas ...
  • 88 - Unknown Apple II File
  • 89 - Unknown Apple II File
  • 890 - SAM Digital Subtitle ( ...

-ADS BY GOOGLE

SearchCompliance

  • cyborg anthropologist

    A cyborg anthropologist is an individual who studies the interaction between humans and technology, observing how technology can ...

  • RegTech

    RegTech, or regulatory technology, is a term used to describe technology that is used to help streamline the process of ...

  • conduct risk

    Conduct risk is the prospect of financial loss to an organization that is caused by the actions of an organization's ...

SearchSecurity

  • security

    Security, in information technology (IT), is the defense of digital information and IT assets against internal and external, ...

  • insider threat

    An insider threat is a malicious hacker (also called a cracker or a black hat) who is an employee or officer of a business, ...

  • virus (computer virus)

    A computer virus is malicious code that replicates by copying itself to another program, computer boot sector or document.

SearchHealthIT

  • HIPAA Privacy Rule

    The Standards for Privacy of Individually Identifiable Health Information, commonly known as the HIPAA Privacy Rule, establishes ...

  • HIPAA business associate agreement (BAA)

    Under the U.S. Health Insurance Portability and Accountability Act of 1996, a HIPAA business associate agreement (BAA) is a ...

  • telemedicine

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

SearchDisasterRecovery

  • disaster recovery plan (DRP)

    A company's disaster recovery policy is enhanced with a documented DR plan that formulates strategies, and outlines preparation ...

  • fault-tolerant

    Systems with integrated fault tolerance are designed to withstand multiple hardware failures to ensure continuous availability.

  • disaster recovery (DR)

    Disaster recovery strategies are critical, as many businesses fail following an unforeseen event. DR may require an internal or ...

SearchStorage

  • Secure Digital card (SD card)

    SD cards use flash memory to provide nonvolatile storage. They are more rugged than traditional storage media and are used in ...

  • data storage

    In a computer, storage is the place where data is held in an electromagnetic or optical form for access by a computer processor.

  • flash storage

    Flash-based storage, based on flash memory, is used for data repositories, storage systems and consumer devices, such as USB ...

SearchSolidStateStorage

  • flash file system

    Flash file systems are designed specifically for memory devices. A well-designed flash device and flash file system ensure ...

  • IOPS (input/output operations per second)

    IOPS measures the maximum number of reads and writes to non-contiguous storage. It is not an actual benchmark since vendor ...

  • eMMC (embedded MultiMediaCard)

    An embedded MultiMediaCard (eMMC) is a small storage device made up of NAND flash memory and a simple storage controller.

SearchCloudStorage

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

  • Zadara VPSA and ZIOS

    Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA ...

Close