Browse Definitions:

Browse File Extensions by Alphabet

S - SAB

  • S - Source code file (Scheme)
  • S - Assembler source code (...
  • S!D - Shuffle ! Direct Video ...
  • S$$ - Temporary sort file
  • S$$ - Sprint temporary sort ...
  • S01 - Microstation file
  • S01 - MicroStation ...
  • S01 - ZipSplitter Part 2 ...
  • S01 - WordPerfect Distribution...
  • S02 - ZipSplitter Part 3 ...
  • S02 - WordPerfect Distribution...
  • S02 - Corel WordPerfect ...
  • S03 - Corel WordPerfect ...
  • S03 - WordPerfect S03 ...
  • S08 - TaxCalc Tax File ( ...
  • S1 - Free Pascal Assembler ...
  • S11 - Sealed MPEG -1 Video ( ...
  • S12 - SPIRIT Drawing File (STI...
  • S14 - Sealed MPEG -4 Video ( ...
  • S17 - SubSeven Saved Settings ...
  • S19 - Motorola S19 File Record
  • S19 - Motorola ASCII format of...
  • S19 - Motorola EEPROM ...
  • S1A - Sealed Acrobat Document ...
  • S1E - Sealed Excel Worksheet (...
  • S1G - Sealed GIF Image ( ...
  • S1H - Sealed HTML Document ( ...
  • S1J - Sealed file
  • S1M - Sealed MP3 Audio ( ...
  • S1N - Sealed PNG Graphic ( ...
  • S1P - Sealed PowerPoint ...
  • S1Q - Sealed QuickTime Movie (...
  • S1V - Yamaha EX- series ...
  • S1W - Sealed Word Document ( ...
  • S1Y - Yamaha EX- series ...
  • S2 - Stranded II Mapfile ...
  • S2 - Stranded II map file
  • S2 - Motorola S- record format
  • S28 - Genesis or Sega32X ROM ...
  • S2K - Subtitle file
  • S2M - Stronghold 2 Map File
  • S2MA - Starcraft 2 map file
  • S2MV - Starcraft 2 map preview ...
  • S2P - Sonnet S- device ...
  • S2P - Sonnet File
  • S2R - RegMagiK Registry Editor...
  • S2S - SRT2SUP native subtitle ...
  • S2S - Spike2 Script ( ...
  • S2WDH - HP Share to Web Upload ...
  • S2Z - S2Games Savage game ...
  • S3 - Motorola S- record format
  • S3D - Micrografx Simply 3D ...
  • S3D - EverQuest ( Sony )
  • S3D - Shape3d Surfboard Design...
  • S3D - Philips 3D Solutions 3D ...
  • S3DF - Sealed CAD File ( ...
  • S3I - Instrument file (Scream ...
  • S3M - 16 channel music file (...
  • S3P - AKAI MESA II/PC S- ...
  • S3R - Rtl Ski Jump Replay File
  • S3Z - Amiga and Pc Tracker ...
  • S3Z - ScreamTracker v3 File
  • S4T - S4/ TEXT and Tagless ...
  • S57 - vector image ( ' ...
  • S5D - Step5 Program ( Siemens ...
  • S6BN - Mac File Type
  • S7 - Sibelius Music Notation ...
  • S70 - Xilinx Libraries Library...
  • S7I - Seed7 library / include ...
  • S7P - SubSeven Trojan File
  • S7Z - 7-Zip Compressed File ( ...
  • S7Z - 7-zip compressed file
  • S8 - Simul8 Simulation
  • S85 - SABRE Chart or Graph ( ...
  • S85 - Sabre Airline Solutions ...
  • S8BN - Mac File Type
  • SA - UNIX stub library
  • SA - System Sa51swe file
  • SA1 - Panasonic AAC Data ...
  • SA1 - Audio Encryption File
  • SA2 - Time Stamp project grid ...
  • SA2 - Surprise ! AdLib Tracker...
  • SA2 - Suprise ! adlib tracker ...
  • SA2B - A2B Player Stream ( ...
  • SA4 - STABCAL ( stability ...
  • SA5 - street atlas document ...
  • SA5 - SecretAgent archive file
  • SA6 - Street Atlas Ver. 6 Map ...
  • SA7 - Street Atlas Ver 7 Map ...
  • SA8 - Street Atlas Ver 8 Map ...
  • SA9 - Hue and Cry Photoshop ...
  • SA9 - Hue and Cry Photoshop / ...
  • SAA - SecretAgent Auto - ...
  • SAB - Saber file - Star Wars :...
  • SAB - ALSong album file
  • SAB - ACIS Solid Binary File
  • SAB - NVision 3D Scanner File
  • SAB - 3D ACIS binary file
  • SAB - ModelMaker File
  • SAB2 - NVision 3D Scanner File

-ADS BY GOOGLE

SearchCompliance

  • cyborg anthropologist

    A cyborg anthropologist is an individual who studies the interaction between humans and technology, observing how technology can ...

  • RegTech

    RegTech, or regulatory technology, is a term used to describe technology that is used to help streamline the process of ...

  • conduct risk

    Conduct risk is the prospect of financial loss to an organization that is caused by the actions of an organization's ...

SearchSecurity

  • security

    Security, in information technology (IT), is the defense of digital information and IT assets against internal and external, ...

  • insider threat

    An insider threat is a malicious hacker (also called a cracker or a black hat) who is an employee or officer of a business, ...

  • virus (computer virus)

    A computer virus is malicious code that replicates by copying itself to another program, computer boot sector or document.

SearchHealthIT

  • HIPAA Privacy Rule

    The Standards for Privacy of Individually Identifiable Health Information, commonly known as the HIPAA Privacy Rule, establishes ...

  • HIPAA business associate agreement (BAA)

    Under the U.S. Health Insurance Portability and Accountability Act of 1996, a HIPAA business associate agreement (BAA) is a ...

  • telemedicine

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

SearchDisasterRecovery

  • data recovery

    Data recovery restores data that has been lost, accidentally deleted, corrupted or made inaccessible. Learn how data recovery ...

  • disaster recovery plan (DRP)

    A company's disaster recovery policy is enhanced with a documented DR plan that formulates strategies, and outlines preparation ...

  • fault-tolerant

    Systems with integrated fault tolerance are designed to withstand multiple hardware failures to ensure continuous availability.

SearchStorage

  • Secure Digital card (SD card)

    SD cards use flash memory to provide nonvolatile storage. They are more rugged than traditional storage media and are used in ...

  • data storage

    In a computer, storage is the place where data is held in an electromagnetic or optical form for access by a computer processor.

  • flash storage

    Flash-based storage, based on flash memory, is used for data repositories, storage systems and consumer devices, such as USB ...

SearchSolidStateStorage

  • flash file system

    Flash file systems are designed specifically for memory devices. A well-designed flash device and flash file system ensure ...

  • IOPS (input/output operations per second)

    IOPS measures the maximum number of reads and writes to non-contiguous storage. It is not an actual benchmark since vendor ...

  • eMMC (embedded MultiMediaCard)

    An embedded MultiMediaCard (eMMC) is a small storage device made up of NAND flash memory and a simple storage controller.

SearchCloudStorage

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

  • Zadara VPSA and ZIOS

    Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA ...

Close