Browse Definitions:

Browse File Extensions by Alphabet

STK - SUN

  • STK - RankTracker data file
  • STK - HyperStudio stacks
  • STK - Rail3D 2KD/2k3 Stock and...
  • STK - eBook - Starebook
  • STK - Stickfigure Animator File
  • STK - Personal Stock Monitor ...
  • STK - CRiSP Harvest File
  • STK - Sticker Store Sticker
  • STK - Pivot Stickfigure ...
  • STK - MetaMorph software stack
  • STKX - Personal Stock Streamer ...
  • STL - Stereolithography file
  • STM - Shorter suffix for .shtml
  • STM - Music module (MOD) (...
  • STM - Music file (Scream ...
  • STM - State transition diagram...
  • STMB - Synclavier Timbre File
  • STMI - (MAC CREATOR CODE ) ...
  • STMI - HTML files created by ...
  • STMI - (MAC CREATOR CODE ) HTML...
  • STMI - PageMill
  • STML - HTML server side include...
  • STML - SSI HTML File
  • STML - See STM HTML
  • STN - ArcView Geocoding ...
  • STN - Microsoft Flight ...
  • STN - Genuine Fractals ...
  • STN - Sting File
  • STN - ArcView : geocoding ...
  • STO - Pascal stub OBJ file (...
  • STP - Standardized graphic ...
  • STP - STP stands for STandard ...
  • STQ - Text file (Statistica) (...
  • STR - Screensaver file
  • STR - Structure list OBJ file ...
  • STRINGS - Text Strings File
  • STRINGS - Apple Safari translation...
  • STRN - HyperCard Stack Converter
  • STS - Song file (Music) (...
  • STS - Project status ...
  • STSP - ScanTango scanner Plug -...
  • STT - Taci Pixia palette file
  • STU - Tarantella Enterprise 3 ...
  • STU - Pinnacle Studio Video ...
  • STU - xyALGEBRA file
  • STU - Studio Video Project ( ...
  • STU - Pinnacle Studio Project ...
  • STUB - Mac File Type
  • STUFF - EVE Online Game Contents...
  • STUFF - Black & White II jokey ...
  • STUFF - Unknown Apple II File
  • STV - sofTV authoring file
  • STVINI - Multiple Programs ...
  • STW - Data file (SmartTerm for...
  • STW - OpenOffice.org 1.0 Text ...
  • STX - Electronic book file (...
  • STX - Tax form (CA-Simply Tax)
  • STY - Audio file for ...
  • STY - Style sheet (Ventura ...
  • STY - Style sheet (Generic ...
  • STYK - Stykz Stick Figure
  • STYKZ - Stykz Animation
  • STYLE - Html style file
  • STYLE - ArcGIS Style Manager File
  • STYLE - Unknown Apple II File
  • STYXML - Inventor Style Library (...
  • STZ - Screamtracker 2 Module ...
  • SU - Unknown Apple II File
  • SUA - SeeYou Airspace ( ...
  • SUB - SubTerra Level File ( ...
  • SUB - IBM Rational Rose ...
  • SUB - CloneCd Related File
  • SUB - SubTerra level file
  • SUB - CaSat Suite Subtitling ...
  • SUB - SubmitWolf File
  • SUB - DivX movie subtitle file...
  • SUB - Subtitle format - ...
  • SUB - Insight II subset ...
  • SUB - CloneCD sub channel data...
  • SUB - Divx Subtitles
  • SUBS - Homeworld Subsystem Data...
  • SUBTITLE - TMPGEnc DVD Author 3 ...
  • SUC - Softrans Gmbh Hello ...
  • SUC - Softrans Hello Engines !...
  • SUD - Super Project Analyzer ...
  • SUD - Sudoku Puzzle File
  • SUD - WISCO Word Power Sudoku ...
  • SUD - sud Super Project ...
  • SUD - Symantec Undodata file
  • SUE - System Enhancement ...
  • SUF - Ccrypt Encrypted File
  • SUF - Sony camera ...
  • SUI - Suit library (Simple ...
  • SUIT - MacBench Test Suite
  • SUIT - Apple Font File ( Apple ...
  • SUITE - Theme Manager / ...
  • SUITE - Winstyles Suite ( ...
  • SUL - GFA Ray- Trace
  • SUL - Gfa Raytrace image
  • SUM - Summary file (Generic)

-ADS BY GOOGLE

SearchCompliance

  • PCAOB (Public Company Accounting Oversight Board)

    The Public Company Accounting Oversight Board (PCAOB) is a Congressionally-established nonprofit that assesses audits of public ...

  • cyborg anthropologist

    A cyborg anthropologist is an individual who studies the interaction between humans and technology, observing how technology can ...

  • RegTech

    RegTech, or regulatory technology, is a term used to describe technology that is used to help streamline the process of ...

SearchSecurity

  • email spam

    Email spam, or junk email, is unsolicited bulk messages sent through email with commercial, fraudulent or malicious intent.

  • distributed denial of service (DDoS) attack

    A distributed denial-of-service attack occurs when an attack originates from multiple computers or devices, usually from multiple...

  • application whitelisting

    Application whitelisting is the practice of identifying applications that have been deemed safe for execution and restricting all...

SearchHealthIT

  • athenahealth Inc.

    Based in Watertown, Mass., athenahealth Inc. is a leading vendor of cloud-based EHRs for small to medium-sized physician ...

  • Affordable Care Act (ACA or Obamacare)

    The Affordable Care Act (ACA) is legislation passed in 2010 that changed how uninsured Americans enroll in and receive healthcare...

  • HIPAA Privacy Rule

    The Standards for Privacy of Individually Identifiable Health Information, commonly known as the HIPAA Privacy Rule, establishes ...

SearchDisasterRecovery

  • disaster recovery as a service (DRaaS)

    One approach to a strong disaster recovery plan is DRaaS, where companies offload data replication and restoration ...

  • data recovery

    Data recovery restores data that has been lost, accidentally deleted, corrupted or made inaccessible. Learn how data recovery ...

  • disaster recovery plan (DRP)

    A company's disaster recovery policy is enhanced with a documented DR plan that formulates strategies, and outlines preparation ...

SearchStorage

  • yottabyte (YB)

    A yottabyte is a measure of theoretical storage capacity and is 2 to the 80th power bytes, or, in decimal, approximately 1,000 ...

  • Kilo, mega, giga, tera, peta, exa, zetta and all that

    Kilo, mega, giga, tera, peta, exa, zetta are among the list of prefixes used to denote the quantity of something, such as a byte ...

  • brontobyte

    A brontobyte is a measure of memory or data storage that is equal to 10 to the 27th power of bytes.

SearchSolidStateStorage

  • SSD caching

    SSD caching, also known as flash caching, is the temporary storage of data on NAND flash memory chips in a solid-state drive so ...

  • NVDIMM (Non-Volatile Dual In-line Memory Module)

    An NVDIMM (non-volatile dual in-line memory module) is hybrid computer memory that retains data during a service outage.

  • NAND mirroring

    NAND mirroring has been proposed to break the security in certain portable devices that use NAND flash memory for encryption.

SearchCloudStorage

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

  • Zadara VPSA and ZIOS

    Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA ...

Close