Browse Definitions:

Browse File Extensions by Alphabet

DIT - DLX

  • DIT - DRAWIT graphics save file
  • DIT - Windows2000 Active ...
  • DIT - Microsoft Windows 2000 :...
  • DITA - DITA output file
  • DIV - DivX Movie ( ...
  • DIVX - Movie Encoded with DivX ...
  • DIVX - DivX - Encoded Movie File
  • DIVX - DivX Media Format
  • DIX - Adobe Bridge file
  • DIX - Stonevoice Translator ...
  • DIZ - Description file (...
  • DJ - DJGPP docs file
  • DJ - DjVu File Bitmap graphics
  • DJA - Unknown file extension
  • DJE - MattBatt iAM- player ...
  • DJR - Macromedia Director ...
  • DJR - Adobe Director video ...
  • DJS - NASCAR Thunder game ...
  • DJS - Data Junction ...
  • DJV - DjVu file bitmap graphics
  • DJV - DjVu Image
  • DJV - DjVu file Header
  • DJVU - DjVu compressed image ...
  • DJW - Datadisc Explore
  • DJX - Dundjinni Art ( Fluid ...
  • DK - Denmark Danish text
  • DK - Danemark : danish text
  • DK@P - DocMaker Standalone Doc
  • DKB - Graphics file (Ray ...
  • DKC - Virtue Deskshow Compiler
  • DKD - Virtue Deskshow ...
  • DKD - Submarine Titans battle ...
  • DKD - Karaoke file
  • DKE - DriveLock FDE Disk Key ...
  • DKP - Virtue Deskshow ...
  • DKP - Dreamkeys plug -in
  • DKS - DataKeeper Configuration...
  • DKX - Submarine Titans Battle ...
  • DKZ - Description In Zip File
  • DL - Image
  • DL$ - System Dllbackup file
  • DL0 - Abbyy Finereader 4.0 ...
  • DL0 - ABBYY Finereader 4.0 ...
  • DL_ - Compressed DLL File
  • DL_ - The Land Of UM
  • DL_ - Animation / image
  • DL_ - DLL backup
  • DLB - SSL Trojan data file
  • DLB - SmartBook
  • DLB - Troj / Dloadr -AHT file
  • DLB - Spectrum Analyzer ...
  • DLC - JDownloader download ...
  • DLC - 3D Studio Max animation ...
  • DLC - Download Link Container ...
  • DLC - Disclib library database
  • DLC - DIGILINEAR compressed ...
  • DLC - 3DS Max Animation ...
  • DLC - Echelon HQ configuration...
  • DLC - Model Dislocation file
  • DLCT - AppleScript Dialect
  • DLD - Datafile (Lotus 1-2-3)
  • DLDI - Dynamically Linked ...
  • DLE - 3D Studio Max plugin
  • DLF - Belkin Router Firmware ...
  • DLF - DataCAD Double Precision...
  • DLF - Dialogue Live Format
  • DLG - C++ Dialogue Script
  • DLI - Beast 2.02 Trojan File
  • DLK - INMOS Transputer ...
  • DLK - INMOS Transputer ...
  • DLL - Export/Import Filter (...
  • DLL - Dynamic-link library file
  • DLM - FileMaker Pro : Data
  • DLM - Dirty Little Helper ...
  • DLM - ( Microsoft ) DownLoad ...
  • DLM - Dynamic Link Module
  • DLM - 3ds Max ( Autodesk Inc.)
  • DLM - Akamai Download Manager ...
  • DLM - Adobe Download Manager ...
  • DLM - Microsoft File Transfer ...
  • DLM - ASCII Delimited File
  • DLMCACHE - FilePlanet Download ...
  • DLMPARTIAL - FilePlanet Download ...
  • DLN - Scanner Recognita file
  • DLO - DOS7 SYSTEM file
  • DLO - 3ds Max Plug -in
  • DLO - 3D Studio Max Plugin file
  • DLP - Data - DAQLab
  • DLPF - DinkeyLook Diagnostic ...
  • DLR - TIB Browser
  • DLS - Interactive music ...
  • DLS - Downloadable sound
  • DLS - Setup file (Norton ...
  • DLT - VCTEditor Data File ( ...
  • DLU - Dirty Little Helper ...
  • DLV - CATIA 4 Export File
  • DLV - CATIA export file
  • DLV3 - CATIA Export File ( ...
  • DLV4 - Catia file format
  • DLW - DALiM LiTHO Line Work ...

-ADS BY GOOGLE

SearchCompliance

  • PCAOB (Public Company Accounting Oversight Board)

    The Public Company Accounting Oversight Board (PCAOB) is a Congressionally-established nonprofit that assesses audits of public ...

  • cyborg anthropologist

    A cyborg anthropologist is an individual who studies the interaction between humans and technology, observing how technology can ...

  • RegTech

    RegTech, or regulatory technology, is a term used to describe technology that is used to help streamline the process of ...

SearchSecurity

  • email spam

    Email spam, or junk email, is unsolicited bulk messages sent through email with commercial, fraudulent or malicious intent.

  • distributed denial of service (DDoS) attack

    A distributed denial-of-service attack occurs when an attack originates from multiple computers or devices, usually from multiple...

  • application whitelisting

    Application whitelisting is the practice of identifying applications that have been deemed safe for execution and restricting all...

SearchHealthIT

  • athenahealth Inc.

    Based in Watertown, Mass., athenahealth Inc. is a leading vendor of cloud-based EHRs for small to medium-sized physician ...

  • Affordable Care Act (ACA or Obamacare)

    The Affordable Care Act (ACA) is legislation passed in 2010 that changed how uninsured Americans enroll in and receive healthcare...

  • HIPAA Privacy Rule

    The Standards for Privacy of Individually Identifiable Health Information, commonly known as the HIPAA Privacy Rule, establishes ...

SearchDisasterRecovery

  • disaster recovery as a service (DRaaS)

    One approach to a strong disaster recovery plan is DRaaS, where companies offload data replication and restoration ...

  • data recovery

    Data recovery restores data that has been lost, accidentally deleted, corrupted or made inaccessible. Learn how data recovery ...

  • disaster recovery plan (DRP)

    A company's disaster recovery policy is enhanced with a documented DR plan that formulates strategies, and outlines preparation ...

SearchStorage

  • yottabyte (YB)

    A yottabyte is a measure of theoretical storage capacity and is 2 to the 80th power bytes, or, in decimal, approximately 1,000 ...

  • Kilo, mega, giga, tera, peta, exa, zetta and all that

    Kilo, mega, giga, tera, peta, exa, zetta are among the list of prefixes used to denote the quantity of something, such as a byte ...

  • brontobyte

    A brontobyte is a measure of memory or data storage that is equal to 10 to the 27th power of bytes.

SearchSolidStateStorage

  • SSD caching

    SSD caching, also known as flash caching, is the temporary storage of data on NAND flash memory chips in a solid-state drive so ...

  • NVDIMM (Non-Volatile Dual In-line Memory Module)

    An NVDIMM (non-volatile dual in-line memory module) is hybrid computer memory that retains data during a service outage.

  • NAND mirroring

    NAND mirroring has been proposed to break the security in certain portable devices that use NAND flash memory for encryption.

SearchCloudStorage

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

  • Zadara VPSA and ZIOS

    Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA ...

Close