Browse Definitions:

Browse File Extensions by Alphabet

ASS - ATQ

  • ASS - SubStation Alpha ...
  • ASS - Aegisub Advanced ...
  • ASS - Assistance for the blind...
  • ASS - ASS I/O file
  • ASS - Assembler / Disassembler...
  • ASS - Flash
  • ASS - Assistance for the blind
  • ASS - Advanced SubStation ...
  • ASSOC - Associate This File ...
  • ASSP - MAC file type
  • ASST - MAC file type
  • AST - Claris Works "assistant"...
  • AST - Astound multimedia file
  • AST2 - Astrotite ( Fantiusen ...
  • ASV - DataCAD Autosave file
  • ASW - Authorware Star - ...
  • ASWCS - avast ! antivirus skin ...
  • ASWCS - Avast ! Compressed Skin
  • ASWCS - avast ! Antivirus Skin (...
  • ASWS - avast ! Antivirus Skin (...
  • ASWS - Avast ! Skin File
  • ASX - Video file
  • ASX - Microsoft Advanced ...
  • ASX - Cheyenne Backup script
  • ASXML - AudioPlayer XML Music ...
  • ASY - LTspice IV circuit ...
  • ASZ - Skin - AltDesk
  • ASZ - LoseThos Assembly Source...
  • AT - Rescue Disk file
  • AT2 - Aldus Persuasion 2.0 ...
  • AT3 - ATRAC3 Audio File
  • AT3 - WinControl DCX- AT3000 ...
  • AT3 - Airport Tycoon - Version...
  • AT3 - Playstation audio file
  • AT3 - Airport Tycoon Version 3...
  • AT5 - Marine electronic chart
  • AT5 - Lowrance Map File
  • AT5 - AirMap file
  • AT65 - MAC file type
  • AT_ - Audio Utility Winatb ...
  • ATA - Antenna project Header
  • ATA - Antenna Project ( Julian...
  • ATAK - Soundscape Audio - Take ...
  • ATAK1A - Soundscape Audio - Take ...
  • ATAK4D - Soundscape Audio - Take ...
  • ATARI - ST Graphics Formats
  • ATB - TechMed Annotation ...
  • ATB - AnetHelp Tools file ...
  • ATB - Alphacam Lathe VB Macro ...
  • ATC - ACUCOBOL - GT Thin ...
  • ATC - AceText Collection ( ...
  • ATC - AutoCAD catalog file
  • ATC - Sniffer Capture File ( ...
  • ATD - Systems Management ...
  • ATD - Microsoft Systems ...
  • ATD - Alphacam Lathe Drawing (...
  • ATE - Office Accounting ...
  • ATF - Adobe Photoshop transfer...
  • ATF - Canvas duotone curve file
  • ATF - Sharp APL Workspace ...
  • ATF - Axon text file
  • ATF - GenePix Axon Text File (...
  • ATF - Photoshop Transfer ...
  • ATF - Aspect TIF file
  • ATF - Photoshop Transfer ...
  • ATF - Unknown Apple II File
  • ATF - Linux file
  • ATF - Altera design file
  • ATH - Athena document (v2.x) ...
  • ATH - Alphacam Lathe Thread ( ...
  • ATH - Athena Document ( Bertil...
  • ATHEME - Amazing clock Theme ( ...
  • ATI - Office Accounting ...
  • ATK - Bitmap image ( Andrew ...
  • ATK - Andrew Toolkit Raster ...
  • ATL - ATP Assembler Source ( ...
  • ATL - Hal file
  • ATL - PROGNOSIS Atlas Document...
  • ATL - AutoTap Log File (B&B ...
  • ATM - Adobe Type Manager data/...
  • ATMC - MAC file type
  • ATMC - Adobe Type Manager File
  • ATMN - Automation Anywhere ...
  • ATMSPHR - ATMoSPHeRe ( TerraGen - ...
  • ATMSPHR - TerragGen Atmosphere ( ...
  • ATN - Daqarta Extended Audio ...
  • ATN - Photoshop Action File ( ...
  • ATN - Adobe Photoshop action -...
  • ATN - Photoshop Actions File
  • ATN - Visual FoxPro WWW search...
  • ATO - ATO Modeler Project File...
  • ATO - Just Burn File ( Sonic ...
  • ATOM - Atom web feed Header
  • ATOM - Atom Syndication Format
  • ATOM - Atom Feed
  • ATOMS - Ribbons atoms file
  • ATP - Alphacam Lathe Post ( ...
  • ATP - Automise project file
  • ATP - Visual Studio.NET ACT ...
  • ATP - ATRAC encoded audio ...

-ADS BY GOOGLE

SearchCompliance

  • cyborg anthropologist

    A cyborg anthropologist is an individual who studies the interaction between humans and technology, observing how technology can ...

  • RegTech

    RegTech, or regulatory technology, is a term used to describe technology that is used to help streamline the process of ...

  • conduct risk

    Conduct risk is the prospect of financial loss to an organization that is caused by the actions of an organization's ...

SearchSecurity

  • application whitelisting

    Application whitelisting is the practice of identifying applications that have been deemed safe for execution and restricting all...

  • security

    Security, in information technology (IT), is the defense of digital information and IT assets against internal and external, ...

  • insider threat

    An insider threat is a malicious hacker (also called a cracker or a black hat) who is an employee or officer of a business, ...

SearchHealthIT

  • HIPAA Privacy Rule

    The Standards for Privacy of Individually Identifiable Health Information, commonly known as the HIPAA Privacy Rule, establishes ...

  • HIPAA business associate agreement (BAA)

    Under the U.S. Health Insurance Portability and Accountability Act of 1996, a HIPAA business associate agreement (BAA) is a ...

  • telemedicine

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

SearchDisasterRecovery

  • data recovery

    Data recovery restores data that has been lost, accidentally deleted, corrupted or made inaccessible. Learn how data recovery ...

  • disaster recovery plan (DRP)

    A company's disaster recovery policy is enhanced with a documented DR plan that formulates strategies, and outlines preparation ...

  • fault-tolerant

    Systems with integrated fault tolerance are designed to withstand multiple hardware failures to ensure continuous availability.

SearchStorage

  • data deduplication

    Deduplication retains one unique data instance to reduce storage and bandwidth consumed by remote backups, replication and ...

  • byte

    In most computer systems, a byte is a unit of data that is eight binary digits long. Bytes are often used to represent a ...

  • Secure Digital card (SD card)

    SD cards use flash memory to provide nonvolatile storage. They are more rugged than traditional storage media and are used in ...

SearchSolidStateStorage

  • flash file system

    Flash file systems are designed specifically for memory devices. A well-designed flash device and flash file system ensure ...

  • IOPS (input/output operations per second)

    IOPS measures the maximum number of reads and writes to non-contiguous storage. It is not an actual benchmark since vendor ...

  • eMMC (embedded MultiMediaCard)

    An embedded MultiMediaCard (eMMC) is a small storage device made up of NAND flash memory and a simple storage controller.

SearchCloudStorage

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

  • Zadara VPSA and ZIOS

    Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA ...

Close