Browse Definitions:

Browse File Extensions by Alphabet

NIM - NOD

  • NIM - Game File
  • NIM - Nokia Phone Game File ( ...
  • NIMBLEGEN - ArrayScribe = NimbleGen ...
  • NINDEX - Newsgroup Index File
  • NIP - Microsoft DRM ( Digital ...
  • NIP - Network interface plug -...
  • NIS - Homeworld Non- ...
  • NISI - (MAC CREATOR CODE ) ...
  • NIST - Audio (NIST Sphere)
  • NIT - ArcView INFO Table ...
  • NITF - National Imagery ...
  • NITF - National Imagery ...
  • NIV - TheWord & Bible ...
  • NIX - REF file
  • NIX - Rational XDE (IBM)
  • NJB - Nikon Photo Index File
  • NJB - Nikon Digital SLR Camera...
  • NJI - Nero BackItUp job file
  • NJP - njPipes Compiler File
  • NJT - Nero BackItUp job ...
  • NK2 - Outlook 2002 Nickname ...
  • NK2 - Microsoft Outlook ...
  • NK2 - Outlook AutoComplete ...
  • NK2 - e- mail address ...
  • NKC - ECG Viewer ( Nihon ...
  • NKI - KONTAKT Instrument File
  • NKI - Native Instruments ...
  • NKJV - TheWord & Bible ...
  • NKM - KONTAKT ( Native ...
  • NKS - Archive file
  • NKS - Native Instruments ...
  • NKY - NUMROTOplus Keyfile (NUM...
  • NL - Norton Desktop Icon ...
  • NL - Unknown Apple II File
  • NLB - Data (Oracle 7)
  • NLC - NeroLINUX Compilation ( ...
  • NLD - WINXP SYSTEM32 file
  • NLD - ATI Radeon Video Driver
  • NLF - MicroSim PCBoard Netlist...
  • NLM - Loadable Module (Netware)
  • NLO - NetG Skill Builder file
  • NLP - Newsletter Profi 2001
  • NLP - Newsletter Profi 2001 ...
  • NLR - NLREG Nonlinear ...
  • NLS - National Language ...
  • NLTRACK - NoLimits Roller Coaster ...
  • NLTRACK - NoLimits Rollercoaster ...
  • NLU - E-Mail Trigger file (...
  • NLV - Nikon Capture LCHE ...
  • NLX - Form (FormWorx 3.0)
  • NM - RM Number Magic Data ...
  • NM2 - Navitel Navigator Ver ...
  • NM2 - Navitel 3.1 Map Header
  • NMA - Normalised Extinction ...
  • NMA - NMEA GPS log data Header
  • NMA - GPS Log Data file
  • NMAT - NeoEngine ( Reality Rift...
  • NMD - SwordSearcher File
  • NMD - Nero miniDVD Compilation...
  • NMDAR - Connectivity Memory ...
  • NMEA - GPS Log Data file
  • NMF - Nuzzler Basic Rule ...
  • NMF - NICE Media Player audio ...
  • NMF - Nuzzler Basic Message ...
  • NMF - Lightwave Narmal map file
  • NMF - Note - Mate Question Set...
  • NMGF - 2D Graphic
  • NMI - SwordSearcher File
  • NMIND - NovaMind Mind Map File
  • NMK - Oc2. 316s cakit file
  • NML - News Markup Language file
  • NML - NML Language Source File...
  • NML - NewsMail 2.0 E- mail ...
  • NML - NEURO ONE Static Neuron ...
  • NML. - nugthat Compiler Source ...
  • NMO - Virtools behavioral ...
  • NMP - Neopaint Mask image ...
  • NMS - Note - Mate save file
  • NMS - Virtools Graphical ...
  • NMS - Unknown Apple II File
  • NMS - Numega Softice 's Loader...
  • NMU - Unknown file extension
  • NMV - Nintendulator Movie ...
  • NMW - Microsoft NetMeeting ...
  • NMW - Netmeeting T126 ...
  • NN - Nero CD File List
  • NNB - ANNI Batch File
  • NNG - Unknown file extension
  • NNI - ANNI Archive
  • NNN - News about smth with ext...
  • NNN - Arj archive volumes up ...
  • NNP - ANNI Portfolio File
  • NNR - Nikon Capture Noise ...
  • NNVS - NextNine VNC Player ...
  • NOA - Nancy Codec video Header
  • NOA - Cell Phone Video Clip
  • NOB - Vampire : La Mascarade ...
  • NOB - Silver game data and ...
  • NOB - VersaPro Word Exchange ...
  • NOD - File (Netobject Fusion)

-ADS BY GOOGLE

SearchCompliance

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • audit program (audit plan)

    An audit program, also called an audit plan, is an action plan that documents what procedures an auditor will follow to validate ...

SearchSecurity

  • insider threat

    Insider threat is a generic term for a threat to an organization's security or data that comes from within.

  • ransomware

    Ransomware is a subset of malware in which the data on a victim's computer is locked, typically by encryption, and payment is ...

  • hacker

    A hacker is an individual who uses computer, networking or other skills to overcome a technical problem.

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

SearchSolidStateStorage

  • 3D XPoint

    3D XPoint is memory storage technology jointly developed by Intel and Micron Technology Inc.

  • RRAM or ReRAM (resistive RAM)

    RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...

  • JEDEC

    JEDEC is a global industry group that develops open standards for microelectronics.

SearchCloudStorage

  • Google Cloud Storage

    Google Cloud Storage is an enterprise public cloud storage platform that can house large unstructured data sets.

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

Close