Browse Definitions:

Browse File Extensions by Alphabet

EPH - ES

  • EPH - GPS Pathfinder Office ...
  • EPHTML - Enhanced Perl-parsed HTML
  • EPI - Document file (Express ...
  • EPIBRW - Web File Location
  • EPJ - RapidSQL SCCS project
  • EPJ - Java - clients file
  • EPK - Metin2 Game Data Package
  • EPL - Encirq \PL Programming ...
  • EPL - Tallyman E- commerce ...
  • EPM - Destiny MPE Encoder ...
  • EPML - EPC Tools EPC ...
  • EPP - EditPad Pro Project
  • EPP - Efficient PPC Project ...
  • EPP - TalaPhoto Project File
  • EPP - EditPad Pro Project ( ...
  • EPP - TalaPhoto Project
  • EPR - Eiffel Project Repository
  • EPR - Actuate External ...
  • EPR - Z88 Disk ROM Image files
  • EPRJ - Pg4uw Project File ( ...
  • EPRT - SolidWorkseDrawing CAD ...
  • EPS - Encapsulated Postscript ...
  • EPS - Printer font (Epson, ...
  • EPS - Encapsulated Postscript ...
  • EPS2 - Adobe Level II ...
  • EPS3 - Encapsulated PostScript ...
  • EPSF - Encapsulated PostScript
  • EPSI - Adobe Encapsulated ...
  • EPSON - Epson printer graphics ...
  • EPSON - Epson Printer Graphics ...
  • EPSP - Adobe Encapsulated ...
  • EPSP - PC PostScript File
  • EPSP - Mac File Type
  • EPT - Encapsulated PostScript ...
  • EPT - WITE32 File
  • EPT - Elpoint Presentation File
  • EPT - Adobe Encapsulated ...
  • EPT - Clarion for Windows ...
  • EPUB - Open Publication ...
  • EPUB - Open Publication ...
  • EPUB - International Digital ...
  • EPW - EasyPlot save file Header
  • EPW - EnergyPlus Weather Data ...
  • EPW - EnergyPlus Weather Data ...
  • EPX - SAP HTML file
  • EPX - Piranesi 3D Model File (...
  • EPZ - EON Studio Personal ...
  • EQD - EquineMax Data File ( ...
  • EQF - Winamp equalizer ...
  • EQF - Winamp Equalizer Preset ...
  • EQF - PocketMusic preset file
  • EQL - DART Pro 98 fabric ...
  • EQL - MathType Settings
  • EQL - Embedded SQL File
  • EQN - Equation file (...
  • EQP - MathType Preferences
  • EQP - BPM Studio Equalizer ...
  • EQT - ReliaSoft Weibull ++ 6
  • EQU - astrodigital.net ...
  • EQU - Assembly language equates
  • EQUIV - Specifies remote systems...
  • EQW - SPEFO Stellar Spectra ...
  • EQX - Goldwave 402 file
  • ER - AOL 3.0 Organizer ( ...
  • ER - Aol30 organizer file
  • ER1 - ERWin file
  • ER_ - Winhelp file ( ...
  • ER_ - Winhelp Compressed File
  • ERB - Ruby on Rails Script ( ...
  • ERB - Evil Genius Resource File
  • ERC - Ercato Engine Ercaton ( ...
  • ERD - Entity Relationship ...
  • ERF - BioWare Aurora engine ...
  • ERF - SGML Visual DTD Entity ...
  • ERF - Active Media Eclipse ...
  • ERF - Eclipse Resource File (...
  • ERF - Neverwinter Nights ...
  • ERG - Arranger Audio File
  • ERG - Midiprg Arranger file
  • ERI - ERWin File
  • ERI - AllFusion ERwin Data ( ...
  • ERI - Entis Rasterized Image
  • ERIK - (MAC CREATOR CODE ) ...
  • ERIK - Finder ( Desktop files )
  • ERIK - Mac File Type
  • ERL - Erlang source code file
  • ERM - Entity Relationship ...
  • ERP - NOAA Post -fit GPS Earth...
  • ERP - British Economics & ...
  • ERR - stored error message file
  • ERR - Compilation error file (...
  • ERS - Pro/ ENGINEER temporary ...
  • ERS - Earth Resource Mapping ...
  • ERS - Eraser
  • ERS - Unknown Apple II File
  • ERS - Earth Resource Satellite...
  • ERS - EARS Control File
  • ERWIN - ERwin Data Modeler Data ...
  • ERX - ERWin file

-ADS BY GOOGLE

SearchCompliance

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • audit program (audit plan)

    An audit program, also called an audit plan, is an action plan that documents what procedures an auditor will follow to validate ...

SearchSecurity

  • insider threat

    Insider threat is a generic term for a threat to an organization's security or data that comes from within.

  • ransomware

    Ransomware is a subset of malware in which the data on a victim's computer is locked, typically by encryption, and payment is ...

  • hacker

    A hacker is an individual who uses computer, networking or other skills to overcome a technical problem.

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

SearchSolidStateStorage

  • 3D XPoint

    3D XPoint is memory storage technology jointly developed by Intel and Micron Technology Inc.

  • RRAM or ReRAM (resistive RAM)

    RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...

  • JEDEC

    JEDEC is a global industry group that develops open standards for microelectronics.

SearchCloudStorage

  • Google Cloud Storage

    Google Cloud Storage is an enterprise public cloud storage platform that can house large unstructured data sets.

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

Close