Browse Definitions:

Browse File Extensions by Alphabet

ABA - ACB

  • ABA - Avant Browser add-on file
  • ABA - Palm Address Book Header
  • ABA - Palm Address Book Archive
  • ABA - Avant Browser Add-on ( ...
  • ABAP - ABAP Source Code
  • ABAP - ABAP Source Code (SAP AG)
  • ABBU - Address Book Backup
  • ABBU - Apple AddressBook ...
  • ABC - ABC Programming Language
  • ABC - Athena 16 addressbook
  • ABC - Musical Notation ...
  • ABC - ABC Programming Language...
  • ABC - ACT! E- mail Address ...
  • ABC - LithTech Game 3D Model (...
  • ABC - FlowCharter Data File ( ...
  • ABC - ABC FlowCharter 1.0 ...
  • ABC - Athena 16 Address Book
  • ABCD - AudioVisual Book Data ...
  • ABD - AmBiz Bonus Calculator ...
  • ABD - The Bat! Address Book ...
  • ABD - Text Adventure authoring...
  • ABD - Adventure Builder ...
  • ABDATA - Bridge data
  • ABE - Application Boundaries ...
  • ABF - Adobe Binary Screen Font
  • ABG - FIFA World Cup game data...
  • ABG - Fifa World Cup Game Data...
  • ABI - AOL 6 organizer file
  • ABI - AOL 6 Organizer ( ...
  • ABI - ABI- CODER (ABI- ...
  • ABI - dnaLIMS ABI Trace File (...
  • ABI - ABI- Software ...
  • ABI - Chromatogram file editor
  • ABK - Corel Draw AutoBackup
  • ABK - Backup file (PrintMaster...
  • ABKPRJ - Ashampoo Burning Studio ...
  • ABL - Xilinx Integrated ...
  • ABL - Maxagrid Avails Data File
  • ABL - ABEL hardware ...
  • ABL - ADONIS Application ...
  • ABM - Audio album file (...
  • ABO - Applix Builder Turbo file
  • ABP - Barcode profile file in ...
  • ABR - Adobe Brush file for ...
  • ABR - Adobe Photoshop Brushes ...
  • ABR - Adobe Photoshop Brush
  • ABS - Sometimes used to denote...
  • ABS - Absolute Database file ...
  • ABS - Standard GNU compiler ...
  • ABT - Bullseye script file
  • ABT - Unknown Apple II File
  • ABT - The Arbiter game schedule
  • ABU - ACT! Email Address Book ...
  • ABU - ACT! E- mail Address ...
  • ABW - AbiWord document Header
  • ABW - AbiWord Document File (...
  • ABW - AbiWord Document
  • ABX - WordPerfect Address Book...
  • ABX - WordPerfect Address book
  • ABY - AOL directory file
  • ABY - Address Book File
  • ABY - AOL Address Book File
  • ABZ - AbszOrb 3D interactive ...
  • ABZ - AbszOrb
  • AC - GNU Autoconf ...
  • AC - Autoconf Script
  • AC - ACwin project file
  • AC - Unknown Apple II File
  • AC - AC3D Geometry File ( ...
  • AC - Mopac Cartesian chemical...
  • AC - Acceleration record file
  • AC - AC3D geometry file
  • AC$ - AutoCAD Undo Info file
  • AC0 - AC/ frequency domain ...
  • AC1 - Weaver Spider reminder
  • AC1 - AC/ frequency domain ...
  • AC1D - AC1D packer format sound...
  • AC1D - AC1D - DC1A Packer
  • AC2 - Unknown Apple II File
  • AC2 - Banana40 accounting / ...
  • AC2 - AC/ frequency domain ...
  • AC3 - Dolby Digital audio ...
  • AC3D - 3d format data (org. ...
  • AC4 - AC/ frequency domain ...
  • AC5 - SPICE AC/ frequence ...
  • AC5 - AC/ frequency domain ...
  • AC6 - Artcut software graphics...
  • AC6 - AC/ frequency domain ...
  • AC7 - AC/ frequency domain ...
  • AC8 - AC/ frequency domain ...
  • AC9 - AC/ frequency domain ...
  • AC_ - Creative compressed SB16...
  • AC_ - Creativ compressed Sb16 ...
  • AC_ - CaseWare 2005 Compressed...
  • ACA - HTTP animation file (...
  • ACA - Project Manager ...
  • ACA2 - Fontographer File
  • ACAD - AutoCAD database file
  • ACAD - AutoCAD Database ( ...
  • ACAS - Advanced CATaloguer Pro ...

-ADS BY GOOGLE

SearchCompliance

  • cyborg anthropologist

    A cyborg anthropologist is an individual who studies the interaction between humans and technology, observing how technology can ...

  • RegTech

    RegTech, or regulatory technology, is a term used to describe technology that is used to help streamline the process of ...

  • conduct risk

    Conduct risk is the prospect of financial loss to an organization that is caused by the actions of an organization's ...

SearchSecurity

  • application whitelisting

    Application whitelisting is the practice of identifying applications that have been deemed safe for execution and restricting all...

  • security

    Security, in information technology (IT), is the defense of digital information and IT assets against internal and external, ...

  • insider threat

    An insider threat is a malicious hacker (also called a cracker or a black hat) who is an employee or officer of a business, ...

SearchHealthIT

  • HIPAA Privacy Rule

    The Standards for Privacy of Individually Identifiable Health Information, commonly known as the HIPAA Privacy Rule, establishes ...

  • HIPAA business associate agreement (BAA)

    Under the U.S. Health Insurance Portability and Accountability Act of 1996, a HIPAA business associate agreement (BAA) is a ...

  • telemedicine

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

SearchDisasterRecovery

  • data recovery

    Data recovery restores data that has been lost, accidentally deleted, corrupted or made inaccessible. Learn how data recovery ...

  • disaster recovery plan (DRP)

    A company's disaster recovery policy is enhanced with a documented DR plan that formulates strategies, and outlines preparation ...

  • fault-tolerant

    Systems with integrated fault tolerance are designed to withstand multiple hardware failures to ensure continuous availability.

SearchStorage

  • data deduplication

    Deduplication retains one unique data instance to reduce storage and bandwidth consumed by remote backups, replication and ...

  • byte

    In most computer systems, a byte is a unit of data that is eight binary digits long. Bytes are often used to represent a ...

  • Secure Digital card (SD card)

    SD cards use flash memory to provide nonvolatile storage. They are more rugged than traditional storage media and are used in ...

SearchSolidStateStorage

  • flash file system

    Flash file systems are designed specifically for memory devices. A well-designed flash device and flash file system ensure ...

  • IOPS (input/output operations per second)

    IOPS measures the maximum number of reads and writes to non-contiguous storage. It is not an actual benchmark since vendor ...

  • eMMC (embedded MultiMediaCard)

    An embedded MultiMediaCard (eMMC) is a small storage device made up of NAND flash memory and a simple storage controller.

SearchCloudStorage

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

  • Zadara VPSA and ZIOS

    Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA ...

Close