Browse Definitions:

Browse File Extensions by Alphabet

AES - AGF

  • AES - ACEIT ACE exec scenario ...
  • AES - AE Stabilizer settings ...
  • AES - After Effects Stablilzer...
  • AES - AES Crypt encrypted file
  • AET - MusicaZip lyrics file
  • AET - FreeBSD file
  • AET - After Effects Tracker ...
  • AET - Adobe After Effects ...
  • AEU - AutoRoute Express Europe...
  • AEU - MS AutoRoute Express ...
  • AEX - Armored extracted public...
  • AEX - Alpha Five Compiled ...
  • AEX - Pretty Good Privacy (PGP...
  • AEX - Alpha Five linked ...
  • AEX - Greeting card
  • AEXPK - Pretty Good Privacy (PGP...
  • AEXPK - Armored extracted public...
  • AF - 3D Plus2 Model
  • AF - 3DPlus2 Model ( Serif )
  • AF2 - ABC FlowCharter 2.0 ...
  • AF3 - ABC Flowchart
  • AFA - Astrotite 200X Data ...
  • AFB - Alphacam Flame VB Macro ...
  • AFC - Apple Sound file
  • AFD - Alphacam Flame Drawing (...
  • AFD - Prismo Graphics ...
  • AFD - ArisFlow Diagram
  • AFF - Affix file Header
  • AFF - AGEMA File
  • AFF - Advanced Forensics ...
  • AFF - Nvu file
  • AFF - Affix File
  • AFF - AnyForm form file
  • AFF - Acorn vector draw file
  • AFF - iSpell affixes ...
  • AFG - Guitar Musik trainer file
  • AFI - Truevision Bitmap graphic
  • AFL - Font file (for Always ) ...
  • AFL - RubberFlex animation
  • AFL - AnimaFlex RubberFlex ...
  • AFL - XMap ( Delorme )
  • AFL - Lotus Font (IBM)
  • AFL - X- Plane Airfoils
  • AFM - Adobe metrics
  • AFM - HP NewWave Cardfile ...
  • AFO-XVID - Compressed video file
  • AFP - Flowchart Symbol Palette
  • AFP - Alphacam Flame Post ( ...
  • AFP - ABC FlowCharter shape ...
  • AFP - IBM Transactional Data ...
  • AFP - Gangsters game file
  • AFP - Papyrus Document Storage...
  • AFP - Shape palette
  • AFP - FileProtector Encrypted ...
  • AFP - Prismo Graphics ...
  • AFP - Androsa FileProtector ...
  • AFP - Advanced Function ...
  • AFP - XMap Flight Plan or ...
  • AFPLOC - Apple Filing Protocol ...
  • AFPP - AppleShare Prep File
  • AFR - FreeBSD file
  • AFS - Type Manager Font Set ( ...
  • AFS - Adobe Type Manager font ...
  • AFS - AktivFilter ...
  • AFS - STAAD. foundation ...
  • AFS - FreeBSD file
  • AFS - Aire Freshener schedule ...
  • AFS - Sega Dreamcast ...
  • AFS - Filter Factory Photoshop...
  • AFS3 - AFS 3 Basic encrypted ...
  • AFS3 - Advanced File Security ...
  • AFT - Ancestry.com Family Tree...
  • AFT - Template
  • AFT - Ancestry Family Tree ...
  • AFT - Micrografx ABC ...
  • AFT - Family Tree data file
  • AFW - Bullion firmware file
  • AFW - Workplace - ABC ...
  • AFW - Industrial Aspect ...
  • AFW - Flowcharter Work area ...
  • AFX - Auto F/X image format
  • AFX - Auto FX Photo / Graphic ...
  • AFZ - Ancestry Family Tree ...
  • AFZ - Geneology Backup File
  • AG - Applix graphic
  • AG4 - Access G4 File ( ...
  • AG4 - Access G4 file
  • AGA - Agenda File
  • AGC - Compiled script file
  • AGC - AfterGRASP Compiled ...
  • AGD - AgileGraph data file
  • AGD - Agile Advantage E- mail ...
  • AGD - Agile Advantage file
  • AGD1 - MAC file type (PC ...
  • AGD1 - Freehand 5 (PC ext: FH5)
  • AGD2 - Freehand 7 File
  • AGDB - ANSYS DesignSpace
  • AGE3SCN - Age of Empires III
  • AGE3SCN - Age of Empires 3 ...
  • AGE3YREC - Age Of Empires III ...

-ADS BY GOOGLE

SearchCompliance

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • audit program (audit plan)

    An audit program, also called an audit plan, is an action plan that documents what procedures an auditor will follow to validate ...

SearchSecurity

  • insider threat

    Insider threat is a generic term for a threat to an organization's security or data that comes from within.

  • ransomware

    Ransomware is a subset of malware in which the data on a victim's computer is locked, typically by encryption, and payment is ...

  • hacker

    A hacker is an individual who uses computer, networking or other skills to overcome a technical problem.

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

SearchSolidStateStorage

  • 3D XPoint

    3D XPoint is memory storage technology jointly developed by Intel and Micron Technology Inc.

  • RRAM or ReRAM (resistive RAM)

    RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...

  • JEDEC

    JEDEC is a global industry group that develops open standards for microelectronics.

SearchCloudStorage

  • Google Cloud Storage

    Google Cloud Storage is an enterprise public cloud storage platform that can house large unstructured data sets.

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

Close