Browse Definitions:

Browse File Extensions by Alphabet

V - VBD

  • V - Consistency check ...
  • V - Main image input file (...
  • V$$ - Cheyenne antivirus ...
  • V00 - Krez 3D ultrasound image...
  • V00 - 3D Ultrasound Image
  • V01 - Genesis 2000 ( Genesis ...
  • V11O - ACDSee offline media file
  • V11P - ACDSee photo disc file
  • V11PF - ACDSee private folder
  • V12 - All The Right Type ...
  • V18 - SYNETSIM Source Code
  • V2 - Microsoft Live Messenger...
  • V22 - CWCDATA file
  • V2A - TI Voyage 200 Figure ( ...
  • V2B - Texas Instruments TI ...
  • V2C - TI Voyage 200 Data ( ...
  • V2D - VersaCAD file
  • V2D - TI Voyage 200 GDB ( ...
  • V2D - CAD Design File
  • V2E - TI Voyage 200 Expression...
  • V2F - TI Voyage 200 Function (...
  • V2G - TI Voyage 200 Group ( ...
  • V2I - Norton Ghost Virtual ...
  • V2I - Ghost Disk Drive Image (...
  • V2I - TI Voyage 200 Bitmap ( ...
  • V2K - TI Voyage 200 ...
  • V2L - TI Voyage 200 List ( ...
  • V2M - TI Voyage 200 Matrix ( ...
  • V2N - TI Voyage 200 ...
  • V2P - TI Voyage 200 Calculator...
  • V2Q - TI Voyage 200 ...
  • V2R - TI Voyage 200 ...
  • V2S - TI Voyage 200 String ( ...
  • V2T - TI Voyage 200 Text ( ...
  • V2U - TI Voyage 200 OS Upgrade...
  • V2X - TI Voyage 200 Macro ( ...
  • V2Y - Texas Instruments TI ...
  • V2Z - TI Voyage 200 Program / ...
  • V3D - Visual3D.NET Data File
  • V3D - Vecta3D Model File
  • V3D - Stratum Samples Models ...
  • V3O - Emergency 3D model Header
  • V3O - 3D model file
  • V3S - Voice Master Key Sound
  • V44 - CWCDATA file
  • V4E - Microsoft Windows Script...
  • V4S - Microsoft Windows Script...
  • V56 - 56k Modem Patch
  • V5D - Vis5d Dataset Object
  • V5D - Dataset UNIX Chemical
  • V64 - Nintento 64 emulation ...
  • V64 - Nintento 64 Emulation ...
  • V64 - Nintendo 64 ROM Dump
  • V8 - 8-bit audio file (CoVox)
  • VA - Unknown Apple II File
  • VAB - Playstation Wave Bank ...
  • VAB - Album Visualb
  • VAC - Oc2. 316s Cakit File
  • VAC - IMail Server Vacation ...
  • VAD - Vadera Enterprises PHP ...
  • VAD - Mapper Variant File
  • VAF - Visual Studio Common ...
  • VAF - DVD2SVCD Temporary File
  • VAF - Microsoft Visual Studio ...
  • VAG - PlayStation ADPCM Sound ...
  • VAG - Sony PlayStation ADPCM ...
  • VAG - Sony Playstation /PS2 ...
  • VAI - multimedia - PhotoDub ...
  • VAL - Asset management ...
  • VAL - Values list object file ...
  • VAL - Validity checks/...
  • VALU - Same as VAL
  • VAM - Velazquez Application Map
  • VAM - Microsoft Visual Studio ...
  • VAN - Animation file (VistaPro)
  • VAP - Annotated speech file (...
  • VAPORCD - UltraISO file
  • VAPORCD - Norum Vapor CD
  • VAR - ASCII text file
  • VAR - Variable file (...
  • VARS - Template File
  • VARS - Templates file
  • VAS - VirtualAssessor ...
  • VAT - Vala Content Management ...
  • VB - Virtual Boy ROM File
  • VB - Visual Basic.NET source ...
  • VB - Virtual Boy Image File
  • VB - VBScript File
  • VB - Sony Playstation wave ...
  • VB - Image ROM File
  • VBA - Visual Basic file
  • VBA - VBase file
  • VBB - Backup File
  • VBC - Vocabulary file
  • VBC - Visual Business Cards ...
  • VBC4 - Visual Business Cards ...
  • VBD - Visual Basic 5 Active ...
  • VBD - ActiveX ( Microsoft ...
  • VBD - Visual Basic ActiveX ...
  • VBDT - VBdocman Documentation ...

-ADS BY GOOGLE

SearchCompliance

  • PCAOB (Public Company Accounting Oversight Board)

    The Public Company Accounting Oversight Board (PCAOB) is a Congressionally-established nonprofit that assesses audits of public ...

  • cyborg anthropologist

    A cyborg anthropologist is an individual who studies the interaction between humans and technology, observing how technology can ...

  • RegTech

    RegTech, or regulatory technology, is a term used to describe technology that is used to help streamline the process of ...

SearchSecurity

  • email spam

    Email spam, or junk email, is unsolicited bulk messages sent through email with commercial, fraudulent or malicious intent.

  • distributed denial of service (DDoS) attack

    A distributed denial-of-service attack occurs when an attack originates from multiple computers or devices, usually from multiple...

  • application whitelisting

    Application whitelisting is the practice of identifying applications that have been deemed safe for execution and restricting all...

SearchHealthIT

  • athenahealth Inc.

    Based in Watertown, Mass., athenahealth Inc. is a leading vendor of cloud-based EHRs for small to medium-sized physician ...

  • Affordable Care Act (ACA or Obamacare)

    The Affordable Care Act (ACA) is legislation passed in 2010 that changed how uninsured Americans enroll in and receive healthcare...

  • HIPAA Privacy Rule

    The Standards for Privacy of Individually Identifiable Health Information, commonly known as the HIPAA Privacy Rule, establishes ...

SearchDisasterRecovery

  • disaster recovery as a service (DRaaS)

    One approach to a strong disaster recovery plan is DRaaS, where companies offload data replication and restoration ...

  • data recovery

    Data recovery restores data that has been lost, accidentally deleted, corrupted or made inaccessible. Learn how data recovery ...

  • disaster recovery plan (DRP)

    A company's disaster recovery policy is enhanced with a documented DR plan that formulates strategies, and outlines preparation ...

SearchStorage

  • yottabyte (YB)

    A yottabyte is a measure of theoretical storage capacity and is 2 to the 80th power bytes, or, in decimal, approximately 1,000 ...

  • Kilo, mega, giga, tera, peta, exa, zetta and all that

    Kilo, mega, giga, tera, peta, exa, zetta are among the list of prefixes used to denote the quantity of something, such as a byte ...

  • brontobyte

    A brontobyte is a measure of memory or data storage that is equal to 10 to the 27th power of bytes.

SearchSolidStateStorage

  • SSD caching

    SSD caching, also known as flash caching, is the temporary storage of data on NAND flash memory chips in a solid-state drive so ...

  • NVDIMM (Non-Volatile Dual In-line Memory Module)

    An NVDIMM (non-volatile dual in-line memory module) is hybrid computer memory that retains data during a service outage.

  • NAND mirroring

    NAND mirroring has been proposed to break the security in certain portable devices that use NAND flash memory for encryption.

SearchCloudStorage

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

  • Zadara VPSA and ZIOS

    Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA ...

Close