`
`Page 1 of 9
`
`VIRNETX EXHIBIT 2028
`
`Mangrove V. VirnetX
`Trial |PR2015—01046
`
`Gcmmpumr
`0
`Desktop
`Encyclopedia
`
`Ninth Edition
`
`Alan Freedman
`
`
`
`
`
`VIRNETX EXHIBIT 2028
`Mangrove v. VirnetX
`Trial IPR2015-01046
`
`Page 1 of 9
`
`
`
`Osborne / McGraw-Hill
`2600 Tenth Street
`
`Berkeley, California 94710
`U.S.A.
`
` angc bulk purchase discounts for sales promotions, premiums, or fund—raisers,
`lea
`,3?’
`p
`~ contact Osbome/ McCraw-Hill at the above address. For information on
`agransl tions or book distributors outside the U.S.A., please see the International
`P 8
`aionta tlnformation a e at the end of this book.
`
`Computer Desktop Encyclopedia, Ninth Edltion
`ight © 2001 by The McGraw-Hill Companies. All rights reserved. Printed in the
`States of America. Except as permitted under the Copyright Act of 1976, no part
`15 publication may be rcproducecl or distributed in any form or by any means, or
`of t
`5
`red in a database or retrieval system, without the prior written permission of the
`" publisher, with the exception that the program listings may be entered, stored, and
`executed in a computer system, but they may not be reproduced for publication.
`
`1234567890 DOC DOC 901987654321
`
`Book p /n 0-07-219307-7 and CD p/n 0-07-219308-5
`parts of
`ISBN 0-O7-219306-9
`
`Publisher
`Brandon A. Nordin
`
`Computer Designers
`Lauren McCarthy, Tabitha Cagan
`
`Vice President & Associate Publisher
`Scott Rogers
`Editorial Director
`Roger Stewart
`Senior Project Editor
`Pamela Woolf
`
`Illustrators
`Lyssa Wald, Michael Mueller
`Series Design
`Peter F. Hancik
`Cover Design
`Greg Scott
`
`Proofreaders
`Linda Medoff, Paul Medoff
`
`Cover Illustration
`]oh.n Bleck
`
`This book was composed with Corel VENTURAW Publisher.
`
`LC Como. Numbe,
`
`lllllllllllllllllll
`2001
`2'1 8111
`
`lnformation has been obtained by Osbome/Mr(;raw-Hill from sources believed lobe reliable. However. beczulse of the
`possibility of human or mechanical error by our sources, Osborne/McGraw-HilL or others. (‘Shem-/MCCHW-Hill does not
`guarantee the nun-ncr. adequacy, or Completeness of any information and is not responsible for any errors or omissions or
`the results obtained lrum use of such information.
`
`Page 2 of 9
`
`
`
`Page 3 of 9
`
`Page 3 of 9
`
`
`
`PATROL An application management suite from BMC that uses agents to report on software activities on all the
`servers within the enterprise. Using the information in ”knowledge modules” (KMs) about each system component,
`agents detect events, collect information and notify system and network administrators to take corrective action.
`
`PAX (1) (Private Automatic Exchange) An inhouse intercom system.
`(2) (Parallel Architecture Extended) A parallel processing environment standard based on Intel's i860 RISC chip,
`UNIX System V and Alliant Computer's parallel and 3—D graphics technologies.
`payload
`The data-carrying capacity of some structure. It typically refers to a part of a packet or frame in a
`communications system that holds the message data in contrast to the headers, which are considered overhead.
`
`payment service
`
`See Web payment service.
`
`payware
`
`Software distributed for money. Contrast withfreeware.
`
`FE See PowerBuilder.
`
`PBX (Private Branch exchange) An inhouse telephone switching
`system that interconnects telephone extensions to each other, as well as
`to the outside telephone network. It may include functions such as least
`cost routing for outside calls, call forwarding, conference calling and call
`accounting. Modern PBXS use all-digital methods for switching and may
`support both digital terminals and telephones along with analog
`‘°1eph°“eS‘ see WPBX
`
`A" Eaflll PBX
`This PBX began operation in Bangor, Maine in
`1883. (Image courtesy of AT&T.)
`
`Mummdh
`(csizmzéxnzgme)
`’
`"O Cannon”
`(hard disk,
`Mppy’ mm’
`
`mm‘
`Modem
`
`PC (3) (Printed Circuit) See printed circuit board.
`(2) (Personal Computer) Any laptop or desktop
`computer such as Windows machine or a Macintosh.
`(1) (Personal Computer) A stand-alone laptop or
`desktop computer running Windows (or DOS for earlier
`applications). PC hardware and operating systems are
`primarily governed by Intel and Microsoft respectively.
`The PC is the world's largest computer base.
`PCs are also widely used as clients and servers in a local
`area network (LAN). PC clients predominantly run under
`Windows, but PC servers (X86-based servers) run under
`Windows, Netware or a variation of UNIX such as Linux
`or UnixWare. PC servers may use Windows 95 / 98, but
`Windows NT and 2000 are more likely choices.
`Although there are literally thousands of PC vendors,
`from mom and pop shops to large mail order houses (Dell,
`Gateway, etc.) to the major computer companies (Compaq,
`HP, etc.), and of course IBM, still one of the world's largest
`PC makers, all PCs use an Intel X86 or compatible CPU.
`After IBM introduced the PC in 1981, the first attempts at
`cloning it were mostly unsuccessful. Except for Compaq's first
`PC, from 1982 to 1985, there were a lot of ”almost compatible” PCS. However, as soon as the part of the operating system
`known as the BIOS was successfully cloned and made Commercially available, true Compatibles appeared in abundance.
`Before Windows 95, adding another peripheral device to a PC was often an exercise in trial and error. Modifying
`DOS’s infamous configuration files (AUTOEXEC.BAT and CONFIGSYS) caused many a user to give up. Windows 95,
`98 and 2000 added Plug and Play, which means for the most part, you can replace hard disks and display adapters, as
`well as add a scanner, CD-ROM or other device without difficulty.
`The PC has become a commodity item, winding its way onto the shelves of retail outlets worldwide. This is a
`testimonial to the power of a computer standard, even one fraught with loopholes and inconsistencies,
`
`Motherboard
`
`'
`What?’ Inside 3 PC?
`
`Computer Desktop Encyclopedia
`
`Page 4 of 9
`
`
`
`personal computer
`
`751
`
`(Practical Extraction Report Language) A programming language written by Larry Wall that combines syntax
`Perl
`from several UNIX utilities and languages. Introduced in 1987, Perl is designed to handle a variety of system
`administrator functions and provides comprehensive string handling functions. it is widely used to write Web server
`programs for such tasks as ziulomntically updating user accounts and newsgroup postings, prcicessing removal rojuests,
`synchronizing llrlliilJ¢'i5L’S and generating reports. Perl has also been adapted to non-UNIX platforms. See also PURL.
`permanent font
`(1) A soft font that is kept in the printer's memory until the printer is turned off.
`(2) Same as irriemal font.
`
`permanent memory
`
`Same as rwmvulatile memory.
`
`One possible combination of items out of a larger set of items. For example, with the set of numbers
`permutation
`1, 2 and 3, there are six possible permutations: 12, 21, 13, 31, 23 and 32.
`
`perpendicular recording
`
`See vertical recording.
`
`per seat
`
`By workstation. See per seat licensing.
`
`Software licensing based on a per user basis. For example, a 100-user license means that up
`per seat licensing
`to 100 spr.-cificaiiy~namcd users have access to the program. Per seat licensing is administered by providing user—lcvel
`security to the directory containing the program. Contrast with concurrent licensing.
`
`(1) in a CRT, the time an phosphor dot remains illuminated after being energized. Long-persistence
`persistence
`phosphors reduce flicker, but generate ghost-like images that linger on screen for a fraction of a second.
`(2) in object technology, the storage of an object on a disk or other permanent storage device.
`
`Data that exists from session to session. Persistent data is stored in a database on disk or tape.
`persistent data
`Contrast with transient data.
`
`persistent link
`
`See hot link.
`
`An object that continues to exist after the program that created it has been unloaded. An
`persistent object
`object's class and current state must be saved for use in subsequent sessions. in object technology, persistence means
`storing il\e object for later use.
`
`personal agent
`
`See agent.
`
`personal communicator
`
`See FDA.
`
`Synonymous with "microcomputer," "desktop computer,” and "laptop computer," it is a
`personal computer
`computer that serves one user in the office or home. A complete personal computer system with printer can cost as
`little as $1,000 or as much as $8,000 or more. Size is based on memory and disk capacity. Speed is based on the CPU
`that runs it, and output quality is based on the type and resolution of its monitor and printer.
`Major Suppliers of Personal Computers
`The personal computer world is dominated by Windows-based PCs.
`There are thousands of vendors that make them, from mom and pop shops to huge companies such as Compaq, HP
`and IBM. The alternate personal computer standard is Apple's Macintosh, which is only made by Apple. Atari and
`Commodore once carved out their respective niches, but Atari returned to its gaming roots and Commodore has since
`closed its dodrs.
`
`The industry began in 1977, when Apple, Radio Shack and Commodore
`The History of Personal Computers
`introduced the first off-the-shelf computers as consumer products. The first machines used an 8-bit microprocessor
`with a maximum of 64K of memory and floppy disks for storage. The Apple ii, Atari 500, and Commodore 64 became
`popular home computers, and Apple: was successfiil in companies after the VisiCaic spreadsheet was introduced.
`However, the business world was soon dominated by the Z80 processor and Cl’/ M operating system, used by
`
`computer iieskiop Encyclopedia
`
`Page 5 of 9
`
`
`
`804
`
`protocol stack
`
`protocol stack The hierarchy of protocols used in a communications network. Network architectures desi
`in layers, such as TCP/ll’, 0:31 and SNA, are referred to as stacks. See OS].
`
`gned
`
`protocol suite
`
`Same as protocol stack.
`
`(1) Creating a demo of a new system. Prototyping is essential for clarifying information requirement
`prototyping
`The design of a system (functional specs) must be finalized before the system can be built. While analytically—orientedS‘
`people may have a clear picture of requirements, others may not.
`Using fourth-generation languages, systems analysts and users can develop the new system together. Databases can
`be created and manipulated while the user monitors the progress. Once users see tangible output on screen or paper,
`they can figure out what's missing or what the next question might be if this were a production system. If prototyping
`is carefully done, the end result can be a working system.
`Even if the final system is reprogrammed in other languages for standardization or machine efficiency, prototyping
`has served to provide specifications for a working system rather than a theoretical one.
`(2) See function prototyping.
`
`provisioned
`
`Set up for a particular type of telecommunications service. See provisioning.
`
`Setting up a telecommunications service for a particular customer. Common carriers provision
`provisioning
`circuits by programming their computers to switch customer lines into the appropriate networks.
`
`proxy
`
`See proxy server.
`
`A facility in a proxy server that caches incoming Web pages on the hard disk. If the next page
`proxy cache
`requested by a browser is already in the proxy cache, the page is retrieved locally instead of from the Internet. With
`proxy caches, the browsers must be configured to use the proxy server. See proxy server, reverse proxy cache, transparent
`cache and Web cache.
`‘
`
`proxy server Also called a ”proxy” or ”application level gateway,” it is an application that breaks the connection
`between sender and receiver. All input is forwarded out a different port, closing a straight path between two networks
`and preventing a hacker from obtaining internal addresses and details of a private network.
`Proxy servers are available for common Internet services; for example, an HTTP proxy is used for Web access, and
`an SMTP proxy is used for e—mail. Proxies generally employ network address translation (NAT), which presents one
`organization~wide IP address to the lnternet. It funnels all user requests to the Internet and fans responses back out to
`the appropriate users. Proxies may also cache Web pages, so that the next request can be obtained locally. Proxies are
`only one tool that can be used to build a firewall. See LAN,firewall, proxy cache and SOCKS server.
`
`PR/SM (Processor Resource/Systems Manager) Hardware circuits and microcode built into IBM System/390
`mainframes that support logical partitions (LPARs). LPARs allow the running of multiple system images on a single
`processor complex. Each such image has a full complement of CPUs (dedicated or shared), central storage, expanded
`storage and channels. ESCON and FICON channels may be shared across images using the MIF feature. Pronounced
`"prism," PR/SM was derived from VM, the IBM operating system that provides multiple system images in software.
`See LPAR, MIF and VM.
`
`PRT SC
`
`See print screen.
`
`ps
`
`(1) (Picosecond) See space/time.
`(2) (P&~Personal Services) IBM office automation software for PCs, minis and mainframes, which includes word
`processing, electronic mail and library services.
`(3) (PostScript) See Postscript.
`
`PS/1 An early IBM home computer series introduced in 1990. The original models featured an integrated monitor
`and easy-to~open case. The first PS/1 was a 286 with an ISA bus. See PC.
`
`Computer Desktop Encyclopodia
`
`Page 6 of 9
`
`
`
`994
`
`TSOP
`
`(Thin Small Outline Package) A very~thin, plastic, rectangular surface mount chip package with gu1l—wing
`TSOP
`pins on its two short sides. TSOPs are about a third as thick as S0] chips. See gullewing lead, SOP, SO] and chip package.
`
`T-span
`
`A 24—channel group, which makes up one T1 line. See T1.
`
`TSR (Terminate and Stay Resident) Refers to a program that remains in memory when the user exits it in order
`that it be immediately available at the press of a hotkey. TSRS were popular under DOS to quickly pop up a calendar,
`calculator or other utility, because DOS did not have built-in task switching. Standards for writing TSR5 were not
`codified early on, and TSRs often conflicted with each other and regular applications. After Windows 3.0, TSRS became
`moot, since any DOS or Windows application could be conveniently task switched in a separate window.
`
`T55
`
`See ITU.
`
`(Tree and Tabular Combined Notation) A programming language endorsed by ISO that is used totwrite test
`TTCN
`suites for telecommunications systems. TTCN is used for "black box testing,” which means that all interaction to the
`system is via messages, rather than by a user with a mouse. Test suites are built in a hierarchical and modular manner,
`allowing many programmers to be involved in the project. Numerous telecom vendors use TTCN for their products, and
`organizations such as the FTU, ATM Forum and ETSI, provide "ITCN conformancetests for new standards.
`
`TTFN
`
`Digispeak for goodbye (”ta ta for now”).
`
`TT font
`
`See TrueType.
`
`(1) (Transistor Transistor Logic) A digital circuit composed of bipolar transistors wired in a certain manner.
`TTL
`TTL logic has been widely used since the early days of digital circuitry. TTL designations may appear on input or
`' output ports of various devices, which indicates a digital circuit in contrast to an analog circuit.
`(2) (Time To Live) A set maximum amount of time a packet is allowed to propagate through the network before it
`is discarded.
`
`(3) (Through The Lens) Refers to a single-lens reflex camera that lets the photographer View the scene through the
`same lens that captures the image.
`
`T.TUD See T.120.
`
`(TeleTYpewriter protocol) A low-speed asynchronous communications protocol with limited or no
`TTY p|'0t0C0|
`error checking. See teletypewriter.
`
`tube
`
`See CRT and vacuum tube.
`
`A laser that can change its frequency over a given range. In time, tunable lasers are expected to be
`tunable laser
`capable of switching frequencies on a packet-by-packet basis.
`
`tuner An electronic part of a radio or TV that locks on to a selected carrier frequency (station, channel) and filters
`out the audio and video signals for amplification and display.
`
`Transmitting data structured in one protocol format within the format of another protocol.Tunneling
`tunneling
`allows other types of transmission streams to be carried within the prevailing protocol. See IP tunneling and L2TP.
`
`tuple
`
`In relational database management, a record, or row. See relational database.
`
`A C compiler from Borland used to create a wide variety of commercial products. It is known for its
`Turbo C
`well—designed debugger. Borland's object-oriented Versions of C are Turbo C++ and Borland C++.
`The DOS version of this database is written in Turbo C. The Windows version is written in Microsoft C.
`
`A type of channel coding that uses a convolutional code and a type of Viterbi decoder that outputs a
`turbo code
`continuous value rather than a O or 1. See corzvolutiomzl code and Viterbi decoder.
`
`Computer Desktop Encyclopedia
`
`Page 7 of 9
`
`
`
`Page 8 of 9
`
`Page 8 of 9
`
`
`
`Page 9 of 9
`
`Page 9 of 9