`
`UUmearmaterame);
`Computer Telephony, Telecommunications,
`Networking, Data Communications,
`Voice Processing and the Internet
`
`AeRe
`
`Facebook's Exhibit No. 1010
`
`Facebook's Exhibit No. 1010
`Page 1
`
`
`
`A Flatiron Publishing, Inc. Book
`Published by Flatiron Publishing, Inc.
`Copyright © 1994 by Harry Newton
`
`All rights reserved under International and Pan-American Copyright conventions,
`including the right to reproduce this book or portions thereof in any form
`whatsoever. Published in the United States by Flatiron Publishing, Inc., New
`York.
`
`ISBN 0-936648-60-0
`
`Manufactured in the United States of America
`
`Eighth Edition, November 1994
`Cover Designed by Saul Roldan
`Printed at Bookcrafters, Chelsea, Mi.
`
`Facebook's Exhibit No. 1010
`Page 2
`
`Facebook's Exhibit No. 1010
`Page 2
`
`
`
`NEWTON’S TELECOM DICTIONARY
`
`AP See ADD-ON or APPLICATIONS PROCESSOR.APis an AT&T word for a
`piece of equipment which hangsoff the side of their PBX and makesit do more
`things,like voice mail.
`APA All Points Addressable (APA) method of host graphics implementation which
`usesvertical and horizontalpixel coordinates to create a more graphic image. An
`SNA definition.
`APADAsynchronous Packet Assembler/Disassembler.
`APC Adaptive predictive coding. A narrowband analog-to-digital conversion tech-
`nique employing a one-level or multilevel sampling system in which the value of
`the signal at each sample time is adaptively predicted to be a linear function of
`the past values of the quantized signals. APCis related to linear predictive cod-
`ing (LPC) in that both use adaptive predictors. However, APC uses fewerpredic-
`tion coefficients, thus requiring a higherbit rate than LPC.
`APCC The American Public Communications Council, which is part of the North
`American Telecommunications Association (NATA).
`APD Avalanche PhotoDiode. A diode that, when hit bylight, increasesits electri-
`cal conductivity by a multiplication effect. APDs are usedin lightwavereceivers
`because the APDs have great sensitivity to weakenedlight signals (i.e. those
`whichhavetraveled long distancesoverfiber). APDs are designed to take advan-
`tage of avalanche multiplication of photocurrent.
`APERIODIC ANTENNAAn antenna designed to have an approximately con-
`stant input impedance over a wide rangeof frequencies; e.g., terminated rhombic
`antennas and wave antennas.
`APERTUREFora parabolic reflector or a horn antenna, aperture is the dimen-
`sion of the open mouth and represents a surface over whichit is possible to cal-
`culate the radiation pattern. For a series of n stacked transmitting elements such
`as dipolesor slots, the vertical aperture is usually defined as n times the element
`spacing in wavelengths.
`APERTURE DISTORTION In facsimile, the distortions in resolution, density,
`and shapeof the recorded image causedby the shapeandfinite size of the scan-
`ning and recording apertures or spots.
`API An Application Programming Interface is software that an application pro-
`gram uses to request and carry out lower-level services performed by the com-
`puter’s or a telephone system's operating system. For Windows, the API also
`helps applications manage windows, menus, icons, and other GUI elements. In
`short, an API is a “hook”into software. An API is a set of standard softwareinter-
`rupts, calls, and data formats that application programsusetoinitiate contact with
`network services, mainframe communications programs, telephone equipment or
`program-to-program communications. For example, applications use APIsto call
`services that transport data across a network. Standardization of APIs at various
`layers of a communications protocol stack provides a uniform way to write appli-
`cations. NetBIOSis an early example of a network API. Applications use APIs to
`call services that transport data across a network.
`APLAutomatic Program Loadin telecom. In data processing, it’s a popular pro-
`gramminglanguage.
`
`74
`
`Facebook's Exhibit No. 1010
`Page 3
`
`Facebook's Exhibit No. 1010
`Page 3
`
`
`
`ness training center, saving travel and housing expense.
`UDIOTEX A generic term for interactive voice response equipment and ser-
`vices. Audiotex is to voice what on-line data processingis to data terminals. The
`idea is you Call a phone number. A machine answers, presenting you with sever-
`al options, “Push 1 for information on Plays, Push 2 for information on movies,
`push3 for information on Museums.”If you push 2, the machine may comeback,
`“push 1 for movies on the south side of town, Push 2 for movies onthe north side
`of town, etc.” See also INFORMATION CENTER MAILBOX.
`AUDIOTEXT A different, and less preferred, spelling of AUDIOTEX. See AUDIO-
`TEX.
`AUDITORY PATTERN RECOGNITION Auditory pattern recognition is the
`ability to recognize spoken words.
`AUDIT To conduct an independent review and examination of system records
`and activities in order to test the adequacy andeffectiveness of data security and
`data integrity procedures, to ensure compliance with established policy and oper-
`ational procedures, and to recommendany necessary changes.
`AUDIT TRAILA recordofall the events that occur whenusers request and use
`specific resources. An audit trail gives you the ability to trace who did what and
`who was responsible for what. An audit trail is a chronological record of system
`activities that is sufficient to enable the reconstruction, review, and examination of
`the sequenceof environments and activities surrounding or leading to an opera-
`tion, a procedure or an eventin a transaction from its inception to final results.
`
`Audit trail may apply to information in an automated information system, to the
`routing of messages in a communications system, or to material exchangetrans-
`
`actions, such as in financial audit trails.
`
`AUDITING An AT&T ISDNterm for the monitoring of the status of either the
`network or the ISDN set.
`
`AUDIX VOICE POWERA voice processing application, part of Integrated
`Solution Ill (IS-IIl), that provides Automated Attendant,call answering, voice-
`
`mail, message drop, andinformation services for use with the AT&T Merlin tele-
`
`phone system.
`_ AUGERA type of drill bit typically used to make large, deep holes for passing
`
`wire or cable through wood.
`
`AUI Autonomous Unit Interface or Attachment Unit Interface. Most commonly
`used in reference to the 15 pin D type connector and cables used to connect sin-
`
`gle and multiple channel equipmentto an Ethernettransceiver.
`
`AUPAcceptable Use Policy. The term usedto refer to the restrictions placed on
`use of a network; usually refers to restrictions on use for commercial purposes.
`
`AURALRelating to the sense of hearing.
`
`_ AUSTPACA packet-switched network implementedin Australia.
`AUTHENTICATE To establish, usually by challenge and response,that a trans-
`Mission attempt is authorized and valid. To verify the identity of a user, device, or
`_ other entity in a computer system,or to verify the integrity of data that have been
`Stored, transmitted, or otherwise exposed to possible unauthorized modification.
`
`~
`
`
`
`
`
`
`_
`
`~
`
`CTIONARY
`
`1 about 15 to 20,000 hertz.
`(approximately 20 hertz to 15
`Par,
`
`ch the human ear can detect
`those from 300 to 3,000 hertz
`2 phone doesn't sound “Hi-Fi,”
`‘essing system. The user can
`} a menuoption by hitting a
`two. Computer or voice pro-
`ays — menu-driven and non-
`or users to use, but they can
`bly spoken in a few seconds,
`omated attendant/voice mes-
`‘sing applications. See also
`
`IFICATION AMIS.Issued in
`{ at addressing the problem of
`rent vendors can network or
`vendors could not exchange
`‘ion between two systemsfor
`‘ot describe the userinterface
`nent AMISin a particular sys-
`
`is based on com-
`IS-Digital,
`iging systems.All the control
`2d between systemsin digital
`lls for the use of DTMF tones
`le messageitself is in analog
`der 1990 issue of Business
`of Hinsdale, IL. AMIS specifi-
`'55-7785.
`
`tes computer output into spo-
`i “If you want the weatherin
`er. But that weather would be
`/ more technical explanation:
`ithesized voice responsesto
`vices process calls based on
`\ta base, and information car-
`ire used to increase the num-
`sistent quality in information
`‘OICE RESPONSE.
`sound and visual images to
`idiographics generally refers
`2posed to continuous frame
`‘ansmission is often used to —
`jucational institution or busi-
`—
`
`NEWTON’S TELECOM DICTIONARY
`
`
`
` 101
`
`Facebook's Exhibit No. 1010
`Page 4
`
`Facebook's Exhibit No. 1010
`Page 4
`
`
`
`NEWTON’S TELECOM DICTIONARY
`
`
`
`102
`
`A challenge given by voice or electrical means to attest to the authenticity of q—
`messageor transmission.
`AUTHENTICATIONTheprocess whereby a useror information source proves
`they are who theyclaim to be.
`AUTHORING Authoring is the process of using multimedia applications tg
`create multimedia materials for others to view. Multimedia authoring uses many
`tools, from the more familiar text editor or desktop publishing application, tg |
`tools for capturing and manipulating video images or editing audiofiles. Authors 7
`might include specialized creators of training, sales, or corporate applications ©
`such as insurance claims processing. Or, they might be creators of everyday|
`business communications like voice-annotated email. Over time, everyone —
`involved in business communications will probably have somelevel of multime- 7
`dia authoring capability.
`q
`AUTHORING SYSTEM Software which helps developers design interactive —
`courseware easily, without heavy computer programming. See AUTHORING.
`|
`AUTHORIZED AGENTAlso called Authorized Sales Agent. A term chosenby ©
`someofthe Bell operating companies and manyofthe cellular phone companies
`to refer to companies which sell their network services on commission. Some of
`these companies have specific industry knowledge and have written specialized ©
`software. The idea is to work with businesses to arm them with the absolute best ”
`package of telecommunications hardware, software and services.
`AUTHORIZED BANDWIDTH The necessary bandwidth required for trans-
`mission and reception of intelligence. This definition does not include allowance
`for transmitter drift or Doppler shift.
`AUTHORIZED FREQUENCYA frequency thatis allocated and assigned by an
`authority to a specific user for a specific purpose.
`AUTHORIZATION Think of charging things on your MasterCard, Visa, or
`American Expresscard.If the store cannot authorize the amountof your purchase,
`your Visa card will not allow you to make the purchase. Authorization is needed for
`many long distance calls, especially those made using credit cards, telephone
`companycalling card, etc. Authorization is done by the operator’s computer check-
`ing with the remote validation database service. See BVA, BVS and VALIDATION.
`AUTHORIZATION CODEA code in numbers and/orletters employed by a
`user to gain access to a system or service.
`If you are making a call out on a
`restricted line, the PBX will ask you for an authorization code. If you have one,
`your call will go through.
`If not, your call will be denied (i.e. not go through).
`Authorization codes comein various flavors. Some can be used for making long
`distance calls. Some can be used also for international calls, etc. See AUTHO-
`RIZED USER.
`AUTHORIZED USERA person, firm, corporation or any other legal entity
`4
`authorized by the provider of the service to use the service being provided.
`AUTO ADJUST An AT&T ISDN term. The automatic setting of the baud rate. ©
`The baud rate is automatically set through the use of the AT portion of the com-
`mandline. The speed of the computeris determined from the A and the parity is ©
`determined from the combination of the A andT. Forthis reason, it is not neces- 7
`
`Facebook's Exhibit No. 1010
`Page 5
`
`Facebook's Exhibit No. 1010
`Page 5
`
`
`
`NEWTON’S TELECOM DICTIONARY
`
`consoles your chosen PBX can use.
`MULTIPLE CUSTOMER GROUP OPERATION A PBX shared by several
`different companies, each having separate consoles andtrunks.
`MULTIPLE DOMAINSA set of domains on a single LAN, each of which has
`its own domain-wide postoffice. Hosts within each domain can exchange mail by
`going through one domain postoffice. Hosts in different domains must generally
`send mail though two intermediary post offices: the sender’s domain postoffice
`and the receiver’s domain postoffice.
`MULTIPLE FREQUENCY-SHIFT KEYING MFSK. A form of frequency-shift
`keying in which muitiple codes are used in the transmission of digital signals. The
`coding systems may use multiple frequencies transmitted concurrently ar seauen-
`tially.
`MULTIPLE HOMING Connecting your phone soit can be served by one or
`several switching centers. This service may use a single directory number.It may.
`also use several directory numbers (another term for phone ‘numbers).
`It all
`depends on how yousetthe service up with your local phone company. The idea
`is to give you more ways of reaching the switched network — in case one or more
`of your local loops breaks.
`MULTIPLE LISTED DIRECTORY NUMBER SERVICE Permits more than
`onelisted directory number to be associated with a single PBX.
`=
`MULTIPLE NAME SPACES The association of several names or other pieces
`of information with the samefile. This allows renamingfiles and designating them
`for dissimilar computer systems such as the PC and the Mac.
`MULTIPLE PARALLEL PROCESSINGA method offault tolerance used with
`host computers. Several CPUs cooperate to process data.
`It one CPU fails, its
`processing tasks are automatically assigned to other processors.
`MULTIPLE PROTOCOL ROUTER A communications device designed to
`make decisions about which path a packet of information will take. The packets
`are routed according to address information contained within, and can route
`across different protocols.
`MULTIPLE ROUTING The process of sending a message to more than one
`recipient, usually whenall destinations are specified in the header of the message.
`MULTIPLE SPOT SCANNINGIn facsimile systems, the method in which
`scanning is carried on simultaneously by two or more scanning spots, each one
`analyzingits fraction of the total scanned area of the subject copy.
`MULTIPLE TOKEN OPERATION Variant of token passing for rings in which
`a free token on a LANis transmitted immediately after the last bit of the data pack-
`et, allowing multiple tokens on ring (but only one free token) simultaneously.
`MULTIPLE TUNED ANTENNA Anantenna with connections through induc-
`tances to ground at more than one point and so determined that the total reac-
`tancesin parallel are equal to those necessary to give the antenna the desired
`natural frequency.
`—
`MULTIPLEX To transmit two or more signals over a single channel.
`MULTIPLEX AGGREGATE BIT RATE Thebit rate in a time division multi-
`
`677
`
`Facebook's Exhibit No. 1010
`Page 6
`
`Facebook's Exhibit No. 1010
`Page 6
`
`
`
`NEWTON’S TELECOM DICTIONARY
`
`plexer that is equal to the sum of the input channel data signaling rates available
`to the user plus the rate of the overhead bits required.
`MULTIPLEX BASEBAND in frequency division multiplexing, the frequency
`band occupied by the aggregate of the signals in the line interconnecting the mul-
`tiplexing and radio or line equipment.
`MULTIPLEX HIERARCHYIn the U.S. frequency division multiplex hierarchy,
`12 channels = 1 group
`5 groups (60 channels) = 1 supergroup
`10 supergroups (600 channels) = 1 mastergroup
`6 mastergroups = 1 jumbo group
`In contrast, the CCITT standard says 5 supergroups(i.e. 300 channels) = 1 mas-
`tergroup.
`MULTIPLEXED CHANNEL A communications channel capable of carrying the
`telecommunications transmissions of a number of devices or users at one time.
`MULTIPLEXER Electronic equipment which allows two or more signals to pass
`over one communicationscircuit. That “circuit may be a phone line, a microwave
`circuit, a through-the-air TV signal. That circuit may be analog or digital. There are
`many multiplexing techniques to accommodate both.
`MAULTIPLEXING EFFICIENCY Figure of merit for multiplexers. Theratio of the
`aggregate channelinput data rate to the composite output data rate. Manystatis-
`tical multiplexers achieve a multiplexing efficiency of 8 or more.
`MULTIPOINT GROUNDING SYSTEMAsystem of equipment bonded
`together and also bondedto thefacility ground.
`MULTIPORT CARBA circuit board with two or more ports for modems orother
`devices. Useful for enabling one PC to handle multiple incoming or outgoing calls
`at one time.
`MULTIPORT REPEATERA repeater, either standalone or connected to stan-
`dard Ethernet cable, for interconnecting up to eight ThinWire Ethernet segments.
`MULTIPORT SWITCH A local area network term. A device which allows pack-
`ets to switch from one cable to another.
`MULTi PROCESSINGA type of computing characterized by sysiems that use
`more than one CPUto execute applications. Multi processing is not multi tasking,
`whichis the ability to have more one application running on a system at the same
`time. The technique is not associated with multi processing, nor does it require multi
`processing to take place. Multi tasking typically uses a computer with one CPU (e.g.
`your desktop or laptop). Multi processing uses a computer with several CPUs, often
`a server. See MULTI-PROCESSING, MULTI-TASKING and MULTI-THREADED.
`MULTISESSIONAn incrementally updated Kodak Photo CD. See MULTI-SES-
`SION for a fuller explanation.
`MULTI TASKING See MULTI-TASKING.
`MULTITHREADED See MULTI-THREADED.
`MURIEL Muriel Fullam worked for me for ten years before she worked with me
`
`678
`
`Facebook's Exhibit No. 1010
`Page 7
`
`Facebook's Exhibit No. 1010
`Page 7
`
`
`
`NEWTON’S TELECOM DICTIONARY
`
`Andit's a success because the French phone companyfundsit.
`VIEW 1. In satellite communications, the ability of a satellite to “see” a satellite
`earthstation, aimed sufficiently above the horizon and clear of other obstructions
`so thatit is within a free line of sight. A pair of satellite earthstations has a satel.
`lite in “mutual” view when both enjoy unobstructedline-of-sight contact with the
`satellite simultaneously. 2. An alternative way of looking at the data in one or more
`database tables. A view is usually created as a subset of columns from one or
`moretables.
`VIEWDATAAninformationretrieval system that uses a remote database acces-
`sible through the public telephone network. Video display of the data is on a mon-
`itor or television receiver. Another name for Videotex, the original English (UK)
`name forit. See VIDEOTEX.
`VIM Vendor Independent Messaging. A new E-mail protocol developed by Lotus,
`Apple, Novell and Borland to provide a commonlayer where dissimilar messag-
`ing programs can share data and back-end services. A group called the Vendor
`Independent Messaging Groupwill is intent on developing an open, industry-stan-
`dard interface that will allow e-mail features to be built into a variety of software
`products.
`VINES Virtual NEtwork System. A network operating system developed and mar-
`keted by Banyan Systems, Westboro, MA. Vines is based on Unix system V. This
`network operating system provides transparent communication across heteroge-
`neous networks and is more expansive, although attracting far fewer users, than
`Novell's NetWare.
`VIRTUALIn the telephone industry, “Virtual” is something that pretends to be
`somethingit isn’t, but can be made to appearto bethat thing. A virtual private line
`is effectively a dial up phoneline with an auto-dialer onit. To the user, it appears
`to be a private line. (But the phone company can re-sell that capacity whenit’s not
`in use.) The conceptof “virtual” is to give the telephone company an excuse to
`lowerthe price to the end user. See VIRTUAL NETWORK.
`VIRTUAL 8086 MODEVirtual 8086 mode allowsthe Intel 80386 and beyond
`microprocessors to emulate multiple real mode processors andstill switch to and
`from protected modem. The processor can load and execute real mode applica-
`tions (in virtual 8086 mode), then switch to protected mode and load and execute
`another application that requires access to the full extended memory available.
`The microprocessor, together with a control program like Microsoft Windows 3.x
`or OS/2 assumes the responsibility of protecting applications from one another.
`See REAL MODE and PROTECTED MODE.
`VIRTUAL BANDING 1.
`In WATSservices, virtual banding is the ability of
`trunks to carry traffic to all WATS bands, with billing based on the end points of
`the call instead of the band over which thetraffic went. 2. MCI’s definition: Allows
`customers of MCI’s, PRISM, Hotel WATS, and University WATSto call nationwide
`while only paying for the distance to the actual area. For example,if a customer
`calls to a Band 1 area, Band 1 pricing is used. Similarly,
`if a call is placed to a
`Band 4 area, Band4 pricing is used.
`VIRTUAL BYPASSVirtual bypass is a way smaller users can fill the unused
`portion of local T-1 dedicated loops going from a usersite to a local office of a long
`
`1114
`
`Facebook's Exhibit No. 1010
`Page 8
`
`Facebook's Exhibit No. 1010
`Page 8
`
`
`
`NEWTON’S TELECOM DICTIONARY
`
`distance company,called a POP (Point of Presence).
`VIRTUAL CALL CAPABILITY Provides setup and clearing on a percall basis.
`Eachcall placed appears to have a dedicated connectionfor the duration ofthe call.
`VIRTUAL CELLAcall, established over a network, that uses the capabilities of
`eithera real orvirtual circuit by sharing all or any part of the resourcesofthecir-
`cuit for the duration of the call.
`VIRTUAL CALL CAPABILITY A data communications packet network service
`feature in which a call setup procedure and a call-clearing procedure will deter-
`mine a period of communication between two DTEs.This service requires end-to-
`end transfer control of packets within a network. Data may bedelivered to the net-
`work before the call setup has been completed butit will not be delivered to the
`destination addressif the call setup is not successful. The user's data are deliv-
`ered from the network in the sameorder in which they are received by the net-
`work. See also VIRTUAL CIRCUIT.
`VIRTUAL CIRCUIT A communicationslink — voice or data — that appears to
`the user to be a dedicated point-to-point circuit. Virtual circuits are generally set
`up on a per-call basis and disconnected whenthe call is ended. The concept of a
`virtualcircuit was first used in data communications with packet switching. A pack-
`etized data call may send packets overdifferent physical paths through a network
`to its destination, but is considered to haveasingle virtual circuit. Virtual circuits
`have become more commonin ultra-high speed applications,like frame relay or
`SMDS.There the connection might be permanently connectedlike a LAN. When
`the user wants to transmit he simply transmits. There’s no dialing in the conven-
`tional sense, just the addition of an address field on the information being trans-
`mitted. A virtual circuit is referred to as a logical, rather than physical path for a
`call. A virtual voice circuit is anything from as simple as a phone with an auto
`dialerin it to a high-speedlink in which voice calls are digitized and sendon the
`equivalent of a ultra high-speed, wide-area equivalent of a local area network.
`There are two basic reasons people buy virtual circuits. They're cheaper and
`faster. See PERMANENTVIRTUAL CIRCUIT.
`VIRTUAL CIRCUIT CAPABILITY A network service feature providing a user
`with a virtual circuit. This feature is not necessarily limited to packet mode trans-
`mission. @.g., an analog signal may be convertedatits network node to a digital
`form, which may then be routed over the network via any available route. See VIR-
`TUAL CIRCUIT.
`VIRTUAL CO-LOCATIONThere are several definitions of this evolving.First:
`Someoneotherthanthe local phone company(called an interconnector) can des-
`ignate his choice of transmission equipmentto be located within a local exchange
`carrier's central office and dedicated to its use. The interconnector would have the
`right to remotely monitor and control the equipment, but the local exchangecarri-
`er would install, maintain, and repairit. Second; And this is a more restricted def-
`inition. Connection is done from sites near telephonecentraloffices, but not with-
`in them.
`VIRTUAL COMPUTINGA new term for software that shapes computing hard-
`ware into hardware that never was. Virtual computing uses FPGAs — Field
`Programmable Gate Arrays. See FPGAs.
`
`1495
`
`Facebook's Exhibit No. 1010
`Page 9
`
`Facebook's Exhibit No. 1010
`Page 9
`
`
`
`NEWTON’S TELECOM DICTIONARY
`
`VIRTUAL CONNECTIONA logical connection that is madeto a virtualcircuit.
`VIRTUAL DEVICE A device that software can refer to but that doesn’t physical-
`ly exist.
`VIRTUAL DISK A portion of RAM (Random Access Memory) assigned to sim-
`ulate a disk drive. Also called a ram disk. See RAM DISK.
`VIRTUAL HARD DRIVE MEMORY FACTORTheavailable space on a hard
`drive partition that Windows can address as physical memory.
`VIRTUAL LANA logical grouping of users regardless oftheir physical locations
`on the network. Racal-Datacom defines a virtual LAN as “a LAN extended beyond
`its geographicallimit and flexibly configured to add or removelocations.’ LANsare
`typically extended beyond their geographicallimits (i.e. several thousand feet with-
`in a building or campus) by using telephone companyfacilities,like T-1, T-3, Sonet,
`etc.
`VIRTUAL MACHINE FACILITY VM/370. An IBM system control program,
`essentially an operating system that controls the concurrent execution of multiple
`virtual machines on a single System/370 mainframe.
`VIRTUAL MACHINEVM. Software that mimics the performance of a hardware
`device. For Intel 80386 and higher processors, a virtual machine is protected
`memory spacethat is created through the processor's hardware capabilities.
`VIRTUAL MEMORY j. in computer systems, the memory asit appears to the
`operating programs running in the CPU. This memory may appear smaller, equal
`to, or larger than the real memory presentin the system.
`2. The term used with Apple Macintoshes to connotethe ability to use disk swap
`files as RAM. This requires the Macintosh to be running System 7 and PMMU.3.
`The space on your hard disk that Windows NTusesasif it were actually memo-
`ry. Windows NT doesthis through the use of swapfiles. The benefit of using vir-
`tual memory is that you can run more applications at one time than your system's
`physical memory would otherwise allow. The drawbacks are the disk space
`required for the virtual-memory swapfile and the decreased execution speed
`when swappingis reburied.
`VIRTUAL MEMORY MANAGERVirtual Memory Manageris a software-only
`approach to Expanded Memory. These work almostidentically to the EMS emu-
`lators, except that they use your hard disk rather than extended memory as the
`storage medium for blocks of memory copied out of your program. As you can
`imagine, this is painfully s-I-o-w. Use this approachonly asa last resort.
`VIRTUAL NETWORKA network that is programmed, not hard-wired, to meet
`a customer's specifications. Created on as-needed basis. Also called Software
`Defined Network by AT&T. See SOFTWARE DEFINED NETWORK and VIRTUAL
`PRIVATE NETWORK.
`VIRTUAL PRINTER TECHNOLOGYVPT.Virtual Printer Technology is the
`enterprise network printer architecture developed by Dataproducts Corporation
`that enables a printer to becomean intelligent node in a networked computing
`environment and provide printing services to other network nodes through a
`Client/Servertype relationship.
`VIRTUAL PRIVATE NETWORKAcarrier-provided service in which the pub-
`
`1116
`
`Facebook's Exhibit No. 1010
`Page 10
`
`Facebook's Exhibit No. 1010
`Page 10
`
`