Browse Definitions:

Browse File Extensions by Alphabet

SQE - SRV

  • SQEXP - SpellQuizzer Export / ...
  • SQF - FreeMotion Flash Movie (...
  • SQF - France98 Football Game ...
  • SQFS - Squash FS Bootable File
  • SQI - Squish Message Base Index
  • SQI - Squish : Squish message ...
  • SQJ - AXIS Camera Explorer ...
  • SQL - Extension for SQL queries
  • SQL - SQL queries (Informix)
  • SQLITE - SQLite Database File
  • SQLITE - Mozilla Firefox file
  • SQLITE-JOURNAL - Mozilla Firefox file
  • SQM - Windows Live Messenger ...
  • SQML - UNIX SQML Scheme or ...
  • SQN - Note file - SquareNote
  • SQP - Query result of audio ...
  • SQR - Structured Query ...
  • SQS - Operation Flashpoint ...
  • SQT - Technics Sx KN 6000 ...
  • SQW - Archive
  • SQW - Archive squeeze
  • SQX - SQX Archiver Compressed ...
  • SQX - SQX compressed archive
  • SQX - SQX Archive
  • SQZ - Compressed archive (...
  • SR - Dispatch Swissair / ...
  • SR - Sun Rasterfile : Bitmap ...
  • SR - Sun Raster Graphic
  • SR - Netscape file
  • SR0 - SecuROM Analysis File
  • SR1 - SIR ( Scientific ...
  • SR2 - SIR ( Scientific ...
  • SR2 - Sony Digital Camera Raw ...
  • SR2 - Omron CX- Supervisor
  • SR2 - A RAW Image File
  • SR2 - sr2 compressed data ...
  • SR3 - SIR ( Scientific ...
  • SR4 - SIR ( Scientific ...
  • SR_ - Compressed Tvideo Card ...
  • SR_ - Compr. Tvideo card Neu ...
  • SRA - PowerBuilder Application...
  • SRB - Corel ClipArt ScrapBook
  • SRC - Firefox Custom Search ...
  • SRC - ProWORX Nxt Search Data ...
  • SRC - DataFlex / Multi - Edit ...
  • SRC - WAIS source file
  • SRC - Infinity Game Engine ...
  • SRC - Sourcecode
  • SRC - Bioware Infinity game ...
  • SRC - Source Code
  • SRC - generally Source code ...
  • SRC - Win32Forth sequential ...
  • SRC - Source - DataFlex
  • SRD - Supercube file
  • SRD - PowerBuilder Data Window...
  • SRD - Smart Reminder Database ...
  • SRE - Undefined file (Motorola)
  • SREC - Motorola S- Records
  • SREC - ASCII Load File
  • SRF - Raster graphics file (...
  • SRFMAP - TerraGen SuRFace MAP
  • SRFMAP - Terragen map file
  • SRG - Microsoft PowerPoint ...
  • SRG - Atari Jaguar Cinepak ...
  • SRG - Software Self - Registry...
  • SRH - Remedy Action Request ...
  • SRI - Dragon NaturallySpeaking...
  • SRJ - PowerBuilder Project ( ...
  • SRL - Nintendo ROM dump file
  • SRL - ASwin - ICwin Shared ...
  • SRL - Acwin local database file
  • SRM - Video game console ROM ...
  • SRO - 3WayPack (The Three - ...
  • SRO - GALAXY -II Architecture ...
  • SRP - SCript file (QuickLink)
  • SRPM - Redhat Linux RPM Source ...
  • SRQ - MS Server request file ...
  • SRQ - Unprocessed Microsoft ...
  • SRR - ReScene Data Recovery ...
  • SRS - Partially Processed ...
  • SRS - Sun raster file
  • SRS - Outlook Send - Receive ...
  • SRS - PowerBuilder structure ...
  • SRS - Bitmap : Sun Raster File
  • SRS - Search and Replace ...
  • SRS - MS Server request file ...
  • SRT - BSPlayer Subtitle ( ...
  • SRT - Sagem ringtone format
  • SRT - SubRip Subtitle File
  • SRT - Subtitle format - SubRip
  • SRT - Siemens Mobile Phone C60...
  • SRT - Movie subtitle file ...
  • SRT - SubRip subtitles Header
  • SRT - SDR99 speech recognition...
  • SRT - Omron CX- Supervisor
  • SRT - Video / Movie Subtitle ...
  • SRT - Skymap Data File
  • SRU - PowerBuilder User Object...

-ADS BY GOOGLE

SearchCompliance

  • PCAOB (Public Company Accounting Oversight Board)

    The Public Company Accounting Oversight Board (PCAOB) is a Congressionally-established nonprofit that assesses audits of public ...

  • cyborg anthropologist

    A cyborg anthropologist is an individual who studies the interaction between humans and technology, observing how technology can ...

  • RegTech

    RegTech, or regulatory technology, is a term used to describe technology that is used to help streamline the process of ...

SearchSecurity

  • email spam

    Email spam, or junk email, is unsolicited bulk messages sent through email with commercial, fraudulent or malicious intent.

  • distributed denial of service (DDoS) attack

    A distributed denial-of-service attack occurs when an attack originates from multiple computers or devices, usually from multiple...

  • application whitelisting

    Application whitelisting is the practice of identifying applications that have been deemed safe for execution and restricting all...

SearchHealthIT

  • athenahealth Inc.

    Based in Watertown, Mass., athenahealth Inc. is a leading vendor of cloud-based EHRs for small to medium-sized physician ...

  • Affordable Care Act (ACA or Obamacare)

    The Affordable Care Act (ACA) is legislation passed in 2010 that changed how uninsured Americans enroll in and receive healthcare...

  • HIPAA Privacy Rule

    The Standards for Privacy of Individually Identifiable Health Information, commonly known as the HIPAA Privacy Rule, establishes ...

SearchDisasterRecovery

  • disaster recovery as a service (DRaaS)

    One approach to a strong disaster recovery plan is DRaaS, where companies offload data replication and restoration ...

  • data recovery

    Data recovery restores data that has been lost, accidentally deleted, corrupted or made inaccessible. Learn how data recovery ...

  • disaster recovery plan (DRP)

    A company's disaster recovery policy is enhanced with a documented DR plan that formulates strategies, and outlines preparation ...

SearchStorage

  • yottabyte (YB)

    A yottabyte is a measure of theoretical storage capacity and is 2 to the 80th power bytes, or, in decimal, approximately 1,000 ...

  • Kilo, mega, giga, tera, peta, exa, zetta and all that

    Kilo, mega, giga, tera, peta, exa, zetta are among the list of prefixes used to denote the quantity of something, such as a byte ...

  • brontobyte

    A brontobyte is a measure of memory or data storage that is equal to 10 to the 27th power of bytes.

SearchSolidStateStorage

  • SSD caching

    SSD caching, also known as flash caching, is the temporary storage of data on NAND flash memory chips in a solid-state drive so ...

  • NVDIMM (Non-Volatile Dual In-line Memory Module)

    An NVDIMM (non-volatile dual in-line memory module) is hybrid computer memory that retains data during a service outage.

  • NAND mirroring

    NAND mirroring has been proposed to break the security in certain portable devices that use NAND flash memory for encryption.

SearchCloudStorage

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

  • Zadara VPSA and ZIOS

    Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA ...

Close