Browse Definitions:

Browse File Extensions by Alphabet

AES - AGF

  • AES - ACEIT ACE exec scenario ...
  • AES - AE Stabilizer settings ...
  • AES - After Effects Stablilzer...
  • AES - AES Crypt encrypted file
  • AET - MusicaZip lyrics file
  • AET - FreeBSD file
  • AET - After Effects Tracker ...
  • AET - Adobe After Effects ...
  • AEU - AutoRoute Express Europe...
  • AEU - MS AutoRoute Express ...
  • AEX - Armored extracted public...
  • AEX - Alpha Five Compiled ...
  • AEX - Pretty Good Privacy (PGP...
  • AEX - Alpha Five linked ...
  • AEX - Greeting card
  • AEXPK - Pretty Good Privacy (PGP...
  • AEXPK - Armored extracted public...
  • AF - 3D Plus2 Model
  • AF - 3DPlus2 Model ( Serif )
  • AF2 - ABC FlowCharter 2.0 ...
  • AF3 - ABC Flowchart
  • AFA - Astrotite 200X Data ...
  • AFB - Alphacam Flame VB Macro ...
  • AFC - Apple Sound file
  • AFD - Alphacam Flame Drawing (...
  • AFD - Prismo Graphics ...
  • AFD - ArisFlow Diagram
  • AFF - Affix file Header
  • AFF - AGEMA File
  • AFF - Advanced Forensics ...
  • AFF - Nvu file
  • AFF - Affix File
  • AFF - AnyForm form file
  • AFF - Acorn vector draw file
  • AFF - iSpell affixes ...
  • AFG - Guitar Musik trainer file
  • AFI - Truevision Bitmap graphic
  • AFL - Font file (for Always ) ...
  • AFL - RubberFlex animation
  • AFL - AnimaFlex RubberFlex ...
  • AFL - XMap ( Delorme )
  • AFL - Lotus Font (IBM)
  • AFL - X- Plane Airfoils
  • AFM - Adobe metrics
  • AFM - HP NewWave Cardfile ...
  • AFO-XVID - Compressed video file
  • AFP - Flowchart Symbol Palette
  • AFP - Alphacam Flame Post ( ...
  • AFP - ABC FlowCharter shape ...
  • AFP - IBM Transactional Data ...
  • AFP - Gangsters game file
  • AFP - Papyrus Document Storage...
  • AFP - Shape palette
  • AFP - FileProtector Encrypted ...
  • AFP - Prismo Graphics ...
  • AFP - Androsa FileProtector ...
  • AFP - Advanced Function ...
  • AFP - XMap Flight Plan or ...
  • AFPLOC - Apple Filing Protocol ...
  • AFPP - AppleShare Prep File
  • AFR - FreeBSD file
  • AFS - Type Manager Font Set ( ...
  • AFS - Adobe Type Manager font ...
  • AFS - AktivFilter ...
  • AFS - STAAD. foundation ...
  • AFS - FreeBSD file
  • AFS - Aire Freshener schedule ...
  • AFS - Sega Dreamcast ...
  • AFS - Filter Factory Photoshop...
  • AFS3 - AFS 3 Basic encrypted ...
  • AFS3 - Advanced File Security ...
  • AFT - Ancestry.com Family Tree...
  • AFT - Template
  • AFT - Ancestry Family Tree ...
  • AFT - Micrografx ABC ...
  • AFT - Family Tree data file
  • AFW - Bullion firmware file
  • AFW - Workplace - ABC ...
  • AFW - Industrial Aspect ...
  • AFW - Flowcharter Work area ...
  • AFX - Auto F/X image format
  • AFX - Auto FX Photo / Graphic ...
  • AFZ - Ancestry Family Tree ...
  • AFZ - Geneology Backup File
  • AG - Applix graphic
  • AG4 - Access G4 File ( ...
  • AG4 - Access G4 file
  • AGA - Agenda File
  • AGC - Compiled script file
  • AGC - AfterGRASP Compiled ...
  • AGD - AgileGraph data file
  • AGD - Agile Advantage E- mail ...
  • AGD - Agile Advantage file
  • AGD1 - MAC file type (PC ...
  • AGD1 - Freehand 5 (PC ext: FH5)
  • AGD2 - Freehand 7 File
  • AGDB - ANSYS DesignSpace
  • AGE3SCN - Age of Empires III
  • AGE3SCN - Age of Empires 3 ...
  • AGE3YREC - Age Of Empires III ...

-ADS BY GOOGLE

SearchCompliance

  • PCAOB (Public Company Accounting Oversight Board)

    The Public Company Accounting Oversight Board (PCAOB) is a Congressionally-established nonprofit that assesses audits of public ...

  • cyborg anthropologist

    A cyborg anthropologist is an individual who studies the interaction between humans and technology, observing how technology can ...

  • RegTech

    RegTech, or regulatory technology, is a term used to describe technology that is used to help streamline the process of ...

SearchSecurity

  • email spam

    Email spam, or junk email, is unsolicited bulk messages sent through email with commercial, fraudulent or malicious intent.

  • distributed denial of service (DDoS) attack

    A distributed denial-of-service attack occurs when an attack originates from multiple computers or devices, usually from multiple...

  • application whitelisting

    Application whitelisting is the practice of identifying applications that have been deemed safe for execution and restricting all...

SearchHealthIT

  • athenahealth Inc.

    Based in Watertown, Mass., athenahealth Inc. is a leading vendor of cloud-based EHRs for small to medium-sized physician ...

  • Affordable Care Act (ACA or Obamacare)

    The Affordable Care Act (ACA) is legislation passed in 2010 that changed how uninsured Americans enroll in and receive healthcare...

  • HIPAA Privacy Rule

    The Standards for Privacy of Individually Identifiable Health Information, commonly known as the HIPAA Privacy Rule, establishes ...

SearchDisasterRecovery

  • disaster recovery as a service (DRaaS)

    One approach to a strong disaster recovery plan is DRaaS, where companies offload data replication and restoration ...

  • data recovery

    Data recovery restores data that has been lost, accidentally deleted, corrupted or made inaccessible. Learn how data recovery ...

  • disaster recovery plan (DRP)

    A company's disaster recovery policy is enhanced with a documented DR plan that formulates strategies, and outlines preparation ...

SearchStorage

  • yottabyte (YB)

    A yottabyte is a measure of theoretical storage capacity and is 2 to the 80th power bytes, or, in decimal, approximately 1,000 ...

  • Kilo, mega, giga, tera, peta, exa, zetta and all that

    Kilo, mega, giga, tera, peta, exa, zetta are among the list of prefixes used to denote the quantity of something, such as a byte ...

  • brontobyte

    A brontobyte is a measure of memory or data storage that is equal to 10 to the 27th power of bytes.

SearchSolidStateStorage

  • SSD caching

    SSD caching, also known as flash caching, is the temporary storage of data on NAND flash memory chips in a solid-state drive so ...

  • NVDIMM (Non-Volatile Dual In-line Memory Module)

    An NVDIMM (non-volatile dual in-line memory module) is hybrid computer memory that retains data during a service outage.

  • NAND mirroring

    NAND mirroring has been proposed to break the security in certain portable devices that use NAND flash memory for encryption.

SearchCloudStorage

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

  • Zadara VPSA and ZIOS

    Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA ...

Close