Browse Definitions:

Browse File Extensions by Alphabet

U - UDS

  • U - Subsampled Raw YUV Image
  • U00 - Commodore C64 universal ...
  • U2 - Telelogic Tau UML Model
  • U2E - Unreal Game Translation
  • U2P - Telelogic Tau UML ...
  • U3D - Universal 3D Header
  • U3D - Model file format - ...
  • U3D - Ultimate3D Engine 3D ...
  • U3D - Universal 3D File
  • U3I - U3 Application ...
  • U3I - Sandisk Launchpad ...
  • U3P - U3 Platform install file
  • U3P - U3 Smart Application
  • U3P - U3 application Package ...
  • U4A - UnInstaller Archive
  • U8 - Raw Unsigned 8-Bit Audio...
  • U8 - Raw Unsigned 8-Bit Audio...
  • U96 - EasyZip Temporary File
  • U98 - USA 98 Streets & ...
  • U98 - Urdu 98 document file
  • UAE - UAE - WinUAE ...
  • UAE - WinUAE configuration file
  • UAP - User agent profile (Used...
  • UAS - PhotoImpact Backup / ...
  • UAX - Rune
  • UAX - Unreal Audio File
  • UAX - Unreal Audio Package
  • UAX - Unified Application ...
  • UAX - Deus Ex
  • UAX - Unreal / Unreal 2
  • UB - Raw unsigned byte (8-bit...
  • UBB - Basic Ubas File
  • UBD - Basic Ubas file
  • UBI - Animation UBISOFT
  • UBK - Embiid Reader eBook ( ...
  • UBM - Iphoto Mtwain Install ...
  • UBS - Tracesrv Bugslayer ...
  • UBS - Tracesrv etc Bugslayer ...
  • UC - AutoCut Flash Firmware ...
  • UC - UnrealScript Class
  • UC - Unreal Tournament code ...
  • UC2 - Compressed archive (...
  • UCC - National UCC Financing ...
  • UCCAPILOG - Microsoft UCC API Log ...
  • UCCAPILOG - Windows Live Messenger ...
  • UCD - Prosa / OM use case ...
  • UCD - Prosa / OM Use Case ...
  • UCE - WINXP SYSTEM32 file
  • UCE - UniCode extensions
  • UCE - Microsoft Windows XP ...
  • UCF - Epson personal settings ...
  • UCF - Xilinx Foundation User ...
  • UCF - WebEx Media File
  • UCF - Coordinate list file
  • UCF - WebEx Universal ...
  • UCG - ULEAD MediaStudio CG ...
  • UCI - UFS Explorer Backup File
  • UCI - Samsung YP-P2 Theme
  • UCM - Urban Chaos Game File
  • UCN - New compressed archive (...
  • UCR - MicroSim PCBoard ...
  • UCR - Pixel image file
  • UCS - Universal Classification...
  • UCS - Homeworld Localized ...
  • UCS - Universal Classification...
  • UCSETTINGS - Universal Converter ...
  • UCV - Universal Converter ...
  • UCX - Rational XDE (IBM)
  • UD - AOL 4.0 ( America Online...
  • UD - Aol40 file
  • UD - OmniPage User Dictionary
  • UDA - ZEMAX model data file
  • UDB - Microsoft Works file
  • UDB - Off-line application ...
  • UDB - Windows 2000 Uniqueness ...
  • UDB - PINO 3-Server File
  • UDC - Acrobat Spelling File ( ...
  • UDC - Systems Management ...
  • UDC - Adobe user dictionary ...
  • UDC - Fh5 Us English file
  • UDCX - Universal Data ...
  • UDD - OllyDbg Module Info ...
  • UDEB - Debian Package File
  • UDF - User-Defined Function (...
  • UDF - Image filter (...
  • UDI - Corel Graphics draw ...
  • UDI - Dazzle DVD complete
  • UDI - Corel Graphics10 Draw ...
  • UDIF - Apple Mac OS X Universal...
  • UDIWWW - bookmark data - UdiWWW
  • UDL - ADONIS User Export From ...
  • UDL - Microsoft Data Link file
  • UDL - Data Link ( Microsoft ...
  • UDM - MapView User - Defined ...
  • UDO - Data - Moray User ...
  • UDO - 3D Graphic
  • UDOG - Apple Browser Launcher
  • UDP - User Datagram Protocol
  • UDP - Corel VideoStudio scene ...

-ADS BY GOOGLE

SearchCompliance

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • audit program (audit plan)

    An audit program, also called an audit plan, is an action plan that documents what procedures an auditor will follow to validate ...

SearchSecurity

  • computer worm

    A computer worm is a type of malicious software program whose primary function is to infect other computers while remaining ...

  • black hat

    Black hat refers to a hacker who breaks into a computer system or network with malicious intent.

  • copyright

    Copyright is a legal term describing ownership of control of the rights to the use and distribution of certain works of creative ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

  • mass notification system (MNS)

    A mass notification system is a platform that sends one-way messages to inform employees and the public of an emergency.

SearchStorage

  • hybrid hard drive (HHD)

    A hybrid hard drive (HHD), sometimes known as a solid-state hybrid drive (SSHD), is a mass storage device that combines a ...

  • USB flash drive

    A USB flash drive -- also known as a stick, thumb or pen drive -- is a plug-and-play portable storage device that uses flash ...

  • open source storage

    Open source storage is data storage software developed in a public, collaborative manner that permits the free use, distribution ...

SearchSolidStateStorage

  • RRAM or ReRAM (resistive RAM)

    RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...

  • JEDEC

    JEDEC is a global industry group that develops open standards for microelectronics.

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification written for internally mounted storage...

SearchCloudStorage

  • Google Cloud Storage

    Google Cloud Storage is an enterprise public cloud storage platform that can house large unstructured data sets.

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

Close