Browse Definitions:

Browse File Extensions by Alphabet

ASS - ATR

  • ASS - SubStation Alpha ...
  • ASS - Aegisub Advanced ...
  • ASS - Assistance for the blind...
  • ASS - ASS I/O file
  • ASS - Assembler / Disassembler...
  • ASS - Flash
  • ASS - Assistance for the blind
  • ASS - Advanced SubStation ...
  • ASSOC - Associate This File ...
  • ASSP - MAC file type
  • ASST - MAC file type
  • AST - Claris Works "assistant"...
  • AST - Astound multimedia file
  • AST2 - Astrotite ( Fantiusen ...
  • ASV - DataCAD Autosave file
  • ASW - Authorware Star - ...
  • ASWCS - avast ! antivirus skin ...
  • ASWCS - Avast ! Compressed Skin
  • ASWCS - avast ! Antivirus Skin (...
  • ASWS - avast ! Antivirus Skin (...
  • ASWS - Avast ! Skin File
  • ASX - Video file
  • ASX - Microsoft Advanced ...
  • ASX - Cheyenne Backup script
  • ASXML - AudioPlayer XML Music ...
  • ASY - LTspice IV circuit ...
  • ASZ - Skin - AltDesk
  • ASZ - LoseThos Assembly Source...
  • AT - Rescue Disk file
  • AT2 - Aldus Persuasion 2.0 ...
  • AT3 - ATRAC3 Audio File
  • AT3 - WinControl DCX- AT3000 ...
  • AT3 - Airport Tycoon - Version...
  • AT3 - Playstation audio file
  • AT3 - Airport Tycoon Version 3...
  • AT5 - Marine electronic chart
  • AT5 - Lowrance Map File
  • AT5 - AirMap file
  • AT65 - MAC file type
  • AT_ - Audio Utility Winatb ...
  • ATA - Antenna project Header
  • ATA - Antenna Project ( Julian...
  • ATAK - Soundscape Audio - Take ...
  • ATAK1A - Soundscape Audio - Take ...
  • ATAK4D - Soundscape Audio - Take ...
  • ATARI - ST Graphics Formats
  • ATB - TechMed Annotation ...
  • ATB - AnetHelp Tools file ...
  • ATB - Alphacam Lathe VB Macro ...
  • ATC - ACUCOBOL - GT Thin ...
  • ATC - AceText Collection ( ...
  • ATC - AutoCAD catalog file
  • ATC - Sniffer Capture File ( ...
  • ATD - Systems Management ...
  • ATD - Microsoft Systems ...
  • ATD - Alphacam Lathe Drawing (...
  • ATE - Office Accounting ...
  • ATF - Adobe Photoshop transfer...
  • ATF - Canvas duotone curve file
  • ATF - Sharp APL Workspace ...
  • ATF - Axon text file
  • ATF - GenePix Axon Text File (...
  • ATF - Photoshop Transfer ...
  • ATF - Aspect TIF file
  • ATF - Photoshop Transfer ...
  • ATF - Unknown Apple II File
  • ATF - Linux file
  • ATF - Altera design file
  • ATH - Athena document (v2.x) ...
  • ATH - Alphacam Lathe Thread ( ...
  • ATH - Athena Document ( Bertil...
  • ATHEME - Amazing clock Theme ( ...
  • ATI - Office Accounting ...
  • ATK - Bitmap image ( Andrew ...
  • ATK - Andrew Toolkit Raster ...
  • ATL - ATP Assembler Source ( ...
  • ATL - Hal file
  • ATL - PROGNOSIS Atlas Document...
  • ATL - AutoTap Log File (B&B ...
  • ATM - Adobe Type Manager data/...
  • ATMC - MAC file type
  • ATMC - Adobe Type Manager File
  • ATMN - Automation Anywhere ...
  • ATMSPHR - ATMoSPHeRe ( TerraGen - ...
  • ATMSPHR - TerragGen Atmosphere ( ...
  • ATN - Daqarta Extended Audio ...
  • ATN - Photoshop Action File ( ...
  • ATN - Adobe Photoshop action -...
  • ATN - Photoshop Actions File
  • ATN - Visual FoxPro WWW search...
  • ATO - ATO Modeler Project File...
  • ATO - Just Burn File ( Sonic ...
  • ATOM - Atom web feed Header
  • ATOM - Atom Syndication Format
  • ATOM - Atom Feed
  • ATOMS - Ribbons atoms file
  • ATP - Alphacam Lathe Post ( ...
  • ATP - Automise project file
  • ATP - Visual Studio.NET ACT ...
  • ATP - ATRAC encoded audio ...

-ADS BY GOOGLE

SearchCompliance

  • PCAOB (Public Company Accounting Oversight Board)

    The Public Company Accounting Oversight Board (PCAOB) is a Congressionally-established nonprofit that assesses audits of public ...

  • cyborg anthropologist

    A cyborg anthropologist is an individual who studies the interaction between humans and technology, observing how technology can ...

  • RegTech

    RegTech, or regulatory technology, is a term used to describe technology that is used to help streamline the process of ...

SearchSecurity

  • email spam

    Email spam, or junk email, is unsolicited bulk messages sent through email with commercial, fraudulent or malicious intent.

  • distributed denial of service (DDoS) attack

    A distributed denial-of-service attack occurs when an attack originates from multiple computers or devices, usually from multiple...

  • application whitelisting

    Application whitelisting is the practice of identifying applications that have been deemed safe for execution and restricting all...

SearchHealthIT

  • national provider identifier (NPI)

    A national provider identifier (NPI) is a unique ten-digit identification number required by HIPAA for covered healthcare ...

  • athenahealth Inc.

    Based in Watertown, Mass., athenahealth Inc. is a leading vendor of cloud-based EHRs for small to medium-sized physician ...

  • Affordable Care Act (ACA or Obamacare)

    The Affordable Care Act (ACA) is legislation passed in 2010 that changed how uninsured Americans enroll in and receive healthcare...

SearchDisasterRecovery

  • disaster recovery as a service (DRaaS)

    One approach to a strong disaster recovery plan is DRaaS, where companies offload data replication and restoration ...

  • data recovery

    Data recovery restores data that has been lost, accidentally deleted, corrupted or made inaccessible. Learn how data recovery ...

  • disaster recovery plan (DRP)

    A company's disaster recovery policy is enhanced with a documented DR plan that formulates strategies, and outlines preparation ...

SearchStorage

  • GlusterFS (Gluster File System)

    GlusterFS (Gluster File System) is an open source distributed file system that can scale out in building-block fashion to store ...

  • virtual memory

    Virtual memory is a memory management capability of an OS that allows a computer to compensate for physical memory shortages by ...

  • yottabyte (YB)

    A yottabyte is a measure of theoretical storage capacity and is 2 to the 80th power bytes, or, in decimal, approximately 1,000 ...

SearchSolidStateStorage

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

  • SSD caching

    SSD caching, also known as flash caching, is the temporary storage of data on NAND flash memory chips in a solid-state drive so ...

  • NVDIMM (Non-Volatile Dual In-line Memory Module)

    An NVDIMM (non-volatile dual in-line memory module) is hybrid computer memory that retains data during a service outage.

SearchCloudStorage

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

  • Zadara VPSA and ZIOS

    Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA ...

Close