Browse Definitions:

Browse File Extensions by Alphabet

J - JCL

  • J - Java source code
  • J - Image JPEG / JFIF
  • J - JAR Compressed Archive (...
  • J - JAR Compressed File
  • J - JPEG / JFIF Image
  • J - JAR archive
  • J1 - EDIT Compiler JEDEC ...
  • J2A - Jazz Jackrabbit 2 ...
  • J2B - Jazz Jackrabbit 2 Music ...
  • J2C - Joint Photographic ...
  • J2C - JPEG 2000 image
  • J2D - Jazz Jackrabbit Data ...
  • J2E - Jazz Jackrabbit 2 ...
  • J2H - Jazz Jackrabbit 2 High ...
  • J2I - Jazz Jackrabbit 2 ...
  • J2I - Jazz 2 Internet Link File
  • J2K - JPEG 2000 Image
  • J2K - JPEG - 2000 JP2 File
  • J2L - Jazz Jackrabbit 2 Level ...
  • J2L - Jaxx Creation Station ...
  • J2M - Jazz Jackrabbit 2 ...
  • J2S - Jazz Jackrabbit 2 ...
  • J2T - Jazz Jackrabbit 2 Tile ...
  • J2V - Jazz Jackrabbit 2 ...
  • J3D - Atari Jaguar 3D object ...
  • J62 - Ricoh camera format file
  • J6I - Ricoh Digital Camera ...
  • J6I - Ricoh Digital Camera ...
  • JA - Trainz Railroad ...
  • JA - IBM tools updater file
  • JACKSUM - Jacksum Fingerprint ( ...
  • JAD - Java Application ...
  • JAG - Atari Jaguar JPEG ...
  • JAK - Jack compressed archive ...
  • JAM - Leisure Suite Larry : ...
  • JAM - Misc
  • JAM - E- mail file
  • JAM - Image Microprose
  • JAM - JamTracker module : Music
  • JAM - Jam messagebase - FTN ...
  • JAM - FTN Software Jam ...
  • JAM - Jam music score - Jam
  • JAM - JAM Musical Score
  • JAM - Unknown Apple II File
  • JAM - Joaquim - Andrew - Mats ...
  • JAM - JamTracker Music Module
  • JAM - E- mail
  • JAMMIX - Jammix Enhacer Music ...
  • JAP - jalbum Project Header
  • JAP - Fifa World Cup Game Data...
  • JAP - JAlbum album file
  • JAR - Java Archive (a ...
  • JAS - Graphic (Generic)
  • JAV - Java Source File
  • JAV - Java language source ...
  • JAV - Internet Program : JAVA ...
  • JAVA - Source code (Java)
  • JAW - IchiTaro Web Japanese ...
  • JBA - Jabaco Source Code ...
  • JBB - JobEditor32 Binary Job ...
  • JBC - BestCrypt file
  • JBC - BestCrypt Container ( ...
  • JBC - Jam byte - code hex file
  • JBD - Datafile (SigmaScan)
  • JBF - Image browser file (...
  • JBG - Image JBIG 1-bit raster
  • JBG - JBIG File
  • JBI - Motoman Robot Job File
  • JBI - JobEditor32 ASCII Job ...
  • JBIG - Joint Bilevel Image Group
  • JBIG - 1-bit raster image ...
  • JBIG - JBIG raster image ...
  • JBK - Jot + Notes Backup File
  • JBK - Juno Backup File
  • JBL - Doom scene add-on file
  • JBL - Add-on : DOOM scene
  • JBP - DJ Jukebox Project
  • JBR - Paint Shop Pro Brush ( ...
  • JBR - Paint Shop Pro Brushes ...
  • JBS - Binary file with data ...
  • JBX - Project file (Project ...
  • JC - FlashGet Intermediate ...
  • JC - Watcom Source File
  • JC - Watcom src file
  • JC! - FlashGet incomplete ...
  • JC! - FlashGet File
  • JCAMP - Misc
  • JCB - CB- JCBrooke Song / ...
  • JCB - CB- JCBrooke module / ...
  • JCC - Japan Crossword Dmitry ...
  • JCC - Code Crusader Project ...
  • JCC - Japan Crossword File ( ...
  • JCD - FlashGet File
  • JCD - FlashGet Download ...
  • JCE - JWPce ( Glenn Rosenthal )
  • JCF - JAWS for Windows ...
  • JCF - JAWS config file
  • JCK - Liquid Motion JACK Scene...
  • JCL - Job Control Language IBM
  • JCL - IBM Job Control Language...

-ADS BY GOOGLE

SearchCompliance

  • PCAOB (Public Company Accounting Oversight Board)

    The Public Company Accounting Oversight Board (PCAOB) is a Congressionally-established nonprofit that assesses audits of public ...

  • cyborg anthropologist

    A cyborg anthropologist is an individual who studies the interaction between humans and technology, observing how technology can ...

  • RegTech

    RegTech, or regulatory technology, is a term used to describe technology that is used to help streamline the process of ...

SearchSecurity

  • email spam

    Email spam, or junk email, is unsolicited bulk messages sent through email with commercial, fraudulent or malicious intent.

  • distributed denial of service (DDoS) attack

    A distributed denial-of-service attack occurs when an attack originates from multiple computers or devices, usually from multiple...

  • application whitelisting

    Application whitelisting is the practice of identifying applications that have been deemed safe for execution and restricting all...

SearchHealthIT

  • athenahealth Inc.

    Based in Watertown, Mass., athenahealth Inc. is a leading vendor of cloud-based EHRs for small to medium-sized physician ...

  • Affordable Care Act (ACA or Obamacare)

    The Affordable Care Act (ACA) is legislation passed in 2010 that changed how uninsured Americans enroll in and receive healthcare...

  • HIPAA Privacy Rule

    The Standards for Privacy of Individually Identifiable Health Information, commonly known as the HIPAA Privacy Rule, establishes ...

SearchDisasterRecovery

  • disaster recovery as a service (DRaaS)

    One approach to a strong disaster recovery plan is DRaaS, where companies offload data replication and restoration ...

  • data recovery

    Data recovery restores data that has been lost, accidentally deleted, corrupted or made inaccessible. Learn how data recovery ...

  • disaster recovery plan (DRP)

    A company's disaster recovery policy is enhanced with a documented DR plan that formulates strategies, and outlines preparation ...

SearchStorage

  • yottabyte (YB)

    A yottabyte is a measure of theoretical storage capacity and is 2 to the 80th power bytes, or, in decimal, approximately 1,000 ...

  • Kilo, mega, giga, tera, peta, exa, zetta and all that

    Kilo, mega, giga, tera, peta, exa, zetta are among the list of prefixes used to denote the quantity of something, such as a byte ...

  • brontobyte

    A brontobyte is a measure of memory or data storage that is equal to 10 to the 27th power of bytes.

SearchSolidStateStorage

  • SSD caching

    SSD caching, also known as flash caching, is the temporary storage of data on NAND flash memory chips in a solid-state drive so ...

  • NVDIMM (Non-Volatile Dual In-line Memory Module)

    An NVDIMM (non-volatile dual in-line memory module) is hybrid computer memory that retains data during a service outage.

  • NAND mirroring

    NAND mirroring has been proposed to break the security in certain portable devices that use NAND flash memory for encryption.

SearchCloudStorage

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

  • Zadara VPSA and ZIOS

    Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA ...

Close