throbber
I
`
`!
`
`_i
`
`-l
`
`|
`
`l
`i
`
`
`Page 1 of7
`
`Computer”
`1963thl)
`Encyclopedla
`
`
`
`Ninth Edition
`
`1
`
`Alan Freedman
`m\
`
`‘
`
`Osborne/ McGraw-Hill
`New York Chicago San Francisco
`Lisbon London Madrid Mexico City Milan
`New Delhi SanIuan Seoul Singapore Sydney Toronto
`
`VIRNETX EXHIBIT 2014
`
`Apple v. Virnetx
`Case |PR2013-00349
`
`
`
`

`

`
`
`Page 2 of 7
`
`Osborne / McGraw-Hill
`2600 Tenth Street
`
`Berkeley, California 94710
`U.S.A.
`
`mange bulk purchase discounts for sales promotions, premiums, or fund—raisers,
`{:5
`plea
`contact Osborne/McGraw-Hill at the above address. For information on
`é}
`gramsl tions or book distributors outside the U.S.A., please see the International
`3;"
`aontat t Information page at the end of this book.
`u
`..
`L»
`"'
`Computer Desktop Encyclopedia. Ninth Edition
`0 m[3,.
`3::
`“Ll-Copy ight© 2001 by The McGraw-I—lill Companies. All rights reserved. Printed in the
`it
`Unit- States of America. Except as permitted under the Copyright Act of 1976, no part
`//° of t
`is publication may be reproduced or distributed in any form or by any means, or
`5
`red in a database or retrieval system. without the prior written permission of the
`M publisher, with the exception that the program listings may be entered, stored, and
`executed in a computer systen'i, but they may not be reproduced for publication.
`
`
`
`1234567890 DOC DOC 901987654321
`
`Book p / n 0-07—219307-7 and CD p /n 0-07—219308-5
`parts of
`ISBN 0—07—219306-9
`
`Publisher
`Brandon A. Nordin
`Vice President 8: Associate Publisher
`Scott Rogers
`Editorial Director
`Roger Stewart
`Senior Project Editor
`Pamela Woolf
`
`Computer Designers
`Lauren McCarthy, Tabitha Cagan
`Illustrators
`Lyssa Wald, Michael Mueller
`Series Design
`Peter F. I-Iancik
`Cover Design
`Greg Scott
`
`Proofreaders
`Linda Medoff, Paul Medoff
`
`Cover Illustration
`John Bleck
`
`to Control Number
`
`
`
`3}
`“if,
`
`
`
`This book was composed with Corel VENTURATM Publisher.
`
`
`
`Information has. been obtained by Osborne]McBriiw-Hill from sources believed to be reliable. However, because of the
`possibility of human or mechanical error by om- sources, Osbm‘nc/McGraw-l-Iill, or others, Osborne/McGraw-Hill does not
`guarantee the accuracy, adequacy, or C(Jrl‘iplt’luni‘ffifi ol any information and is not responsible for any errors or omissions or
`
`the results olilaitieti from use of such inion mation.
`
`l
`\llllllllllll
`
`
`
`
`
`278111
`2001
`
`
`
`

`

`
`
`
`
`
`
`CLIENT PLATFORMS (CPU & 05)
`
`Windows 3.1. 95/98, NT
`and 2000
`DOS
`oslz
`Selene (UNIX)
`Interacllve UNIX
`$00 Open Desktop (UNIX)
`sco UnleaIe (UNIX)
`AIX ( UNIX)
`NoXTStep (UNIX)
`_. _.
`
`Mac OS
`NUX (UNIX)
`.
`,.
`‘
`
`Mac OS
`AIX (UNIX)
`
`
`
`Motorola
`saoxo
`
`PowarPc
`
`cHer
`deve
`An a;
`systei
`applil
`envirl
`systel
`build
`the m
`and l\
`langt
`busin
`and/
`tools.
`man)
`mane
`
`Syba:
`may
`Fl
`
`parts
`NT, 4
`softVI
`A
`Basic
`
`appli
`no ”t
`deve
`
`
`
`146
`
`client
`
`
`
`Page 3 of 7
`
`(1) A workstation or personal computer in a client/ server
`client
`environment. See client/server and fat client.
`(2) One end of the spectrum in a request/ supply relationship
`1'
`
`between programs. See X Window and OLE.
`
`
`
`An application running in a workstation or
`client application
`personal computer on a network. See also OLE.
`
`Refers to hardware or software that runs in the user’s
`cllent based
`machine (client). Contrast with server based.
`
`A user’s worksta tion that is attached to a network.
`client machine
`The term can also refer to a portable computer that is plugged into the
`network. See client and client/server.
`
`client program Software that runs in the user's PC or workstation.
`Contrast with server program, which resides in a server in the network.
`
`
`client/server An architecture in which the user’s PC (the client) is
`the requesting machine and the server is the supplying machine, both of
`which are connected via a local area network (LAN) or wide area network
`(WAN). Throughout the late 19805 and early 19905, client/server was
`the hot buzzword as applications were migrated from centralized
`Ininicomputers and mainframes to networks of personal computers.
`in client/server. the client processes the user interface Windows, Mac,
`etc.) and can perform some or all of the application processing. Servers range
`in capacity from high-end PCs to mainframes. A database server maintains
`the databases and processes requests from the client to extract data from or
`to update the database. An application server provides additional business
`processing for the clients. See t’ltcillxiicm’r development system.
`
`Because of the Internet, terms such
`Client/server Versus the Web
`as ”Web based” and ”Web enabled” have replaced the client/ server
`buzzword, yet the client/server architecture is conceptually the same.
`Users’ PCs are still clients, and there are tens of thousands of Web servers
`throughout the internet delivering Web pages. Nevertheless, client/
`server is mostly used In refer to “legacy," non-Web based systems.
`On the Wei), the client runs the browser and just like legacy client}
`server can perform little or it lot ofprecessing: simple displaying of
`HTML pages, more processing with embedded scripts or considerable
`processing with lava applets. A myriad of browser plug—ins provide all
`sorts of client processing.
`The server side of the Web is a multi—tier server architecture with
`interlinked Web servers, application servers, database servers and
`
`caching sewers. See application server.
`
`
`
`
`
`"“°' "‘“l
`HPIUX (UNIX)
`
`Digital UNIX
`OpanVMS
`Windows NT
`
`VMS
`Ullrix (UNIX)
`
` NP 9000
`
`
`Compaq
`Alpha
`
`DEG VAX
`
`(PA-Rlsc)
`
`Solaris (UNIX)
`
`AIX (UNIX)
`
`IRIX (UNIX)
`
`
`
`IBM RSISEDD
`
`SPARE-laiion
`
` Silicon Graphics
`
`(MIPS)
`
`
`
`
`Non ClientISorver
`
`
`
`Database
`1‘ [03.000
`.
`1" “£459qu
`Non-Client/Server
`Although there are clients and sewers in this
`scenario, this is not "true" client/server.
`because the server is nothing more than a
`remote disk drive. and the client does all the
`processing. Lengthy searches can bog down the
`network. because each client has to read the
`entire database. At 1,000 bytes per record,
`a database with 100,000 records sends
`100MB over the LAN.
`
`A person responsible for performing
`client/server analyst
`analysis and design of a client/server system. A knowledge of two—tier and
`three-tier ciient/ server architectures is required. See systems analyst and client/server.
`
`client/server architecture An environment in which the application processing is divided between client
`workstations and servers. It implies the use of desktop computers interacting with servers in a network, in contrast to
`processing everything in a large centralized mainframe. See client/server.
`
`
`
`Computer Desktop Encyclopedia
`
`
`
`
`

`

`
`626 Modula-3
`1
`.
`
`
`
`VAR FahrtREAL;
`BEGIN
`WriteString(“Enter Fahrenheit ");
`ReadRea1(Fahr)y
`WriteLn;
`Writestring(“Calaiua is ”)7
`WriteRea1((Fahr - 32)
`*
`5 / 9);
`END FahrToCent
`
`
`(MODUlar LAnguage-3) The successor to the Module-2 language. Developed by Digital and Olivetti, it
`ModuIa-3
`adds object-oriented extensions, automatic garbage collection and improved exception handling. It is considered an
`excellent teaching language.
`
`A hardware device that is designed for expansion and accepts a variety of plug—in modules of
`modular chassis
`different types. Network switches and routers are typically built with a modular chassis. See line card.
`
`A network hub that is configured by adding different modules, each supporting
`modular hub
`
`a topology, such as Ethernet, Token Ring, FDDI, etc. See hub.
`
`flmain
`
` M
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`: l
`5}
`_
`i
`
`'
`
`
`
`
`
`
`
`
`The characteristic of a system that has been divided into smaller subsystems which
`modularity
`interact with each other.
`
`Breaking down the design of a program into individual components
`I modular programming
`[modules] that can be programmed and tested independently. It is a requirement for effective
`development and maintenance of large programs and projects.
`Modular programming has evolved into object-oriented programming, which provides formal
`rules for developing self-contained software modules. See object—oriented programming.
`
`To vary a carrier wave. Modulation blends a data signal (text, vole-e, etc.) into a
`modulate
`carrier for transmission over a network. The most common methods are (1) amplitude modulation
`(AM), which modulates the height of the carrier wave, {2) frequency modulation (FM), which
`modulates the frequency of the wave, and (3) phase modulation (PM), which modulates the
`polarity of the wave. Contrast with rirmodulate. See carrier.
`
`A self—contained hardware or software component that interacts with a larger system.
`module
`Hardware modules are often made to plug into a main system. Program modules are designed to
`handle a specific task within a larger program. See memory ntodule, ROM crtrri, MGM and modular
`programming.
`
`modulo
`A mathematical operation (modulus arithmetic) in which the result is the remainder of
`
`the division. For example, 20 MOD 3 results in 2 (20/3 = 6 with a remainder of 2).
`
`(1) (Managed Object Format) An ASCII file that contains the formal definition of a CIM
`MOF
`schema. See CIM.
`(2} {Meta Object Facility) An object model from the Object Management Group (OMG) for
`defining metadata in a distributed CDRBA environment. Its four levels define the meta-meta
`modelr meta model. model and instance data. See CORBA and OMG.
`
`
`Pronounced ”mar—ray” and spelled ”moire." in computer graphics, a visible distortion.
`moire
`It results from a variety of conditions; for example, when scanning halftones at a resolution not
`consistent with the printed resolution or when superimposing curved patterns on one another.
`Internal monitor misalignment can also be a cause.
`
`MOLAP
`
`See OLAP.
`
`Illlllllllllllllg
`
`linillgl
`lllllllllli
`
` i‘Illlllllllllli
`
`Modular
`Programmlng
`Building a program
`in modules, or
`independent
`routines, is
`common practice.
`The module
`performs a
`function and then
`returns control
`back to the
`program or
`instruction that
`called It. Modular
`programming has
`evolved Into
`object-oriented
`programming.
`whlch provides
`stricter rules for
`developing
`self—contained
`routines.
`
`Computer Desktop Encyclopedia
`
`
`
`

`

`personal computer
`—\r——_———_—__——_——ukt
`
`751
`
`Page50f7
`
`
`
`
`
`
`
`
`
`
`(Practical Extraction Report Language) A programming language written by Larry Wall that combines syntax
`Perl
`from several UNIX utilities and languages. Introduced in 1987, Perl is designed to handle a variety of system
`administrator functions and provides comprehensive string handling functions. It is widely used to write Web server
`programs for such tasks as automatically updating user accounts and newsgroup postings, processing removal requests,
`
`synchronizing databases and generating reports. Perl has also been adapted to non-UNIX platforms. See also FURL.
`
`(1) A soft font that is kept in the printer’s memory until the printer is turned off.
`permanent font
`(2) Same as internal/but.
`
`permanent memory
`
`Same as non—volatile memory.
`
`One possible combination of items out of a larger set of items. For example, with the set of numbers
`permutation
`1, 2 and 3, there are six possible permutations: 12, 21, 13, 31, 23 and 32.
`
`perpendicular recording
`
`See vertical recording.
`
`per seat
`
`By workstation. See per seat licensing.
`
`Software licensing based on a per user basis. For example, a loo—user license means that up
`per seat licensing
`to 100 specifically-named users have access to the program. Per seat licensing is administered by providing user-level
`
`security to the directory containing the program. Contrast with concurrent licensing.
`
`(1) In a CRT, the time a phosphor dot remains illuminated after being energized. Long-persistence
`persistence
`phosphors reduce flicker, but generate ghost—like images that linger on screen for a fraction of a second.
`(2) In object technology, the storage of an object on a disk or other permanent storage device.
`
`Data that exists from session to session. Persistent data is stored in a database on disk or tape.
`persistent data
`Contrast with transient data.
`
`persistent link
`
`See hot link.
`
`persistent object An object that continues to exist after the program that created it has been unloaded. An
`object’s class and current state must be saved for use in subsequent sessions. In object technology, persistence means
`storing the object for later use.
`
`personal agent
`
`See agent.
`
`personal communicator
`
`See FDA.
`
`Synonymous with ”microcomputer,” ”desktop computer," and "laptop computer,” it is a
`personal computer
`computer that serves one user in the office or home. A complete personal computer system with printer can cost as
`little as $1,000 or as much as $8,000 or more. Size is based on memory and disk capacity. Speed is based on the CPU
`that runs it, and output quality is based on the type and resolution of its monitor and printer.
`
`The personal computer world is dominated by Windows—based PCs.
`Major Suppliers of Personal Computers
`There are thousands of vendors that make them, from mom and pop shops to huge companies such as Compaq, HP
`and IBM. The alternate personal computer standard is Apple’s Macintosh, which is only made by Apple. Atari and
`Commodore price carved out their respective niches, but Atari returned to its gaming roots and Commodore has since
`closed its doors.
`
`The industry began in 1977, when Apple, Radio Shack and Commodore
`The History of Personal Computers
`introduced the first off-the-shelf computers as consumer products. The first machines used an 8-bit microprocessor
`with a maximum of 64K of memory and floppy disks for storage. The Apple II, Atari 500, and Commodore 64 became
`popular home computers, and Apple was successful in companies after the VisiCalc spreadsheet was introduced.
`However, the business world was soon dominated by the 280 processor and CP/M operating system, used by
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Computer Desktop Encyclopedia
`
`
`
`

`

`
`
`
`lrepresents a quantity of 3-D data just as a pixel represents
`
`voxel
`(VOlume piXEL) A three—dimensional pixel. A voxe
`d medical applications that process 3-D images.
`ta. it is used in scientific an
`a point or cluster of points in 2-D da
`._____.—-
`tbeachcom) A manufacturer of sounrl cards and music
`Turtle Beach Systems. Voyetra was Founded
`each, inc ., Yonkers, NY, www.
`Technologies and
`(Voyetra Turtle 8
`Voyetra
`New York state. it introduced the Voyetra
`software that is a result of a late-1996 merger of Voyotra
`d repair facility in southern
`and music—related applications. Voyetra utilities are
`in 1975 as Octave Electronics. a synthesizer an
`0 software for MIDI sequencer
`synthesizer and later moved int
`-winning Multisound line of
`bundled with numerous smmd cards.
`in 1985 in York, PA, and became known for its award
`and are named after beaches from around the world
`Turtle beach was founded
`higlvenrt sound cards. its consumer brands are also popular
`such as. Malibu, Montego and Daytona.
`ex) An IBM mainframe multiprocessin
`
`
`
`
`
`
`
`
`g that uses several computers under tight
`
`(Virtual Processor Compl
`VPC
`central control.
`coniigtu'ed within a public network. For years, common
`lnetworks to the customer. but physically share
`VPN (Virtual Private Network) A private network that is
`ational or internationa
`ity of a private network via access control and encryption,
`carriers have built VPNS that appear as private n
`3 public networks. VPNs have
`backbone trunks with other customers. Vt‘Ns enjoy the secur
`lt—in management facilities of lore
`5 tremendous interest in VPNs over
`while taking advantage of the economies of scale and but
`hnologies. Today, therei
`at extra layer of security, and a huge
`been built over X25, Switched 56, frame relay and ATM tec
`hreat oI hacker attacks. The VPN adds th
`the internet, especially due to the constant t
`cc, PVC, security and transparent LAN service.
`growth in VPN use is expected. See lJP’l‘P, LZF, 1.2TP, 1P5
`,_.__—-———
`a1 processors that a physical processor is simulating.
`VP ratio
`(Virtual Processor ratio) The number of virtu
`VPS
`(Vectors Per Second) The measurement of the spe
`
`ed of a vector or array processor.
`
`VR
`
`See virtual reality.
`
`method that generates and tests a parity bit for each byte of
`
`VRAM See video RAM.
`VRC
`(Vertical Redundancy Check) An error checking
`data that is moved or transmitted.
`
`aphics language used on the Web. After downloading a
`be "walked into.” The VRML
`VRML
`(Virtual Reality Modeling Language) A 3-D gr
`and manipulated. Simulated rooms can
`VltMl. page, its contents can be viewed, rotated
`hics library was the basis for developing
`viewer is launched from within the Web browser.
`1, whose Open Inventor grap
`The first VRML viewer was WebSpace from 5G
`ws viewers, and Whurlwind and Voyager are Mac viewers.
`VRMI... WebFX, WorldView and Fountain are other Windo
`Wang introduced in 1977, which use virtual memory techniques.
`widely used in IBM mainframes.
`
`(1) (Virtual Storage) Same as virtual memory.
`VS
`(2) (Virtual Storage) A family of minicomputers from
`
`Access Method) An IBM access method for storing data,
`VSAM (Virtual Storage
`It uses the B+tree method for organizing data.
`mission that handles up to 56
`6 Terminal) A small earth station for satellite trans
`te (up to 1.544 Mbits/sec) are called ”TSATs.”
`(Very Small Aperture satellit
`VSAT
`s that handle the T1 data ra
`Kbits/sec of digital transmission. VSAT
`otoroi on the VME bus that allows high~speed transfer
`oor“ pr
`V53
`(1) (VME Subsystem Bus) An auxiliary “backd
`he 64-bit implementation arrived.
`cl developed by Zenith for cable modems and terrestrial
`between devices. it was faster than the main bus beiuret
`(2] (Vestigial SideBand) A digital modulation metho
`transmission for DTV. See S—VSB.
`
`
`
`
`
`VSE
`
`See DOS/VSE.
`
`Computer DesktOp Encyclopedia
`
`
`
`
`
`

`

`
`
`‘1;
`
`,
`
`Page7of7
`
`
`
`
`
`
`
`
`1080 workfunction
`
`bottom of the in basket. A ulomating workllow sets [intent that ensure that documents move along at a prescribed pace and
`that ll'te appropriate person processes them in the Correct order.
`integrating workflow into existing software applications may require extensive reprogramming, because although
`independent workflovv software can launch a whole application, a workilow system must be able to invoke individual
`routines within the application. As a result, vendors of application soflware have teamed up with workflow vendors to
`provide the appropriate interfaces antl/ or they have developed their own workflow capability. Workflow standards
`developed by the Workl'low Management Coalition {WPMC} are expected to provide interoperability between workflow
`software and the applicalions as well as between different workfiow systems.
`Workflow software is not the same as workgroup software, otherwise known as groupware. Workflow deals with
`the step-by-step processes, whereas workgroup systems are concerned with information sharing and threaded
`discussions among users.
`For an excellent book on the subject of workflow written by the guru in this field, read The Workflow Imperative by
`Thomas M. Koulopoulos, published by Van Nostrand Reinhold, ISBN 0-442—01975-0.
`
`
`work function
`
`
`The amount of photon energy required to cause an electron to be emitted from a material.
`
`Two or more hirlividuals that share files and databases. LANs designer! around workgroups provide
`W0 rkgroup
`electronic sharing of required data. In general, products designed for workgroups support up to St) people. whereas
`departmental devices support several hundred, and enterprise devices serve several thousand. See groupware and 'werigflow.
`
`
`W0rkgroup switch
`
`
`A network switch designed for LAN traffic within an enterprise. Contrast with carrier-class switch.
`
`
`
`working directory See current directory.
`
`The user interface in OS/2 introduced with Version 2.0. The Workplace Shell is extensible and
`Workplace Shell
`application developers can use Workplace Shell library functions when developing programs.
`
`
`Same as spreadsheet.
`worksheet
`
`
`worksheet compiler
`
`
`Same as spreadsheet compiler.
`
`('1) A high—performance, single-user computer used for grapl'ilcs. CAD, L'Ali, simulation and scientific
`workstation
`applications. it is typically a REC—based computer that runs under some variation of UNiX. The major vendors of
`workstations are Sun, HI", IBM, Compaq and SGI. High—end Pentium PCs increasmgly provide workstation performzmce.
`(2} A terminal or desktop computer in a network. in this context, workstation is just a generic term [or a user's
`machine (client machine). Contrast with server and host.
`(3) In the telecom industry, a combined telephone and computer.
`
`WorldCom (WorldCom. lnc., jacksen. MS, www.wcom.com) A major. international telecommunications carrier
`founded in 1983 as Long Distance Discount Service {LDDSL a reseller oi A'l‘&T WATS lines to small businesses. It grew
`by acquiring many small, and eventually, large long dislance and networking organizations, including {DI} WorldCom,
`a leading international carrier, WilTel, a major telecom carrier. and MFS Communications. an international phone
`company and recent parent of UUNET, a prominent Internet provider.
`in 1997, the network Operations of America Onlinc and CompuServe became part of WorldCom. It also merged
`with Brooks Fiber and then acquired MCI in 1993 to become the MCI WorldCom powerhouse. While WoririCom may
`have been a pretentious name for rather modest beginnings, it was very prophetic, because the MCI name was later
`
`dropped, leaving WorldCorn as the name of the company.
`
`.
`
`World Wide Walt What many have called the Web while waiting patiently for the next page to download. The
`World Wide Wait is caused by any combination of a slow modem, overloaded Web server at the site you are accessing
`or any clog in one of the routers or switches at a national, regional or local 151’. See Internet service provider.
`
`
`World Wide Web An Internet facility that links documents locally and remotely. The Web document, or Web
`age, contains text, graphics, animations and videos as well as hypertext links. The links in the page let users jump
`
`p
`
`
`
`
`
`i
`
`
`
` t
`
`.-
`
`.‘t'v
`
`_
`Computer Desktop Encyclopedia
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket