Browse Definitions:

Browse File Extensions by Alphabet

STK - SUN

  • STK - RankTracker data file
  • STK - HyperStudio stacks
  • STK - Rail3D 2KD/2k3 Stock and...
  • STK - eBook - Starebook
  • STK - Stickfigure Animator File
  • STK - Personal Stock Monitor ...
  • STK - CRiSP Harvest File
  • STK - Sticker Store Sticker
  • STK - Pivot Stickfigure ...
  • STK - MetaMorph software stack
  • STKX - Personal Stock Streamer ...
  • STL - Stereolithography file
  • STM - Shorter suffix for .shtml
  • STM - Music module (MOD) (...
  • STM - Music file (Scream ...
  • STM - State transition diagram...
  • STMB - Synclavier Timbre File
  • STMI - (MAC CREATOR CODE ) ...
  • STMI - HTML files created by ...
  • STMI - (MAC CREATOR CODE ) HTML...
  • STMI - PageMill
  • STML - HTML server side include...
  • STML - SSI HTML File
  • STML - See STM HTML
  • STN - ArcView Geocoding ...
  • STN - Microsoft Flight ...
  • STN - Genuine Fractals ...
  • STN - Sting File
  • STN - ArcView : geocoding ...
  • STO - Pascal stub OBJ file (...
  • STP - Standardized graphic ...
  • STP - STP stands for STandard ...
  • STQ - Text file (Statistica) (...
  • STR - Screensaver file
  • STR - Structure list OBJ file ...
  • STRINGS - Text Strings File
  • STRINGS - Apple Safari translation...
  • STRN - HyperCard Stack Converter
  • STS - Song file (Music) (...
  • STS - Project status ...
  • STSP - ScanTango scanner Plug -...
  • STT - Taci Pixia palette file
  • STU - Tarantella Enterprise 3 ...
  • STU - Pinnacle Studio Video ...
  • STU - xyALGEBRA file
  • STU - Studio Video Project ( ...
  • STU - Pinnacle Studio Project ...
  • STUB - Mac File Type
  • STUFF - EVE Online Game Contents...
  • STUFF - Black & White II jokey ...
  • STUFF - Unknown Apple II File
  • STV - sofTV authoring file
  • STVINI - Multiple Programs ...
  • STW - Data file (SmartTerm for...
  • STW - OpenOffice.org 1.0 Text ...
  • STX - Electronic book file (...
  • STX - Tax form (CA-Simply Tax)
  • STY - Audio file for ...
  • STY - Style sheet (Ventura ...
  • STY - Style sheet (Generic ...
  • STYK - Stykz Stick Figure
  • STYKZ - Stykz Animation
  • STYLE - Html style file
  • STYLE - ArcGIS Style Manager File
  • STYLE - Unknown Apple II File
  • STYXML - Inventor Style Library (...
  • STZ - Screamtracker 2 Module ...
  • SU - Unknown Apple II File
  • SUA - SeeYou Airspace ( ...
  • SUB - SubTerra Level File ( ...
  • SUB - IBM Rational Rose ...
  • SUB - CloneCd Related File
  • SUB - SubTerra level file
  • SUB - CaSat Suite Subtitling ...
  • SUB - SubmitWolf File
  • SUB - DivX movie subtitle file...
  • SUB - Subtitle format - ...
  • SUB - Insight II subset ...
  • SUB - CloneCD sub channel data...
  • SUB - Divx Subtitles
  • SUBS - Homeworld Subsystem Data...
  • SUBTITLE - TMPGEnc DVD Author 3 ...
  • SUC - Softrans Gmbh Hello ...
  • SUC - Softrans Hello Engines !...
  • SUD - Super Project Analyzer ...
  • SUD - Sudoku Puzzle File
  • SUD - WISCO Word Power Sudoku ...
  • SUD - sud Super Project ...
  • SUD - Symantec Undodata file
  • SUE - System Enhancement ...
  • SUF - Ccrypt Encrypted File
  • SUF - Sony camera ...
  • SUI - Suit library (Simple ...
  • SUIT - MacBench Test Suite
  • SUIT - Apple Font File ( Apple ...
  • SUITE - Theme Manager / ...
  • SUITE - Winstyles Suite ( ...
  • SUL - GFA Ray- Trace
  • SUL - Gfa Raytrace image
  • SUM - Summary file (Generic)

-ADS BY GOOGLE

SearchCompliance

  • cyborg anthropologist

    A cyborg anthropologist is an individual who studies the interaction between humans and technology, observing how technology can ...

  • RegTech

    RegTech, or regulatory technology, is a term used to describe technology that is used to help streamline the process of ...

  • conduct risk

    Conduct risk is the prospect of financial loss to an organization that is caused by the actions of an organization's ...

SearchSecurity

  • application whitelisting

    Application whitelisting is the practice of identifying applications that have been deemed safe for execution and restricting all...

  • security

    Security, in information technology (IT), is the defense of digital information and IT assets against internal and external, ...

  • insider threat

    An insider threat is a malicious hacker (also called a cracker or a black hat) who is an employee or officer of a business, ...

SearchHealthIT

  • HIPAA Privacy Rule

    The Standards for Privacy of Individually Identifiable Health Information, commonly known as the HIPAA Privacy Rule, establishes ...

  • HIPAA business associate agreement (BAA)

    Under the U.S. Health Insurance Portability and Accountability Act of 1996, a HIPAA business associate agreement (BAA) is a ...

  • telemedicine

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

SearchDisasterRecovery

  • data recovery

    Data recovery restores data that has been lost, accidentally deleted, corrupted or made inaccessible. Learn how data recovery ...

  • disaster recovery plan (DRP)

    A company's disaster recovery policy is enhanced with a documented DR plan that formulates strategies, and outlines preparation ...

  • fault-tolerant

    Systems with integrated fault tolerance are designed to withstand multiple hardware failures to ensure continuous availability.

SearchStorage

  • data deduplication

    Deduplication retains one unique data instance to reduce storage and bandwidth consumed by remote backups, replication and ...

  • byte

    In most computer systems, a byte is a unit of data that is eight binary digits long. Bytes are often used to represent a ...

  • Secure Digital card (SD card)

    SD cards use flash memory to provide nonvolatile storage. They are more rugged than traditional storage media and are used in ...

SearchSolidStateStorage

  • flash file system

    Flash file systems are designed specifically for memory devices. A well-designed flash device and flash file system ensure ...

  • IOPS (input/output operations per second)

    IOPS measures the maximum number of reads and writes to non-contiguous storage. It is not an actual benchmark since vendor ...

  • eMMC (embedded MultiMediaCard)

    An embedded MultiMediaCard (eMMC) is a small storage device made up of NAND flash memory and a simple storage controller.

SearchCloudStorage

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

  • Zadara VPSA and ZIOS

    Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA ...

Close