Browse Definitions:

Browse File Extensions by Alphabet

VER - VIK

  • VER - Version Record
  • VER - Internet Explorer file
  • VER - TurboTax installed ...
  • VER - Version Description
  • VER - Garmin FTL Image Version...
  • VER - SeeYou Airspace file
  • VERS - Version description ( ...
  • VERSATEC - Misc
  • VERSION - Version dist file
  • VERSION - Linux gated daemon file
  • VES - Curvaceous Visual ...
  • VET - Ribbons surface file
  • VET - VET antivirus system file
  • VET - Ventrilo Event Text File...
  • VEW - View file (Lotus ...
  • VEW - View file (Clipper 5)
  • VEX - Possible Virus File
  • VEXE - Virus Executable File
  • VF - Vegas Movie Studio File
  • VF3 - Vaultlet Suite Encrypted...
  • VFB - VForm Builder file
  • VFB - Font Description File
  • VFB - Microsoft Office Outlook...
  • VFC - VentaFax Cover Page File
  • VFD - Drive Image5 Vfd file
  • VFD - Virtual PC virtual ...
  • VFE - Left 4 Dead file
  • VFF - Vextus Factor Compiled ...
  • VFF - DESR VFF greyscale ...
  • VFF - Sun TAAC File
  • VFF - Apple Macintosh Image
  • VFL - Clip art file (...
  • VFM - Voting form (Voter)
  • VFN - Voting form for ...
  • VFP - TMPGEnc VFAPI plug -in
  • VFP - Qtreader file
  • VFS - GnomeVFS Virtual File ...
  • VFS - VentaFax Schedule File
  • VFS - Virtual File System Index
  • VFS - HP All-in-One Thumbnail ...
  • VFT - VisiForm Form ( Primary ...
  • VFX - Volumetric effect plugin...
  • VFZ - Video Effects File
  • VFZ - Creative Webcam Video ...
  • VG - VGuard Proprietry H.264 ...
  • VGA - Video graphics array (...
  • VGA - Video graphics array
  • VGB - VoloGest Management ...
  • VGC - ViziGen code generation ...
  • VGC - ViziGen source code file
  • VGC - ViziGen Code Generation ...
  • VGD - Visual display driver ( ...
  • VGDB - V IDE Automatically ...
  • VGENDLL - V IDE Automatically ...
  • VGI - Vista Game Information
  • VGL - Configuration 911s file ...
  • VGL - Config 911s file
  • VGR - Graphics file (Ventura ...
  • VGRD - (MAC CREATOR CODE ) ...
  • VGRD - LaserWriter
  • VGS - Virtual Game Station ...
  • VGS - Virtual Game Station ...
  • VGUI - V IDE Automatically ...
  • VGUIDB - V IDE Automatically ...
  • VGX - VGuard Proprietry H.264 ...
  • VGZ - VGuard proprietary H.264...
  • VGZ - DigitalVDO Compressed ...
  • VH - Winhelp Vh file
  • VH - Playstation Wave Bank ...
  • VHA - Macromedia Sitespring ...
  • VHC - Big Red Racing Vehicle ...
  • VHD - Virtual PC Virtual Hard ...
  • VHD - Quartus II VHDL Design ...
  • VHD - Virtual Hard Disk file
  • VHD - Vista complete PC backup...
  • VHD - Disk image file format ...
  • VHD - Quartus II VHDL Design ...
  • VHD - Virtual PC Virtual HD ...
  • VHD - VHDL Source File
  • VHDL - " Very High - level ...
  • VHDL - Quartus II VHDL Design ...
  • VHTML - VITRAGE Apache Module ...
  • VI - Virtual Instrument file ...
  • VI - Variable Information ...
  • VI - Graphics file (Jovian ...
  • VI1 - Kaspersky Anti - Virus ...
  • VI2 - Kaspersky Anti - Virus ...
  • VI_ - Audio Waveprg Samplitude...
  • VIB - Chemsoft Export / Import...
  • VIC - Graphics file (Vicar)
  • VICAR - Graphics ( Video Image ...
  • VICAR - VICAR graphics
  • VID - Bitmap graphics (YUV12C ...
  • VID - Bethesda video files (...
  • VID - Screen device driver (...
  • VID - Shell monitor file (...
  • VID - Generic video file
  • VIEW - GOM Atos Scanner File
  • VIEW - Unknown Apple II File
  • VIF - Khoros Visualisation ...

-ADS BY GOOGLE

SearchCompliance

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

SearchSecurity

  • computer exploit

    A computer exploit, or exploit, is an attack on a computer system, especially one that takes advantage of a particular ...

  • cyberwarfare

    Cyberwarfare is computer- or network-based conflict involving politically motivated attacks by a nation-state on another ...

  • insider threat

    Insider threat is a generic term for a threat to an organization's security or data that comes from within.

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

  • OpenStack Block Storage (Cinder)

    OpenStack Block Storage (Cinder) is open source software designed to create and manage a service that provides persistent data ...

  • SATA Express (SATAe)

    SATA Express (SATAe or Serial ATA Express) is a bus interface to connect storage devices to a computer motherboard, supporting ...

  • DIMM (dual in-line memory module)

    A DIMM (dual in-line memory module) is the standard memory card used in servers and PCs.

SearchSolidStateStorage

  • hybrid flash array

    A hybrid flash array is a solid-state storage system that contains a mix of flash memory drives and hard disk drives.

  • 3D XPoint

    3D XPoint is memory storage technology jointly developed by Intel and Micron Technology Inc.

  • RRAM or ReRAM (resistive RAM)

    RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...

SearchCloudStorage

  • Google Cloud Storage

    Google Cloud Storage is an enterprise public cloud storage platform that can house large unstructured data sets.

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

Close