Browse Definitions:

Browse File Extensions by Alphabet

EDQ - EIN

  • EDQ - Ensoniq SQ1/SQ2/KS32 ...
  • EDR - Embird Plus Color ...
  • Edraw XML file - Graphics file created ...
  • EDRW - eDrawings File ( ...
  • EDRW - SolidWorks eDrawing File
  • EDS - Ensoniq SQ80 disk image
  • EDT - Default settings (VAX ...
  • EDTV - Mac File Type
  • EDU - Unknown file extension
  • EDV - Ensoniq VFX-SD disk image
  • EDW - eDrawings SolidWorks Corp
  • EDX - Editor Dictionary File (...
  • EE - Encrypt Easy encrypted ...
  • EEA - Attachment Decoder ...
  • EEB - Button Bar for Equation ...
  • EEE - EEEWin Archive ( Remia ...
  • EEE - 3eee Triple Encryption ...
  • EEG - SleepScan and Ceegraph ...
  • EENV - Mac File Type
  • EEP - Evidence Eliminator file
  • EEP - EEPROM Data File
  • EER - Lahey Fortran execution ...
  • EES - Empire Earth Scenario ...
  • EF2 - Internet Download ...
  • EFA - Ensoniq ASR file
  • EFAX - New Contact Fax Form file
  • EFC - Effect
  • EFC - EFCoins File
  • EFC - FAIRCOPY encrypted fair ...
  • EFC - Technics Sx KN 6000 ...
  • EFD - EARS filter definition ...
  • EFDEMO - Star Trek Voyager Elite ...
  • EFE - Ensoniq EPS file
  • EFF - Bioware Infinity game ...
  • EFF - eFileFolders file format
  • EFF - EverQuest effects file
  • EFG - Gambit Extensive Form ...
  • EFI - Extensible Firmware ...
  • EFI - Microsoft Windows 7 file
  • EFK - Ensoniq KT file
  • EFL - Encryptafile Encrypted ...
  • EFL - Encryptafile encrypted ...
  • EFL - External Format Language...
  • EFM - Equation FontMetrics
  • EFP - Exchange Forms Designer ...
  • EFQ - Ensoniq SQ1/SQ2/KS32 file
  • EFR - Encrypted Private Key ...
  • EFR - Encryptafile Private Key...
  • EFS - Ensoniq SQ80 file
  • EFT - High Resolution Screen ...
  • EFTX - Office 2007 Theme Effect...
  • EFU - Encryptafile Public Key ...
  • EFV - Ensoniq VFX-SD file
  • EFW - Renamed Zip or ...
  • EFW - CA Security Center ...
  • EFX - Fax Document (Everex ...
  • EFX - Fax document (Efax ...
  • EG - Image It Backup Disk ...
  • EG1 - Unknown file extension
  • EG2 - IBM eGatherer collected ...
  • EG2 - eGatherer Collected ...
  • EGA - EGA Display font (...
  • EGD - GIS Software Encrypted ...
  • EGG - Ducks add-on level file
  • EGG - Wer Wird Millionaer Data...
  • EGG - EGG Solution 360RealTour...
  • EGG - Explosion Graphics ...
  • EGG - Panda3D Model File
  • EGG - Panda3D transform ...
  • EGGP - Adobe After Effects ...
  • EGISENC - egis encrypted data ...
  • EGISENX - Egis encryped file
  • EGL - EagleCheck Encrypted ...
  • EGM - Bentley Systems drawing ...
  • EGN - Daqarta Extended Audio ...
  • EGO - Rollback Rx drive image ...
  • EGON - Egon animation Header
  • EGP - Easy Grade Pro Gradebook...
  • EGP - Easy Grade Pro Data ( ...
  • EGP - EGrid32 Form properties ...
  • EGR - Egrid32 Form ( Elias ...
  • EGRP - Explorations RPG Game ...
  • EGS - GIS Software Encrypted ...
  • EGT - EGT universal document
  • EGWARSAVE - War! Age of Imperialism ...
  • EHELP - Emperor Help Language ...
  • EHP - HelpLogic Project ( ...
  • EHTML - Enhanced HTML
  • EI - Electric Image
  • EI - EARS Component File
  • EI - Electric Image image ...
  • EID - IBM ViaVoice Vocabulary ...
  • EID - Faena MyID Encrypted File
  • EID - Seiko Epson Internet ...
  • EIDI - Electric Image EIDI File
  • EIDI - Bitmap image ( Electric ...
  • EIF - Epson Installation ...
  • EIF - Eroiica graphic file
  • EIG - Easy Index Generator ...
  • EIN - Skyplot Settings File ( ...

-ADS BY GOOGLE

SearchCompliance

  • cyborg anthropologist

    A cyborg anthropologist is an individual who studies the interaction between humans and technology, observing how technology can ...

  • RegTech

    RegTech, or regulatory technology, is a term used to describe technology that is used to help streamline the process of ...

  • conduct risk

    Conduct risk is the prospect of financial loss to an organization that is caused by the actions of an organization's ...

SearchSecurity

  • application whitelisting

    Application whitelisting is the practice of identifying applications that have been deemed safe for execution and restricting all...

  • security

    Security, in information technology (IT), is the defense of digital information and IT assets against internal and external, ...

  • insider threat

    An insider threat is a malicious hacker (also called a cracker or a black hat) who is an employee or officer of a business, ...

SearchHealthIT

  • HIPAA Privacy Rule

    The Standards for Privacy of Individually Identifiable Health Information, commonly known as the HIPAA Privacy Rule, establishes ...

  • HIPAA business associate agreement (BAA)

    Under the U.S. Health Insurance Portability and Accountability Act of 1996, a HIPAA business associate agreement (BAA) is a ...

  • telemedicine

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

SearchDisasterRecovery

  • data recovery

    Data recovery restores data that has been lost, accidentally deleted, corrupted or made inaccessible. Learn how data recovery ...

  • disaster recovery plan (DRP)

    A company's disaster recovery policy is enhanced with a documented DR plan that formulates strategies, and outlines preparation ...

  • fault-tolerant

    Systems with integrated fault tolerance are designed to withstand multiple hardware failures to ensure continuous availability.

SearchStorage

  • data deduplication

    Deduplication retains one unique data instance to reduce storage and bandwidth consumed by remote backups, replication and ...

  • byte

    In most computer systems, a byte is a unit of data that is eight binary digits long. Bytes are often used to represent a ...

  • Secure Digital card (SD card)

    SD cards use flash memory to provide nonvolatile storage. They are more rugged than traditional storage media and are used in ...

SearchSolidStateStorage

  • flash file system

    Flash file systems are designed specifically for memory devices. A well-designed flash device and flash file system ensure ...

  • IOPS (input/output operations per second)

    IOPS measures the maximum number of reads and writes to non-contiguous storage. It is not an actual benchmark since vendor ...

  • eMMC (embedded MultiMediaCard)

    An embedded MultiMediaCard (eMMC) is a small storage device made up of NAND flash memory and a simple storage controller.

SearchCloudStorage

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

  • Zadara VPSA and ZIOS

    Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA ...

Close