Browse Definitions:

Browse File Extensions by Alphabet

BRZ - BTG

  • BRZ - DbBRZ file for very ...
  • BS - Ball and Stick chemical ...
  • BS - Printfox / Pagefox image...
  • BS - PrintFox (C64) bitmap ...
  • BS - Infinity Game Engine ...
  • BS - Ball and Stick chemical ...
  • BS1 - Apogee Blake Stone data ...
  • BS2 - Burning Sand 2 Code File
  • BS2 - Basic Stamp 2 Code File
  • BS2 - BS2 editor file
  • BS2 - BS2 archive
  • BS2 - Archive - BS2.EXE
  • BS4 - Mikogo Session Video ...
  • BS_ - Microsoft Bookshelf Find...
  • BSA - BSARC Compressed archive
  • BSA - Data file used with ...
  • BSAVE - Quickbasic BLOAD / BSAVE...
  • BSB - BioShock saved game
  • BSB - 2D Graphic file
  • BSB - SWAT Sub- basin Output ...
  • BSB - MapInfo sea chart
  • BSB - BioShock Saved Game (2K ...
  • BSC - MS Developer Studio (...
  • BSC - Apple II Compressed ...
  • BSC - Fortran Pwbrmake Object
  • BSCS - Strategy2Act Balanced ...
  • BSCT - Strategy2Act Balanced ...
  • BSD - bsd system file
  • BSD - BASin data format
  • BSD - Unknown Apple II File
  • BSD - Licency according to BSD...
  • BSD - FacetWin Bitwise Backup ...
  • BSDF - ZEMAX scattering ...
  • BSDL - Boundary Scan ...
  • BSE - CRiSP Harvest File
  • BSF - AVC Blu-ray video format...
  • BSF - Bridge - Soft Quarterly ...
  • BSF - Blu-ray AVC Video File
  • BSF - Rainbow Six: Rogue Spear...
  • BSH - Bash file
  • BSH - BeanShell Script
  • BSI - BSPlayer configuration
  • BSI - BSI FutureComposer audio...
  • BSK - Bryce 4 file
  • BSK - Bryce 4 File (DAZ ...
  • BSL - BSPlayer Configuration
  • BSM - SQLMatcher Project File ...
  • BSM - Bioshock map
  • BSM - Project file for ...
  • BSN - Autodesk TR-55 detention...
  • BSN - BSA packing program ...
  • BSN - MIDI File
  • BSN - BSN Midi file
  • BSP - Quake map file
  • BSPR - Need for Speed SHIFT ...
  • BSQ - Oracle Control File
  • BSQ - BinScii 'd NuFX file
  • BSQ - Apple II BINSCII - ...
  • BSQ - BCDown Download
  • BSQ - ArcView Image File ( ...
  • BSR - Simple Reads file
  • BSS - Bridge Base file
  • BST - BiblioTex file
  • BST - BibTeX Style File
  • BST - BiblioTex file ( ...
  • BST - Star Trek : Birth of the...
  • BSU - Brindys BriTray
  • BSV - Bluespec SystemVerilog
  • BSV - BASIC Bsave Graphics
  • BSW - Business Scorecard ...
  • BSY - FTN Soft Busy Flag
  • BSY - VTrain ( Vocabulary ...
  • BSY - Busy flag - FTN soft
  • BSZ - BSplayer Skin Header
  • BSZ - BSplayer Compressed Skin...
  • BT - EVwin project file
  • BT - VTBuilder - Binary ...
  • BT - VTBuilder Binary Terrain
  • BT - Binary Template Archive
  • BT - BTwin project file
  • BT - Virtual Terrain Project ...
  • BT - BluffTitler Show Header
  • BT1 - Battery analyzer test ...
  • BT2 - Batch Barcode Maker file
  • BT3 - Control Runner Button ...
  • BT5 - ERP5 Business template ...
  • BTAB - Base Guitar Tabulature
  • BTAPP - uTorrent App
  • BTC - Becker Tools compressed ...
  • BTD - Data file
  • BTD - Power To-Do List Data ...
  • BTD - Business -in-a-Box File ...
  • BTF - Bank check image and ...
  • BTF - Nations Bank Check File
  • BTF - Brother scanner file
  • BTF - Basi Office TypeFace ...
  • BTF - Baires Turf ...
  • BTFL - Desktop DB
  • BTG - FlightGear scenery file
  • BTG - Binary TerraGear - ...

-ADS BY GOOGLE

SearchCompliance

  • PCAOB (Public Company Accounting Oversight Board)

    The Public Company Accounting Oversight Board (PCAOB) is a Congressionally-established nonprofit that assesses audits of public ...

  • cyborg anthropologist

    A cyborg anthropologist is an individual who studies the interaction between humans and technology, observing how technology can ...

  • RegTech

    RegTech, or regulatory technology, is a term used to describe technology that is used to help streamline the process of ...

SearchSecurity

  • Advanced Encryption Standard (AES)

    The Advanced Encryption Standard, or AES, is a symmetric block cipher used by the U.S. government to protect classified ...

  • identity theft

    Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable ...

  • spear phishing

    Spear phishing is an email-spoofing attack that targets a specific organization or individual, seeking unauthorized access to ...

SearchHealthIT

SearchDisasterRecovery

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

  • mass notification system (MNS)

    A mass notification system is a platform that sends one-way messages to inform employees and the public of an emergency.

  • disaster recovery as a service (DRaaS)

    One approach to a strong disaster recovery plan is DRaaS, where companies offload data replication and restoration ...

SearchStorage

  • CIFS (Common Internet File System)

    CIFS (Common Internet File System) is a protocol that gained popularity around the year 2000, as vendors worked to establish an ...

  • GlusterFS (Gluster File System)

    GlusterFS (Gluster File System) is an open source distributed file system that can scale out in building-block fashion to store ...

  • virtual memory

    Virtual memory is a memory management capability of an OS that allows a computer to compensate for physical memory shortages by ...

SearchSolidStateStorage

  • Tier 0

    Tier 0 (tier zero) is a level of data storage that is faster, and perhaps more expensive, than any other level in the storage ...

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

  • SSD caching

    SSD caching, also known as flash caching, is the temporary storage of data on NAND flash memory chips in a solid-state drive so ...

SearchCloudStorage

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

  • Zadara VPSA and ZIOS

    Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA ...

Close