Browse Definitions:

Browse File Extensions by Alphabet

BHO - BK!

  • BHO - Behold Settings File ( ...
  • BHS - Rise of Nations Script (...
  • BHTML - BabuHTML Embedded ...
  • BHX - BinHex compressed file ...
  • BI - Microsoft Visual Basic ...
  • BI - BASIC include file - ...
  • BI - Progress database before...
  • BI - Binary file
  • BI$ - MS compressed BI ...
  • BIAR - Business Objects (SAP)
  • BIB - TeX/BibTeX Literature ...
  • BIB - Database
  • BIB - Bibliography file (ASCII)
  • BIBTEX - BibTeX document file
  • BIC - Civilization III Scenario
  • BIC - Civilization III game ...
  • BIC - BioWare Aurora game ...
  • BID - BidMaker 2002
  • BIE - JBIG image
  • BIE - Image JBIG
  • BIF - GroupWise initialization...
  • BIF - Boot information file
  • BIF - Image Capture Board ...
  • BIFF - XLITE 3D file
  • BIG - Electronic Arts Game MOD...
  • BIG5 - Chinese Text
  • BIG5 - Chinese text (old ...
  • BIK - BioCharter Profile Backup
  • BIK - Bink and Smacker Game ...
  • BIK - BINK Video File
  • BIK - Video File
  • BIK - Bink Video Header
  • BIL - Linux file
  • BIL - Helgeson Software binary...
  • BIL - Band interleaved data
  • BIL - Printing accounts
  • BIL - AMPS Mission 7 Daedalus ...
  • BIL - ArcView image format ( ...
  • BIL - Mosaicked 10- meter DEM ...
  • BIL - Satellite Image ( 8bit ...
  • BIL - FreeBSD file
  • BIL - Spot raster image file
  • BIM - Cadsoft Envisioneer self...
  • BIM - Envisioneer self - ...
  • BIMD - Blue Ink Meta - Data ( ...
  • BIN - Binary file
  • BIN64 - Binary encoding method (...
  • BINA - DOS Binary File
  • BINA - Netscape Mail File
  • BINUI - Call of Juarez game menu...
  • BIO - OS/2 Bios file
  • BIORAD - Biorad confocal file : ...
  • BIOT - BiotSavart Magnetic ...
  • BIP - QIP Infium account file
  • BIP - Blue Ink project file
  • BIP - ArcView : image file ( ...
  • BIP - ArcView Image File ( ...
  • BIQ - Civilization 3 Scenario
  • BIT - X11 Bitmap
  • BIT - Imported map file used ...
  • BIU - BidMaker 2002 Update
  • BIX - Index to a.BIB BibTeX ...
  • BIX - Civilization III scenario
  • BIX - BIX Compressed File ...
  • BIX - Civilization 3 Scenario
  • BIX - BIX Archiver Compressed ...
  • BIX - Kodicom Video File
  • BIZ - BizTalk compatible schema
  • BIZ - Creatacard business card...
  • BIZ - PrintMaster Gold ...
  • BIZ - BIZ dVS model object
  • BIZ - ShowBiz Project File ( ...
  • BIZ - BIZ dVS Model / Object ...
  • BIZ - Print Shop business card...
  • BIZ - Business card file
  • BIZDESIGN - BusinessReport Design ( ...
  • BIZDOCUMENT - BusinessReport Document ...
  • BJD - NDDigital Print Bureau (...
  • BJF - NTI Backup Now related ...
  • BJG - DESQview ( Symantec ...
  • BJK - Scanner Recognita file
  • BJK - Blaise File ( Statistics...
  • BJL - BJL Business Systems ...
  • BJO - Instrument tablature file
  • BJO - TablEdit Tablature File
  • BK - Backup file (Generic)
  • BK - Backup
  • BK - FreeBSD file
  • BK - FrameMaker Book File
  • BK - Movie Magic Screenwiter ...
  • BK - JetFax Faxbook file
  • BK - Xerox Alto BCPL static ...
  • BK - Adobe FrameMaker book ...
  • BK - Power Chess opening book...
  • BK - Automatic packet / ...
  • BK - LinguAssist File
  • BK - OS/8 file
  • BK - JetFax faxbook
  • BK - Faxbook - JetFax
  • BK! - WordPerfect for Windows ...

-ADS BY GOOGLE

SearchCompliance

  • PCAOB (Public Company Accounting Oversight Board)

    The Public Company Accounting Oversight Board (PCAOB) is a Congressionally-established nonprofit that assesses audits of public ...

  • cyborg anthropologist

    A cyborg anthropologist is an individual who studies the interaction between humans and technology, observing how technology can ...

  • RegTech

    RegTech, or regulatory technology, is a term used to describe technology that is used to help streamline the process of ...

SearchSecurity

  • email spam

    Email spam, or junk email, is unsolicited bulk messages sent through email with commercial, fraudulent or malicious intent.

  • distributed denial of service (DDoS) attack

    A distributed denial-of-service attack occurs when an attack originates from multiple computers or devices, usually from multiple...

  • application whitelisting

    Application whitelisting is the practice of identifying applications that have been deemed safe for execution and restricting all...

SearchHealthIT

  • athenahealth Inc.

    Based in Watertown, Mass., athenahealth Inc. is a leading vendor of cloud-based EHRs for small to medium-sized physician ...

  • Affordable Care Act (ACA or Obamacare)

    The Affordable Care Act (ACA) is legislation passed in 2010 that changed how uninsured Americans enroll in and receive healthcare...

  • HIPAA Privacy Rule

    The Standards for Privacy of Individually Identifiable Health Information, commonly known as the HIPAA Privacy Rule, establishes ...

SearchDisasterRecovery

  • disaster recovery as a service (DRaaS)

    One approach to a strong disaster recovery plan is DRaaS, where companies offload data replication and restoration ...

  • data recovery

    Data recovery restores data that has been lost, accidentally deleted, corrupted or made inaccessible. Learn how data recovery ...

  • disaster recovery plan (DRP)

    A company's disaster recovery policy is enhanced with a documented DR plan that formulates strategies, and outlines preparation ...

SearchStorage

  • virtual memory

    Virtual memory is a memory management capability of an OS that allows a computer to compensate for physical memory shortages by ...

  • yottabyte (YB)

    A yottabyte is a measure of theoretical storage capacity and is 2 to the 80th power bytes, or, in decimal, approximately 1,000 ...

  • Kilo, mega, giga, tera, peta, exa, zetta and all that

    Kilo, mega, giga, tera, peta, exa, zetta are among the list of prefixes used to denote the quantity of something, such as a byte ...

SearchSolidStateStorage

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

  • SSD caching

    SSD caching, also known as flash caching, is the temporary storage of data on NAND flash memory chips in a solid-state drive so ...

  • NVDIMM (Non-Volatile Dual In-line Memory Module)

    An NVDIMM (non-volatile dual in-line memory module) is hybrid computer memory that retains data during a service outage.

SearchCloudStorage

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

  • Zadara VPSA and ZIOS

    Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA ...

Close