Browse Definitions:

Browse File Extensions by Alphabet

RIX - RNG

  • RIX - Bitmap graphics (...
  • RJS - RealJukebox skin
  • RJS - RealSystem Skin Header
  • RJS - RealJukebox Skin ( ...
  • RKA - RK Archiver / RKAU Audio...
  • RKP - RemoteKeys profile file
  • RKP - REKO PC cardset Header
  • RKP - REKO PC Cardset ( REKO ...
  • RKP - RKP Game Package (v1.x)
  • RKP - RKP game package
  • RKT - RockSim Rocket Design ...
  • RKV - RKIVE compressed file ...
  • RKV - RKIVE Compressed Archive
  • RKW - RockWorks Graphic ( ...
  • RL - FLEXnet Manager Report ...
  • RL$ - Basic Realizer Disk1 file
  • RL1 - Regestered level file (...
  • RL10 - Nokia ST picture smilies...
  • RL2 - Registered level file (...
  • RL4 - Bitmap graphics file
  • RL8 - Bitmap graphics file
  • RLA - Wavefront raster image (...
  • RLB - Data file (Harvard ...
  • RLC - Graphics file (1 bit per...
  • RLD - OSIMapDef. RecLoad ...
  • RLD - Norton Commander 5.0 ...
  • RLD - Norton Commander 5.0 ...
  • RLE - Run-Length Encoded ...
  • RLF - RichLink compiled format
  • RLF - ArtCAM Pro Relief File (...
  • RLG - Regcleaner Language File
  • RLG - ReliaSoft ALTA 6 & ...
  • RLG - Regcleaner Languages file
  • RLI - RVS-COM Least - cost - ...
  • RLL - Basic CA- Realizer file
  • RLL - SQL Server - Resource ...
  • RLL - IP-EPS
  • RLL - Basic Realizer Careal ...
  • RLO - Basic Realizer Careal ...
  • RLO - Basic Realizer Careal ...
  • RLS - RadLight Skin ( RadLight...
  • RLT - ReliaSoft BlockSim & ...
  • RLV - Basic Realizer Careal ...
  • RLV - Basic Realizer Careal ...
  • RLW - ReliaSoft ALTA 6 & ...
  • RLZ - Realizer source code ...
  • RM - RealNetwork�s RealPlayer...
  • RMA - RealMedia audio file
  • RMAP - Real Pool Image
  • RMB - RegistryMaster branch
  • RMD - Document (Microsoft ...
  • RME - Final Fantasy Sound ( ...
  • RME - Sb_awe keys file
  • RMF - Rich Map Format (used by...
  • RMF - Rich music format (...
  • RMG - RootsMagic genealogy file
  • RMG - Rimage Image file
  • RMG - ANSYS file
  • RMG - Temporary file
  • RMH - GigaTrust RM- protected ...
  • RMI - MIDI music
  • RMID - MIDI - sequention music ...
  • RMJ - RealAudio Media ( ...
  • RMJ - Real Media Jukebox Audio...
  • RMK - Makefile (Clipper RMake)
  • RML - Redline Markup Language ...
  • RMM - RealMedia Metafile ( ...
  • RMM - RAM Meta File
  • RMP - RealJukebox Track Info ...
  • RMP - RealAudio audio file
  • RMP - Open Workbench project ...
  • RMP - RIFF MP3 audio file
  • RMP - Map File
  • RMR - ResumeMaker File
  • RMR - Resume Maker File
  • RMS - Dynamite VSP Road ...
  • RMS - Rise of Nations random ...
  • RMS - AutoCAD Data File for ...
  • RMS - RealMedia Secure Media ...
  • RMS - Java Application ...
  • RMT - Router Firmware
  • RMT - CONSEL Input File
  • RMUF - Alpha Five runtime file
  • RMVB - RealVideo Variable Bit ...
  • RMW - Final Fantasy Sound ( ...
  • RMX - Reference Manager ...
  • RMX - RealMedia secure media ...
  • RMX - RealJukebox Format
  • RMX - RealMedia Secure clip ...
  • RN - Xpl Program file (Nota ...
  • RNC - RNC ProPack Archive
  • RNC - RELAX NG Compact Syntax ...
  • RND - Rendering slide (...
  • RNG - RELAX NG Header
  • RNG - Nokia Composer Ringtone
  • RNG - RELAX NG File
  • RNG - Nokia Communicator ...
  • RNG - RELAX NG ( OASIS RELAX ...
  • RNG - Top Secret Crypto Gold ...
  • RNG - Random Number Generator ...

-ADS BY GOOGLE

SearchCompliance

  • cyborg anthropologist

    A cyborg anthropologist is an individual who studies the interaction between humans and technology, observing how technology can ...

  • RegTech

    RegTech, or regulatory technology, is a term used to describe technology that is used to help streamline the process of ...

  • conduct risk

    Conduct risk is the prospect of financial loss to an organization that is caused by the actions of an organization's ...

SearchSecurity

  • security

    Security, in information technology (IT), is the defense of digital information and IT assets against internal and external, ...

  • insider threat

    An insider threat is a malicious hacker (also called a cracker or a black hat) who is an employee or officer of a business, ...

  • virus (computer virus)

    A computer virus is malicious code that replicates by copying itself to another program, computer boot sector or document.

SearchHealthIT

  • HIPAA Privacy Rule

    The Standards for Privacy of Individually Identifiable Health Information, commonly known as the HIPAA Privacy Rule, establishes ...

  • HIPAA business associate agreement (BAA)

    Under the U.S. Health Insurance Portability and Accountability Act of 1996, a HIPAA business associate agreement (BAA) is a ...

  • telemedicine

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

SearchDisasterRecovery

  • data recovery

    Data recovery restores data that has been lost, accidentally deleted, corrupted or made inaccessible. Learn how data recovery ...

  • disaster recovery plan (DRP)

    A company's disaster recovery policy is enhanced with a documented DR plan that formulates strategies, and outlines preparation ...

  • fault-tolerant

    Systems with integrated fault tolerance are designed to withstand multiple hardware failures to ensure continuous availability.

SearchStorage

  • Secure Digital card (SD card)

    SD cards use flash memory to provide nonvolatile storage. They are more rugged than traditional storage media and are used in ...

  • data storage

    In a computer, storage is the place where data is held in an electromagnetic or optical form for access by a computer processor.

  • flash storage

    Flash-based storage, based on flash memory, is used for data repositories, storage systems and consumer devices, such as USB ...

SearchSolidStateStorage

  • flash file system

    Flash file systems are designed specifically for memory devices. A well-designed flash device and flash file system ensure ...

  • IOPS (input/output operations per second)

    IOPS measures the maximum number of reads and writes to non-contiguous storage. It is not an actual benchmark since vendor ...

  • eMMC (embedded MultiMediaCard)

    An embedded MultiMediaCard (eMMC) is a small storage device made up of NAND flash memory and a simple storage controller.

SearchCloudStorage

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

  • Zadara VPSA and ZIOS

    Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA ...

Close