Browse Definitions:

Browse File Extensions by Alphabet

BHO - BK!

  • BHO - Behold Settings File ( ...
  • BHS - Rise of Nations Script (...
  • BHTML - BabuHTML Embedded ...
  • BHX - BinHex compressed file ...
  • BI - Microsoft Visual Basic ...
  • BI - BASIC include file - ...
  • BI - Progress database before...
  • BI - Binary file
  • BI$ - MS compressed BI ...
  • BIAR - Business Objects (SAP)
  • BIB - TeX/BibTeX Literature ...
  • BIB - Database
  • BIB - Bibliography file (ASCII)
  • BIBTEX - BibTeX document file
  • BIC - Civilization III Scenario
  • BIC - Civilization III game ...
  • BIC - BioWare Aurora game ...
  • BID - BidMaker 2002
  • BIE - JBIG image
  • BIE - Image JBIG
  • BIF - GroupWise initialization...
  • BIF - Boot information file
  • BIF - Image Capture Board ...
  • BIFF - XLITE 3D file
  • BIG - Electronic Arts Game MOD...
  • BIG5 - Chinese Text
  • BIG5 - Chinese text (old ...
  • BIK - BioCharter Profile Backup
  • BIK - Bink and Smacker Game ...
  • BIK - BINK Video File
  • BIK - Video File
  • BIK - Bink Video Header
  • BIL - Linux file
  • BIL - Helgeson Software binary...
  • BIL - Band interleaved data
  • BIL - Printing accounts
  • BIL - AMPS Mission 7 Daedalus ...
  • BIL - ArcView image format ( ...
  • BIL - Mosaicked 10- meter DEM ...
  • BIL - Satellite Image ( 8bit ...
  • BIL - FreeBSD file
  • BIL - Spot raster image file
  • BIM - Cadsoft Envisioneer self...
  • BIM - Envisioneer self - ...
  • BIMD - Blue Ink Meta - Data ( ...
  • BIN - Binary file
  • BIN64 - Binary encoding method (...
  • BINA - DOS Binary File
  • BINA - Netscape Mail File
  • BINUI - Call of Juarez game menu...
  • BIO - OS/2 Bios file
  • BIORAD - Biorad confocal file : ...
  • BIOT - BiotSavart Magnetic ...
  • BIP - QIP Infium account file
  • BIP - Blue Ink project file
  • BIP - ArcView : image file ( ...
  • BIP - ArcView Image File ( ...
  • BIQ - Civilization 3 Scenario
  • BIT - X11 Bitmap
  • BIT - Imported map file used ...
  • BIU - BidMaker 2002 Update
  • BIX - Index to a.BIB BibTeX ...
  • BIX - Civilization III scenario
  • BIX - BIX Compressed File ...
  • BIX - Civilization 3 Scenario
  • BIX - BIX Archiver Compressed ...
  • BIX - Kodicom Video File
  • BIZ - BizTalk compatible schema
  • BIZ - Creatacard business card...
  • BIZ - PrintMaster Gold ...
  • BIZ - BIZ dVS model object
  • BIZ - ShowBiz Project File ( ...
  • BIZ - BIZ dVS Model / Object ...
  • BIZ - Print Shop business card...
  • BIZ - Business card file
  • BIZDESIGN - BusinessReport Design ( ...
  • BIZDOCUMENT - BusinessReport Document ...
  • BJD - NDDigital Print Bureau (...
  • BJF - NTI Backup Now related ...
  • BJG - DESQview ( Symantec ...
  • BJK - Scanner Recognita file
  • BJK - Blaise File ( Statistics...
  • BJL - BJL Business Systems ...
  • BJO - Instrument tablature file
  • BJO - TablEdit Tablature File
  • BK - Backup file (Generic)
  • BK - Backup
  • BK - FreeBSD file
  • BK - FrameMaker Book File
  • BK - Movie Magic Screenwiter ...
  • BK - JetFax Faxbook file
  • BK - Xerox Alto BCPL static ...
  • BK - Adobe FrameMaker book ...
  • BK - Power Chess opening book...
  • BK - Automatic packet / ...
  • BK - LinguAssist File
  • BK - OS/8 file
  • BK - JetFax faxbook
  • BK - Faxbook - JetFax
  • BK! - WordPerfect for Windows ...

-ADS BY GOOGLE

SearchCompliance

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

SearchSecurity

  • computer exploit

    A computer exploit, or exploit, is an attack on a computer system, especially one that takes advantage of a particular ...

  • cyberwarfare

    Cyberwarfare is computer- or network-based conflict involving politically motivated attacks by a nation-state on another ...

  • insider threat

    Insider threat is a generic term for a threat to an organization's security or data that comes from within.

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

  • OpenStack Block Storage (Cinder)

    OpenStack Block Storage (Cinder) is open source software designed to create and manage a service that provides persistent data ...

  • SATA Express (SATAe)

    SATA Express (SATAe or Serial ATA Express) is a bus interface to connect storage devices to a computer motherboard, supporting ...

  • DIMM (dual in-line memory module)

    A DIMM (dual in-line memory module) is the standard memory card used in servers and PCs.

SearchSolidStateStorage

  • hybrid flash array

    A hybrid flash array is a solid-state storage system that contains a mix of flash memory drives and hard disk drives.

  • 3D XPoint

    3D XPoint is memory storage technology jointly developed by Intel and Micron Technology Inc.

  • RRAM or ReRAM (resistive RAM)

    RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...

SearchCloudStorage

  • Google Cloud Storage

    Google Cloud Storage is an enterprise public cloud storage platform that can house large unstructured data sets.

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

Close