Browse Definitions:

Browse File Extensions by Alphabet

LM8 - LOM

  • LM8 - Picture File
  • LMA - Netscape packetized ...
  • LMA - Learning Mobile Author (...
  • LMA - P�s Logik - Manager ...
  • LMA - Learning Mobile Author (...
  • LMAN - Mac File Type
  • LMBS - Mac File Type
  • LMD - Tune Smithy List of ...
  • LMD - Abbyy Finereader 4.0 ...
  • LMD - ABBYY Finereader 4.0 ...
  • LME - LegglessMusicEditor song...
  • LME - LegglessMusicEditor sound
  • LMF - Library Mapping and ...
  • LMH - Memory Hacking Software ...
  • LMI - HomePortal Firmware ...
  • LMK - Sprint - Layout Macro ( ...
  • LMP - Doom Recorded Demo File ...
  • LMP - Left 4 Dead file
  • LMP - Quake file
  • LMP - ArchiCAD Geometric ...
  • LMR - QuickBooks Loan Manager ...
  • LMS - Light -O- Rama Lighting ...
  • LMS - LenMus Score File
  • LMT - RPG Maker 2000 / 2003 ...
  • LMU - RPG Maker Map File
  • LMU - RPG Maker 2000 / 2003 ...
  • LMV - Adobe Flash source code
  • LMV - LiveSwif Movie File
  • LMV - LEGO CAD Movie (The LEGO...
  • LMW - Lmw examples file
  • LMX - Lomax Software Game File
  • LMX - Landmark Exchange File
  • LMX - Route 66 landmarks file
  • LN - UNIX lint File
  • LNB - Logomanager File
  • LND - 3D Landscape Data
  • LNF - Oyoaha lookandfeel ...
  • LNG - Setup string and message...
  • LNG - Adobe Acrobat language ...
  • LNG - Diablo II game file
  • LNG - Launch -n-Go Shared ...
  • LNG - NRG SDR Language File
  • LNG - Lingo Script File
  • LNG - Jasmine language file
  • LNG - Opera language file
  • LNG - Language extensions ( ...
  • LNG - DeepBurner language file
  • LNG - SourceEdit Language ...
  • LNG - Acrobat Language Plug -...
  • LNG - Crysis game file
  • LNG - Total Commander language...
  • LNG - Language definition file
  • LNK - Linker response file (...
  • LNK - Shortcut file (Microsoft...
  • LNK - Datafile (Revelation)
  • LNK2 - Program Neighborhood ...
  • LNM - Corel WordPerfect SGML ...
  • LNM - WordPerfect SGML Alias (...
  • LNR - Lunar Invasion Saved Game
  • LNS - Unknown Apple II File
  • LNS - AVG Anti - Virus ...
  • LNT - LiveNote Transcript file
  • LNX - Atari Lynx ROM Image ( ...
  • LNX - Lynx project file
  • LNX - Atari Lynx ROM
  • LNX - Linux specific makefile
  • LNX - Commodore 64 Lynx Archive
  • LO - GNU Libtool Library ...
  • LO - Unknown Apple II File
  • LO4 - Flight Data File
  • LO_ - Systems Management ...
  • LO_ - WINXP SYSTEM32 WBEM Logs...
  • LOADTEST - Microsoft Visual Studio ...
  • LOC - Localisation String ...
  • LOC - GPS Location File
  • LOC - EasyGPS TerraByte ...
  • LOC - Suppose locations file
  • LOC - MicroSim PCBoard ...
  • LOCAL - Delphi user - specific ...
  • LOCAL - Xset Setup Program Bin ...
  • LOCK - Lock File
  • LOCK - Mozilla Firefox file
  • LOCK.NET - Framework database lock ...
  • LOCK.NET - Framework Database Lock ...
  • LOCKED - Softwrap Locked and ...
  • LOCR - Location Manager Setting
  • LOD - Load file (Generic)
  • LOF - Auxiliary file for LaTex
  • LOF - List of files
  • LOG - Log file (Generic)
  • LOG1 - Windows Registry Hive ...
  • LOG1 - Generic log file
  • LOG2 - Generic log file
  • LOG2 - Windows Registry Hive ...
  • LOGONVISTA - LogonStudio Vista Logon ...
  • LOGONVISTA - LogonStudio Windows ...
  • LOGONXP - LogonStudio theme Header
  • LOGONXP - Logon Studio document ...
  • LOK - Compressed file (...
  • LOM - 3D Model - Lock On: ...

-ADS BY GOOGLE

SearchCompliance

  • PCAOB (Public Company Accounting Oversight Board)

    The Public Company Accounting Oversight Board (PCAOB) is a Congressionally-established nonprofit that assesses audits of public ...

  • cyborg anthropologist

    A cyborg anthropologist is an individual who studies the interaction between humans and technology, observing how technology can ...

  • RegTech

    RegTech, or regulatory technology, is a term used to describe technology that is used to help streamline the process of ...

SearchSecurity

  • email spam

    Email spam, or junk email, is unsolicited bulk messages sent through email with commercial, fraudulent or malicious intent.

  • distributed denial of service (DDoS) attack

    A distributed denial-of-service attack occurs when an attack originates from multiple computers or devices, usually from multiple...

  • application whitelisting

    Application whitelisting is the practice of identifying applications that have been deemed safe for execution and restricting all...

SearchHealthIT

  • athenahealth Inc.

    Based in Watertown, Mass., athenahealth Inc. is a leading vendor of cloud-based EHRs for small to medium-sized physician ...

  • Affordable Care Act (ACA or Obamacare)

    The Affordable Care Act (ACA) is legislation passed in 2010 that changed how uninsured Americans enroll in and receive healthcare...

  • HIPAA Privacy Rule

    The Standards for Privacy of Individually Identifiable Health Information, commonly known as the HIPAA Privacy Rule, establishes ...

SearchDisasterRecovery

  • disaster recovery as a service (DRaaS)

    One approach to a strong disaster recovery plan is DRaaS, where companies offload data replication and restoration ...

  • data recovery

    Data recovery restores data that has been lost, accidentally deleted, corrupted or made inaccessible. Learn how data recovery ...

  • disaster recovery plan (DRP)

    A company's disaster recovery policy is enhanced with a documented DR plan that formulates strategies, and outlines preparation ...

SearchStorage

  • virtual memory

    Virtual memory is a memory management capability of an OS that allows a computer to compensate for physical memory shortages by ...

  • yottabyte (YB)

    A yottabyte is a measure of theoretical storage capacity and is 2 to the 80th power bytes, or, in decimal, approximately 1,000 ...

  • Kilo, mega, giga, tera, peta, exa, zetta and all that

    Kilo, mega, giga, tera, peta, exa, zetta are among the list of prefixes used to denote the quantity of something, such as a byte ...

SearchSolidStateStorage

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

  • SSD caching

    SSD caching, also known as flash caching, is the temporary storage of data on NAND flash memory chips in a solid-state drive so ...

  • NVDIMM (Non-Volatile Dual In-line Memory Module)

    An NVDIMM (non-volatile dual in-line memory module) is hybrid computer memory that retains data during a service outage.

SearchCloudStorage

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

  • Zadara VPSA and ZIOS

    Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA ...

Close