Browse Definitions:

Browse File Extensions by Alphabet

KDE - KLA

  • KDELNK - KDE desktop file
  • KDEVDLG - KDevelop Dialog Box File
  • KDEVELOP - KDevelop Project Data ...
  • KDEVELOP - KDevelop Global Project ...
  • KDEVPRJ - KDevelop Project File
  • KDEVPRJ - KDevelop Project File ( ...
  • KDEVSES - KDevelop Specific ...
  • KDF - VisiQuest Standard Data ...
  • KDF - KARMA MW/ Triton data ...
  • KDF - Kinkos Photo ( Kinko 's ...
  • KDH - CAJViewer
  • KDK - Kodak Proprietary ...
  • KDK - Kodak Proprietary ...
  • KDMP - Windows Crash Dump File
  • KDO - Kudo picture browser
  • KDT - Medbasin Evaporation Data
  • KDX - Google Earth import ...
  • KE$ - Modem Bitware Fax disk2 ...
  • KE_ - Ntgraph Ze32v215 file
  • KEA - Panasonic KTS file
  • KED - KEDIT Profile and Macro ...
  • KEN - Player Cdcheck ...
  • KEP - Turbo Pascal DOS Tp19 ...
  • KEP - SapShow training file
  • KEP - ( unknown ) - ( unknown )
  • KES - Kurzweil 1000 and 3000 ...
  • KEV - JAWS7 ( preload.kev)
  • KEV - JAWS for Windows Preload...
  • KEX - Macro (KEDIT)
  • KEXI - Kexi database Header
  • KEXIS - Kexi Database Connection...
  • KEXT - Mac OS X Kernel ...
  • KEXT - Kernel Extension
  • KEY - Keyboard Macro
  • KEY - Icon toolbar (DataCAD)
  • KEY - Security file (Such as a...
  • KEY - Datafile (Forecast Pro)
  • KEYBOARD - Amaya config file
  • KEYBOARD - Amaya Configuration
  • KEYNOTE - iWork Keynote File ( ...
  • KEYTAB - Unix file
  • KF2 - Max Payne Model File ( ...
  • KFA - Dark Age of Camelot ...
  • KFI - IRIS Native Data File ( ...
  • KFIL - Keyboard Filech Skeyboard
  • KFL - IRIS Literary ( ...
  • KFL - Microsoft Outlook 2007 ...
  • KFL - Pegasus Mail auto - ...
  • KFL - KFLog Airfield File
  • KFL - Kwalitan Filter
  • KFM - Keyframe Motion file ( ...
  • KFM - KEY Form Designer Form ...
  • KFM - GameBryo KFM File ( ...
  • KFN - KaraFun karaoke song file
  • KFN - Audio File
  • KFP - Kinkos File Prep Tool
  • KFS - Max Payne Model File ( ...
  • KFT - Korg T- series wave file
  • KFT - Matrox X Tools keyframe ...
  • KFX - Image (KoFax Group 4)
  • KGB - KGB Archive File
  • KGB - KGB Archiver File
  • KGB - Kremlin Encrypted File
  • KGB - KGB Archiver compressed ...
  • KGB - Z80 Spectrum Emulator ...
  • KGB - Kremlin Encrypt File
  • KHD - Dynamics AX Kernel Help ...
  • KHD - ViewChoice ( Payroll ...
  • KHF - Kwalitan Tree Structure
  • KHI - Dynamics AX Kernel Help ...
  • KHS - Kwalitan History
  • KHTMP - Google Earth Temporary ...
  • KIC - Kodak Image Compression ...
  • KIC - Kodak Compressed Image ...
  • KID - Kidspiration ( ...
  • KID - Kidspiration File
  • KID - Tonline Bsw4 Install ...
  • KIDS - Kestrel sequence id file
  • KIDS - Mac File Type
  • KIF - Knowledge Interchange ...
  • KIF - AutoCAD Key Index ( ...
  • KIF - KIFF - Kt Interchange ...
  • KIM - Commodore KIM-1 Program ...
  • KIN - Protein Structure Images...
  • KIN - Kinemage chemical test
  • KIN - Kinemage Chemical ...
  • KIN - Kinetic Music Project
  • KIP - OA-KIP Client Data ...
  • KIT - Raven Toolkit File
  • KIT - 20-20 Design File
  • KIT - Power Chord Drum Kit
  • KIT - Battery Drum Kit File
  • KIT - Power Chord : Power ...
  • KIT - 20-20 Design kitchen ...
  • KIZ - Digital postcard (Kodak)
  • KJV - TheWord & Bible ...
  • KK1 - ViewChoice ( Payroll ...
  • KK2 - ViewChoice ( Payroll ...
  • KKW - RoboHELP Help project ...
  • KL - Haxial Compiler Haxial ...

-ADS BY GOOGLE

SearchCompliance

  • PCAOB (Public Company Accounting Oversight Board)

    The Public Company Accounting Oversight Board (PCAOB) is a Congressionally-established nonprofit that assesses audits of public ...

  • cyborg anthropologist

    A cyborg anthropologist is an individual who studies the interaction between humans and technology, observing how technology can ...

  • RegTech

    RegTech, or regulatory technology, is a term used to describe technology that is used to help streamline the process of ...

SearchSecurity

  • email spam

    Email spam, or junk email, is unsolicited bulk messages sent through email with commercial, fraudulent or malicious intent.

  • distributed denial of service (DDoS) attack

    A distributed denial-of-service attack occurs when an attack originates from multiple computers or devices, usually from multiple...

  • application whitelisting

    Application whitelisting is the practice of identifying applications that have been deemed safe for execution and restricting all...

SearchHealthIT

  • athenahealth Inc.

    Based in Watertown, Mass., athenahealth Inc. is a leading vendor of cloud-based EHRs for small to medium-sized physician ...

  • Affordable Care Act (ACA or Obamacare)

    The Affordable Care Act (ACA) is legislation passed in 2010 that changed how uninsured Americans enroll in and receive healthcare...

  • HIPAA Privacy Rule

    The Standards for Privacy of Individually Identifiable Health Information, commonly known as the HIPAA Privacy Rule, establishes ...

SearchDisasterRecovery

  • disaster recovery as a service (DRaaS)

    One approach to a strong disaster recovery plan is DRaaS, where companies offload data replication and restoration ...

  • data recovery

    Data recovery restores data that has been lost, accidentally deleted, corrupted or made inaccessible. Learn how data recovery ...

  • disaster recovery plan (DRP)

    A company's disaster recovery policy is enhanced with a documented DR plan that formulates strategies, and outlines preparation ...

SearchStorage

  • virtual memory

    Virtual memory is a memory management capability of an OS that allows a computer to compensate for physical memory shortages by ...

  • yottabyte (YB)

    A yottabyte is a measure of theoretical storage capacity and is 2 to the 80th power bytes, or, in decimal, approximately 1,000 ...

  • Kilo, mega, giga, tera, peta, exa, zetta and all that

    Kilo, mega, giga, tera, peta, exa, zetta are among the list of prefixes used to denote the quantity of something, such as a byte ...

SearchSolidStateStorage

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

  • SSD caching

    SSD caching, also known as flash caching, is the temporary storage of data on NAND flash memory chips in a solid-state drive so ...

  • NVDIMM (Non-Volatile Dual In-line Memory Module)

    An NVDIMM (non-volatile dual in-line memory module) is hybrid computer memory that retains data during a service outage.

SearchCloudStorage

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

  • Zadara VPSA and ZIOS

    Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA ...

Close