Browse Definitions:

Browse File Extensions by Alphabet

BHO - BK!

  • BHO - Behold Settings File ( ...
  • BHS - Rise of Nations Script (...
  • BHTML - BabuHTML Embedded ...
  • BHX - BinHex compressed file ...
  • BI - Microsoft Visual Basic ...
  • BI - BASIC include file - ...
  • BI - Progress database before...
  • BI - Binary file
  • BI$ - MS compressed BI ...
  • BIAR - Business Objects (SAP)
  • BIB - TeX/BibTeX Literature ...
  • BIB - Database
  • BIB - Bibliography file (ASCII)
  • BIBTEX - BibTeX document file
  • BIC - Civilization III Scenario
  • BIC - Civilization III game ...
  • BIC - BioWare Aurora game ...
  • BID - BidMaker 2002
  • BIE - JBIG image
  • BIE - Image JBIG
  • BIF - GroupWise initialization...
  • BIF - Boot information file
  • BIF - Image Capture Board ...
  • BIFF - XLITE 3D file
  • BIG - Electronic Arts Game MOD...
  • BIG5 - Chinese Text
  • BIG5 - Chinese text (old ...
  • BIK - BioCharter Profile Backup
  • BIK - Bink and Smacker Game ...
  • BIK - BINK Video File
  • BIK - Video File
  • BIK - Bink Video Header
  • BIL - Linux file
  • BIL - Helgeson Software binary...
  • BIL - Band interleaved data
  • BIL - Printing accounts
  • BIL - AMPS Mission 7 Daedalus ...
  • BIL - ArcView image format ( ...
  • BIL - Mosaicked 10- meter DEM ...
  • BIL - Satellite Image ( 8bit ...
  • BIL - FreeBSD file
  • BIL - Spot raster image file
  • BIM - Cadsoft Envisioneer self...
  • BIM - Envisioneer self - ...
  • BIMD - Blue Ink Meta - Data ( ...
  • BIN - Binary file
  • BIN64 - Binary encoding method (...
  • BINA - DOS Binary File
  • BINA - Netscape Mail File
  • BINUI - Call of Juarez game menu...
  • BIO - OS/2 Bios file
  • BIORAD - Biorad confocal file : ...
  • BIOT - BiotSavart Magnetic ...
  • BIP - QIP Infium account file
  • BIP - Blue Ink project file
  • BIP - ArcView : image file ( ...
  • BIP - ArcView Image File ( ...
  • BIQ - Civilization 3 Scenario
  • BIT - X11 Bitmap
  • BIT - Imported map file used ...
  • BIU - BidMaker 2002 Update
  • BIX - Index to a.BIB BibTeX ...
  • BIX - Civilization III scenario
  • BIX - BIX Compressed File ...
  • BIX - Civilization 3 Scenario
  • BIX - BIX Archiver Compressed ...
  • BIX - Kodicom Video File
  • BIZ - BizTalk compatible schema
  • BIZ - Creatacard business card...
  • BIZ - PrintMaster Gold ...
  • BIZ - BIZ dVS model object
  • BIZ - ShowBiz Project File ( ...
  • BIZ - BIZ dVS Model / Object ...
  • BIZ - Print Shop business card...
  • BIZ - Business card file
  • BIZDESIGN - BusinessReport Design ( ...
  • BIZDOCUMENT - BusinessReport Document ...
  • BJD - NDDigital Print Bureau (...
  • BJF - NTI Backup Now related ...
  • BJG - DESQview ( Symantec ...
  • BJK - Scanner Recognita file
  • BJK - Blaise File ( Statistics...
  • BJL - BJL Business Systems ...
  • BJO - Instrument tablature file
  • BJO - TablEdit Tablature File
  • BK - Backup file (Generic)
  • BK - Backup
  • BK - FreeBSD file
  • BK - FrameMaker Book File
  • BK - Movie Magic Screenwiter ...
  • BK - JetFax Faxbook file
  • BK - Xerox Alto BCPL static ...
  • BK - Adobe FrameMaker book ...
  • BK - Power Chess opening book...
  • BK - Automatic packet / ...
  • BK - LinguAssist File
  • BK - OS/8 file
  • BK - JetFax faxbook
  • BK - Faxbook - JetFax
  • BK! - WordPerfect for Windows ...

-ADS BY GOOGLE

SearchCompliance

  • PCAOB (Public Company Accounting Oversight Board)

    The Public Company Accounting Oversight Board (PCAOB) is a Congressionally-established nonprofit that assesses audits of public ...

  • cyborg anthropologist

    A cyborg anthropologist is an individual who studies the interaction between humans and technology, observing how technology can ...

  • RegTech

    RegTech, or regulatory technology, is a term used to describe technology that is used to help streamline the process of ...

SearchSecurity

  • Advanced Encryption Standard (AES)

    The Advanced Encryption Standard, or AES, is a symmetric block cipher used by the U.S. government to protect classified ...

  • identity theft

    Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable ...

  • spear phishing

    Spear phishing is an email-spoofing attack that targets a specific organization or individual, seeking unauthorized access to ...

SearchHealthIT

SearchDisasterRecovery

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

  • mass notification system (MNS)

    A mass notification system is a platform that sends one-way messages to inform employees and the public of an emergency.

  • disaster recovery as a service (DRaaS)

    One approach to a strong disaster recovery plan is DRaaS, where companies offload data replication and restoration ...

SearchStorage

  • CIFS (Common Internet File System)

    CIFS (Common Internet File System) is a protocol that gained popularity around the year 2000, as vendors worked to establish an ...

  • GlusterFS (Gluster File System)

    GlusterFS (Gluster File System) is an open source distributed file system that can scale out in building-block fashion to store ...

  • virtual memory

    Virtual memory is a memory management capability of an OS that allows a computer to compensate for physical memory shortages by ...

SearchSolidStateStorage

  • Tier 0

    Tier 0 (tier zero) is a level of data storage that is faster, and perhaps more expensive, than any other level in the storage ...

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

  • SSD caching

    SSD caching, also known as flash caching, is the temporary storage of data on NAND flash memory chips in a solid-state drive so ...

SearchCloudStorage

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

  • Zadara VPSA and ZIOS

    Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA ...

Close