throbber

`
`Gamputar
`0
`Desktop
`Emcyclwpedm
`
`
`
`
`
`
`
`Ninth Edition
`
`Alan Freedman
`\\
`
`Osborne/ McGraw-Hill
`
`New York Chicago San Francisco
`Lisbon London Madrid MexicoC'ny Milan
`New Delhi SanJuan Seoul Singapore Sydney Toronto
`
`
`
`Page 1 of 9
`
`VIRNETX EXHIBIT 2027
`Microsoft v. VirnetX
`Trial |PR2014-00610
`
`Page 1 of 9
`
`
`
`
`
`VIRNETX EXHIBIT 2027
`Microsoft v. VirnetX
`Trial IPR2014-00610
`
`

`

`
`
`Osborne / McGraw-I-lill
`2600 Tenth Street
`
`Berkeley, California 94710
`U.S.A.
`
`i Mange bulk purchase discounts for sales promotions, premiums, or fund—raisers,
`his
`plea ~ contact Osborne/McGraw-Hill at the above address. For information on
`ok distributors outside the U.S.A., please see the International
`g aransl tions or be
`Etonta t Information page at the end of this book.
`r:N
`Computer Desktop Encyclopedia, Ninth Edltion
`
`o.
`{AA-Copy ight © 2001 by "the McGraw-Hill Companies. All rights reserved. Printed in the
`Unit
`States of America. Except as permitted under the Copyright Act of 1976, no part
`of t
`15 publication may be reproduced or distributed in any form or by any means, or
`5
`red in a database or retrieval system, without the prior written permission of the
`" publisher, with the exception that the program listings may be entered, stored, and
`executed in a computer system, but they may not be reproduced for publication.
`
`a0
`
`1234567890 DOC DOC 901987654321
`
`Book p /n 0-07-219307-7 and CD p/n 0—07-219308—5
`parts of
`ISBN 0-07-219306-9
`
`Publisher
`Brandon A. Nordin
`
`Computer Designers
`Lauren McCarthy, Tabitha Cagan
`
`Vice President &-. Associate Publisher
`Scott Rogers
`Editorial Director
`Roger Stewart
`Senior Project Editor
`Pamela Woolf
`
`Illustrators
`Lyssa Wald, Michael Mueller
`Series Design
`Peter F. Hancik
`Cover Design
`Greg Scott
`
`Proofreaders
`Linda Medoff, Paul Medoff
`
`Cover Illustration
`John Bleck
`
`LC Control Number
`
`This book was composed with Corel VENTURA"M Publisher.
`
`Information has been obtnined by
`Osbome/MrGraw-Hill from sources believed lobe rella
`or by our sources, Osborne/McGraw-HilL 0:— others.
`possibility of human or mechanical err
`ompleteness of any information and la not respmsiblc for a
`guarantee the auruncy, adequacy, or c
`the results obtained lrum use of such information,
`
`llllllllllllllllll
`
`2'] 811
`2001
`ble. However, because of the
`(‘lsborne/McCraw—Hill does not
`ny errors or umissmns or
`
`Page 2 of 9
`
`Page 2 of 9
`
`

`

`
`
` CLIENT PLATFORMS (CPU 5 OS)
`
`when»: 31.95/98, NT
`Mac OS
`Mac 05
`and 2000
`NUX (UMX) NX (WIX)
`005
`
`not:
`Solidi (UNIX)
`lnluwhlo UNIX
`500 Open Oakley (UNIX)
`sine-1W
`NuXISton {Wm
`
`mp?“
`
`Pentium:
`
`-
`
`
`
`
`
`E”ARC-inlet!
`
`146
`
`client
`
`
`
`
`
`(1) A workstation or personal computer in a client/sewer
`client
`environment. See client/server and [at client.
`(2) One end of the spectrum in a request/ supply relationship
`1
`between programs. See X Window and OLE.
`
`An application running in a workstation or
`client application
`
`personal computer on a network. See also OLE.
`
`Refers to hardware or software that runs in the user's
`client based
`machine (client). Contrast with server based.
`
`A user’s workstation that is attached to a network.
`client machine
`'lhe term can also refer to a portable computer that is plugged into the
`network. See client and client/server.
`
`client program Software that runs in the user’s PC or workstation.
`Contrast with server program, which resides in a server in the network.
`
`
`An architecture in which the user’s PC (the client) is
`client/server
`the requesting machine and the server is the supplying machine, both of
`which are connected via a local area network (LAN) or wide area network
`(WAN). Throughout the late 19805 and early 19905, client/server was
`the hot buzzword as applications were migrated from centralized
`minicomputers and mainframes to networks of personal computers.
`in dient/server, the client processes the user interface (Windows, Mac,
`etc.) and can perform some oral] of the application processing. Servers range
`in capacity from high-end PCs to mainframes A database server maintains
`the databases and processes rcquwts from the client to attract data from or
`to update the database. An npplioition server provides additional business
`processing for the clients. See client/server development system.
`Client/sewer Versus the Web
`Because of the Internet, terms such
`as "Web based” and "Web enabled” have replaced the client/server
`buzzword, yet the client/server architecmre is conceptually the same.
`Users' PCs are still clients, and there are tens of thousands of Web servers
`throughout the lntemet delivering Web pages. Nevertheless, clicnt/
`server is mostly used to refer to "legacy," non-Web based systems.
`On the Web, the client runs the browser and just like legacy client/
`server can perform little or a lot of processing: simple displaying of
`HTML pages, more processing with embedded scripts or considerable
`processing with Java applets. A myriad of browser plug-ins provide all
`sorts of client processing.
`The server side of the Web is a multi-tier server architecture with
`interlinked Web servers, application servers, database sewers and
`
`caching servers. See application server,
`
`I
`
`’
`
`i
`
`'
`
`"
`
`
`
`3M
`
`M" 0""
`Heiux (LNIX)
`
`Digit-I umx
`OMVMS
`Windows NI
`
`vvts
`um (umxi
`
`HP 0000
`(VA-wise)
`Solltls(UNl>i)
`
`c
`XEEF
`AIX (W)
`
`v
`"9 ax
`iRIX (UNIX)
`
`
`
`
`
`Silicon Gnuhla
`IBM RMBW
`(MIP8)
`
`
`Non Cllonlisinvev
`
`Database
`100.900
`
`SM 150.1!!!)77
`
`Non-Client/Servor
`Although there are clients and servers in this
`scenario. this Is not “true" client/sewer,
`because the sewer is nothing more than a
`remote disk drive. and the client does all the
`processing. Lengthy searches can bog down the
`network, because each client has to read the
`entire database. At 1,000 bytes per record.
`a database wulh 100,000 records sends
`100MB over the LAN.
`
`A person responsible for performing
`client/server analyst
`analysis and design of a client/server system. A knowledge of two-tier and
`three tier client/server architectures is required. See systems analyst and client/server.
`_______._————-
`An environment in which the application processing is divided between client
`client/sewer architecture
`workstations and servers. it implies the use of desktop COmputerS interacting with sewers in a network, in contrast to
`processing everything in a large centralized mainframe. See client/sewer.
`
`Cnnpnter Desktop Encyclopedia
`
`Page 3 of 9
`
` clier
`
`deve
`Art at
`systet
`appli.
`enviri
`systei
`build
`the m
`and l\
`langi.
`busin
`and/
`tools.
`man)
`man:
`
`Syba:
`may
`F1
`parts
`NT, (
`softu
`A
`Bask
`appli
`no “t
`dcvn
`
`clie
`appl
`cite
`used
`
`clie
`suPi
`and
`
`Page 3 of 9
`
`

`

`PC
`
`735
`
`
`
`PATROL An application management suite from BMC that uses agents to report on software activities on all the
`servers within the enterprise. Using the information in ”knowledge modules” (KMs) about each system component,
`agents detect events, collect information and notify system and network administrators to take corrective action.
`
`PAX (1) (Private Automatic Exchange) An inhouse intercom system.
`(2) (Parallel Architecture Extended) A parallel processing environment standard based on Intel’s i860 RISC Chip,
`UNIX System V and Alliant Computer’s parallel and 3—D graphics technologies.
`The data-carrying capacity of some structure. It typically refers to a part of a packet or frame in a
`payload
`communications system that holds the message data in contrast to the headers, which are considered overhead.
`
`
`
`payment service
`
`See Web payment service.
`
`payware
`
`Software distributed for money. Contrast withfreeware.
`
`PB See PowerBuilder.
`
`PBX
`(Private Branch eXchange) An inhouse telephone switching
`system that interconnects telephone extensions to each other, as well as
`to the outside telephone network. It may include functions such as least
`cost routing for outside calls, call forwarding, conference calling and call
`accounting. Modern PBXs use all-digital methods for switching and may
`support both digital terminals and telephones along with analog
`telephones. See WPBX.
`
`.“nm'.
`’mm
`
`t
`
`An Early PBX
`This PBX began operation in Bangor, Maine in
`1883. (Image courtesy of AT&T.)
`
`
`
`
`
`
`Computer Desktop Encyclopedia
`
`Page 4 of 9
`
`Multlmadla
`Controller
`(sound, game)
`
`Internal
`Modem
`
`"0 Controller
`
`
`(hard dlsk,
`floppy, sellal,
`parallel)
`
`
`
`
`Motherboard
`CPU
`
`
`What’s lnslde a PC?
`
`PC (5) (Printed Circuit) See printed circuit board.
`(2) (Personal Computer) Any laptop or desktop
`computer such as Windows machine or a Macintosh.
`(1) (Personal Computer) A stand-alone laptop or
`desktop computer running Windows (or DOS for earlier
`applications). PC hardware and operating systems are
`primarily governed by Intel and Microsoft respectively.
`The PC is the world’s largest computer base.
`PCs are also widely used as clients and servers in a local
`area network (LAN). PC clients predominantly run under
`Windows, but PC servers (x86-based servers) run under
`Windows, NetWare or a variation of UNIX such as Linux
`or UnixWare. PC servers may use Windows 95/98, but:
`Windows NT and 2000 are more likely choices.
`Although there are literally thousands of PC vendors,
`from mom and pop shops to large mail order houses (Dell,
`Gateway, etc.) to the major computer companies (Compaq,
`HP, etc), and of course IBM, still one of the world’s largest
`PC makers, all PCs use an Intel x86 or compatible CPU.
`After IBM introduced the PC in 1981, the first attempts at
`cloning it were mostly unsuccessful. Except for Compaq’s first
`PC, from 1982 to 1985, there were a lot of ”almost compatible” PCs. However, as soon as the part of the operating system
`known as the BIOS was successfully cloned and made Commercially available, true compatibles appeared in abundance.
`Before Windows 95, adding another peripheral device to a PC was often an exercise in trial and error. Modifying
`DOS’s infamous configuration files (AUTOEXECBAT and CONFIGSYS) caused many a user to give up. Windows 95,
`rt, you can replace hard disks and display adapters, as
`98 and 2000 added Plug and Play, which means for the most pa
`well as acid a scanner, CD-ROM or other device without difficulty.
`The PC has become a commodity item, winding its way onto the shelves of retail outlets worldwide. This is a
`testimonial to the power of a computer standard, even one fraught with loopholes and inconsistencies.
`
`Page 4 of 9
`
`

`

`751
`
`(Practical Extraction Report Language) A programming language written by Larry Wall that combines syntax
`Perl
`from several UNIX utilities and languages. Introduced in 1987, Perl is designed to handle a variety of system
`administrator functions and provides comprehensive string handling functions. it is widely used to write Wet: server
`programs for such tasks as automatically updating user accounts and newsgroup postings, processing removal rmuests,
`synchronizing databases and generating reports. Peri has also been adapted to non-UNIX platforms. See also PURL.
`
`(1) A soil font that is kept in the printer’s memory until the printer is turned off.
`permanent font
`(2) Same as internal font.
`
`permanent memory
`
`Same as non-volatile memory.
`
`One possible combination of items out of a larger set of items. For example, with the set of numbers
`permutation
`
`1, 2 and 3, there are six possible permutations: 12, 21, 13, 31, 23 and 32.
`
`perpendicular recording
`
`See vertical recording.
`
`
`
`per seat By workstation. See per seat licensing.
`
`Software licensing based on a per user basis. For example, a 100-user license means that up
`per seat licensing
`to 100 specificallyflamed users have access to the program. Per seat licensing is administered by providing user-level
`security to the directory containing the program. Contrast with concurrent licensing.
`
`(1) in a CRT, the time a phosphor dot remains illuminated after being energized. Long-persistence
`persistence
`phosphors reduce flicker, but generate ghost-like images that linger on screen for a fraction of a second.
`
`(2) in object technology, the storage of an object on a disk or other permanent storage device.
`
`Data that exists from session to session. Persistent data is stored in a database on disk or tape.
`persistent data
`Contrast with transient data.
`
`
`
`perslstent link See hot link.
`
`An object that continues to exist after the program that created it has been unloaded. An
`persistent ODJBCt
`object’s class and current state must be saved for use in subsequent sessions. In object technology, persistence means
`storing the object for later use.
`
`
`
`personal agent See agent.
`
`personal communicator
`
`See FDA.
`
` personal computer
`
`Synonymous with "microcomputer,” ”desktop computer,” and "laptop computer," it is a
`personal computer
`computer that serves one user in the office or home. A complete personal computer system with printer can cost as
`little as $1,000 or as much as $8,000 or more. Size is based on memory and disk capacity. Speed is based on the CPU
`that runs it, and output quality is based on the type and resolution of its monitor and printer.
`Major Suppliers of Personal Computers
`The personal computer world is dominated by Windows-based PCs.
`There are thousands of vendors that make them, from mom and pop shops to huge companies such as Compaq, HP
`and IBM. The alternate personal computer standard is Apple’s Macintosh, which is only made by Apple. Atari and
`Commodore once carved out their respective niches, but Atari returned to its gaming roots and Commodore has since
`closed its dodrs.
`
`
`
`
`The industry began in 1977, when Apple, Radio Shack and Commodore
`The History of Personal Computers
`introduced the first off-thc-shelf computers as consumer products. The first machines used an 8—bit microprocessor
`with a maximum of (24K of memory and floppy disls for storage. The Apple ii, Atari 500, and Commodore 64 became
`popular home computers, and Apple: was successful in companies after the VisiCalc spreadsheet was introduced.
`However, the business world was soon dominated by the Z80 processor and CP/ M opera ting system, used by
`
`Computer Desktop Encyclopedia
`
`Page 5 of 9
`
`_
`:i
`
`.i
`'
`
`.
`
`l
`i
`
`'
`
`;
`
`ll:
`i'
`'
`
`l
`
`‘.
`
`'r
`
`'
`~
`,
`'
`
`‘
`.
`
`‘
`
`.
`
`Page 5 of 9
`
`

`

`protocol stack
`
`c0m1
`PC“
`3&3
`so“)
`2000
`with
`pom
`MIF
`the (
`j
`p5)
`PS;oru
`lBIV
`firm
`[35
`PS
`,.
`P5
`.—PS
`
`_..
`PS
`gr?
`TH
`be
`ear
`bit
`I;thl
`
`804
`
`gned
`
`protocol stack The hierarchy of protocols used in a communications network. Network architectures desi
`in layers, such as TCP/1P, OSI and SNA, are referred to as stacks. See 05].
`
`
`Same as protocol stack.
`protocol suite
`(1) Creating a demo of a new system. Prototyping is essential for clarifying information requirement
`prototyping
`The design of a system (functional specs) must be finalized before the system can be built. While analytically-OrientedS‘
`people may have a clear picture of requirements, others may not.
`Using fourth—generation languages, systems analysts and users can develop the new system together. Databases Can
`be created and manipulated while the user monitors the progress. Once users see tangible output on screen or Paper,
`they can figure out what's missing or what the next question might be if this were a production system. If prototyping
`is carefully done, the end result can be a working system.
`Even if the final system is reprogrammed in other languages for standardization or machine efficiency, prototyping
`has served to provide specifications for a working system rather than a theoretical one.
`(2) Seefunction prototyping.
`
`provrswned
`Set up for a particular type of telecommunications service. See proviswnmg.
`
`provisioning
`Setting up a telecommunications service for a particular customer. Common carriers provision
`circuits by programming their computers to switch customer lines into the appropriate networks.
`
`proxy
`See proxy server.
`
`proxy cache
`A facility in a proxy server that caches incoming Web pages on the hard disk. If the next page
`requested by a browser is already in the proxy cache, the page is retrieved locally instead of from the Internet. With
`proxy caches, the browsers must be configured to use the proxy server. See proxy server, reverse proxy cache, transparent
`cache and Web cache.
`‘
`
`
`proxy server Also called a ”proxy” or ”application level gateway," it is an application that breaks the connection
`between sender and receiver. All input is forwarded out a different port, closing a straight path between two networks
`and preventing a hacker from obtaining internal addresses and details of a private network.
`Proxy servers are available for common Internet services; for example, an HTTP proxy is used for Web access, and
`an SMTP proxy is used for e—mail. Proxies generally employ network address translation (NAT), which presents one
`organization~wide IP address to the Internet. It funnels all user requests to the Internet and fans responses back out to
`the appropriate users. Proxies may also cache Web pages, so that the next request can be obtained locally. Proxies are
`only one tool that can be used to build a firewall. See LAN,firewall, proxy cache and SOCKS server.
`
`
`r.
`
`5“ I
`'
`

`
`;
`5
`
`.
`
`5
`
`g
`
`-
`
`PR/SM (Processor Resource/Systems Manager) Hardware circuits and microcode built into IBM System/390
`mainframes that support logical partitions (LPARs). LPARs allow the running of multiple system images on a single
`processor complex. Each such image has a full complement of CPUs (dedicated or shared), central storage, expanded
`storage and channels. ESCON and FICON channels may be shared across images using the MIF feature. Pronounced
`"prism,” PR/SM was derived from VM, the IBM operating system that provides multiple system images in software.
`See LPAR, MIF and VM.
`
`PRT SC
`See print screen.
`ps
`(1) (PicoSecond) See space/time.
`(2) (PS—~Personal Services) IBM office automation software for PCs, minis and mainframes, which includes word
`processing, electronic mail and library services.
`(3) (PostScript) See PostScript.
`
`PS/1 An early IBM home computer series introduced in 1990. The original models featured an integrated monitor
`and easy-to~open case. The first I’S/l was a 286 with an ISA bus. See PC.
`
`.
`
`'
`
`P‘
`'
`“-
`p:tr
`.._
`p
`‘
`FP
`2
`
`Computer Desktop Encyclopedia
`
`
`
`Page 6 of 9
`
`Page 6 of 9
`
`

`

`994
`
`TSOP
`
`(Thin Small Outline Package) A very~thin, plastic, rectangular surface mount chip package with gull—wing
`TSOP
`
`pins on its two short sides. TSOPs are about a third as thick as SO] chips. See gullewing lead, SOP, SO] and chip package.
`T-span
`A 24—channel group, which makes up one T1 line. See T1.
`
`TSR (Terminate and Stay Resident) Refers to a program that remains in memory when the user exits it in order
`that it be immediately available at the press of a hotkey. TSRs were popular under DOS to quickly pop up a calendar,
`calculator or other utility, because DOS did not have built-in task switching. Standards for writing TSRs were not
`codified early on, and TSRs often conflicted with each other and regular applications. After Windows 3.0, TSRs became
`
`moot, since any DOS or Windows application could be conveniently task switched in a separate window.
`T55
`See ITU.
`.._...._.
`(Tree and Tabular Combined Notation) A programming language endorsed by 150 that is used torwrite test
`TTCN
`suites for telecommunications systems. TTCN is used for "black box testing,” which means that all interaction to the
`system is via messages, rather than by a user with a mouse. Test suites are built in a hierarchical and modular manner,
`allowing many programmers to be involved in the project. Numerous telecom vendors use TTCN for their products, and
`
`organizations such as the EU, ATM Forum and ETSI, provide TTCN conformancetests for new standards.
`TTFN
`Digispeak for goodbye (”ta ta for now”).
`m
`TT font
`See TrueType.
`
`(1) (Transistor Transistor Logic) A digital circuit composed of bipolar transistors wired in a certain manner.
`TTL
`TTL logic has been widely used since the early days of digital circuitry. TTL designations may appear on input or
`' output ports of various devices, which indicates a digital circuit in contrast to an analog circuit.
`(2) (Time To Live) A set maximum amount of time a packet is allowed to propagate through the network before it
`is discarded.
`(3) (Through The Lens) Refers to a single-lens reflex camera that lets the photographer View the scene through the
`
`same lens that captures the image.
`T.TUD See T120.
`_____._...__.__
`(TeleTYpewriter protocol) A low-speed asynchronous communications protocol with limited or no
`TTY protocol
`
`error checking. See teletypewriter.
`
`tube
`
`See CRT and vacuum tube.
`
`;
`
`...‘
`
`_
`.
`
`i
`
`1
`
`.
`I
`
`f
`
`.
`
`i
`"
`,
`:
`l
`,i
`3
`E
`
`1
`l
`
`..
`:
`
`'
`
`3
`
`
`
`A laser that can change its frequency over a given range. In time, tunable lasers are expected to be
`tunable laser
`capable of switching frequencies on a packet-by-packet basis.
`
`tuner An electronic part of a radio or TV that locks on to a selected carrier frequency (station, channel) and filters
`out the audio and video signals for amplification and display.
`W
`Transmitting data structured in one protocol format within the format of another protocoi.Tunneling
`tunneling
`
`allows other types of transmission streams to be carried within the prevailing protocol. See lP tunneling and L2TP.
`
`
`
`.
`
`tuple
`
`In relational database management, a record, or row. See relational database.
`
`A C compiler from Borland used to create a wide variety of commercial products. It is known for its
`Turbo C
`well-designed debugger. Borland's object-oriented versions of C are Turbo C++ and Borland C++.
`The DOS version of this database is written in Turbo C. The Windows version is written in Microsoft C.
`
`A type of Channel coding that uses a convolutional code and a type of Viterbi decoder that outputs a
`turbo code
`continuous value rather than a O or 1. See convolutional code and Viterbi decoder.
`
`Computer Desktop Encyclopedia
`
`
`
`
`
`,
`
`3
`Ct
`
`T
`3‘
`3
`t}
`l
`T
`if
`Ir
`——
`13
`at
`hi
`a1
`T
`|
`C1
`
`tl
`b(
`-
`u
`A»
`-
`2
`”1
`0|.
`—-
`TI
`
`T‘
`ar
`
`W‘
`vi.di
`
`.._
`Tl
`N
`._.
`Tl
`
`Tl
`
`Tl
`su
`im
`
`tVl
`pe
`
`
`
`Page 7 of 9
`
`Page 7 of 9
`
`

`

`
`
`
`
`
`
`t
`
`I
`
`'.
`
`
`
`i
`\
`‘
`
`,
`
`,
`
`‘
`
`.
`'3
`i,
`" '
`f
`
`
`
`‘ ‘l
`
`1044
`
`total
`
`
`
`voxel
`
`resents a quantity of 3-D data just as a pixel represents
`(VOlume piXEL) A three-dimensional pixel. A voxel rep dical applications that process 3-D images.
`s in 2—D data. it is used in scientific and me
`a point or cluster of point
`s, NY,www.tbeach.com) A manufacturer of sound cards and music
`Turtle Beach Systems. Voyetra was founded
`Voyotra
`(Voyetra Turtle Beach, lnc., Yonker
`software that is a result of a Iatevl996 merger of Voyetra Technologies and
`New York state. it introduced the Voyet‘ra
`in 1975 as Octave Electronics, at synthesizer and repair facility in southern
`related applications. Voyetra utilities art,-
`synthesizer and later moved into software for MlDl sequencer and music-
`Turtle Beach was founded in 1985 in York, PA,and became known for its award-winning Multisound line of
`bundled with numerous sound cards.
`high-endsoundcards. itsconsumerbrands arealsopopularandare namedafterbeaches fromaround theworld
`rame multiprocessing that uses several computers under tight
`
`such as Malibu, Montego and Daytona.
`VPC (Virtual Processor Complex) An IBM main!
`central control.
`work that is configured within a public network. For years, common
`carriers havebuilt VPNs that appear asprivate national or internationalnetworks to the customer,but physically share
`VPN (Virtual Private Network) A private net
`backbonetrunks with otherCustomers.Vi’Nsenjoy the security of aprivatenetwork via access control and encryption,
`whiletakingadvantageof theeconomiesofscaleandbuilt-in managementfacilities oflargepublicnetworks.VPNshave
`been built over X25,Switched 56, frame relayand ATM tecluiologiei.Today, there is tremendous interest inVl’Ns over
`theInternet,especiallydue totheconstantthreat ofhackerattacks.TheVPN adds thatextralayerofsecurity,and ahuge
`growth inVPN useisexpected.See Pl‘TP,L2F, LZTP, lPsec,PVC,securityand transparent LANservice.
`
`VP ratio
`(Virtual Processor ratio) The number of virtual processors that a physic
`VPS
`(Vectors Per Second) The measurement of the speed of a vector or array processor.
`VR
`See virtual reality.
`_—
`
`at processor is simulating.
`
`VA‘IH’I
`
`
`
`1|
`'
`I
`
`t
`

`
`=
`
`.
`
`.
`
`I
`1
`
`.
`1
`
`;
`
`‘
`
`|
`
`l
`
`.‘
`'
`
`-
`
`',
`
`,
`
`method that generates and tests a parity bit for each byte of
`
`VRAM Sac video RAM.
`VRC
`(Vertical Redundancy Check) An error checking
`
`data that is moved or transmitted.
`uage used on the Web. After downloading a
`VRML
`(Virtual Reality Modeling Language) A 3-D graphics lang ulated rooms can be "walked into." The VRML
`.
`VRMLpage,itscontentscanbeviewed,rotatedandmanipulated.Sim
`WebSp-acefromSGi,whoseOpeninventorgraphicslibrarywasthebasisfordeveloping
`(2)(VirtualStorage) AfamilyofminicomputersfromWangintroducedin1977,whichusevirtualmemorytechniques.
`VSAM (VirtualStorageAccessMethod) AnIBMaccessmethodforstoringdata,widelyusedinIBMmainframes.
`
`viewer is launched from within the Web browser.
`The first VRML viewer was
`her Windows viewers, and Whurlw‘md an
`VRML. Webl‘X, WorldView and Fountain are at
`
`d Voyager are Mac viewers.
`
`VS
`
`(1) (Virtual Storage) Same as virtual memory.
`
`it uses the B+tree method for organizing data.
`It station for satellite transmission that handles up to 56
`VSAT
`(Very Small Aperture satellite Terminal) A small eart rate (up to l .544 Mbits/sec) are called ”TSATs.”
`Kbits/sec of digital transmission. VSA'I‘s that handle the T1 data
`V58
`(1) (VME Subsystem Bus) An auxiliary"backdoor" protocol on theVMEbus that allows high-speed transfer
`between devices. It was faster than the main busbefore the 64-bit implementation arrived.
`(2) (Vestlgiai SideBnnd) A digital modulation method developed by Zenith for cable modems and terrestrial
`transmission for D'I'V. See B-VSB.
`
`
`
`
`‘
`
`2
`
`754E
`
`See DOS/V55.
`
`"4
`
`
`
`Computer Desktop Encyclopedia
`
`
`
`Page 8 of 9
`
`
`
`Page 8 of 9
`
`

`

`
`
`i
`
`1080 workiunction
`
`bottom of the in basket. Automating workflow sets timers that ensure that documents move along at a prescribed pace and
`that the appropriate person processes them in the correct order.
`Integrating workflow into existing software applications may require extensive reprogramming, because although
`independent workflow software can launch a whole application, a workfiow system must be able to invoke individual
`routines within the application. As a result, Vendors of application software have teamed up with workflow vendors to
`provide the appropriate interfaces and/or they have developed their own workflow capability. Workflow standards
`developed by the Workflow Management Coalition (WI’MC) are expected to provide interoperability between workflow
`software and the applications as well as between different workflow systems.
`Workflow software is not the same as worhgroup software, otherwise known as groupware. Workflow deals with
`the step-by-step processes, whereas workgroup systems are concerned with information sharing and threaded
`discussions among users.
`For an excellent book on the subject of workflow written by the guru in this field, read The Workjlow Imperative by
`
`Thomas M. Koulopoulos, published by Van Nostrand Reinhold, ISBN 0-442-01975-0.
`
`
`work function
`
`The amount of photon energy required to cause an electron to be emitted from a material.
`
`Two or more individuals that share files and databases. LANs designed around workgroups provide
`workgroup
`electronic sharing of required data. In general, products designed for workgroups support up to 50 people, whereas
`departmental devices support several hundred, and enterprise devices serve several thousand. See groupware and workjiow.
`
`
`workgroup switch
`
`
`A network switdi designed for LAN traffic within an enterprise. Contrast with carrier-close; switch.
`
`
`
`working directory See current directory.
`
`The user interface in OS/2 introduced with Version 2.0. The Workplace Shell is extensible and
`Workplace Shell
`
`application developers can use Workplace Shell library functions when developing programs.
`
`worksheet Same as spreadsheet.
`
`worksheet compiler
`
`
`Same as spreadsheet compiler.
`
`(1) A high-performance, single-user computer used for graphics, CAD, CAE, simulation and scientific
`workstation
`applications. It is typically a RJSC-based computer that runs under some variation of UNIX. The major vendors of
`workstations are Sun, HP, IBM, Compaq and SC]. High-end Pentium PCs increasingly provide workstation performance.
`(2) A terminal or desktop computer in a network. In this context, workstation is just a generic term for a user’s
`machine (client machine). Contrast with server and host.
`(3) In the telecom industry, a combined telephone and computer.
`
`
`WorldCom (WorldCom, lnc., Jackson, MS, www.wcom.com) A major, international telecommunications carrier
`founded in 1983 as Long Distance Discount Service (LDDS), a reseller of A'l'&T WATS lines to small businesses. it grew
`by acquiring many small, and eventually, large long distance and networking organizations, including IDB WorldCom,
`a leading international carrier, Wil'l‘el, a major telecom carrier, and Mi-‘S Communications, an international phone
`company and recent parent of UUNET, a prominent internet provider.
`in 1997, the network operations of America Online and CompuServe became part of WorldCom. It also merged
`with Brooks Fiber and then acquired MCI in 1998 to become the MCI WorldCom powerhouse. While WorldCom may
`have been a pretentious name for rather modest beginnings, it was very prophetic, because the MCI name was later
`dropped, leaving WorldCom as the name of the company.
`
`World Wide Walt What many have called the Web while waiting patiently for the next page to download. The
`World Wide Wait is caused by any combination of a slow modem, overloaded Web server at the site you are accessing
`or any clog in one of the routers or switches at a national, regional or local ISP. See Internet service provider.
`
`
`An Internet facility that links documents locally and remotely. The Web document, or Web
`World Wide Web
`page, contains text, graphics, animations and videos as well as hypertext links. The links in the page let users jump
`
`
`
`Computer Desktop Encyclopedia
`
`
`
`Page 9 of 9
`
`
`
`Page 9 of 9
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket