throbber

`
`Apple v. Realtime
`Proceeding No. |PR2016-01365
`APPLE 1021
`
`Apple v. Realtime
`Proceeding No. IPR2016-01365
`APPLE 1021
`
`1
`
`

`

`PUBLISHED BY
`Microsoft Press
`
`A Division of Microsoft Corporation
`One Microsoft Way
`Redmond, Washington 98052-6399
`
`Copyright © 2002 by Microsoft Corporation
`
`All rights reserved. No part of the contents of this book may be reproduced or transmitted in any form
`or by any means without the written permission of the publisher.
`
`Library of Congress Cataloging-in—Publication Data
`Microsoft Computer Dictionary.--5th ed.
`p. cm.
`ISBN 0-7356-1495-4
`
`1. Computers--Dictionaries.
`
`2.
`
`lVIicrocomputers--Dictionaries.
`
`AQ76.5. M52267
`OO4'.03—-dc21
`
`2002
`
`200219714
`
`Printed and bound in the United States of America.
`
`23456789 QWT 765432
`
`Distributed in Canada by HE. Fenn and Company Ltd.
`
`A CIP catalogue record for this book is available from the British Library.
`
`Microsoft Press books are available through booksellers and distributors worldwide. For further informa-
`tion about international editions, contact your local Microsoft Corporation office or contact Microsoft
`Press International directly at fax (425) 936-7329. Visit our Web site at www.microsoft.com/mspress.
`Send comments to mspinput©microsofi. com.
`
`Active Desktop, Active Directory, ActiveMovie, ActiveStore, ActiveSync, ActiveX, Authenticode,
`BackOffice, BizTalk, ClearType, Direct3D, DirectAnimation, DirectDraw, DirectInput, DirectMusic,
`DirectPlay, DirectShow, DirectSound, DirectX, Entourage, FoxPro, FrontPage, Hotmail, IntelliEye,
`IntelliMouse, IntelliSense, JScript, MapPoint, Microsoft, Microsoft Press, Mobile Explorer, MS-DOS,
`MSN, Music Central, NetMeeting, Outlook, PhotoDraw, PowerPoint, SharePoint, UltimateTV, Visio,
`Visual Basic, Visual C++, Visual FoxPro, Visual InterDev, Visual J++, Visual SourceSafe, Visual Studio,
`Win32, Win325, Windows, Windows Media, Windows NT, Xbox are either registered trademarks or
`trademarks of Microsoft Corporation in the United States andfor other countries. Other product and
`company names mentioned herein may be the trademarks of their respective owners.
`
`The example companies, organizations, products, domain names, e-mail addresses, logos, people, places,
`and events depicted herein are fictitious. No association with any real company, organization, product,
`domain name, e—mail address, logo, person, place, or event is intended or should be inferred.
`
`Acquisitions Editor: Alex Blanton
`Project Editor: Sandra Haynes
`
`Body Part No. X08-41929
`
`2
`
`

`

`Contributors
`
`Peter Aiken
`
`Bart Arenson
`
`Janice Borzendowski
`
`Jerome Colburn
`
`Duane Hanson
`
`Andrew Himes
`
`Robert Howecton
`
`Annette B. Jackson
`
`Larry S. Jackson
`
`Thomas A. Jackson
`
`Chris Kinata
`
`llana Kingsley
`
`Robin Lombard
`
`Thomas A. Long
`
`William G. Madison
`
`Illustrators
`
`Travis Beaven
`
`David Holter
`
`Alton Lawson
`
`Thomas P. Magliery
`
`David Mason
`
`Terrence M. McLaren
`
`Wallace Parker
`
`Charles Petzold
`
`Phil Rose
`
`John Ross
`
`David Rygmyr
`
`Aimée Truchard
`
`Michael Vose
`
`Bruce Webster
`
`Judson D. Weeks
`
`Tom Winn
`
`JoAnne Woodcock
`
`Rob Nance
`
`JoelPanchot
`
`3
`
`

`

`Encapsulated PostScript
`
`End key
`
`programming, to keep the implementation details of a class
`a separate file whose contents do not need to be known by
`a programmer using that class. See also object-oriented
`programming, TCP/IP.
`
`Encapsulated PostScrlpt a. See EPS.
`
`encapsulated type :1. See abstract data type.
`
`encapsulatlon n. 1. In object-oriented programming, the
`packaging of attributes (properties) and functionality
`(methods or behaviors) to create an object that is essen-
`tially a “black box’ ’7one whose internal structure remains
`private and whose services can be accessed by other
`objects only through messages passed via a clearly defined
`interface (the programming equivalent of a mailbox or tele-
`phone line). Encapsulation ensures that the object provid-
`ing service can prevent other objects from manipulating its
`data or procedures directly, andit enables the object
`requesting service to ignore the details of how that service
`is provided. See also information hiding. 2. In terms of the
`Year 2000 problem, a method of dealing with dates that
`entails shifting either program logic (data encapsulation) or
`input (program encapsulation) backward into the past, to a
`parallel year that allows the system to avoid Year 2000
`complications. Encapsulation thus allows processing to
`take place in a “time warp” created by shifting to an earlier
`time before processing and—for accuracy—shifting output
`forward by the same number of years to reflect the actual
`date. See data encapsulation, program encapsulation.
`
`enclpher vb. See encrypt.
`
`encode vb. 1. See encrypt. 2. In programming, to put
`something into code, which frequently involves changing
`the formifor example, changing a decimal number to
`binary-coded form. See also binary-coded decimal,
`EBCDIC.
`
`encoder a. 1. In general, any hardware or software that
`encodes informationithat is, converts the information to
`a particular form or format. For example, the Windows
`Media Encoder converts audio and video to a form that
`can be streamed to clients over a network. 2. In reference
`
`to MP3 digital audio in particular, technology that con-
`verts a WAV audio file into an MP3 file. An MP3 encoder
`
`compresses a sound file to a much smaller size, about
`one-twelfth as large as the original, without a perceptible
`drop in quality. Also called: MP3 encoder. See also MP3,
`WAV. Compare rip, ripper.
`
`encodlng n. 1. See Huffman coding. 2. A method of deal-
`ing with computers with Year 2000 problems that entails
`storing a four-digit year in date fields designed to hold
`only two digits in a program or system. This can be
`accomplished by using the bits associated with the date
`field more efficientlyifor example, by converting the
`date field from ASCII to binary or from decimal to hexa-
`decimal, both of which allow storage of larger values.
`
`encrypt vb. To encode (scramble) information in such a
`way that it is unreadable to all but those individuals pos-
`sessing the key to the code. Encrypted information is
`known as cipher text. Also called: encipher, encode.
`
`encryptlon a. The process of encoding data to prevent
`unauthorized access, especially during transmission.
`Encryption is usually based on one or more keys, or codes,
`that are essential for decoding, or returning the data to
`readable form. The U.S. National Bureau of Standards
`
`created a complex encryption standard, Data Encryption
`Standard (DES), which is based on a 56-bit variable that
`provides for more than 70 quadrillion unique keys to
`encrypt documents. See also DES.
`
`encryptlon key a. A sequence of data that is used to
`encrypt other data and that, consequently, must be used for
`the data’s decryption. See also decryption, encryption.
`
`end-around carry is. A special type of end-around shift
`operation on a binary value that treats the carry bit as an
`extra bit; that is, the carry bit is moved from one end of the
`value to the other. See also carry, end-around shift, shift.
`
`end-around shlft n. An operation performed on a binary
`value in which a bit is shifted out of one end and into the
`
`other end. For example, a right-end shift on the value
`00101001 yields 10010100. See also shift.
`
`en dash n. A punctuation mark (—) used to show ranges
`of dates and numbers, as in 1990—92, and in compound
`adjectives where one part is hyphenated or consists of two
`words, as in pre43ivil War. The en dash is named after a
`typographical unit of measure, the en space, which is half
`the width of an em space. See also em space. Compare em
`dash, hyphen.
`
`End key is. A cursor-control key that moves the cursor to
`a certain position, usually to the end of a line, the end of a
`screen, or the end of a file, depending on the program. See
`the illustration.
`
`192
`
`4
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket