Browse Definitions:

Browse File Extensions by Alphabet

ALF - AMD

  • ALF - Abacus Law ( Abacus Data...
  • ALF - Aipro 2000 landfiles
  • ALF - AdventNet Bean Builder ...
  • ALF - AbacusLaw related file
  • ALF - ALF Logic
  • ALF - SonicWALL Aventail ...
  • ALF - Cadence Ambit BuildGates
  • ALF - Altium Designer license
  • ALF - Color Quick Label
  • ALF6 - MAC file type - ...
  • ALG - ER Mapper algorithm
  • ALG - Activity Log - ARCSOLO
  • ALG - ARCSOLO Activity Log
  • ALG - PDP-10 ALGOL compiler ...
  • ALG - InRoads Survey alignment...
  • ALG - HDLmaker file
  • ALG - Netmino file
  • ALH - Aladdin Interactive DSP ...
  • ALH5 - MAC file type - ...
  • ALI - Document file (SAP ...
  • ALIAS - Alias Image
  • ALIGN - Insight II Sequence ...
  • ALL - WordPerfect for Windows ...
  • ALL - Arts & Letters Library
  • ALLOW - Linux access file
  • ALM - Aley 's Module v1.0 1.1 ...
  • ALM - Aley 's Module v1.1-1.2 ...
  • ALM - AL- Mail file
  • ALM - Alphacam laser parameter...
  • ALM - Alpha Five database ...
  • ALMB - Location Manager Module
  • ALMN - Location Manager Module
  • ALN - LexNavigator Database ...
  • ALN - Grlib Saoimage file
  • ALO - Almanac support file
  • ALP - Alphacam Laser Post ( ...
  • ALPHA - Bitmap graphics (raw ...
  • ALPHA - Raw Alpha Bytes Bitmap
  • ALR - ADRIFT Language Resource
  • ALR - VirusScan Alert File ( ...
  • ALR - ADRIFT Language Resource...
  • ALS - Alias Image
  • ALSA - Recorded sound from /dev...
  • ALST - Anarchie Server List
  • ALT - WordPerfect Library Menu
  • ALT3 - MAC file type - template
  • ALT4 - MAC file type
  • ALT5 - Mac file type
  • ALT6 - MAC file type
  • ALTH - MAC file type
  • ALTP - MAC file type
  • ALTQ - MAC file type - settings
  • ALTV - MAC file type - help file
  • ALTV - QuickView File
  • ALV - Canvas image levels file
  • ALV - Vbox Available Languages...
  • ALV - Adobe Photoshop levels ...
  • ALV - Photoshop Levels ( Adobe...
  • ALW - PDP-10 Algol -W Compiler...
  • ALW - A-law G.711 European ...
  • ALX - BlackBerry Application ...
  • ALX - BlackBerry Application ...
  • ALX - Alpha Five database ...
  • ALX - OM2 OMALI plug -in
  • ALX - BlackBerry Application ...
  • ALX - ActiveX Layout Control ...
  • ALX - Internet script language...
  • ALZ - AlZip Compressed Files
  • ALZ - ALZip Archive
  • ALZ - ALZip Compressed File ( ...
  • ALZ - DarkEden game file
  • AM - Applix SHELF Macro
  • AM - Advantage database ...
  • AM1 - Adventure Maker Project ...
  • AM1 - Adventure Maker project ...
  • AM2 - AutoPlay Menu Studio Ver...
  • AM3 - AutoPlay Menu Studio Ver...
  • AM4 - Security First CCTV ...
  • AM4 - AutoPlay Menu Studio Ver...
  • AM4 - AutoPlay Media Studio 4 ...
  • AM5 - AutoPlay Menu Studio Ver...
  • AM5 - AutoPlay Media Studio 5 ...
  • AM6 - AutoPlay Menu Studio Ver...
  • AM6 - AutoPlay Media Studio 6 ...
  • AM7 - AutoPlay Menu Studio ver...
  • AM7 - AutoPlay Media Studio 7 ...
  • AMA - Fifa2000 Feart File
  • AMAYA - Amaya
  • AMAYA - Amaya file
  • AMB - Alphacam 3D Mill 2D Mill...
  • AMB - All My Books Book ...
  • AMB - Radiance Ambient File ...
  • AMB - AIMMS Model File
  • AMC - Wireless Analyzer ...
  • AMC - A.M. Composer 1.2 Music ...
  • AMC - Ant Movie Catalog
  • AMC - AMC media file
  • AMC - Quicktime AMC File

-ADS BY GOOGLE

SearchCompliance

  • PCAOB (Public Company Accounting Oversight Board)

    The Public Company Accounting Oversight Board (PCAOB) is a Congressionally-established nonprofit that assesses audits of public ...

  • cyborg anthropologist

    A cyborg anthropologist is an individual who studies the interaction between humans and technology, observing how technology can ...

  • RegTech

    RegTech, or regulatory technology, is a term used to describe technology that is used to help streamline the process of ...

SearchSecurity

  • email spam

    Email spam, or junk email, is unsolicited bulk messages sent through email with commercial, fraudulent or malicious intent.

  • distributed denial of service (DDoS) attack

    A distributed denial-of-service attack occurs when an attack originates from multiple computers or devices, usually from multiple...

  • application whitelisting

    Application whitelisting is the practice of identifying applications that have been deemed safe for execution and restricting all...

SearchHealthIT

  • athenahealth Inc.

    Based in Watertown, Mass., athenahealth Inc. is a leading vendor of cloud-based EHRs for small to medium-sized physician ...

  • Affordable Care Act (ACA or Obamacare)

    The Affordable Care Act (ACA) is legislation passed in 2010 that changed how uninsured Americans enroll in and receive healthcare...

  • HIPAA Privacy Rule

    The Standards for Privacy of Individually Identifiable Health Information, commonly known as the HIPAA Privacy Rule, establishes ...

SearchDisasterRecovery

  • disaster recovery as a service (DRaaS)

    One approach to a strong disaster recovery plan is DRaaS, where companies offload data replication and restoration ...

  • data recovery

    Data recovery restores data that has been lost, accidentally deleted, corrupted or made inaccessible. Learn how data recovery ...

  • disaster recovery plan (DRP)

    A company's disaster recovery policy is enhanced with a documented DR plan that formulates strategies, and outlines preparation ...

SearchStorage

  • yottabyte (YB)

    A yottabyte is a measure of theoretical storage capacity and is 2 to the 80th power bytes, or, in decimal, approximately 1,000 ...

  • Kilo, mega, giga, tera, peta, exa, zetta and all that

    Kilo, mega, giga, tera, peta, exa, zetta are among the list of prefixes used to denote the quantity of something, such as a byte ...

  • brontobyte

    A brontobyte is a measure of memory or data storage that is equal to 10 to the 27th power of bytes.

SearchSolidStateStorage

  • SSD caching

    SSD caching, also known as flash caching, is the temporary storage of data on NAND flash memory chips in a solid-state drive so ...

  • NVDIMM (Non-Volatile Dual In-line Memory Module)

    An NVDIMM (non-volatile dual in-line memory module) is hybrid computer memory that retains data during a service outage.

  • NAND mirroring

    NAND mirroring has been proposed to break the security in certain portable devices that use NAND flash memory for encryption.

SearchCloudStorage

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

  • Zadara VPSA and ZIOS

    Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA ...

Close