Browse Definitions :

Browse File Extensions by Alphabet

AMD - ANL

  • AMD - ASCET XML Model ...
  • AMD - ABBYY Finereader 5.0 Pro...
  • AMD - AMUSIC AdLib Tracker
  • AMD - ABBYY Finereader Pro file
  • AMD - Maxum chromatograph ...
  • AMD - Alphacam 3D Mill 2D Mill...
  • AME - ACT! E- mail System ...
  • AME - ACT! Email System Library
  • AMF - DSMIA/Asylum module ...
  • AMF - Music file (Advanced ...
  • AMFF - Amiga Metafile ( Amiga )
  • AMFF - 2D Graphic
  • AMFM - Adobe Multiple Font ...
  • AMG - AMGC Compressed Archive ...
  • AMG - ACTOR System image
  • AMI - Annotation file (...
  • AMIGA - Amiga file
  • AMIGA - Amiga ( Amiga )
  • AMIPRO - Ami/ AMIPRO Table ...
  • AML - Morpheus layout - ...
  • AML - Mio Technology ...
  • AML - AutomationML - ...
  • AML - Morpheus Photo Morpher ...
  • AML - AutoMage
  • AMM - AMM
  • AMM - Adaptive Message Macro ...
  • AMM - Alphacam 3D Mill 2D Mill...
  • AMM - Abbyy file
  • AMM - Orchida Knitting System ...
  • AMM - All My Movies Movie ...
  • AMO - AIM AOL Instant ...
  • AMODEL - ActiveModeler ...
  • AMODEL - ActiveModeler project ...
  • AMOS - AMOS basic code file
  • AMP - Photoshop Arbitrary Map ...
  • AMP - Connectivity Memory ...
  • AMP - Alphacam 3D Mill 2D Mill...
  • AMP - Adobe Photoshop ...
  • AMP - RMCProfile file
  • AMP - & &
  • AMP - PlayMedia AMP MP3 Audio ...
  • AMR - Adaptive Multi-Rate ...
  • AMS - Velvet Studio music ...
  • AMS - Extreme's Tracker Module
  • AMSORM - OnLine Ringman file
  • AMSORM - OnLine Ringman Auction ...
  • AMT - ArtMoney Table ( ...
  • AMT - Alphacam 3D Mill 2D Mill...
  • AMT - AVSnap project file
  • AMT - Abbyy Finereader 5.0 Pro...
  • AMT - ABBYY Finereader 5.0 Pro...
  • AMT - ArtMoney Table File ...
  • AMU - Sony Photo Album
  • AMV - AMV video file format
  • AMV - MTV Movie Header
  • AMV - Audio - Video media file
  • AMW - Alcorn McBride show ...
  • AMW - AMOS Data
  • AMX - Small Computer Language ...
  • AMX - MetaMOD Half - Life Plug...
  • AMX - Admin Mod plug -in file
  • AMX - AliahTHINK ! extended ...
  • AMX - After Effects Motion ...
  • AMX - AMOS Line Editor ...
  • AMX - Bruker file
  • AMX - Adobe motion exchange ...
  • AMXX - AMX Mod X Plugin File
  • AMXX - AMX Mod X Plug -in (AMX ...
  • AMXX - AMX Mod X plugin Header
  • AMZ - Amazon MP3 Downloader ...
  • AMZ - Amazon MP3 Downloader
  • AMZ - The Game of the Amazons ...
  • AN - Groundworks text file
  • AN - Text file (Sterling ...
  • AN1 - Street Atlas Draw File
  • AN1 - DeLorme Street Atlas ...
  • AN1 - WWG DA-30 Capture File
  • AN2 - Croc Legend of the ...
  • AN8 - Anim8or File
  • AN8 - Anim8or 3D Animation
  • ANA - Analysis for Windows ...
  • ANA - Analysis for Windows
  • ANAT - XNBC V8 Biological ...
  • ANB - Analyst 's Notebook ...
  • ANB - i2 Analyst 's Notebook ...
  • ANC - Canon Computer Pattern ...
  • AND - Collins Electronic ...
  • AND - AniData : Animation
  • ANF - ANSYS DesignModeler file...
  • ANF - AcuteNotes
  • ANG - AIMSUN NG Network (TSS- ...
  • ANG - AIMSUN NG related file
  • ANHA - Analog Helper Analysis
  • ANI - Microsoft Windows ...
  • ANIM - Animation
  • ANIM - Amiga Animation file
  • ANIM - Unknown Apple II File
  • ANIM - Homeworld file
  • ANISO - Chemical crystallography...
  • ANKI - Anki Deck File ( Damien ...

-ADS BY GOOGLE

SearchCompliance

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

SearchSecurity

  • buffer underflow

    Buffer underflow, also known as buffer underrun or buffer underwrite, is a threat to data that typically occurs when the ...

  • digital signature

    A digital signature is a mathematical technique used to validate the authenticity and integrity of a message, software or digital...

  • denial-of-service attack

    A denial-of-service attack is a security event that occurs when an attacker prevents legitimate users from accessing specific ...

SearchHealthIT

SearchDisasterRecovery

  • virtual disaster recovery

    Virtual disaster recovery is a type of DR that typically involves replication and allows a user to fail over to virtualized ...

  • tabletop exercise (TTX)

    A tabletop exercise (TTX) is a disaster preparedness activity that takes participants through the process of dealing with a ...

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a data center.

SearchStorage

  • secondary storage

    Secondary storage is storage for noncritical data that does not need to be frequently accessed.

  • Pure Storage

    Pure Storage is a provider of enterprise data flash storage solutions designed to substitute for electromechanical disk arrays.

  • yobibyte (YiB)

    A yobibyte (YiB) is a unit of measure used to describe data capacity as part of the binary system of measuring computing and ...

Close