pemphokusani+softwarewords

in the software industry and their hardware developers. ||  ||   ||   ||   ||   ||   ||   || Read me file || These are files that contain information about other files in a directory or archive and are commonly distributed with computer software. ||  ||   ||   ||   ||   ||   ||   ||
 * || word || meaning ||  ||   ||   ||   ||   ||   ||   ||
 * cycle 6 || **//EULA //** || **E **//nd- //**U **//ser //**//L //**//icense //**A **//greement, // the type of license used for most software. An EULA is a legal contract between the manufacturer and/or the author and the end user of an aplication or software. ||  ||   ||   ||   ||   ||   ||   ||
 * || Volume license || Volume License Key is a term used by many computer software companies to denote the product key used when installing software licensed under volume licensing, which allows a single product key to be used for multiple installations. ||  ||   ||   ||   ||   ||   ||   ||
 * cycle 7 || BSA || Is a Trade organization that works with international governments to tackle major advancement goals
 * || <span style="font-family: 'Arial','sans-serif'; font-size: 19px;">Help system || <span style="font-family: 'Arial','sans-serif'; font-size: 13px;">it helps to embed useful interactive help //(documentation or use of other programs )// to your application on 100% pure Tcl/Tk ||  ||   ||   ||   ||   ||   ||   ||
 * || =hardware words.= ||  ||   ||   ||   ||   ||   ||   ||   ||
 * cycle 8 || yottabyte || is a unit of information or computer storage equal to one septillion bytes ||  ||   ||   ||   ||   ||   ||   ||
 * || zettabyte || is a unit of information or computer storage equal to one sextillion bytes ||  ||   ||   ||   ||   ||   ||   ||
 * || Manycore || computing devices have large numbers of processors (cores) on a single chip. ||  ||   ||   ||   ||   ||   ||   ||
 * cycle 9 || <span style="font-family: 'Calibri','sans-serif'; font-size: 15px;">Cloud computing || is the delivery of computing as a service rather than a product, whereby shared resources, software, and information are provided to computers and other devices as a utility (like the electricity grid) over a network (typically the Internet) ||  ||   ||   ||   ||   ||   ||   ||
 * || <span style="font-family: 'Calibri','sans-serif'; font-size: 15px;">CDD || <span style="font-family: 'Calibri','sans-serif'; font-size: 15px;">(Center for Digital Democracy)is a set of ideas advocating reforming the mass media, strengthening public service broadcasting, and developing and participating in alternative media and citizen journalism. The stated purpose for doing so is to create a mass media system that informs and empowers all members of society, and enhances democratic values. Media democracy entails that media should be used to promote democracy ||  ||   ||   ||   ||   ||   ||   ||
 * || =**networks**= ||  ||   ||   ||   ||   ||   ||   ||   ||
 * cycle 9 || <span style="font-family: 'Arial','sans-serif'; font-size: 13px;">Web Forums || <span style="font-family: 'Arial','sans-serif'; font-size: 13px;">- A **web forum**, or **message board**, is an online discussion site where people can hold conversations in the form of posted messages. They differ from chat rooms in that messages are at least temporarily archived. Also, depending on the access level of a user or the forum set-up, a posted message might need to be approved by a moderator before it becomes visible. ||  ||   ||   ||   ||   ||   ||   ||
 * || <span style="font-family: 'Arial','sans-serif'; font-size: 13px;">Multiple ISP Routers || This approach uses a specialized Link Load Balancer (or WAN Load Balancer) appliance between the firewall and the link routers. No special configuration is required in the ISP’s routers. It allows use of all links at the same time to increase the total available bandwidth. ||  ||   ||   ||   ||   ||   ||   ||
 * || <span style="font-family: 'Arial','sans-serif'; font-size: 13px;">Bit ra tes || In telecommunication and computing, ** bit rate ** is the number of bits that are conveyed or processed per unit of time. Normally bits per second. ||  ||   ||   ||   ||   ||   ||   ||
 * cycle10 || Remote access || Pertaining to communication with a data processing facility from a remote location or facility through a data link . One of the more common methods of providing this type of remote access is using a VPN . ||  ||   ||   ||   ||   ||   ||   ||
 * || Teleconferencing || A ** teleconference ** is the live exchange and mass articulation of information among several persons and machines remote from one another but linked by a telecommunication system . Things such as audio conferencing, telephone conferencing and phone conferencing, video conferencing and skype are forms of teleconferencing. ||  ||   ||   ||   ||   ||   ||   ||
 * || Online communication || The term "online communication" refers to reading, writing, and communication via networked computers or any device that enables one to surf the internet. it uses computers that are synchronized, these computers then communicate through numerous software that allow communication via chat or discussion software, with all participants at their computers or internet enabled devices at the same time ||  ||   ||   ||   ||   ||   ||   ||
 * cycle 11 || 3G || The next generation of mobile wireless technology, which promises high-bandwidth connections that will support true multimedia, including real-time video. ||  ||   ||   ||   ||   ||   ||   ||
 * || Mainframe || ., (computer science) the part of a computer (a microprocessor chip) that does most of the data processing ||  ||   ||   ||   ||   ||   ||   ||
 * || Micro segmentation || Specific individuals are identified by his geographic location, sociodemographic descriptors (age/income), or behavioral descriptors. Once target groups are identified, programmers develop services desired by people in group ||  ||   ||   ||   ||   ||   ||   ||
 * cycle 12 || Cyber terrorism || a hacker whose intention is the exploitation of a target computer or network to create a serious impact, such as the crippling of a communications network or the sabotage of a server using a virus, which may have an impact on millions of citizens if the terrorist's attack is successful. ||  ||   ||   ||   ||   ||   ||   ||
 * || <span style="font-family: 'Calibri','sans-serif'; font-size: 15px;">Grid Computing || An aggregation of geographically dispersed computing, storage, and network resources, coordinated to deliver improved performance, higher quality of service, better utilization, and easier access to data ||  ||   ||   ||   ||   ||   ||   ||
 * || <span style="font-family: 'Calibri','sans-serif'; font-size: 15px;">VPN || <span style="font-family: 'Calibri','sans-serif'; font-size: 15px;">A **virtual private network** (**VPN**) is a network that uses primarily public telecommunication infrastructure, such as the Internet, to provide remote offices or traveling users access to a central organizational network ||  ||   ||   ||   ||   ||   ||   ||
 * cycle 13 || <span style="font-family: 'Calibri','sans-serif'; font-size: 15px;">Zombie ||  ||   ||   ||   ||   ||   ||   ||   ||
 * || <span style="font-family: 'Calibri','sans-serif'; font-size: 15px;">Distributed processing || <span style="font-family: 'Calibri','sans-serif'; font-size: 15px;">A form of distributed computing where in which not files, but processing power is shared between networked computer ||  ||   ||   ||   ||   ||   ||   ||
 * || <span style="font-family: 'Calibri','sans-serif'; font-size: 15px;">Grid Computing || An aggregation of geographically dispersed computing, storage, and network resources, coordinated to deliver improved performance, higher quality of service, better utilization, and easier access to data ||  ||   ||   ||   ||   ||   ||   ||
 * || <span style="font-family: 'Calibri','sans-serif'; font-size: 15px;">VPN || <span style="font-family: 'Calibri','sans-serif'; font-size: 15px;">A **virtual private network** (**VPN**) is a network that uses primarily public telecommunication infrastructure, such as the Internet, to provide remote offices or traveling users access to a central organizational network ||  ||   ||   ||   ||   ||   ||   ||
 * cycle 13 || <span style="font-family: 'Calibri','sans-serif'; font-size: 15px;">Zombie ||  ||   ||   ||   ||   ||   ||   ||   ||
 * || <span style="font-family: 'Calibri','sans-serif'; font-size: 15px;">Distributed processing || <span style="font-family: 'Calibri','sans-serif'; font-size: 15px;">A form of distributed computing where in which not files, but processing power is shared between networked computer ||  ||   ||   ||   ||   ||   ||   ||