Browse Definitions:

Browse File Extensions by Alphabet

SAV - SC

  • SAV - Saved date file for SPSS...
  • SAV - Saved game file (Generic)
  • SAV - Backup file (Generic)
  • SAV - Configuration file (...
  • SAVE - Doom 3 and Quake 4 ...
  • SAVE - Temp file for Unix nano ...
  • SAVED - Typicaly saved copy of ...
  • SAVEDDECK - Nokia Saved Web Page
  • SAVEDSEARCH - OS X Spotlight Saved ...
  • SAVEDSEARCH - Spotlight Saved Search
  • SAVER - Screensaver - Mac OS X
  • SAVER - Mac OS X Screen Saver
  • SAVGAO - Aleph One Saved Game ( ...
  • SAW - Living Scenes Jigsaw ...
  • SAY - Sound data 1 bit
  • SAY - SayaMatrix Accounting ...
  • SAZ - Fiddler Session Archive ...
  • SB - Raw Signed Byte (8bit) ...
  • SB! - Locking file (Superbase)
  • SB2 - SerialBox serials ...
  • SB2 - SerialBox Serials ...
  • SB4 - SetupBuilder ...
  • SB5 - SetupBuilder 5 ...
  • SB_ - Creativ Compressed Sb16 ...
  • SB_ - Creative compressed ...
  • SBA - SpeedBalance Accounting ...
  • SBAK - Ideal Summary Sheets ...
  • SBB - Office Accounting ...
  • SBBUGREPORT - SBBugReport. Document ...
  • SBC - Sagebrush spectrum CIRC ...
  • SBC - Office Accounting ...
  • SBC - Smart Book compiled ...
  • SBC - SBC compressed archive ...
  • SBD - Data definition file (...
  • SBD - SAP 2000 file Structural...
  • SBD - ACT! contact management ...
  • SBD - Storyboard data file (...
  • SBD - File Format - SAP 2000 file Structural...
  • SBE - Spybot Excludes file
  • SBE - Spybot - Search & ...
  • SBF - File data (Superbase)
  • SBGF - Grapher Graph Data File ...
  • SBGLOSSARY - SBGlossary. Document ...
  • SBH - Rational robot header ...
  • SBI - Instrument file (...
  • SBIG - Santa Barbara ...
  • SBJ - Clipart Index Micrografx...
  • SBK - Bank file (Soundblaster)...
  • SBKT - Scrapbook File
  • SBKT - Mac File Type
  • SBL - Flash object (ShockWave)
  • SBM - Image.LBM
  • SBM - Hello Network ...
  • SBN - ArcView Spatial Index ...
  • SBN - ArcView : spatial index ...
  • SBN - Cisco Firmware File
  • SBP - Dml program file (...
  • SBP - Program file (Superbase)
  • SBPF - Small Business Publisher...
  • SBQ - Query definition file (...
  • SBR - Support file (Source ...
  • SBS - SPSS Script ( SPSS Inc.)
  • SBS - SPSS Script
  • SBS - SWAT HRU Output File
  • SBS - Spybot - Search & ...
  • SBSC - Adobe Soundbooth score ...
  • SBSONG - SongShow Plus Song File ...
  • SBST - Adobe Soundbooth score ...
  • SBT - Notes related to record ...
  • SBV - Form definition file (...
  • SBW - Smart Book file
  • SBW - Savings Bonds Wizard ...
  • SBW - SuperBeam 4 UK data file
  • SBW - Savings Bonds Wizard Data
  • SBX - Adobe Illustrator Tsume ...
  • SBX - ArcView spatial index ...
  • SBX - Adobe Illustrator Tsume
  • SBX - ESRI Spatial Index File
  • SBZ - ShowBiz Project File ( ...
  • SBZ - Shedko Badges Theme
  • SBZ - ShowBiZ project Header
  • SC - UNIX spreadsheet commands
  • SC - Script - Borland Paradox
  • SC - Ingres Embedded SQL/C ...
  • SC - Pal script
  • SC - Display driver (...
  • SC - IRIS Showcase drawing / ...
  • SC - Skills Connection test ...
  • SC - Pal script (Paradox)
  • SC - SuperCollider Source ...
  • SC - Sega SC- 3000 image file
  • SC - Paradox Source Code
  • SC - Framework II display ...
  • SC$ - Modem Bitware Fax disk1 ...
  • SC1 - Simcity file
  • SC2 - SAS 6.12 catalog (...
  • SC2 - Schedule+ 7.0 file (...
  • SC2000 - Sim city 2000 dos ...
  • SC2DATA - Starcraft 2 A.I. game ...
  • SC2REPLAY - Starcraft 2 game replay ...

-ADS BY GOOGLE

SearchCompliance

  • cyborg anthropologist

    A cyborg anthropologist is an individual who studies the interaction between humans and technology, observing how technology can ...

  • RegTech

    RegTech, or regulatory technology, is a term used to describe technology that is used to help streamline the process of ...

  • conduct risk

    Conduct risk is the prospect of financial loss to an organization that is caused by the actions of an organization's ...

SearchSecurity

  • application whitelisting

    Application whitelisting is the practice of identifying applications that have been deemed safe for execution and restricting all...

  • security

    Security, in information technology (IT), is the defense of digital information and IT assets against internal and external, ...

  • insider threat

    An insider threat is a malicious hacker (also called a cracker or a black hat) who is an employee or officer of a business, ...

SearchHealthIT

  • HIPAA Privacy Rule

    The Standards for Privacy of Individually Identifiable Health Information, commonly known as the HIPAA Privacy Rule, establishes ...

  • HIPAA business associate agreement (BAA)

    Under the U.S. Health Insurance Portability and Accountability Act of 1996, a HIPAA business associate agreement (BAA) is a ...

  • telemedicine

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

SearchDisasterRecovery

  • data recovery

    Data recovery restores data that has been lost, accidentally deleted, corrupted or made inaccessible. Learn how data recovery ...

  • disaster recovery plan (DRP)

    A company's disaster recovery policy is enhanced with a documented DR plan that formulates strategies, and outlines preparation ...

  • fault-tolerant

    Systems with integrated fault tolerance are designed to withstand multiple hardware failures to ensure continuous availability.

SearchStorage

  • data deduplication

    Deduplication retains one unique data instance to reduce storage and bandwidth consumed by remote backups, replication and ...

  • byte

    In most computer systems, a byte is a unit of data that is eight binary digits long. Bytes are often used to represent a ...

  • Secure Digital card (SD card)

    SD cards use flash memory to provide nonvolatile storage. They are more rugged than traditional storage media and are used in ...

SearchSolidStateStorage

  • flash file system

    Flash file systems are designed specifically for memory devices. A well-designed flash device and flash file system ensure ...

  • IOPS (input/output operations per second)

    IOPS measures the maximum number of reads and writes to non-contiguous storage. It is not an actual benchmark since vendor ...

  • eMMC (embedded MultiMediaCard)

    An embedded MultiMediaCard (eMMC) is a small storage device made up of NAND flash memory and a simple storage controller.

SearchCloudStorage

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

  • Zadara VPSA and ZIOS

    Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA ...

Close