Browse Definitions:

Browse File Extensions by Alphabet

GGP - GL

  • GGP - GemCom Graphic Format
  • GGR - GIMP Gradient (The GIMP ...
  • GGS - Gameboy Emulator File
  • GGS - Audio file
  • GGX - Green Globs & Graphing ...
  • GHI - Configuration File for ...
  • GHI - NCSA Mosaic ...
  • GHO - Symantec ghost image file
  • GHS - Symantec ghost segment ...
  • GHW - GHDL Wave file - GHDL / ...
  • GI - Global Image
  • GI - Audio Utility ...
  • GI - Sonic RecordNow ! cd ...
  • GI - CD Image
  • GI - Sony CD Extreme Global ...
  • GI - Prassi or PrimoDVD Image
  • GI - UltraISO disk image file
  • GI - RecordNow ! CD Image
  • GI! - GigaSampler / GigaStudio...
  • GIB - Chart (Graph-in-the-Box)
  • GIC - BioWare Aurora Engine ...
  • GID - Windows 95 global index ...
  • GIF - Bitmap (CompuServe)
  • GIF2 - Netobjects fusion Styles...
  • GIF_ - GIF Image Filter Databgif
  • GIFAR - GIF With Java ARchive
  • GIFENX - egis Encrypted GIF File ...
  • GIFF - CompuServe bitmap image ...
  • GIFF - Graphic Interchange ...
  • GIG - Gigasampler file
  • GIG - Tascam GigaSampler File
  • GIG - GigaSampler / GigaStudio...
  • GIH - GIMP Animated Brush (The...
  • GIM - Graphics Link ...
  • GIN - GEMS Engine Control Unit...
  • GINT - Gintor Download ...
  • GIO - Nyquist V2.10 Test file
  • GIO - Nyquist MIDI File
  • GIO - Adagio Score File
  • GIR - Gens Plus ! Movie Capture
  • GIS - Erdas bitmap Header
  • GIS - Erdas gray - scale ...
  • GIT - BioWare Aurora Engine ...
  • GIW - Presentation (...
  • GIX - Graphics Link ...
  • GJD - 7th Guest Game Archive
  • GJD - 11th Hour Game Archive
  • GJD - GeoJet Professional ...
  • GJD - The 11th Hour game file
  • GJF - Gaussian Input Data File
  • GJM - Compressed audio file ( ...
  • GJS - Compressed audio file ( ...
  • GJT - GAJET Input Data File (...
  • GKA - GKWIN ( Matsushita ...
  • GKB - General Knowledge Base ...
  • GKH - Ensoniq EPS family disk ...
  • GKS - GripKey document (Gravis)
  • GL - Animation file (GRASP ...
  • GL2 - HP Graphics Language ...
  • GL3 - Green line file
  • GLADE - Glade Project File
  • GLB - Textured 3-D scene file ...
  • GLB - Microsoft Exchange ...
  • GLC - 3D Graphic
  • GLD - The GUI Loft Design ( ...
  • GLD - Glide File
  • GLD - Ground Loop Design Work ...
  • GLF - Golf Save file
  • GLF - Pointwise Tcl script
  • GLF - Grantleigh Labels
  • GLF - 3D font used by glf
  • GLF - iGolf golf course file
  • GLF - AfterGRASP font
  • GLF - Gridgen Tcl script
  • GLG - MicroSim PCBoard ...
  • GLH - Wise Installer Temporary...
  • GLI - GLHEPRO Input Data ( ...
  • GLIF - Glyph Interchange Format
  • GLK - Microsoft Office Groove ...
  • GLM - Datafile (Glim)
  • GLO - Auxiliary for glossary (...
  • GLO - Global module in Basic ...
  • GLO - Instant Text Glossary ...
  • GLOBAL - Global Makefile
  • GLOBAL - Unknown Apple II File
  • GLOS - Mac File Type
  • GLOS - MS Word Glossary
  • GLS - Datafile (Across)
  • GLT - Sothink Glenda File
  • GLUE - GlueMon audio file
  • GLUE - GlueMon song / module ...
  • GLUT - Opengl Glut -3.6 file
  • GLUT2 - Opengl Glut -3.6 file
  • GLUT3 - Opengl Glut -3.6 file
  • GLV - 2D Graphic
  • GLV - Glove Data File (New ...
  • GLY - Glossary (Microsoft Word)

-ADS BY GOOGLE

SearchCompliance

  • cyborg anthropologist

    A cyborg anthropologist is an individual who studies the interaction between humans and technology, observing how technology can ...

  • RegTech

    RegTech, or regulatory technology, is a term used to describe technology that is used to help streamline the process of ...

  • conduct risk

    Conduct risk is the prospect of financial loss to an organization that is caused by the actions of an organization's ...

SearchSecurity

  • application whitelisting

    Application whitelisting is the practice of identifying applications that have been deemed safe for execution and restricting all...

  • security

    Security, in information technology (IT), is the defense of digital information and IT assets against internal and external, ...

  • insider threat

    An insider threat is a malicious hacker (also called a cracker or a black hat) who is an employee or officer of a business, ...

SearchHealthIT

  • HIPAA Privacy Rule

    The Standards for Privacy of Individually Identifiable Health Information, commonly known as the HIPAA Privacy Rule, establishes ...

  • HIPAA business associate agreement (BAA)

    Under the U.S. Health Insurance Portability and Accountability Act of 1996, a HIPAA business associate agreement (BAA) is a ...

  • telemedicine

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

SearchDisasterRecovery

  • data recovery

    Data recovery restores data that has been lost, accidentally deleted, corrupted or made inaccessible. Learn how data recovery ...

  • disaster recovery plan (DRP)

    A company's disaster recovery policy is enhanced with a documented DR plan that formulates strategies, and outlines preparation ...

  • fault-tolerant

    Systems with integrated fault tolerance are designed to withstand multiple hardware failures to ensure continuous availability.

SearchStorage

  • data deduplication

    Deduplication retains one unique data instance to reduce storage and bandwidth consumed by remote backups, replication and ...

  • byte

    In most computer systems, a byte is a unit of data that is eight binary digits long. Bytes are often used to represent a ...

  • Secure Digital card (SD card)

    SD cards use flash memory to provide nonvolatile storage. They are more rugged than traditional storage media and are used in ...

SearchSolidStateStorage

  • flash file system

    Flash file systems are designed specifically for memory devices. A well-designed flash device and flash file system ensure ...

  • IOPS (input/output operations per second)

    IOPS measures the maximum number of reads and writes to non-contiguous storage. It is not an actual benchmark since vendor ...

  • eMMC (embedded MultiMediaCard)

    An embedded MultiMediaCard (eMMC) is a small storage device made up of NAND flash memory and a simple storage controller.

SearchCloudStorage

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

  • Zadara VPSA and ZIOS

    Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA ...

Close