Browse Definitions:

Browse File Extensions by Alphabet

VMR - VPC

  • VMR - Veeam Monitor report file
  • VMR - VBMaximizer File
  • VMS - Text file with vms ...
  • VMSD - VMware snapshots and ...
  • VMSG - VMware file
  • VMSG - CompuServe Message
  • VMSN - VMware Snapshot ( VMware...
  • VMSS - VMware Suspend State ( ...
  • VMT - VMware configuration file
  • VMT - Valve Material File
  • VMT - Steam Source SDK Texture...
  • VMTM - VMware Team Data File
  • VMTM - VMware Document ( VMware...
  • VMU - Dreamcast VMU Save File ...
  • VMV - Nikon Scan Cache File ( ...
  • VMV - VirtuaNES movie capture ...
  • VMV - VirtualNES or ...
  • VMWAREVM - VMware Fusion virtual ...
  • VMWAREVM - VMware Fusion Virtual ...
  • VMX - VMWare Configuration File
  • VMX - Cubase Mixer Settings ...
  • VMX - VectorMAX Streaming Video
  • VMX - VMware configuration ( ...
  • VMX - Cubase mixer settings
  • VMX - Infor ERP Visual ERP ...
  • VMX2 - VectorMAX Streaming Video
  • VMX3 - VectorMAX Streaming Video
  • VMXA - VMware ACE master file
  • VMXF - VMware configuration ...
  • VNA - Video Capture album
  • VNA - NetDraw file
  • VNA - JVC JLIP Image
  • VNC - Virtual Network ...
  • VND - Type3 Design File
  • VND - Medlin Accounting Vendor...
  • VNF - Vision Numeric Font
  • VNM - VenomIDE Venom -SC ...
  • VNT - Mobile Phone vNote File
  • VNT - Sony Ericsson Mobile ...
  • VNT - Decorating Vignette Web ...
  • VNT - Sony Ericsson Mobile ...
  • VNW - RAR renamed file
  • VO - Include file with object...
  • VOB - Encrypted video and ...
  • VOC - Audio file (Quartet)
  • VOC - Audio file (Creative ...
  • VOC - Audio file (generated by...
  • VOD - Video On Demand file
  • VOD - WorldGroup Manager ...
  • VOF - Object folder (VZ ...
  • VOI - Voyetra Voice File
  • VOI - VOI Group File
  • VOID - Halflife Map Voids File
  • VOK - VTrain ( Vocabulary ...
  • VOK - VTrain vocabulary trainer
  • VOK - PocketVoc vocabulary file
  • VOK - Dictionary file
  • VOL - Earth Siege 2 Archive
  • VOL - Video Game Archive
  • VOL - Tribes Archive
  • VOL - Red Baron 3D game file
  • VOL - Giants : Citizen Kabuto ...
  • VOL - FreeOTFE Volume File ( ...
  • VOL - Volume file
  • VOL - Tribes game archive
  • VOL - Volfs file system ...
  • VOR - StarOffice Template
  • VOR - OpenOffice.org or ...
  • VOR - StarOffice template ( ...
  • VORT - Very Ordinary Raster ...
  • VORT - Bitmap image ( Very ...
  • VOS - Virtual Orchestra Studio...
  • VOS - Vosaic video mosaic file...
  • VOT - Recorded Video
  • VOX - Audio file (Talking ...
  • VOX - Formatted voice file (...
  • VOX - Dialogic audio file ...
  • VOX-6K - Dialogic 4-bit ADP
  • VOX-8K - Dialogic 4-bit ADPCM file
  • VP - Publication (Ventura ...
  • VP2 - Videophile II Video ...
  • VP3 - VP3 sewing machine file
  • VP3 - On2 Streaming Video File
  • VP3 - VP3 encoded video file
  • VP4 - VP4 Encoded Video File (...
  • VP5 - VP5 Encoded Video File (...
  • VP6 - VP6 Encoded Video File (...
  • VP6 - VP6 encoded video
  • VP6 - Command & Conquer Red ...
  • VP6 - TrueMotion VP6 Video File
  • VP7 - TrueMotion VP7 Video File
  • VPA - VPchat Chat Gestures File
  • VPA - Excite Chat Gestures File
  • VPC - ViziGen Project ...
  • VPC - ViziGen Configuration ...
  • VPC - VIPP Project Container ...
  • VPC - PhotoDVD Compilation ...
  • VPC7 - Virtual Machine Package

-ADS BY GOOGLE

SearchCompliance

  • cyborg anthropologist

    A cyborg anthropologist is an individual who studies the interaction between humans and technology, observing how technology can ...

  • RegTech

    RegTech, or regulatory technology, is a term used to describe technology that is used to help streamline the process of ...

  • conduct risk

    Conduct risk is the prospect of financial loss to an organization that is caused by the actions of an organization's ...

SearchSecurity

  • application whitelisting

    Application whitelisting is the practice of identifying applications that have been deemed safe for execution and restricting all...

  • security

    Security, in information technology (IT), is the defense of digital information and IT assets against internal and external, ...

  • insider threat

    An insider threat is a malicious hacker (also called a cracker or a black hat) who is an employee or officer of a business, ...

SearchHealthIT

  • HIPAA Privacy Rule

    The Standards for Privacy of Individually Identifiable Health Information, commonly known as the HIPAA Privacy Rule, establishes ...

  • HIPAA business associate agreement (BAA)

    Under the U.S. Health Insurance Portability and Accountability Act of 1996, a HIPAA business associate agreement (BAA) is a ...

  • telemedicine

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

SearchDisasterRecovery

  • data recovery

    Data recovery restores data that has been lost, accidentally deleted, corrupted or made inaccessible. Learn how data recovery ...

  • disaster recovery plan (DRP)

    A company's disaster recovery policy is enhanced with a documented DR plan that formulates strategies, and outlines preparation ...

  • fault-tolerant

    Systems with integrated fault tolerance are designed to withstand multiple hardware failures to ensure continuous availability.

SearchStorage

  • data deduplication

    Deduplication retains one unique data instance to reduce storage and bandwidth consumed by remote backups, replication and ...

  • byte

    In most computer systems, a byte is a unit of data that is eight binary digits long. Bytes are often used to represent a ...

  • Secure Digital card (SD card)

    SD cards use flash memory to provide nonvolatile storage. They are more rugged than traditional storage media and are used in ...

SearchSolidStateStorage

  • flash file system

    Flash file systems are designed specifically for memory devices. A well-designed flash device and flash file system ensure ...

  • IOPS (input/output operations per second)

    IOPS measures the maximum number of reads and writes to non-contiguous storage. It is not an actual benchmark since vendor ...

  • eMMC (embedded MultiMediaCard)

    An embedded MultiMediaCard (eMMC) is a small storage device made up of NAND flash memory and a simple storage controller.

SearchCloudStorage

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

  • Zadara VPSA and ZIOS

    Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA ...

Close