Browse Definitions:

Browse File Extensions by Alphabet

ATR - AVP

  • ATR - MicroSim PCBoard ...
  • ATR - Lightscape Material ...
  • ATR - Atari Disk Image File ( ...
  • ATR - Atari 8-bit disk image
  • ATRAC - Sony ATRAC Audio File
  • ATS - Attityd survey program
  • ATS - Unrelated Inventions ...
  • ATS - Audiotools file
  • ATT - Data file commonly used ...
  • ATT - AT&T Group 4 bitmap
  • ATTR - Apple iPhoto image ...
  • ATTR - iPhoto image data Header
  • ATW - AnyTime Deluxe for ...
  • ATX - Animation Master Plugin ...
  • ATX - Alphasoft Trueterm 2001 ...
  • ATX - Texture plugin ( ...
  • ATX - A ZIP- formatted ...
  • ATY - Association Placeholder ...
  • ATY - 3D Topicscape File
  • ATY - 3D Topicscape ...
  • ATYP - FileTYPE _ AutoTYPE
  • ATZ - Aston Compiled Theme ( ...
  • ATZ - Aston compiled theme
  • ATZ - Atomic Time Zone File
  • AU - uLaw /AU Audio File
  • AU - Sun/NeXT/DEC/UNIX sound ...
  • AU - Audio File
  • AU - ?-law sound file
  • AU - Audio U-law (pronounced ...
  • AU - Sun Microsystems audio ...
  • AU - NeXT /Sun uLaw / AUdio ...
  • AU - Audacity audio block
  • AU3 - AutoIt v3 file
  • AU3 - AutoIt v3 Script
  • AUC - Advanced URL Catalog ...
  • AUCD - AppleCD Audio Player
  • AUD - Audio file (Westwood ...
  • AUDIOCD - Audio CD file
  • AUF - Hansen Information ...
  • AUF - Alphacam User Font ( ...
  • AUF - Audacity block file
  • AUF - ASAUpdaterV2 Update File...
  • AUM - Adobe Update Manager ...
  • AUM - Adobe Update Manager ...
  • AUP - Audacity project file
  • AUPD - Windows Update File
  • AUPF - Audio CD Player ...
  • AUR - AutoREALM map file
  • AUR - Sheffield Thesaurus file
  • AUR - AutoREALM Map Header
  • AURL - MAC file type
  • AUS - Agnitum Outpost Firewall...
  • AUS - AutoREALM Symbols Header
  • AUS - AutoREALM Symbols
  • AUST - Self - extracting archive
  • AUT - AutoIt Script File
  • AUT - Descent Manager Mission ...
  • AUT - AutoIt (pre Ver. 3) ...
  • AUT - IPIX automation
  • AUT - GPSMan - autoMapic File
  • AUT - Authentication File
  • AUT - Signwave Auto - ...
  • AUT - Xitami Webserver Admin ...
  • AUT - Microcraft AUTHOR ...
  • AUTOCONF - Autoconfiguration file ...
  • AUTOCONF - UNIX File
  • AUTOPLAY - AutoPlay Media Studio ...
  • AUTOREG - Mozilla ( Netscape ) ...
  • AUX - ChiWriter Auxilliary ...
  • AUX - TeX/LaTeX Auxilliary ...
  • AUZ - Ableton Live File - ...
  • AV - Final Draft AV document ...
  • AV - Final Draft AV Document ...
  • AV2 - Avatar2 model file ( ...
  • AVA - Avagio Publication
  • AVASTLIC - Avast ! License File
  • AVATAR - Avatar
  • AVB - Inculan Anti-Virus virus...
  • AVC - Advanced Video Coding ( ...
  • AVC - Kaspersky Anti - virus ...
  • AVC - Kaspersky Anti - virus ...
  • AVD - AVD Video File
  • AVD - Movie Edit Pro Video ...
  • AVD - DOS7 File
  • AVE - ArcView Avenue script
  • AVF - Video information
  • AVF - AccountsVision Workbook
  • AVF - AccountsVision Workbook ...
  • AVG - AVG Virus Information ...
  • AVI - Microsoft Audio Video ...
  • AVIC - AVI to QT Utility
  • AVL - Video fun file
  • AVL - ArcView Legend File
  • AVL - ArcView Theme Legend ...
  • AVM - Map file
  • AVM - AVISO Geographic ...
  • AVM - AVG Incremental ...
  • AVN - altaVENTE Application ...
  • AVP - AntiVir Scanner ...
  • AVP - ArcView Pallet File ( ...

-ADS BY GOOGLE

SearchCompliance

  • PCAOB (Public Company Accounting Oversight Board)

    The Public Company Accounting Oversight Board (PCAOB) is a Congressionally-established nonprofit that assesses audits of public ...

  • cyborg anthropologist

    A cyborg anthropologist is an individual who studies the interaction between humans and technology, observing how technology can ...

  • RegTech

    RegTech, or regulatory technology, is a term used to describe technology that is used to help streamline the process of ...

SearchSecurity

  • Advanced Encryption Standard (AES)

    The Advanced Encryption Standard, or AES, is a symmetric block cipher used by the U.S. government to protect classified ...

  • identity theft

    Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable ...

  • spear phishing

    Spear phishing is an email-spoofing attack that targets a specific organization or individual, seeking unauthorized access to ...

SearchHealthIT

SearchDisasterRecovery

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

  • mass notification system (MNS)

    A mass notification system is a platform that sends one-way messages to inform employees and the public of an emergency.

  • disaster recovery as a service (DRaaS)

    One approach to a strong disaster recovery plan is DRaaS, where companies offload data replication and restoration ...

SearchStorage

  • CIFS (Common Internet File System)

    CIFS (Common Internet File System) is a protocol that gained popularity around the year 2000, as vendors worked to establish an ...

  • GlusterFS (Gluster File System)

    GlusterFS (Gluster File System) is an open source distributed file system that can scale out in building-block fashion to store ...

  • virtual memory

    Virtual memory is a memory management capability of an OS that allows a computer to compensate for physical memory shortages by ...

SearchSolidStateStorage

  • Tier 0

    Tier 0 (tier zero) is a level of data storage that is faster, and perhaps more expensive, than any other level in the storage ...

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

  • SSD caching

    SSD caching, also known as flash caching, is the temporary storage of data on NAND flash memory chips in a solid-state drive so ...

SearchCloudStorage

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

  • Zadara VPSA and ZIOS

    Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA ...

Close