Browse Definitions:

Browse File Extensions by Alphabet

UDS - UNI

  • UDS - NHTSA UDS- 1992 crash ...
  • UDS - Sierra Generations ...
  • UDS - FIMware Database
  • UDS - Uniform Data System file
  • UDS - NHTSA UDS- 1992 crash ...
  • UDS - Sierra Generations File
  • UDW - Raw unsigned doubleword ...
  • UE2 - Encrypted archive (...
  • UEA - Protector Suite QL file
  • UEED - Uconomix Encryption ...
  • UEEF - Uconomix Encryption ...
  • UEF - Unified Emulator Format
  • UENC - UltraEdit Encrypted File...
  • UEZ - COOL 3D ( Ulead Systems ...
  • UFA - UFA Compressed File ...
  • UFA - GIF Animator Animation ...
  • UFA - UFA compressed archive ...
  • UFD - PDP-10 User File ...
  • UFI - data - UFO CaptureV2 ...
  • UFI - UFOCaptureV2 Preset ...
  • UFM - Unicode TrueType font
  • UFO - Object file (Ulead)
  • UFP - Ulead photo project file
  • UFS - FreeBSD PC-BSD Unix File...
  • UFSD - UFS Explorer ...
  • UG - Drawing file (AutoCAD ...
  • UGA - Ulead GIF Animator ...
  • UGBT - Mac File Type
  • UH - Age Of Empires - Age of ...
  • UHA - UHARC compressed archive...
  • UHA - UHarc Compressed Archive
  • UHA - Compressed Multimedia ...
  • UHS - Binary file (Universal ...
  • UHTM - Unreal Tournament File
  • UI - Espire source code (...
  • UI - User interface file (...
  • UIBAK - UltraISO Backup Disk ...
  • UID - IBM Voice Type Users ...
  • UIF - Long prompts for ...
  • UIFILE - Windows Explorer UIFILE ...
  • UIH - Espire header file (...
  • UIL - X- Motif UIL Table
  • UIL - Bitmap image (X- Motif ...
  • UIN - ICQ user
  • UIN - ICQ (a variety of ...
  • UINDEX - Newsgroup Index File
  • UIR - LabWindows User ...
  • UIR - LabWindows User ...
  • UIS - Skin File
  • UIS - WindowBlinds Skin
  • UIS - WindowBlinds User ...
  • UK - TAGCASE0 html folder file
  • UK - English language ...
  • UKA - Fifa World Cup Game Data...
  • UKA - UKA Data Archive (HRM ...
  • UKS - Works File ( Microsoft ...
  • UKS - Microsoft Works File
  • UKX - Unreal Tournament ...
  • UKX - Unreal Animation Package
  • UL - Audio file (ULAW)
  • ULAW - (CCITT G.711) audio (US ...
  • ULB - COBOL Unisys Library file
  • ULD - Uploaded file ...
  • ULF - data - MRF Mapping Tool ...
  • ULF - Universal List File
  • ULF - Uniware Layout File ( ...
  • ULP - EAGLE Layout Editor ...
  • ULP - Peugeot Diag 2000 File
  • ULS - Internet Location Service
  • ULS - NetMeeting user location...
  • ULT - Music module (MOD) (...
  • ULW - Raw & micro -Law Audio ...
  • ULW - u-Law Audio File
  • ULX - Glulx data file
  • ULX - CLAN Lexical File ( ...
  • ULZ - USBlyzer ( USBlyzer )
  • ULZ - USBlyzer Data Capture ...
  • UM - The Land Of UM World File
  • UMB - Backup file (archive) (...
  • UMD - UMD Photobook
  • UML - Visual UML Class Diagram...
  • UMOD - Unreal Self - extracting...
  • UMOD - Unreal Self - extracting...
  • UMOD - Unreal Tournament Module...
  • UMP - UModel Project ( Altova )
  • UMR - MyEclipse UML Model ...
  • UMS - Rune
  • UMX - U-MYX Player song mix ...
  • UMX - Harry Potter
  • UMX - Unreal Music Package
  • UMX - Unreal Tournament music
  • UMX - Deus Ex file
  • UN_ - Ntgraph Setup30 file
  • UNAUTH - SiteMinder Unauthorized ...
  • UNC - Files and Settings ...
  • UND - A86 Assembler Undefined ...
  • UND - A86 UNDefined symbols
  • UNF - Btreive Unformatted File
  • UNF - Universal NES Image ...

-ADS BY GOOGLE

SearchCompliance

  • PCAOB (Public Company Accounting Oversight Board)

    The Public Company Accounting Oversight Board (PCAOB) is a Congressionally-established nonprofit that assesses audits of public ...

  • cyborg anthropologist

    A cyborg anthropologist is an individual who studies the interaction between humans and technology, observing how technology can ...

  • RegTech

    RegTech, or regulatory technology, is a term used to describe technology that is used to help streamline the process of ...

SearchSecurity

  • email spam

    Email spam, or junk email, is unsolicited bulk messages sent through email with commercial, fraudulent or malicious intent.

  • distributed denial of service (DDoS) attack

    A distributed denial-of-service attack occurs when an attack originates from multiple computers or devices, usually from multiple...

  • application whitelisting

    Application whitelisting is the practice of identifying applications that have been deemed safe for execution and restricting all...

SearchHealthIT

  • athenahealth Inc.

    Based in Watertown, Mass., athenahealth Inc. is a leading vendor of cloud-based EHRs for small to medium-sized physician ...

  • Affordable Care Act (ACA or Obamacare)

    The Affordable Care Act (ACA) is legislation passed in 2010 that changed how uninsured Americans enroll in and receive healthcare...

  • HIPAA Privacy Rule

    The Standards for Privacy of Individually Identifiable Health Information, commonly known as the HIPAA Privacy Rule, establishes ...

SearchDisasterRecovery

  • disaster recovery as a service (DRaaS)

    One approach to a strong disaster recovery plan is DRaaS, where companies offload data replication and restoration ...

  • data recovery

    Data recovery restores data that has been lost, accidentally deleted, corrupted or made inaccessible. Learn how data recovery ...

  • disaster recovery plan (DRP)

    A company's disaster recovery policy is enhanced with a documented DR plan that formulates strategies, and outlines preparation ...

SearchStorage

  • yottabyte (YB)

    A yottabyte is a measure of theoretical storage capacity and is 2 to the 80th power bytes, or, in decimal, approximately 1,000 ...

  • Kilo, mega, giga, tera, peta, exa, zetta and all that

    Kilo, mega, giga, tera, peta, exa, zetta are among the list of prefixes used to denote the quantity of something, such as a byte ...

  • brontobyte

    A brontobyte is a measure of memory or data storage that is equal to 10 to the 27th power of bytes.

SearchSolidStateStorage

  • SSD caching

    SSD caching, also known as flash caching, is the temporary storage of data on NAND flash memory chips in a solid-state drive so ...

  • NVDIMM (Non-Volatile Dual In-line Memory Module)

    An NVDIMM (non-volatile dual in-line memory module) is hybrid computer memory that retains data during a service outage.

  • NAND mirroring

    NAND mirroring has been proposed to break the security in certain portable devices that use NAND flash memory for encryption.

SearchCloudStorage

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

  • Zadara VPSA and ZIOS

    Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA ...

Close