throbber
Osborne/McGraw-Hill
`
`Page 1 of 9
`
`VIRNETX EXHIBIT 2028
`
`Mangrove V. VirnetX
`Trial |PR2015—01047
`
`Gcmmpumr
`0
`Desktop
`Encyclopedia
`
`Ninth Edition
`
`Alan Freedman
`
`
`
`
`
`VIRNETX EXHIBIT 2028
`Mangrove v. VirnetX
`Trial IPR2015-01047
`
`Page 1 of 9
`
`

`
`Osborne / McGraw-Hill
`2600 Tenth Street
`
`Berkeley, California 94710
`U.S.A.
`
` angc bulk purchase discounts for sales promotions, premiums, or fund—raisers,
`lea
`,3?’
`p
`~ contact Osbome/ McCraw-Hill at the above address. For information on
`agransl tions or book distributors outside the U.S.A., please see the International
`P 8
`aionta tlnformation a e at the end of this book.
`
`Computer Desktop Encyclopedia, Ninth Edltion
`ight © 2001 by The McGraw-Hill Companies. All rights reserved. Printed in the
`States of America. Except as permitted under the Copyright Act of 1976, no part
`15 publication may be rcproducecl or distributed in any form or by any means, or
`of t
`5
`red in a database or retrieval system, without the prior written permission of the
`" publisher, with the exception that the program listings may be entered, stored, and
`executed in a computer system, but they may not be reproduced for publication.
`
`1234567890 DOC DOC 901987654321
`
`Book p /n 0-07-219307-7 and CD p/n 0-07-219308-5
`parts of
`ISBN 0-O7-219306-9
`
`Publisher
`Brandon A. Nordin
`
`Computer Designers
`Lauren McCarthy, Tabitha Cagan
`
`Vice President & Associate Publisher
`Scott Rogers
`Editorial Director
`Roger Stewart
`Senior Project Editor
`Pamela Woolf
`
`Illustrators
`Lyssa Wald, Michael Mueller
`Series Design
`Peter F. Hancik
`Cover Design
`Greg Scott
`
`Proofreaders
`Linda Medoff, Paul Medoff
`
`Cover Illustration
`]oh.n Bleck
`
`This book was composed with Corel VENTURAW Publisher.
`
`LC Como. Numbe,
`
`lllllllllllllllllll
`2001
`2'1 8111
`
`lnformation has been obtained by Osbome/Mr(;raw-Hill from sources believed lobe reliable. However. beczulse of the
`possibility of human or mechanical error by our sources, Osborne/McGraw-HilL or others. (‘Shem-/MCCHW-Hill does not
`guarantee the nun-ncr. adequacy, or Completeness of any information and is not responsible for any errors or omissions or
`the results obtained lrum use of such information.
`
`Page 2 of 9
`
`

`
`Page 3 of 9
`
`Page 3 of 9
`
`

`
`PATROL An application management suite from BMC that uses agents to report on software activities on all the
`servers within the enterprise. Using the information in ”knowledge modules” (KMs) about each system component,
`agents detect events, collect information and notify system and network administrators to take corrective action.
`
`PAX (1) (Private Automatic Exchange) An inhouse intercom system.
`(2) (Parallel Architecture Extended) A parallel processing environment standard based on Intel's i860 RISC chip,
`UNIX System V and Alliant Computer's parallel and 3—D graphics technologies.
`payload
`The data-carrying capacity of some structure. It typically refers to a part of a packet or frame in a
`communications system that holds the message data in contrast to the headers, which are considered overhead.
`
`payment service
`
`See Web payment service.
`
`payware
`
`Software distributed for money. Contrast withfreeware.
`
`FE See PowerBuilder.
`
`PBX (Private Branch exchange) An inhouse telephone switching
`system that interconnects telephone extensions to each other, as well as
`to the outside telephone network. It may include functions such as least
`cost routing for outside calls, call forwarding, conference calling and call
`accounting. Modern PBXS use all-digital methods for switching and may
`support both digital terminals and telephones along with analog
`‘°1eph°“eS‘ see WPBX
`
`A" Eaflll PBX
`This PBX began operation in Bangor, Maine in
`1883. (Image courtesy of AT&T.)
`
`Mummdh
`(csizmzéxnzgme)
`’
`"O Cannon”
`(hard disk,
`Mppy’ mm’
`
`mm‘
`Modem
`
`PC (3) (Printed Circuit) See printed circuit board.
`(2) (Personal Computer) Any laptop or desktop
`computer such as Windows machine or a Macintosh.
`(1) (Personal Computer) A stand-alone laptop or
`desktop computer running Windows (or DOS for earlier
`applications). PC hardware and operating systems are
`primarily governed by Intel and Microsoft respectively.
`The PC is the world's largest computer base.
`PCs are also widely used as clients and servers in a local
`area network (LAN). PC clients predominantly run under
`Windows, but PC servers (X86-based servers) run under
`Windows, Netware or a variation of UNIX such as Linux
`or UnixWare. PC servers may use Windows 95 / 98, but
`Windows NT and 2000 are more likely choices.
`Although there are literally thousands of PC vendors,
`from mom and pop shops to large mail order houses (Dell,
`Gateway, etc.) to the major computer companies (Compaq,
`HP, etc.), and of course IBM, still one of the world's largest
`PC makers, all PCs use an Intel X86 or compatible CPU.
`After IBM introduced the PC in 1981, the first attempts at
`cloning it were mostly unsuccessful. Except for Compaq's first
`PC, from 1982 to 1985, there were a lot of ”almost compatible” PCS. However, as soon as the part of the operating system
`known as the BIOS was successfully cloned and made Commercially available, true Compatibles appeared in abundance.
`Before Windows 95, adding another peripheral device to a PC was often an exercise in trial and error. Modifying
`DOS’s infamous configuration files (AUTOEXEC.BAT and CONFIGSYS) caused many a user to give up. Windows 95,
`98 and 2000 added Plug and Play, which means for the most part, you can replace hard disks and display adapters, as
`well as add a scanner, CD-ROM or other device without difficulty.
`The PC has become a commodity item, winding its way onto the shelves of retail outlets worldwide. This is a
`testimonial to the power of a computer standard, even one fraught with loopholes and inconsistencies,
`
`Motherboard
`
`'
`What?’ Inside 3 PC?
`
`Computer Desktop Encyclopedia
`
`Page 4 of 9
`
`

`
`personal computer
`
`751
`
`(Practical Extraction Report Language) A programming language written by Larry Wall that combines syntax
`Perl
`from several UNIX utilities and languages. Introduced in 1987, Perl is designed to handle a variety of system
`administrator functions and provides comprehensive string handling functions. it is widely used to write Web server
`programs for such tasks as ziulomntically updating user accounts and newsgroup postings, prcicessing removal rojuests,
`synchronizing llrlliilJ¢'i5L’S and generating reports. Perl has also been adapted to non-UNIX platforms. See also PURL.
`permanent font
`(1) A soft font that is kept in the printer's memory until the printer is turned off.
`(2) Same as irriemal font.
`
`permanent memory
`
`Same as rwmvulatile memory.
`
`One possible combination of items out of a larger set of items. For example, with the set of numbers
`permutation
`1, 2 and 3, there are six possible permutations: 12, 21, 13, 31, 23 and 32.
`
`perpendicular recording
`
`See vertical recording.
`
`per seat
`
`By workstation. See per seat licensing.
`
`Software licensing based on a per user basis. For example, a 100-user license means that up
`per seat licensing
`to 100 spr.-cificaiiy~namcd users have access to the program. Per seat licensing is administered by providing user—lcvel
`security to the directory containing the program. Contrast with concurrent licensing.
`
`(1) in a CRT, the time an phosphor dot remains illuminated after being energized. Long-persistence
`persistence
`phosphors reduce flicker, but generate ghost-like images that linger on screen for a fraction of a second.
`(2) in object technology, the storage of an object on a disk or other permanent storage device.
`
`Data that exists from session to session. Persistent data is stored in a database on disk or tape.
`persistent data
`Contrast with transient data.
`
`persistent link
`
`See hot link.
`
`An object that continues to exist after the program that created it has been unloaded. An
`persistent object
`object's class and current state must be saved for use in subsequent sessions. in object technology, persistence means
`storing il\e object for later use.
`
`personal agent
`
`See agent.
`
`personal communicator
`
`See FDA.
`
`Synonymous with "microcomputer," "desktop computer,” and "laptop computer," it is a
`personal computer
`computer that serves one user in the office or home. A complete personal computer system with printer can cost as
`little as $1,000 or as much as $8,000 or more. Size is based on memory and disk capacity. Speed is based on the CPU
`that runs it, and output quality is based on the type and resolution of its monitor and printer.
`Major Suppliers of Personal Computers
`The personal computer world is dominated by Windows-based PCs.
`There are thousands of vendors that make them, from mom and pop shops to huge companies such as Compaq, HP
`and IBM. The alternate personal computer standard is Apple's Macintosh, which is only made by Apple. Atari and
`Commodore once carved out their respective niches, but Atari returned to its gaming roots and Commodore has since
`closed its dodrs.
`
`The industry began in 1977, when Apple, Radio Shack and Commodore
`The History of Personal Computers
`introduced the first off-the-shelf computers as consumer products. The first machines used an 8-bit microprocessor
`with a maximum of 64K of memory and floppy disks for storage. The Apple ii, Atari 500, and Commodore 64 became
`popular home computers, and Apple: was successfiil in companies after the VisiCaic spreadsheet was introduced.
`However, the business world was soon dominated by the Z80 processor and Cl’/ M operating system, used by
`
`computer iieskiop Encyclopedia
`
`Page 5 of 9
`
`

`
`804
`
`protocol stack
`
`protocol stack The hierarchy of protocols used in a communications network. Network architectures desi
`in layers, such as TCP/ll’, 0:31 and SNA, are referred to as stacks. See OS].
`
`gned
`
`protocol suite
`
`Same as protocol stack.
`
`(1) Creating a demo of a new system. Prototyping is essential for clarifying information requirement
`prototyping
`The design of a system (functional specs) must be finalized before the system can be built. While analytically—orientedS‘
`people may have a clear picture of requirements, others may not.
`Using fourth-generation languages, systems analysts and users can develop the new system together. Databases can
`be created and manipulated while the user monitors the progress. Once users see tangible output on screen or paper,
`they can figure out what's missing or what the next question might be if this were a production system. If prototyping
`is carefully done, the end result can be a working system.
`Even if the final system is reprogrammed in other languages for standardization or machine efficiency, prototyping
`has served to provide specifications for a working system rather than a theoretical one.
`(2) See function prototyping.
`
`provisioned
`
`Set up for a particular type of telecommunications service. See provisioning.
`
`Setting up a telecommunications service for a particular customer. Common carriers provision
`provisioning
`circuits by programming their computers to switch customer lines into the appropriate networks.
`
`proxy
`
`See proxy server.
`
`A facility in a proxy server that caches incoming Web pages on the hard disk. If the next page
`proxy cache
`requested by a browser is already in the proxy cache, the page is retrieved locally instead of from the Internet. With
`proxy caches, the browsers must be configured to use the proxy server. See proxy server, reverse proxy cache, transparent
`cache and Web cache.
`‘
`
`proxy server Also called a ”proxy” or ”application level gateway,” it is an application that breaks the connection
`between sender and receiver. All input is forwarded out a different port, closing a straight path between two networks
`and preventing a hacker from obtaining internal addresses and details of a private network.
`Proxy servers are available for common Internet services; for example, an HTTP proxy is used for Web access, and
`an SMTP proxy is used for e—mail. Proxies generally employ network address translation (NAT), which presents one
`organization~wide IP address to the lnternet. It funnels all user requests to the Internet and fans responses back out to
`the appropriate users. Proxies may also cache Web pages, so that the next request can be obtained locally. Proxies are
`only one tool that can be used to build a firewall. See LAN,firewall, proxy cache and SOCKS server.
`
`PR/SM (Processor Resource/Systems Manager) Hardware circuits and microcode built into IBM System/390
`mainframes that support logical partitions (LPARs). LPARs allow the running of multiple system images on a single
`processor complex. Each such image has a full complement of CPUs (dedicated or shared), central storage, expanded
`storage and channels. ESCON and FICON channels may be shared across images using the MIF feature. Pronounced
`"prism," PR/SM was derived from VM, the IBM operating system that provides multiple system images in software.
`See LPAR, MIF and VM.
`
`PRT SC
`
`See print screen.
`
`ps
`
`(1) (Picosecond) See space/time.
`(2) (P&~Personal Services) IBM office automation software for PCs, minis and mainframes, which includes word
`processing, electronic mail and library services.
`(3) (PostScript) See Postscript.
`
`PS/1 An early IBM home computer series introduced in 1990. The original models featured an integrated monitor
`and easy-to~open case. The first PS/1 was a 286 with an ISA bus. See PC.
`
`Computer Desktop Encyclopodia
`
`Page 6 of 9
`
`

`
`994
`
`TSOP
`
`(Thin Small Outline Package) A very~thin, plastic, rectangular surface mount chip package with gu1l—wing
`TSOP
`pins on its two short sides. TSOPs are about a third as thick as S0] chips. See gullewing lead, SOP, SO] and chip package.
`
`T-span
`
`A 24—channel group, which makes up one T1 line. See T1.
`
`TSR (Terminate and Stay Resident) Refers to a program that remains in memory when the user exits it in order
`that it be immediately available at the press of a hotkey. TSRS were popular under DOS to quickly pop up a calendar,
`calculator or other utility, because DOS did not have built-in task switching. Standards for writing TSR5 were not
`codified early on, and TSRs often conflicted with each other and regular applications. After Windows 3.0, TSRS became
`moot, since any DOS or Windows application could be conveniently task switched in a separate window.
`
`T55
`
`See ITU.
`
`(Tree and Tabular Combined Notation) A programming language endorsed by ISO that is used totwrite test
`TTCN
`suites for telecommunications systems. TTCN is used for "black box testing,” which means that all interaction to the
`system is via messages, rather than by a user with a mouse. Test suites are built in a hierarchical and modular manner,
`allowing many programmers to be involved in the project. Numerous telecom vendors use TTCN for their products, and
`organizations such as the FTU, ATM Forum and ETSI, provide "ITCN conformancetests for new standards.
`
`TTFN
`
`Digispeak for goodbye (”ta ta for now”).
`
`TT font
`
`See TrueType.
`
`(1) (Transistor Transistor Logic) A digital circuit composed of bipolar transistors wired in a certain manner.
`TTL
`TTL logic has been widely used since the early days of digital circuitry. TTL designations may appear on input or
`' output ports of various devices, which indicates a digital circuit in contrast to an analog circuit.
`(2) (Time To Live) A set maximum amount of time a packet is allowed to propagate through the network before it
`is discarded.
`
`(3) (Through The Lens) Refers to a single-lens reflex camera that lets the photographer View the scene through the
`same lens that captures the image.
`
`T.TUD See T.120.
`
`(TeleTYpewriter protocol) A low-speed asynchronous communications protocol with limited or no
`TTY p|'0t0C0|
`error checking. See teletypewriter.
`
`tube
`
`See CRT and vacuum tube.
`
`A laser that can change its frequency over a given range. In time, tunable lasers are expected to be
`tunable laser
`capable of switching frequencies on a packet-by-packet basis.
`
`tuner An electronic part of a radio or TV that locks on to a selected carrier frequency (station, channel) and filters
`out the audio and video signals for amplification and display.
`
`Transmitting data structured in one protocol format within the format of another protocol.Tunneling
`tunneling
`allows other types of transmission streams to be carried within the prevailing protocol. See IP tunneling and L2TP.
`
`tuple
`
`In relational database management, a record, or row. See relational database.
`
`A C compiler from Borland used to create a wide variety of commercial products. It is known for its
`Turbo C
`well—designed debugger. Borland's object-oriented Versions of C are Turbo C++ and Borland C++.
`The DOS version of this database is written in Turbo C. The Windows version is written in Microsoft C.
`
`A type of channel coding that uses a convolutional code and a type of Viterbi decoder that outputs a
`turbo code
`continuous value rather than a O or 1. See corzvolutiomzl code and Viterbi decoder.
`
`Computer Desktop Encyclopedia
`
`Page 7 of 9
`
`

`
`Page 8 of 9
`
`Page 8 of 9
`
`

`
`Page 9 of 9
`
`Page 9 of 9

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket