Browse Definitions:

Browse File Extensions by Alphabet

VIN - VMP

  • VIN - Dynaload Client & ...
  • VINF - data - ReMPEG log file -...
  • VIP - Magix Samplitude project...
  • VIP - Stitch Pattern File
  • VIP - Husqvarna Viking / Pfaff...
  • VIP - Samplitude Project ( ...
  • VIP - Husqvarna Viking / Pfaff...
  • VIP - Mumath 30 VIP File
  • VIP - ( MAGIX ) Samplitude ...
  • VIR - File identified as a ...
  • VIRUS - F- Secure Renamed File ...
  • VIS - Graphics image file (VIS)
  • VIS4 - Mac File Type
  • VISA - Apple File Exchange File
  • VISIO4 - Visio - file
  • VIT - Bitmap image ( VITec ...
  • VIT - VITec bitmap Header
  • VIT - LabVIEW file
  • VITEC - ViTec Tiled Image File
  • VIV - Streaming video file (...
  • VIVO - RealNetworks VivoActive ...
  • VIVO - VivoActive Movies and ...
  • VIW - Microsoft SQL Server ...
  • VIX - ViX Image Catalog
  • VIX - ACUCOBOL -GT Index File
  • VIX - Acu4GL / AcuCOBOL Index ...
  • VIX - ViX images catalog Header
  • VIZ - dVS/dVISE file (Division)
  • VJB - VinylMaster Pro file
  • VJS - QuickTime Music File ( ...
  • VKF - easyLEARN Author Question
  • VKL - Virtual Edit
  • VKP - Sony Ericsson firmware ...
  • VKV - easyLEARN Video Catalog ...
  • VL - Visual Labels File
  • VL2 - Tribes 2 game file
  • VLAB - VisionLab Studio Project...
  • VLAB - VisionLab Studio Project...
  • VLAB - VisionLab Studio Project...
  • VLB - Library file (Corel ...
  • VLC - ACUCOBOL -GT license file
  • VLC - ACUCOBOL -GT License ...
  • VLD - DataFlex Variable Length...
  • VLE - Virtual Labs Electricity...
  • VLG - VentaFax Logbook File
  • VLM - Drafting program file (...
  • VLP - LiveSite Project ( ...
  • VLP - LiveSite project
  • VLT - Darn ! Passwords ! vault...
  • VLT - VLC Player Skin
  • VLT - WinVault File Archive
  • VLT - Darn ! Passwords ! Vault...
  • VLW - Video Linkwell Document ...
  • VLX - Compiled AutoLISP File
  • VLX - AutoCAD AutoLISP Macro ...
  • VLX - Visual LISP Application ...
  • VM - Virtual memory file (...
  • VM1 - Panasonic SD Voice ...
  • VM1 - Panasonic voice file
  • VMAC - VMware configuration file
  • VMAP - MaNGOS WoW Map Physics ...
  • VMB - CCTV System Video File
  • VMB - Quicken 2002 order file
  • VMBA - VMware configuration file
  • VMC - Virtual memory ...
  • VMC - virtual machine settings...
  • VMD - On-line video file (...
  • VMDC - VMware Virtual Disk File...
  • VMDF - MyWinLocker Yo- Safe ...
  • VMDK - VMware virtual disk file
  • VMDK - Virtual Machine Disk ...
  • VMDK - ( part of a) VMware 3 ...
  • VMDK - VMware 4 Virtual Disk ( ...
  • VMDK - VMware Virtual Disk File...
  • VMDK - Virtual Machine Disk File
  • VME - Virtual Matrix ...
  • VME - Encrypted File
  • VMEM - VMware virtual machine '...
  • VMF - Font characteristics ...
  • VMF - Audio file (FaxWorks)
  • VMG - Saved SMS ( Unicode ) ...
  • VMG - Nokia Text Message ( ...
  • VMG - Nokia message file format
  • VMG - Image file format
  • VMHF - VMware ACE hot fix file
  • VMHR - VMware ACE hot fix file
  • VMI - Dreamcast Doiwnload Info...
  • VML - Vector markup language (...
  • VMLOG - VMware replay recording
  • VMM - Visual Mind Document ( ...
  • VMO - Siemens Mobile Phone ...
  • VMO - Emergency people ...
  • VMO - Virtools behavioral ...
  • VMO - Cosmopolitan Virtual ...
  • VMO - VinylMaster Pro file
  • VMOX - Virtual MakeOver Content
  • VMP - ViewMinder Compressed ...
  • VMP - Logos Library System 2.x...
  • VMP - VinylMaster Pro file
  • VMPL - WMvare policy file

-ADS BY GOOGLE

SearchCompliance

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • audit program (audit plan)

    An audit program, also called an audit plan, is an action plan that documents what procedures an auditor will follow to validate ...

SearchSecurity

  • insider threat

    Insider threat is a generic term for a threat to an organization's security or data that comes from within.

  • ransomware

    Ransomware is a subset of malware in which the data on a victim's computer is locked, typically by encryption, and payment is ...

  • hacker

    A hacker is an individual who uses computer, networking or other skills to overcome a technical problem.

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

SearchSolidStateStorage

  • 3D XPoint

    3D XPoint is memory storage technology jointly developed by Intel and Micron Technology Inc.

  • RRAM or ReRAM (resistive RAM)

    RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...

  • JEDEC

    JEDEC is a global industry group that develops open standards for microelectronics.

SearchCloudStorage

  • Google Cloud Storage

    Google Cloud Storage is an enterprise public cloud storage platform that can house large unstructured data sets.

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

Close