Browse Definitions:

Browse File Extensions by Alphabet

LBX - LEE

  • LBX - Labels (Microsoft FoxPro)
  • LBXADD - Libronix DLS Addin
  • LBXALV - Logos Bible Software ...
  • LBXCBV - Logos Bible Software ...
  • LBXCIT - Libronix DLS Citation ...
  • LBXCMP - Libronix DLS Company ...
  • LBXCOL - Libronix DLS Resource ...
  • LBXCTB - Libronix DLS Custom ...
  • LBXDAT - Libronix DLS Data File
  • LBXDTP - Libronix DLS Data Type
  • LBXGYQ - Libronix DLS Graphical ...
  • LBXLBK - Libronix DLS License ...
  • LBXLIC - Libronix DLS Licenses ...
  • LBXLLS - Libronix DLS Resource
  • LBXNOT - Libronix DLS Notes
  • LBXOEB - Libronix DLS Resource
  • LBXPDF - Libronix DLS Resource
  • LBXPLN - Logos Bible Software ...
  • LBXPLP - Logos Bible Software ...
  • LBXPLV - Logos Bible Software ...
  • LBXPRF - Libronix DLS Preferences
  • LBXPRL - Logos Bible Software ...
  • LBXRAS - Libronix DLS Resource ...
  • LBXRTP - Libronix DLS Resource ...
  • LBXSDG - Logos Bible Software ...
  • LBXSHL - Libronix DLS Shell
  • LBXUPD - Libronix DLS Update ...
  • LBXVRS - Logos Bible Software ...
  • LBXWDL - Libronix DLS Word List
  • LBXWKS - Libronix DLS Workspace
  • LBZ - compressed LBM image
  • LBZ - Leibniz Mathematical ...
  • LC - Textbridge Classic Bin ...
  • LCB - Living Cookbook Backup ...
  • LCB - Living Cookbook File
  • LCB - Concept2 LogCard Utility...
  • LCC - Capture One PRO file
  • LCC - PLUGTEST Dynamic Link ...
  • LCC - IBM Voice Type Language ...
  • LCD - LeoCAD project file
  • LCD - ABBYY Finereader 4.0 ...
  • LCD - CDSpace Emulated Disk ...
  • LCD - CDspace CD Emulator
  • LCD - Abbyy Finereader sprint ...
  • LCE - LockCrypt Database ( ...
  • LCF - Linker control file (...
  • LCFL - Language Support File
  • LCH - Used in a program (...
  • LCI - 'IBM Voice Type ' ...
  • LCK - Lockfile (Paradox)
  • LCL - Datafile (FTP)
  • LCLW - Claris Works Art Library
  • LCM - Lipikar Data ( Santanu ...
  • LCM - Lipikar Custom Map File
  • LCN - Lection document (...
  • LCO - Railroad Tycoon 3 ...
  • LCS - Data History file (ACT!)
  • LCT - Loader Control File In ...
  • LCW - Spreadsheet (Lucid 3-D)
  • LD - Long distance area codes...
  • LD1 - Overlay file (dBase)
  • LD2 - Lingoes Dictionary Header
  • LD2 - Lingoes Dictionary ( ...
  • LD_ - Visc15 Adressen Setup ...
  • LDA - Absolute binary file ( ...
  • LDA - LaserData image format
  • LDATA - JSim Line Data Format ( ...
  • LDB - Lock file (Microsoft ...
  • LDC - Steuer2001 file
  • LDD - Laser Dispatch Data
  • LDD - Laser Dispatch data file
  • LDD - LEGO Digital Designer ...
  • LDF - Microsoft SQL Server log...
  • LDF - Library definition file ...
  • LDFX - LogPlot 7 LogDeesign ...
  • LDI - LDIF File
  • LDI - LDIF file ( address book...
  • LDIF - Structured text file ...
  • LDL - Library (Corel Paradox)
  • LDM - VolumeViz Multi - ...
  • LDO - Nova Logic game loadout ...
  • LDP - Label Designer Plus ...
  • LDR - GoDot C64 Image ...
  • LDR - Symantec Ghost template ...
  • LDR - LDraw Model File ( ...
  • LDR - LDraw Model Header
  • LDR - WindLDR ( IDEC ...
  • LDR - Yamaha live drum kits
  • LDS - LOUDNESS Sound System ...
  • LDT - Loader Data File in ...
  • LDW - Virtual Villagers data ...
  • LDW - Virtual Villagers Data
  • LDX - Liquid Executable ...
  • LE - DOS/4GW executable image...
  • LE - Opera Binary Voice - ...
  • LE - Executable image (DOS/...
  • LE$ - BASIC VB
  • LE$ - Basic Vb file
  • LE_ - Basic Vb compressed ...
  • LEAD - wavelet compressed ...

-ADS BY GOOGLE

SearchCompliance

  • cyborg anthropologist

    A cyborg anthropologist is an individual who studies the interaction between humans and technology, observing how technology can ...

  • RegTech

    RegTech, or regulatory technology, is a term used to describe technology that is used to help streamline the process of ...

  • conduct risk

    Conduct risk is the prospect of financial loss to an organization that is caused by the actions of an organization's ...

SearchSecurity

  • insider threat

    An insider threat is a malicious hacker (also called a cracker or a black hat) who is an employee or officer of a business, ...

  • virus (computer virus)

    A computer virus is malicious code that replicates by copying itself to another program, computer boot sector or document.

  • two-factor authentication (2FA)

    Two-factor authentication (2FA), often referred to as two-step verification, is a security process in which the user provides two...

SearchHealthIT

  • HIPAA Privacy Rule

    The Standards for Privacy of Individually Identifiable Health Information, commonly known as the HIPAA Privacy Rule, establishes ...

  • HIPAA business associate agreement (BAA)

    Under the U.S. Health Insurance Portability and Accountability Act of 1996, a HIPAA business associate agreement (BAA) is a ...

  • telemedicine

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

SearchDisasterRecovery

  • disaster recovery plan (DRP)

    A company's disaster recovery policy is enhanced with a documented DR plan that formulates strategies, and outlines preparation ...

  • fault-tolerant

    Systems with integrated fault tolerance are designed to withstand multiple hardware failures to ensure continuous availability.

  • disaster recovery (DR)

    Disaster recovery strategies are critical, as many businesses fail following an unforeseen event. DR may require an internal or ...

SearchStorage

  • Secure Digital card (SD card)

    SD cards use flash memory to provide nonvolatile storage. They are more rugged than traditional storage media and are used in ...

  • data storage

    In a computer, storage is the place where data is held in an electromagnetic or optical form for access by a computer processor.

  • flash storage

    Flash-based storage, based on flash memory, is used for data repositories, storage systems and consumer devices, such as USB ...

SearchSolidStateStorage

  • flash file system

    Flash file systems are designed specifically for memory devices. A well-designed flash device and flash file system ensure ...

  • IOPS (input/output operations per second)

    IOPS measures the maximum number of reads and writes to non-contiguous storage. It is not an actual benchmark since vendor ...

  • eMMC (embedded MultiMediaCard)

    An embedded MultiMediaCard (eMMC) is a small storage device made up of NAND flash memory and a simple storage controller.

SearchCloudStorage

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

  • Zadara VPSA and ZIOS

    Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA ...

Close