Browse Definitions:

Browse File Extensions by Alphabet

CLK - CMK

  • CLK - ClickFORMS Data ( ...
  • CLK - Corel R.A.V.E. Animation...
  • CLK - WatchGuard cloaked file ...
  • CLK - ClickFORMS data Header
  • CLK - WatchGuard Cloaked File ...
  • CLK - Corel R.A.V.E. Animation...
  • CLKK - Clicker Keyboard ( Crick...
  • CLKK - Clicker Keyboard
  • CLKT - Clicker Template ( Crick...
  • CLKT - Clicker Template
  • CLKW - Clicker Word Bank
  • CLKW - Clicker Word Bank ( ...
  • CLKX - Crick Software Clicker ...
  • CLKX - Clicker Grid Set ( Crick...
  • CLKZ - Date Preferences
  • CLL - Cricket Software Clicker...
  • CLM - GenePattern CEL ...
  • CLM - Micrografx Picture ...
  • CLM - MagicJack call log
  • CLMOV - Clan Lord Movie - ...
  • CLN - CLT file
  • CLN - Backup Configuration File
  • CLO - Cloe Image
  • CLOE - Cloe Ray- Tracer image
  • CLOE - Cloe Ray- Tracer
  • CLOG - SpreadMaster Client Log ...
  • CLOUD - GOM Atos Scanner File
  • CLOUD - Homeworld Cloud Data ( ...
  • CLP - Windows Clipboard
  • CLP - Quattro Pro Clip art
  • CLP - Clipper 5 Compiler Script
  • CLPI - Blu-Ray Clip Information
  • CLPI - Blu-ray Clip AV Stream ...
  • CLPI - Blu-ray Clip AV stream ...
  • CLPP - Mac File Type
  • CLPS - Mac File Type
  • CLPT - Mac File Type
  • CLR - 1st Reader Binary color ...
  • CLR - PhotStyler Color ...
  • CLS - C++ Class Definition
  • CLS - Visual Basic Class Module
  • CLSS - Java Class Filegcodiclass
  • CLSS - Metrowerks Java Class
  • CLT - VisualBoyAdvance cheat ...
  • CLT - Autodesk culvert data ...
  • CLU - Cluster File
  • CLU - XNBC V8 cluster name file
  • CLU - Clusse Node File ( ...
  • CLU - Phantasmagoria 2 8-bit ...
  • CLU - CLUCalc CLUScript file
  • CLU - IBM PCI cryptographic ...
  • CLU - Broken Sword 2 Dialog ...
  • CLUT - Color Lookup table / ...
  • CLV - Yamaha Cool Voices file
  • CLV - QIP visible list
  • CLV - Vbox current language ...
  • CLV - Clovis for Outlook ...
  • CLW - Clarion for Windows ...
  • CLW - Visual C++ Class Wizard ...
  • CLW - MFC Class Wizard ...
  • CLW - Class Wizard file
  • CLX - Adobe file
  • CLX - Rational XDE file
  • CLX - Macro ToolsWorks Macro ...
  • CLY - Corel Graphics Custom ...
  • CLY - Corel Graphics10 Custom ...
  • CLY - ACT! Graphic Layout File
  • CM - Craftman Data
  • CM1 - CaseMap Version 1.x Case...
  • CM2 - Unknown Apple II File
  • CM2 - Poser Camera Set File
  • CM2 - CaseMap Version 2.x Case...
  • CM3 - CaseMap Version 3.x Case...
  • CM4 - CaseMap case analysis ...
  • CM4 - Championship Manager 4 ...
  • CM4 - ClipMate Data File
  • CM5 - CaseMap Version 5.x Case...
  • CM6 - CaseMap Version 6.x Case...
  • CM7 - CaseMap Version 7.x Case...
  • CMA - Database file in plain ...
  • CMAP - CmapTools Concept Map ( ...
  • CMB - Reason Combinator ...
  • CMB - Chromeleon backup ...
  • CMB - XTree for Windows button...
  • CMB - Chromeleon Backup Archive
  • CMB - Reason Combinator ...
  • CMBL - Logger PRO Data
  • CMBL - Logger Pro Data ( ...
  • CMBX - # develop ( SharpDevelop...
  • CMC - Collectorz.com Comic ...
  • CMC - PowerFront File
  • CMC - CosmoCaller : Remote ...
  • CMD - Command file for Windows...
  • CMD - DOS CP/M command file
  • CMD - dBase-II program file
  • CMD - 1st Reader External ...
  • CMD5 - CrystalMaker Data format...
  • CMD5 - CrystalMaker Data ( ...
  • CMDF - CrystalMaker Data format...
  • CMDF - CrystalMaker Data ( ...

-ADS BY GOOGLE

SearchCompliance

  • cyborg anthropologist

    A cyborg anthropologist is an individual who studies the interaction between humans and technology, observing how technology can ...

  • RegTech

    RegTech, or regulatory technology, is a term used to describe technology that is used to help streamline the process of ...

  • conduct risk

    Conduct risk is the prospect of financial loss to an organization that is caused by the actions of an organization's ...

SearchSecurity

  • application whitelisting

    Application whitelisting is the practice of identifying applications that have been deemed safe for execution and restricting all...

  • security

    Security, in information technology (IT), is the defense of digital information and IT assets against internal and external, ...

  • insider threat

    An insider threat is a malicious hacker (also called a cracker or a black hat) who is an employee or officer of a business, ...

SearchHealthIT

  • HIPAA Privacy Rule

    The Standards for Privacy of Individually Identifiable Health Information, commonly known as the HIPAA Privacy Rule, establishes ...

  • HIPAA business associate agreement (BAA)

    Under the U.S. Health Insurance Portability and Accountability Act of 1996, a HIPAA business associate agreement (BAA) is a ...

  • telemedicine

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

SearchDisasterRecovery

  • data recovery

    Data recovery restores data that has been lost, accidentally deleted, corrupted or made inaccessible. Learn how data recovery ...

  • disaster recovery plan (DRP)

    A company's disaster recovery policy is enhanced with a documented DR plan that formulates strategies, and outlines preparation ...

  • fault-tolerant

    Systems with integrated fault tolerance are designed to withstand multiple hardware failures to ensure continuous availability.

SearchStorage

  • data deduplication

    Deduplication retains one unique data instance to reduce storage and bandwidth consumed by remote backups, replication and ...

  • byte

    In most computer systems, a byte is a unit of data that is eight binary digits long. Bytes are often used to represent a ...

  • Secure Digital card (SD card)

    SD cards use flash memory to provide nonvolatile storage. They are more rugged than traditional storage media and are used in ...

SearchSolidStateStorage

  • flash file system

    Flash file systems are designed specifically for memory devices. A well-designed flash device and flash file system ensure ...

  • IOPS (input/output operations per second)

    IOPS measures the maximum number of reads and writes to non-contiguous storage. It is not an actual benchmark since vendor ...

  • eMMC (embedded MultiMediaCard)

    An embedded MultiMediaCard (eMMC) is a small storage device made up of NAND flash memory and a simple storage controller.

SearchCloudStorage

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

  • Zadara VPSA and ZIOS

    Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA ...

Close