Browse Definitions:

Browse File Extensions by Alphabet

NIM - NOD

  • NIM - Game File
  • NIM - Nokia Phone Game File ( ...
  • NIMBLEGEN - ArrayScribe = NimbleGen ...
  • NINDEX - Newsgroup Index File
  • NIP - Microsoft DRM ( Digital ...
  • NIP - Network interface plug -...
  • NIS - Homeworld Non- ...
  • NISI - (MAC CREATOR CODE ) ...
  • NIST - Audio (NIST Sphere)
  • NIT - ArcView INFO Table ...
  • NITF - National Imagery ...
  • NITF - National Imagery ...
  • NIV - TheWord & Bible ...
  • NIX - REF file
  • NIX - Rational XDE (IBM)
  • NJB - Nikon Photo Index File
  • NJB - Nikon Digital SLR Camera...
  • NJI - Nero BackItUp job file
  • NJP - njPipes Compiler File
  • NJT - Nero BackItUp job ...
  • NK2 - Outlook 2002 Nickname ...
  • NK2 - Microsoft Outlook ...
  • NK2 - Outlook AutoComplete ...
  • NK2 - e- mail address ...
  • NKC - ECG Viewer ( Nihon ...
  • NKI - KONTAKT Instrument File
  • NKI - Native Instruments ...
  • NKJV - TheWord & Bible ...
  • NKM - KONTAKT ( Native ...
  • NKS - Archive file
  • NKS - Native Instruments ...
  • NKY - NUMROTOplus Keyfile (NUM...
  • NL - Norton Desktop Icon ...
  • NL - Unknown Apple II File
  • NLB - Data (Oracle 7)
  • NLC - NeroLINUX Compilation ( ...
  • NLD - WINXP SYSTEM32 file
  • NLD - ATI Radeon Video Driver
  • NLF - MicroSim PCBoard Netlist...
  • NLM - Loadable Module (Netware)
  • NLO - NetG Skill Builder file
  • NLP - Newsletter Profi 2001
  • NLP - Newsletter Profi 2001 ...
  • NLR - NLREG Nonlinear ...
  • NLS - National Language ...
  • NLTRACK - NoLimits Roller Coaster ...
  • NLTRACK - NoLimits Rollercoaster ...
  • NLU - E-Mail Trigger file (...
  • NLV - Nikon Capture LCHE ...
  • NLX - Form (FormWorx 3.0)
  • NM - RM Number Magic Data ...
  • NM2 - Navitel Navigator Ver ...
  • NM2 - Navitel 3.1 Map Header
  • NMA - Normalised Extinction ...
  • NMA - NMEA GPS log data Header
  • NMA - GPS Log Data file
  • NMAT - NeoEngine ( Reality Rift...
  • NMD - SwordSearcher File
  • NMD - Nero miniDVD Compilation...
  • NMDAR - Connectivity Memory ...
  • NMEA - GPS Log Data file
  • NMF - Nuzzler Basic Rule ...
  • NMF - NICE Media Player audio ...
  • NMF - Nuzzler Basic Message ...
  • NMF - Lightwave Narmal map file
  • NMF - Note - Mate Question Set...
  • NMGF - 2D Graphic
  • NMI - SwordSearcher File
  • NMIND - NovaMind Mind Map File
  • NMK - Oc2. 316s cakit file
  • NML - News Markup Language file
  • NML - NML Language Source File...
  • NML - NewsMail 2.0 E- mail ...
  • NML - NEURO ONE Static Neuron ...
  • NML. - nugthat Compiler Source ...
  • NMO - Virtools behavioral ...
  • NMP - Neopaint Mask image ...
  • NMS - Note - Mate save file
  • NMS - Virtools Graphical ...
  • NMS - Unknown Apple II File
  • NMS - Numega Softice 's Loader...
  • NMU - Unknown file extension
  • NMV - Nintendulator Movie ...
  • NMW - Microsoft NetMeeting ...
  • NMW - Netmeeting T126 ...
  • NN - Nero CD File List
  • NNB - ANNI Batch File
  • NNG - Unknown file extension
  • NNI - ANNI Archive
  • NNN - News about smth with ext...
  • NNN - Arj archive volumes up ...
  • NNP - ANNI Portfolio File
  • NNR - Nikon Capture Noise ...
  • NNVS - NextNine VNC Player ...
  • NOA - Nancy Codec video Header
  • NOA - Cell Phone Video Clip
  • NOB - Vampire : La Mascarade ...
  • NOB - Silver game data and ...
  • NOB - VersaPro Word Exchange ...
  • NOD - File (Netobject Fusion)

-ADS BY GOOGLE

SearchCompliance

  • cyborg anthropologist

    A cyborg anthropologist is an individual who studies the interaction between humans and technology, observing how technology can ...

  • RegTech

    RegTech, or regulatory technology, is a term used to describe technology that is used to help streamline the process of ...

  • conduct risk

    Conduct risk is the prospect of financial loss to an organization that is caused by the actions of an organization's ...

SearchSecurity

  • security

    Security, in information technology (IT), is the defense of digital information and IT assets against internal and external, ...

  • insider threat

    An insider threat is a malicious hacker (also called a cracker or a black hat) who is an employee or officer of a business, ...

  • virus (computer virus)

    A computer virus is malicious code that replicates by copying itself to another program, computer boot sector or document.

SearchHealthIT

  • HIPAA Privacy Rule

    The Standards for Privacy of Individually Identifiable Health Information, commonly known as the HIPAA Privacy Rule, establishes ...

  • HIPAA business associate agreement (BAA)

    Under the U.S. Health Insurance Portability and Accountability Act of 1996, a HIPAA business associate agreement (BAA) is a ...

  • telemedicine

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

SearchDisasterRecovery

  • data recovery

    Data recovery restores data that has been lost, accidentally deleted, corrupted or made inaccessible. Learn how data recovery ...

  • disaster recovery plan (DRP)

    A company's disaster recovery policy is enhanced with a documented DR plan that formulates strategies, and outlines preparation ...

  • fault-tolerant

    Systems with integrated fault tolerance are designed to withstand multiple hardware failures to ensure continuous availability.

SearchStorage

  • Secure Digital card (SD card)

    SD cards use flash memory to provide nonvolatile storage. They are more rugged than traditional storage media and are used in ...

  • data storage

    In a computer, storage is the place where data is held in an electromagnetic or optical form for access by a computer processor.

  • flash storage

    Flash-based storage, based on flash memory, is used for data repositories, storage systems and consumer devices, such as USB ...

SearchSolidStateStorage

  • flash file system

    Flash file systems are designed specifically for memory devices. A well-designed flash device and flash file system ensure ...

  • IOPS (input/output operations per second)

    IOPS measures the maximum number of reads and writes to non-contiguous storage. It is not an actual benchmark since vendor ...

  • eMMC (embedded MultiMediaCard)

    An embedded MultiMediaCard (eMMC) is a small storage device made up of NAND flash memory and a simple storage controller.

SearchCloudStorage

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

  • Zadara VPSA and ZIOS

    Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA ...

Close