Browse Definitions:

Browse File Extensions by Alphabet

ADB - AES

  • ADB - Ada source text body ...
  • ADB - Ability Database file
  • ADB - HP 100LX Organizer ...
  • ADBA - AIMSS author project ...
  • ADBA - Advanced Integrated ...
  • ADBLOCK - Alpha Five temporary file
  • ADC - Scanstudio 16 color ...
  • ADCP - Adobe device central file
  • ADD - OS/2 adapter driver file...
  • ADDIN - Microsoft Visual Studio ...
  • ADE - Audio file (ADC TI/MIT)
  • ADE - ADC Audio File
  • ADE - Microsoft Access Project...
  • ADE - Access Project Extension...
  • ADEV - AppleTalk Extension
  • ADEX - ADEX Corp. bitmap image
  • ADEX - Bitmap graphics - 4bit ...
  • ADF - Amiga disk file
  • ADG - Ableton Device Group
  • ADG - Data - ADG 3D Scene
  • ADGM - After Dark Module
  • ADI - AutoCAD ...
  • ADICHT - LabChart data ...
  • ADIF - Amateur Data Interchange...
  • ADIF - Amateur Data Interchange...
  • ADIUMEMOTICON - Adium Dock Icons (The ...
  • ADIUMEMOTICONSET - Adium Emoticon Set (The ...
  • ADIUMMENUBARICONS - Adium Menu Bar Icons (...
  • ADIUMMESSAGESTYLE - Adium Message Style (The...
  • ADIUMPLUGIN - Adium Plug -in (The ...
  • ADIUMSCRIPTS - Adium AppleScripts (The ...
  • ADIUMSERVICEICONS - Adium Service Icons (The...
  • ADIUMSOUNDSET - Adium Sound Set (The ...
  • ADIUMSTATUSICONS - Adium Status Icons (The ...
  • ADJ - LISCAD adjustment file
  • ADK - OS/2 Saved SKF Format ...
  • ADL - QEMM Mca adaptor ...
  • ADLS - ADL Workbench file
  • ADM - Windows NT policy ...
  • ADM - After Dark MultiModule ...
  • ADML - Windows / Office ...
  • ADMX - Windows / Office Group ...
  • ADN - Lotus 1-2-3 Add-In file
  • ADO - FreeBSD file
  • ADO - Apptivity file
  • ADO - Stata Program
  • ADO - Adobe Photoshop duotone ...
  • ADOBEBRIDGE - Adobe Bridge file
  • ADOBENET - Adobe Production Studio ...
  • ADOC - Authentica Secure Office...
  • ADOS - Compound document file
  • ADOS - ADOS Compound Document (...
  • ADP - Astound Dynamite file
  • ADP - Microsoft Access project...
  • ADP - FaxWorks Faxmodem setup ...
  • ADPCM - Intel /DVI Adaptive ...
  • ADPCM - Sound ADPCM IMA ADPCM ...
  • ADPP - Adobe Device Central file
  • ADR - Smart Address address ...
  • ADR - After Dark Randomizer ...
  • ADR3 - CompuServe Address Book
  • ADRG - ARC Digitized Raster ...
  • ADRI - ARC Digitized Raster ...
  • ADRK - After Dark
  • ADRP - File Alias
  • ADS - Ada source text ...
  • ADSK - Autodesk exchange file
  • ADSM - Advanced Split Machine ...
  • ADT - ACT! document template ...
  • ADT - AdTech Fax file
  • ADU - Addict User Dictionary (...
  • ADU - Dictionary
  • ADV - Gravis Ultrasound ...
  • ADV - Text document
  • ADV - GUS device driver ( ...
  • ADV - TAPCIS Advanced Commands...
  • ADVS - Adobe Device Central file
  • ADW - Copyright information
  • ADW - ADHAWIN Multilingual ...
  • ADX - Archetype Designer ...
  • ADX - Lotus Approach dBase ...
  • ADX - Dynazip Active Delivery ...
  • ADZ - Packed ADF file (...
  • AE - Author/Editor file (...
  • AEA - Ae Timer Alarm Document
  • AEB - Alphacam Wire EDM VB ...
  • AEC - DataCAD Double Precision...
  • AED - Alphacam Wire EDM ...
  • AEF - ELECTRICAL Designer
  • AEF - CA Visual Object ...
  • AEF - Visual Objects ...
  • AEH - iPer Advanced Embedded ...
  • AEH - iPer Advanced Embedded ...
  • AEM - Alphacam Wire EDM ...
  • AEP - ArcExplorer project file
  • AEPX - Adobe After Effects XML ...
  • AER - FAA aeronautical charts ...
  • AER - Maptech raster ...
  • AER - Adobe Atmosphere file

-ADS BY GOOGLE

SearchCompliance

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

SearchSecurity

  • computer exploit

    A computer exploit, or exploit, is an attack on a computer system, especially one that takes advantage of a particular ...

  • cyberwarfare

    Cyberwarfare is computer- or network-based conflict involving politically motivated attacks by a nation-state on another ...

  • insider threat

    Insider threat is a generic term for a threat to an organization's security or data that comes from within.

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

  • OpenStack Block Storage (Cinder)

    OpenStack Block Storage (Cinder) is open source software designed to create and manage a service that provides persistent data ...

  • SATA Express (SATAe)

    SATA Express (SATAe or Serial ATA Express) is a bus interface to connect storage devices to a computer motherboard, supporting ...

  • DIMM (dual in-line memory module)

    A DIMM (dual in-line memory module) is the standard memory card used in servers and PCs.

SearchSolidStateStorage

  • hybrid flash array

    A hybrid flash array is a solid-state storage system that contains a mix of flash memory drives and hard disk drives.

  • 3D XPoint

    3D XPoint is memory storage technology jointly developed by Intel and Micron Technology Inc.

  • RRAM or ReRAM (resistive RAM)

    RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...

SearchCloudStorage

  • Google Cloud Storage

    Google Cloud Storage is an enterprise public cloud storage platform that can house large unstructured data sets.

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

Close