Browse Definitions:

Browse File Extensions by Alphabet

LM8 - LOM

  • LM8 - Picture File
  • LMA - Netscape packetized ...
  • LMA - Learning Mobile Author (...
  • LMA - P�s Logik - Manager ...
  • LMA - Learning Mobile Author (...
  • LMAN - Mac File Type
  • LMBS - Mac File Type
  • LMD - Tune Smithy List of ...
  • LMD - Abbyy Finereader 4.0 ...
  • LMD - ABBYY Finereader 4.0 ...
  • LME - LegglessMusicEditor song...
  • LME - LegglessMusicEditor sound
  • LMF - Library Mapping and ...
  • LMH - Memory Hacking Software ...
  • LMI - HomePortal Firmware ...
  • LMK - Sprint - Layout Macro ( ...
  • LMP - Doom Recorded Demo File ...
  • LMP - Left 4 Dead file
  • LMP - Quake file
  • LMP - ArchiCAD Geometric ...
  • LMR - QuickBooks Loan Manager ...
  • LMS - Light -O- Rama Lighting ...
  • LMS - LenMus Score File
  • LMT - RPG Maker 2000 / 2003 ...
  • LMU - RPG Maker Map File
  • LMU - RPG Maker 2000 / 2003 ...
  • LMV - Adobe Flash source code
  • LMV - LiveSwif Movie File
  • LMV - LEGO CAD Movie (The LEGO...
  • LMW - Lmw examples file
  • LMX - Lomax Software Game File
  • LMX - Landmark Exchange File
  • LMX - Route 66 landmarks file
  • LN - UNIX lint File
  • LNB - Logomanager File
  • LND - 3D Landscape Data
  • LNF - Oyoaha lookandfeel ...
  • LNG - Setup string and message...
  • LNG - Adobe Acrobat language ...
  • LNG - Diablo II game file
  • LNG - Launch -n-Go Shared ...
  • LNG - NRG SDR Language File
  • LNG - Lingo Script File
  • LNG - Jasmine language file
  • LNG - Opera language file
  • LNG - Language extensions ( ...
  • LNG - DeepBurner language file
  • LNG - SourceEdit Language ...
  • LNG - Acrobat Language Plug -...
  • LNG - Crysis game file
  • LNG - Total Commander language...
  • LNG - Language definition file
  • LNK - Linker response file (...
  • LNK - Shortcut file (Microsoft...
  • LNK - Datafile (Revelation)
  • LNK2 - Program Neighborhood ...
  • LNM - Corel WordPerfect SGML ...
  • LNM - WordPerfect SGML Alias (...
  • LNR - Lunar Invasion Saved Game
  • LNS - Unknown Apple II File
  • LNS - AVG Anti - Virus ...
  • LNT - LiveNote Transcript file
  • LNX - Atari Lynx ROM Image ( ...
  • LNX - Lynx project file
  • LNX - Atari Lynx ROM
  • LNX - Linux specific makefile
  • LNX - Commodore 64 Lynx Archive
  • LO - GNU Libtool Library ...
  • LO - Unknown Apple II File
  • LO4 - Flight Data File
  • LO_ - Systems Management ...
  • LO_ - WINXP SYSTEM32 WBEM Logs...
  • LOADTEST - Microsoft Visual Studio ...
  • LOC - Localisation String ...
  • LOC - GPS Location File
  • LOC - EasyGPS TerraByte ...
  • LOC - Suppose locations file
  • LOC - MicroSim PCBoard ...
  • LOCAL - Delphi user - specific ...
  • LOCAL - Xset Setup Program Bin ...
  • LOCK - Lock File
  • LOCK - Mozilla Firefox file
  • LOCK.NET - Framework database lock ...
  • LOCK.NET - Framework Database Lock ...
  • LOCKED - Softwrap Locked and ...
  • LOCR - Location Manager Setting
  • LOD - Load file (Generic)
  • LOF - Auxiliary file for LaTex
  • LOF - List of files
  • LOG - Log file (Generic)
  • LOG1 - Windows Registry Hive ...
  • LOG1 - Generic log file
  • LOG2 - Generic log file
  • LOG2 - Windows Registry Hive ...
  • LOGONVISTA - LogonStudio Vista Logon ...
  • LOGONVISTA - LogonStudio Windows ...
  • LOGONXP - LogonStudio theme Header
  • LOGONXP - Logon Studio document ...
  • LOK - Compressed file (...
  • LOM - 3D Model - Lock On: ...

-ADS BY GOOGLE

SearchCompliance

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

SearchSecurity

  • computer exploit

    A computer exploit, or exploit, is an attack on a computer system, especially one that takes advantage of a particular ...

  • cyberwarfare

    Cyberwarfare is computer- or network-based conflict involving politically motivated attacks by a nation-state on another ...

  • insider threat

    Insider threat is a generic term for a threat to an organization's security or data that comes from within.

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

  • OpenStack Block Storage (Cinder)

    OpenStack Block Storage (Cinder) is open source software designed to create and manage a service that provides persistent data ...

  • SATA Express (SATAe)

    SATA Express (SATAe or Serial ATA Express) is a bus interface to connect storage devices to a computer motherboard, supporting ...

  • DIMM (dual in-line memory module)

    A DIMM (dual in-line memory module) is the standard memory card used in servers and PCs.

SearchSolidStateStorage

  • hybrid flash array

    A hybrid flash array is a solid-state storage system that contains a mix of flash memory drives and hard disk drives.

  • 3D XPoint

    3D XPoint is memory storage technology jointly developed by Intel and Micron Technology Inc.

  • RRAM or ReRAM (resistive RAM)

    RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...

SearchCloudStorage

  • Google Cloud Storage

    Google Cloud Storage is an enterprise public cloud storage platform that can house large unstructured data sets.

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

Close