Browse Definitions:

Browse File Extensions by Alphabet

SIB - SJS

  • SIB - Sibelius Score
  • SIB - Sibelius music file
  • SIB - Sheet music file
  • SIB - Sibelius file - Sibelius...
  • SIB - ShipInBottle compressed ...
  • SIC - Quicken 2002 order file
  • SIC - Quicken 2002 Order File ...
  • SID - LizardTech MrSID photo ...
  • SID - ScanIt Document file
  • SID - LizardTech MrSID image ...
  • SID - SIDtune Header
  • SID - Real C64 SIDtune Header
  • SID - C64 Sound Effects File
  • SID - Steam Game Data Backup ...
  • SID - MrSID file
  • SID - Commodore 64 tunes and ...
  • SIF - Setup installation files...
  • SIG - Signature file (PopMail)
  • SIG - PrintMaster graphics file
  • SIG - Current program settings...
  • SIGN - Archive File
  • SIGN - Archive
  • SIGS - Mac File Type
  • SIK - Backup files (...
  • SIK - Backup files (Microsoft ...
  • SIL - Spameater Pro Import File
  • SIL - SmartInspect Log File ( ...
  • SILK - Same as SLK
  • SILO - MeshTV : Mesh file
  • SIM - VTune Performance ...
  • SIM - Aurora image format
  • SIM - Stagecast Creator ...
  • SIM - ITI-SIM model file
  • SIM - Aurora Image
  • SIM - SAP Course Material (SAP)
  • SIM - SimulationX Model File (...
  • SIM - SIMPLE script source ( ...
  • SIM - PowerDVD File
  • SIM - Intel VTune performance ...
  • SIM - Steam Game Backup ...
  • SIM - Simon document file - ...
  • SIM - PDP-10 Simula -67 ...
  • SIM - Autodesk storage ...
  • SIM - SAP Itutor tutorial ...
  • SIM - PC Finder 2002C file
  • SIMPLE - Simple Compiler Source ...
  • SIMPLE - cygnus share file
  • SIMS2PACK - The Sims Compacted ...
  • SIMS2PACK - Downloaded Sims 2 ...
  • SIMS3PACK - The Sims 3 Package File
  • SIMS3PACK - The Sims 3 game package ...
  • SIN - Rise of Nations Campaign...
  • SIN - Unknown Apple II File
  • SIN - SiN game file
  • SIP - Scoptrax file
  • SIP - Powersim Studio ...
  • SIP - Spider Player Icon Set ...
  • SIP - SCRIPT Internet Protocol...
  • SIR - BYU SIR
  • SIR - Bitmap image ( Solitaire...
  • SIR - SIR ( Scientific ...
  • SIR - BYU SIR image format
  • SIS - Symbian OS Installer ...
  • SIS - SiSoftware Sandra ...
  • SIS - Symbian installation file
  • SIS - Nokia Phone Program
  • SIS - symbian file
  • SIS - EPOC / SymbianOS ...
  • SIS - Student Information ...
  • SISHEN - Worm W32/ Sonebot -C
  • SISX - Symbian Series 3 ...
  • SISX - Symbian OS Installation ...
  • SIT - Compressed archive of ...
  • SIT! - Archive created by ...
  • SIT5 - StuffIt 5 archive format
  • SITD - Archive created by ...
  • SITE - GoLive Website Project ...
  • SITE - GoLive Website project ...
  • SITE - Site specific file
  • SITEMAP - ASP.NET site map
  • SITHQX - StuffIt Compressed ...
  • SITL - StuffIt library file
  • SITO - StuffIt Translator file
  • SITV - StuffIt Viewer file
  • SITX - StuffIt Compressed ...
  • SITX - Stuffit X Archive
  • SITX - Stuffit SITX Archive ...
  • SIX - DEC SIXEL Graphic bitmap...
  • SIX - Bitmap image (DEC LN03 +...
  • SIX - SIXEL Graphic
  • SIZ - Configuration file (...
  • SIZED - Gallery resized photo ...
  • SJ1 - SEGA SJ-1 DIGIO graphic ...
  • SJ1 - Image SEGA SJ-1 DIGIO
  • SJ_ - Superjam Compressed ...
  • SJ_ - Midiprg Superjam ...
  • SJF - Split Files Shell ...
  • SJF - Label Etching Matching ...
  • SJP - Sealed JPEG Image ( ...
  • SJP - 3WayPack (The Three - ...

-ADS BY GOOGLE

SearchCompliance

  • PCAOB (Public Company Accounting Oversight Board)

    The Public Company Accounting Oversight Board (PCAOB) is a Congressionally-established nonprofit that assesses audits of public ...

  • cyborg anthropologist

    A cyborg anthropologist is an individual who studies the interaction between humans and technology, observing how technology can ...

  • RegTech

    RegTech, or regulatory technology, is a term used to describe technology that is used to help streamline the process of ...

SearchSecurity

  • email spam

    Email spam, or junk email, is unsolicited bulk messages sent through email with commercial, fraudulent or malicious intent.

  • distributed denial of service (DDoS) attack

    A distributed denial-of-service attack occurs when an attack originates from multiple computers or devices, usually from multiple...

  • application whitelisting

    Application whitelisting is the practice of identifying applications that have been deemed safe for execution and restricting all...

SearchHealthIT

  • athenahealth Inc.

    Based in Watertown, Mass., athenahealth Inc. is a leading vendor of cloud-based EHRs for small to medium-sized physician ...

  • Affordable Care Act (ACA or Obamacare)

    The Affordable Care Act (ACA) is legislation passed in 2010 that changed how uninsured Americans enroll in and receive healthcare...

  • HIPAA Privacy Rule

    The Standards for Privacy of Individually Identifiable Health Information, commonly known as the HIPAA Privacy Rule, establishes ...

SearchDisasterRecovery

  • disaster recovery as a service (DRaaS)

    One approach to a strong disaster recovery plan is DRaaS, where companies offload data replication and restoration ...

  • data recovery

    Data recovery restores data that has been lost, accidentally deleted, corrupted or made inaccessible. Learn how data recovery ...

  • disaster recovery plan (DRP)

    A company's disaster recovery policy is enhanced with a documented DR plan that formulates strategies, and outlines preparation ...

SearchStorage

  • yottabyte (YB)

    A yottabyte is a measure of theoretical storage capacity and is 2 to the 80th power bytes, or, in decimal, approximately 1,000 ...

  • Kilo, mega, giga, tera, peta, exa, zetta and all that

    Kilo, mega, giga, tera, peta, exa, zetta are among the list of prefixes used to denote the quantity of something, such as a byte ...

  • brontobyte

    A brontobyte is a measure of memory or data storage that is equal to 10 to the 27th power of bytes.

SearchSolidStateStorage

  • SSD caching

    SSD caching, also known as flash caching, is the temporary storage of data on NAND flash memory chips in a solid-state drive so ...

  • NVDIMM (Non-Volatile Dual In-line Memory Module)

    An NVDIMM (non-volatile dual in-line memory module) is hybrid computer memory that retains data during a service outage.

  • NAND mirroring

    NAND mirroring has been proposed to break the security in certain portable devices that use NAND flash memory for encryption.

SearchCloudStorage

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

  • Zadara VPSA and ZIOS

    Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA ...

Close