Browse Definitions:

Browse File Extensions by Alphabet

U - UDS

  • U - Subsampled Raw YUV Image
  • U00 - Commodore C64 universal ...
  • U2 - Telelogic Tau UML Model
  • U2E - Unreal Game Translation
  • U2P - Telelogic Tau UML ...
  • U3D - Universal 3D Header
  • U3D - Model file format - ...
  • U3D - Ultimate3D Engine 3D ...
  • U3D - Universal 3D File
  • U3I - U3 Application ...
  • U3I - Sandisk Launchpad ...
  • U3P - U3 Platform install file
  • U3P - U3 Smart Application
  • U3P - U3 application Package ...
  • U4A - UnInstaller Archive
  • U8 - Raw Unsigned 8-Bit Audio...
  • U8 - Raw Unsigned 8-Bit Audio...
  • U96 - EasyZip Temporary File
  • U98 - USA 98 Streets & ...
  • U98 - Urdu 98 document file
  • UAE - UAE - WinUAE ...
  • UAE - WinUAE configuration file
  • UAP - User agent profile (Used...
  • UAS - PhotoImpact Backup / ...
  • UAX - Rune
  • UAX - Unreal Audio File
  • UAX - Unreal Audio Package
  • UAX - Unified Application ...
  • UAX - Deus Ex
  • UAX - Unreal / Unreal 2
  • UB - Raw unsigned byte (8-bit...
  • UBB - Basic Ubas File
  • UBD - Basic Ubas file
  • UBI - Animation UBISOFT
  • UBK - Embiid Reader eBook ( ...
  • UBM - Iphoto Mtwain Install ...
  • UBS - Tracesrv Bugslayer ...
  • UBS - Tracesrv etc Bugslayer ...
  • UC - AutoCut Flash Firmware ...
  • UC - UnrealScript Class
  • UC - Unreal Tournament code ...
  • UC2 - Compressed archive (...
  • UCC - National UCC Financing ...
  • UCCAPILOG - Microsoft UCC API Log ...
  • UCCAPILOG - Windows Live Messenger ...
  • UCD - Prosa / OM use case ...
  • UCD - Prosa / OM Use Case ...
  • UCE - WINXP SYSTEM32 file
  • UCE - UniCode extensions
  • UCE - Microsoft Windows XP ...
  • UCF - Epson personal settings ...
  • UCF - Xilinx Foundation User ...
  • UCF - WebEx Media File
  • UCF - Coordinate list file
  • UCF - WebEx Universal ...
  • UCG - ULEAD MediaStudio CG ...
  • UCI - UFS Explorer Backup File
  • UCI - Samsung YP-P2 Theme
  • UCM - Urban Chaos Game File
  • UCN - New compressed archive (...
  • UCR - MicroSim PCBoard ...
  • UCR - Pixel image file
  • UCS - Universal Classification...
  • UCS - Homeworld Localized ...
  • UCS - Universal Classification...
  • UCSETTINGS - Universal Converter ...
  • UCV - Universal Converter ...
  • UCX - Rational XDE (IBM)
  • UD - AOL 4.0 ( America Online...
  • UD - Aol40 file
  • UD - OmniPage User Dictionary
  • UDA - ZEMAX model data file
  • UDB - Microsoft Works file
  • UDB - Off-line application ...
  • UDB - Windows 2000 Uniqueness ...
  • UDB - PINO 3-Server File
  • UDC - Acrobat Spelling File ( ...
  • UDC - Systems Management ...
  • UDC - Adobe user dictionary ...
  • UDC - Fh5 Us English file
  • UDCX - Universal Data ...
  • UDD - OllyDbg Module Info ...
  • UDEB - Debian Package File
  • UDF - User-Defined Function (...
  • UDF - Image filter (...
  • UDI - Corel Graphics draw ...
  • UDI - Dazzle DVD complete
  • UDI - Corel Graphics10 Draw ...
  • UDIF - Apple Mac OS X Universal...
  • UDIWWW - bookmark data - UdiWWW
  • UDL - ADONIS User Export From ...
  • UDL - Microsoft Data Link file
  • UDL - Data Link ( Microsoft ...
  • UDM - MapView User - Defined ...
  • UDO - Data - Moray User ...
  • UDO - 3D Graphic
  • UDOG - Apple Browser Launcher
  • UDP - User Datagram Protocol
  • UDP - Corel VideoStudio scene ...

-ADS BY GOOGLE

SearchCompliance

  • PCAOB (Public Company Accounting Oversight Board)

    The Public Company Accounting Oversight Board (PCAOB) is a Congressionally-established nonprofit that assesses audits of public ...

  • cyborg anthropologist

    A cyborg anthropologist is an individual who studies the interaction between humans and technology, observing how technology can ...

  • RegTech

    RegTech, or regulatory technology, is a term used to describe technology that is used to help streamline the process of ...

SearchSecurity

  • email spam

    Email spam, or junk email, is unsolicited bulk messages sent through email with commercial, fraudulent or malicious intent.

  • distributed denial of service (DDoS) attack

    A distributed denial-of-service attack occurs when an attack originates from multiple computers or devices, usually from multiple...

  • application whitelisting

    Application whitelisting is the practice of identifying applications that have been deemed safe for execution and restricting all...

SearchHealthIT

  • athenahealth Inc.

    Based in Watertown, Mass., athenahealth Inc. is a leading vendor of cloud-based EHRs for small to medium-sized physician ...

  • Affordable Care Act (ACA or Obamacare)

    The Affordable Care Act (ACA) is legislation passed in 2010 that changed how uninsured Americans enroll in and receive healthcare...

  • HIPAA Privacy Rule

    The Standards for Privacy of Individually Identifiable Health Information, commonly known as the HIPAA Privacy Rule, establishes ...

SearchDisasterRecovery

  • disaster recovery as a service (DRaaS)

    One approach to a strong disaster recovery plan is DRaaS, where companies offload data replication and restoration ...

  • data recovery

    Data recovery restores data that has been lost, accidentally deleted, corrupted or made inaccessible. Learn how data recovery ...

  • disaster recovery plan (DRP)

    A company's disaster recovery policy is enhanced with a documented DR plan that formulates strategies, and outlines preparation ...

SearchStorage

  • yottabyte (YB)

    A yottabyte is a measure of theoretical storage capacity and is 2 to the 80th power bytes, or, in decimal, approximately 1,000 ...

  • Kilo, mega, giga, tera, peta, exa, zetta and all that

    Kilo, mega, giga, tera, peta, exa, zetta are among the list of prefixes used to denote the quantity of something, such as a byte ...

  • brontobyte

    A brontobyte is a measure of memory or data storage that is equal to 10 to the 27th power of bytes.

SearchSolidStateStorage

  • SSD caching

    SSD caching, also known as flash caching, is the temporary storage of data on NAND flash memory chips in a solid-state drive so ...

  • NVDIMM (Non-Volatile Dual In-line Memory Module)

    An NVDIMM (non-volatile dual in-line memory module) is hybrid computer memory that retains data during a service outage.

  • NAND mirroring

    NAND mirroring has been proposed to break the security in certain portable devices that use NAND flash memory for encryption.

SearchCloudStorage

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

  • Zadara VPSA and ZIOS

    Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA ...

Close