Browse Definitions:

Browse File Extensions by Alphabet

JMP - JRC

  • JMP - Discovery ...
  • JMS - Voxtron TeleButler ...
  • JMS - UltraForce music format
  • JMS - Music format ( JMusic ...
  • JMS - SpamProx blocking list
  • JN1 - Jill of the Jungle data ...
  • JNB - Workbook file (Sigma ...
  • JNC - Communication log file
  • JNG - JPEG Network Graphic
  • JNG - JPEG Network Graphic ...
  • JNG - JPEG Network Graphics ...
  • JNK - Junk
  • JNK - Junk temporary file
  • JNL - Journal Macro data file
  • JNL - ISC BIND Journal File ( ...
  • JNL - CVS journal file
  • JNL - WinDev log file
  • JNL - Ingres Journal File
  • JNLP - Java Web Start File
  • JNLP - Java Web Start (Sun ...
  • JNT - Microsoft Windows ...
  • JO - FlowJo MAC workspace file
  • JO - JesperOlsen audio file
  • JOB - Vector graphics file ...
  • JOBOPTIONS - Acrobat Job Options File
  • JOBOPTIONS - Adobe Joboptions File
  • JOBOPTIONS - Acrobat Distiller Job ...
  • JOBS - VirtualDub Job Control ...
  • JOC - Context4 dos word ...
  • JOCL - Java Object ...
  • JOD - Microsoft Jet OLEDB.4.0
  • JOD - MS.Jet. OLEDB.4.0 ...
  • JOI - XBoard Join conferences ...
  • JOINED - HJSplit Default Joined ...
  • JOINED - HJ- Split Data File
  • JOML - JOOB Object Modelling ...
  • JOMPROJ - Microsoft Visual Studio ...
  • JOR - Journal (Microsoft SQL ...
  • JOT - WinJottr Desktop Note
  • JOT - JDesignerPro File
  • JOT - Jot+ Notes note data file
  • JOT3 - Jot+ Notes data file
  • JOU - Journal backup (VAX Edt ...
  • JOY - Joystick calibration file
  • JOY - Trackjoy sound file
  • JOY - Trackjoy GUS Tracker ...
  • JP1 - Japanese ( Romaji ) Text...
  • JP2 - JPEG - 2000 JP2 bitmap ...
  • JP2 - Jeoparty II Presentation...
  • JP2 - LuraWave JPEG - 2000 ...
  • JP2 - JPEG - 2000 JP2 File
  • JP2 - JPEG 2000 image
  • JP2_ - JPEG 2 file
  • JP3 - Electric Quilt File
  • JP4 - Electric Quilt File
  • JP5 - Electric Quilt File
  • JPA - JoomlaPack Joomla ...
  • JPC - Graphic (Japan PIC)
  • JPD - Java Process Definition
  • JPD - Joint PhotoDefiner Image
  • JPE - JPEG image
  • JPEG - JPEG compressed bitmap
  • JPEGENX - egis Encrypted JPEG File...
  • JPF - Biz Plan Pro Business ...
  • JPF - JPEG 2000 Image
  • JPF - JPEG2000 image format
  • JPG - JPEG bitmap
  • JPG2 - JPEG 2000 image (bitmap)...
  • JPG_T - JPG Image File
  • JPG_T - Jpg images file
  • JPGENX - egis Encrypted JPG File ...
  • JPH - JProbe Memory Snapshot
  • JPH - Jprobe Memory Debugger ...
  • JPI - Jupiter Document ( Elfin...
  • JPL - Siren Jukebox file
  • JPL - Jprobe Settings File ( ...
  • JPM - JPEG 2000 jpm file format
  • JPN - Photomodeler Lite file
  • JPOW - JPowered Java Bar Charts
  • JPP - Jprobe Profiler Memory ...
  • JPP - Jigsaw Puzzle Player ...
  • JPR - Javasockets file
  • JPR - JBuilder Project
  • JPR - Oracle JDeveloper model ...
  • JPS - Jigsaw Puzzle Player ...
  • JPS - Stereo Image
  • JPS - Print Studio Graphic ( ...
  • JPS - Stereo Image file format
  • JPT - Jprobe Threadalyzer ...
  • JPW - World File for JPEG
  • JPX - JBuilder Project File
  • JPX - JBuilder Project Header
  • JPX - Jalbum image info
  • JPX - JPEG - 2000 JP2 File
  • JPX - JAlbum jalbum image info
  • JPX - JPEG 2000 Image File
  • JQX - Windows Help Related ...
  • JQZ - JQuiz Quiz File
  • JR2 - Fishing Simulator 2 ...

-ADS BY GOOGLE

SearchCompliance

  • PCAOB (Public Company Accounting Oversight Board)

    The Public Company Accounting Oversight Board (PCAOB) is a Congressionally-established nonprofit that assesses audits of public ...

  • cyborg anthropologist

    A cyborg anthropologist is an individual who studies the interaction between humans and technology, observing how technology can ...

  • RegTech

    RegTech, or regulatory technology, is a term used to describe technology that is used to help streamline the process of ...

SearchSecurity

  • email spam

    Email spam, or junk email, is unsolicited bulk messages sent through email with commercial, fraudulent or malicious intent.

  • distributed denial of service (DDoS) attack

    A distributed denial-of-service attack occurs when an attack originates from multiple computers or devices, usually from multiple...

  • application whitelisting

    Application whitelisting is the practice of identifying applications that have been deemed safe for execution and restricting all...

SearchHealthIT

  • athenahealth Inc.

    Based in Watertown, Mass., athenahealth Inc. is a leading vendor of cloud-based EHRs for small to medium-sized physician ...

  • Affordable Care Act (ACA or Obamacare)

    The Affordable Care Act (ACA) is legislation passed in 2010 that changed how uninsured Americans enroll in and receive healthcare...

  • HIPAA Privacy Rule

    The Standards for Privacy of Individually Identifiable Health Information, commonly known as the HIPAA Privacy Rule, establishes ...

SearchDisasterRecovery

  • disaster recovery as a service (DRaaS)

    One approach to a strong disaster recovery plan is DRaaS, where companies offload data replication and restoration ...

  • data recovery

    Data recovery restores data that has been lost, accidentally deleted, corrupted or made inaccessible. Learn how data recovery ...

  • disaster recovery plan (DRP)

    A company's disaster recovery policy is enhanced with a documented DR plan that formulates strategies, and outlines preparation ...

SearchStorage

  • yottabyte (YB)

    A yottabyte is a measure of theoretical storage capacity and is 2 to the 80th power bytes, or, in decimal, approximately 1,000 ...

  • Kilo, mega, giga, tera, peta, exa, zetta and all that

    Kilo, mega, giga, tera, peta, exa, zetta are among the list of prefixes used to denote the quantity of something, such as a byte ...

  • brontobyte

    A brontobyte is a measure of memory or data storage that is equal to 10 to the 27th power of bytes.

SearchSolidStateStorage

  • SSD caching

    SSD caching, also known as flash caching, is the temporary storage of data on NAND flash memory chips in a solid-state drive so ...

  • NVDIMM (Non-Volatile Dual In-line Memory Module)

    An NVDIMM (non-volatile dual in-line memory module) is hybrid computer memory that retains data during a service outage.

  • NAND mirroring

    NAND mirroring has been proposed to break the security in certain portable devices that use NAND flash memory for encryption.

SearchCloudStorage

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

  • Zadara VPSA and ZIOS

    Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA ...

Close