Browse Definitions:

Browse File Extensions by Alphabet

89A - 8XK

  • 89A - TI-89 Figure ( Texas ...
  • 89B - TI-89 Backup ( Texas ...
  • 89C - TI-89 Data ( Texas ...
  • 89D - TI-89 GDB ( Texas ...
  • 89E - TI-89 Expression ( Texas...
  • 89F - TI-89 Function ( Texas ...
  • 89G - TI-89 Group ( Texas ...
  • 89I - TI-89 Bitmap ( Texas ...
  • 89K - TI-89 Application ( ...
  • 89L - TI-89 List ( Texas ...
  • 89M - TI-89 Matrix ( Texas ...
  • 89N - Texas Instruments TI-89 ...
  • 89P - Executable program for ...
  • 89Q - TI-89 Certificate ( ...
  • 89R - TI-89 ( Texas ...
  • 89S - TI-89 String ( Texas ...
  • 89T - TI-89 Text ( Texas ...
  • 89U - TI-89 OS Upgrade ( Texas...
  • 89X - Texas Instruments TI-89 ...
  • 89Y - TI-89 Program / Graphic ...
  • 89Z - TI-89 ASM Program ( ...
  • 8A - Unknown Apple II File
  • 8B - Unknown Apple II File
  • 8BA - PhotoShop Import dll
  • 8BA - Adobe PhotoShop Import ...
  • 8BAM - Mac File Type
  • 8BBR - Mac File Type
  • 8BC - 8BallClub Billiards game...
  • 8BC - Photoshop 5.0 Plug -in
  • 8BC - Photoshop Plug -in ( ...
  • 8BCO - Mac File Type
  • 8BCO - Photoshop Color Table
  • 8BCT - Mac File Type
  • 8BDT - Mac File Type
  • 8BE - Adobe PhotoDeluxe Plug -...
  • 8BE - Plug -in filter for ...
  • 8BE - PhotoDeluxe Plug -in ( ...
  • 8BEM - Mac File Type
  • 8BF - Filter Factory Image ...
  • 8BF - Adobe Photoshop ...
  • 8BF - Photoshop Plug -in ...
  • 8BFK - Adobe Photoshop commands...
  • 8BFM - Photoshop Filter
  • 8BI - Adobe Photoshop Plugins ...
  • 8BI - Photoshop Plug -in
  • 8BI8 - Adobe PhotoShop Plugin ...
  • 8BI8 - Photoshop Plug -in
  • 8BIF - Mac File Type
  • 8BIM - Adobe Photoshop graphic ...
  • 8BL - Photoshop Plug -in
  • 8BL - Adobe PhotoShop Plugin ...
  • 8BP - PhotoShop Import
  • 8BP - Adobe PhotoShop import ...
  • 8BPF - Mac File Type
  • 8BPI - Mac File Type
  • 8BPS - Adobe Photoshop file
  • 8BPS - PhotoShop Transparent ...
  • 8BS - Adobe Photoshop ...
  • 8BS - Photoshop 5.0 Selection ...
  • 8BX - PhotoDeluxe Plug -in
  • 8BX - Adobe PhotoShop Plugin ...
  • 8BXM - Mac File Type
  • 8BY - Adobe Photoshop Plugins ...
  • 8BY - PhotoDeluxe Plug -in
  • 8BYM - Mac File Type
  • 8CM - Eight Channel Module
  • 8CM - Music (8 Channel Module )
  • 8CM - Sound
  • 8CM - Triton FastTracker music...
  • 8DK - OS/2 Saved SKF Format ...
  • 8LI - Photoshop Plug -in ( ...
  • 8LI - Adobe Photoshop 5.0 Sdk ...
  • 8LY - Adobe Photoshop 5.0 Sdk ...
  • 8LY - Photoshop Plug -in ( ...
  • 8M - Printer font with Math 8...
  • 8M - Math 8 extended ...
  • 8M - Adobe PageMaker Math 8 ...
  • 8MED - Amiga OctaMed Music ( ...
  • 8MED - Amiga OctaMed music
  • 8MED - Music
  • 8PBS - Adobe Photoshop ...
  • 8PBS - Adobe Photoshop Mac File
  • 8ST - 8start Launcher File
  • 8SV - Sound file
  • 8SVX - Sound file
  • 8SVX - Amiga 8-bit Sound ( ...
  • 8SVX - Amiga 8-bit sound
  • 8TY - Adobe Photoshop file
  • 8U - Adobe Pagemaker Roman 8 ...
  • 8U - Printer font with Roman ...
  • 8XB - TI-82- Plus Backup ( ...
  • 8XC - Texas Instruments TI-82-...
  • 8XD - TI-82- Plus GDB ( Texas ...
  • 8XE - TI-83 Plus Calculator ...
  • 8XG - TI-82- Plus Group ( ...
  • 8XI - TI-83 Plus Bitmap ( ...
  • 8XK - TI-83 Plus Application ...
  • 8XK - Texas Instruments TI-8x ...
  • 8XK - MirageOS Flash ...
  • 8XK - TI-82 Plus application ...

-ADS BY GOOGLE

SearchCompliance

  • cyborg anthropologist

    A cyborg anthropologist is an individual who studies the interaction between humans and technology, observing how technology can ...

  • RegTech

    RegTech, or regulatory technology, is a term used to describe technology that is used to help streamline the process of ...

  • conduct risk

    Conduct risk is the prospect of financial loss to an organization that is caused by the actions of an organization's ...

SearchSecurity

  • application whitelisting

    Application whitelisting is the practice of identifying applications that have been deemed safe for execution and restricting all...

  • security

    Security, in information technology (IT), is the defense of digital information and IT assets against internal and external, ...

  • insider threat

    An insider threat is a malicious hacker (also called a cracker or a black hat) who is an employee or officer of a business, ...

SearchHealthIT

  • HIPAA Privacy Rule

    The Standards for Privacy of Individually Identifiable Health Information, commonly known as the HIPAA Privacy Rule, establishes ...

  • HIPAA business associate agreement (BAA)

    Under the U.S. Health Insurance Portability and Accountability Act of 1996, a HIPAA business associate agreement (BAA) is a ...

  • telemedicine

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

SearchDisasterRecovery

  • data recovery

    Data recovery restores data that has been lost, accidentally deleted, corrupted or made inaccessible. Learn how data recovery ...

  • disaster recovery plan (DRP)

    A company's disaster recovery policy is enhanced with a documented DR plan that formulates strategies, and outlines preparation ...

  • fault-tolerant

    Systems with integrated fault tolerance are designed to withstand multiple hardware failures to ensure continuous availability.

SearchStorage

  • data deduplication

    Deduplication retains one unique data instance to reduce storage and bandwidth consumed by remote backups, replication and ...

  • byte

    In most computer systems, a byte is a unit of data that is eight binary digits long. Bytes are often used to represent a ...

  • Secure Digital card (SD card)

    SD cards use flash memory to provide nonvolatile storage. They are more rugged than traditional storage media and are used in ...

SearchSolidStateStorage

  • flash file system

    Flash file systems are designed specifically for memory devices. A well-designed flash device and flash file system ensure ...

  • IOPS (input/output operations per second)

    IOPS measures the maximum number of reads and writes to non-contiguous storage. It is not an actual benchmark since vendor ...

  • eMMC (embedded MultiMediaCard)

    An embedded MultiMediaCard (eMMC) is a small storage device made up of NAND flash memory and a simple storage controller.

SearchCloudStorage

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

  • Zadara VPSA and ZIOS

    Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA ...

Close