throbber
By Bryan Pfafi'e11berge1/, P/1.D.
`
`WI LEY
`
`Wiley Publishing, Inc.
`
`Exhibit 2004
`ServiceNow v. HP
`
`|PR2015-00699
`
`COMPUTER
`
`DICTIONARY
`
`10TH EDITION
`
`

`
`
`
`
`
`Webster’s New World"' Computer Dictionary, 10th Edition
`
`Copyright © 2003 by Wiley Publishing, Inc., Indianapolis, Indiana
`
`Published by Wfley Publishing, Inc., Indianapolis, Indiana
`Published simultaneously in Canada
`
`N0 part of this publication may be reproduced, stored in a retrieval system or transmitted
`in any form or by any means, electronic, mechanical, photocopying, recording, scanning
`or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States
`Copyright Act, without either the prior written permission of the Publisher, or authoriza-
`tion through payment of the appropriate per—copy fee to the Copyright Clearance
`Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8700.
`Requests to the Publisher for permission should be addressed to the Legal Department,
`Wiley Publishing, Inc., 10475 Crosspoint Blvd., Indianapolis, IN 46256, (317) 572-3447,
`fax (317) 572-4447, E-mail: permcoordinator@wiley.com.
`
`Trademarks:Wiley, the Wiley Publishing logo,Webster’s New \X/orld, and the Webster’s
`New World logo are trademarks or registered trademarks of'\X/iley Publishing, Inc., in the
`United States and other countries, and may not be used without written permission.All
`other trademarks are the property of their respective owners.\X/iley Publishing, Inc., is not
`associated with any product or vendor mentioned in this book.
`
`Limit of Liability/Disclaimer ofWarranty:While the publisher and author have used their
`best efforts in preparing this book, they make no representations or warranties with
`respect to the accuracy or completeness of the contents of this book and specifically dis-
`claim any implied warranties of merchantability or fitness for a particular purpose. No
`warranty may be created or extended by sales representatives or Written sales materials.
`The advice and strategies contained herein may not be suitable for your situation.You
`should consult with a professional where appropriate. Neither the publisher nor author
`shall be liable for any loss of profit or any other commercial damages, including but not
`limited to special, incidental, consequential, or other damages.
`
`For general information on our other products and services or to obtain technical support
`please contact our Customer Care Department within the U.S. at 800-762-2974, outside
`the U.S. at 317-572-3993 or fax 317-572-4002.
`
`Wiley also publishes its books in a variety of electronic formats. Some content that
`appears in print may not be available in electronic books.
`
`
`
`Library of Congress Cataloging-in-Publication Data is available from the publisher.
`ISBN 0—7645—2478—X
`
`l\/Ianufactured in the United States of America
`
`5432
`
`
`
`

`
`
`
`353
`
`stack
`
`
`
`SSL Acronym for Secure Sockets Layer.
`An Internet security standard that is widely
`supported by leading Web browsers and
`Web servers. Unlike its chief competi-
`tion, S—HTTP, SSL is
`application~in—
`dependent—-it works with all
`Internet
`tools, not
`just
`the World Wide Web
`This is because SSL functions at
`the network layer rather than the applica-
`tion layer and is
`thus available to any
`SSL—ready Internet application, including
`newsreaders. Applications that use SSL use
`RSA public key encryption and RSA cer-
`tificates and digital signatures to establish
`the identities of parties to the transaction;
`after the link is established, a key exchange
`takes place, and RSA’s RC4 encryption
`technology (a symmetric key encryption
`algorithm) is used to secure the transaction.
`With the 128-bit keys used for SSL com-
`munication within the United States, the
`
`sequel.)
`pronounced
`SQL (Often
`Acronym for Structured Query Language.
`In database management systems, an IBM-
`developed query language that has become
`the de facto standard for querying databases
`in a client/server network. The four basic
`cornrnands (SELECT, UPDATE, DELETE,
`and INSERT) correspond to the four basic
`functions of data manipulation (data
`retrieval, data modification, data deletion,
`and data insertion,
`respectively). SQL
`queries approximate the structure of an
`English natural—language query. A data table
`consisting of columns (corresponding to
`data fields) and rows (corresponding to data
`records) displays a que1y’s results. See data-
`base management system (DBMS), ODBC,
`query, query language.
`
`squelch In a network, to suspend or can-
`cel a problem user’s access privileges. A
`network might squelch such privileges after
`a user repeatedly violates the terms under
`which the account was created.
`
`SRAM Acronym for static random access
`memory.A type of random access memory
`(RAM) chip that holds its contents without
`constant refreshing from the central pro-
`cessing unit (CPU). Although as volatile as
`dynamic random access memory (DRAM)
`chips, SRAM does not require the CPU to
`refresh its contents several hundred times
`
`per second. These chips are substantially
`faster but also are significantly more expen-
`sive than DRAM chips and, therefore, are
`most often used for RAM caches. Two
`
`types of SRAM are available: asynchronous
`and synchronous. Unlike asynchronous
`SRAM, synchronous SRAM is significantly
`faster because it is capable of synchronizing
`with the microprocessor’s clock speed,
`enabling it to perform operations that are
`timed by the system clock;. See cache memo-
`ry, DRAM, SDRAM.
`
`S register A special unit of memory
`inside a modem that contains alterations to
`the AT command set, such as the number of
`rings to wait before answering a call or the
`time to wait for the carrier to be established.
`
`encrypted transaction would be computa-
`tionally infeasible to decode, so it is safe
`from snoopers and criminals. (The 40-bit
`version used in export versions of popular
`browsers, however, is not secure and should
`be avoided for commercial transactions.)
`
`ST-506/ST—412 A hard disk interface
`
`standard once widely used in IBM and
`IBM-compatible computers. These drives,
`virtually unavailable today, are slower and
`cheaper than drives that use more recent
`interface standards, such as Enhanced
`System Device Interface (ESDI), Integrated
`Drive Electronics
`(IDE),
`and Small
`Computer System Interface (SCSI). The
`ST—506/ST—4l2 interface uses the Modified
`Frequency Modulation (MFM) and Run-
`Length Limited (RLL) standards.
`
`stack In programming, a data structure in
`which the first items inserted are the last
`
`ones removed. Programs that use control
`structures use the Last In First Out (LIFO)
`data structure.A stack enables the computer
`to track what
`it was doing when it
`branched or jumped to a procedure. In
`I-IyperCard, the term refers to a file that
`contains one or more cards that share a
`common background.
`
`
`
`SSE See streaming S11’/ID extensions

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket