throbber
Page 1
`
`UUmearmaterame);
`Computer Telephony, Telecommunications,
`Networking, Data Communications,
`Voice Processing and the Internet
`
`AeRe
`
`Facebook's Exhibit No. 1010
`
`Facebook's Exhibit No. 1010
`Page 1
`
`

`

`A Flatiron Publishing, Inc. Book
`Published by Flatiron Publishing, Inc.
`Copyright © 1994 by Harry Newton
`
`All rights reserved under International and Pan-American Copyright conventions,
`including the right to reproduce this book or portions thereof in any form
`whatsoever. Published in the United States by Flatiron Publishing, Inc., New
`York.
`
`ISBN 0-936648-60-0
`
`Manufactured in the United States of America
`
`Eighth Edition, November 1994
`Cover Designed by Saul Roldan
`Printed at Bookcrafters, Chelsea, Mi.
`
`Facebook's Exhibit No. 1010
`Page 2
`
`Facebook's Exhibit No. 1010
`Page 2
`
`

`

`NEWTON’S TELECOM DICTIONARY
`
`AP See ADD-ON or APPLICATIONS PROCESSOR.APis an AT&T word for a
`piece of equipment which hangsoff the side of their PBX and makesit do more
`things,like voice mail.
`APA All Points Addressable (APA) method of host graphics implementation which
`usesvertical and horizontalpixel coordinates to create a more graphic image. An
`SNA definition.
`APADAsynchronous Packet Assembler/Disassembler.
`APC Adaptive predictive coding. A narrowband analog-to-digital conversion tech-
`nique employing a one-level or multilevel sampling system in which the value of
`the signal at each sample time is adaptively predicted to be a linear function of
`the past values of the quantized signals. APCis related to linear predictive cod-
`ing (LPC) in that both use adaptive predictors. However, APC uses fewerpredic-
`tion coefficients, thus requiring a higherbit rate than LPC.
`APCC The American Public Communications Council, which is part of the North
`American Telecommunications Association (NATA).
`APD Avalanche PhotoDiode. A diode that, when hit bylight, increasesits electri-
`cal conductivity by a multiplication effect. APDs are usedin lightwavereceivers
`because the APDs have great sensitivity to weakenedlight signals (i.e. those
`whichhavetraveled long distancesoverfiber). APDs are designed to take advan-
`tage of avalanche multiplication of photocurrent.
`APERIODIC ANTENNAAn antenna designed to have an approximately con-
`stant input impedance over a wide rangeof frequencies; e.g., terminated rhombic
`antennas and wave antennas.
`APERTUREFora parabolic reflector or a horn antenna, aperture is the dimen-
`sion of the open mouth and represents a surface over whichit is possible to cal-
`culate the radiation pattern. For a series of n stacked transmitting elements such
`as dipolesor slots, the vertical aperture is usually defined as n times the element
`spacing in wavelengths.
`APERTURE DISTORTION In facsimile, the distortions in resolution, density,
`and shapeof the recorded image causedby the shapeandfinite size of the scan-
`ning and recording apertures or spots.
`API An Application Programming Interface is software that an application pro-
`gram uses to request and carry out lower-level services performed by the com-
`puter’s or a telephone system's operating system. For Windows, the API also
`helps applications manage windows, menus, icons, and other GUI elements. In
`short, an API is a “hook”into software. An API is a set of standard softwareinter-
`rupts, calls, and data formats that application programsusetoinitiate contact with
`network services, mainframe communications programs, telephone equipment or
`program-to-program communications. For example, applications use APIsto call
`services that transport data across a network. Standardization of APIs at various
`layers of a communications protocol stack provides a uniform way to write appli-
`cations. NetBIOSis an early example of a network API. Applications use APIs to
`call services that transport data across a network.
`APLAutomatic Program Loadin telecom. In data processing, it’s a popular pro-
`gramminglanguage.
`
`74
`
`Facebook's Exhibit No. 1010
`Page 3
`
`Facebook's Exhibit No. 1010
`Page 3
`
`

`

`ness training center, saving travel and housing expense.
`UDIOTEX A generic term for interactive voice response equipment and ser-
`vices. Audiotex is to voice what on-line data processingis to data terminals. The
`idea is you Call a phone number. A machine answers, presenting you with sever-
`al options, “Push 1 for information on Plays, Push 2 for information on movies,
`push3 for information on Museums.”If you push 2, the machine may comeback,
`“push 1 for movies on the south side of town, Push 2 for movies onthe north side
`of town, etc.” See also INFORMATION CENTER MAILBOX.
`AUDIOTEXT A different, and less preferred, spelling of AUDIOTEX. See AUDIO-
`TEX.
`AUDITORY PATTERN RECOGNITION Auditory pattern recognition is the
`ability to recognize spoken words.
`AUDIT To conduct an independent review and examination of system records
`and activities in order to test the adequacy andeffectiveness of data security and
`data integrity procedures, to ensure compliance with established policy and oper-
`ational procedures, and to recommendany necessary changes.
`AUDIT TRAILA recordofall the events that occur whenusers request and use
`specific resources. An audit trail gives you the ability to trace who did what and
`who was responsible for what. An audit trail is a chronological record of system
`activities that is sufficient to enable the reconstruction, review, and examination of
`the sequenceof environments and activities surrounding or leading to an opera-
`tion, a procedure or an eventin a transaction from its inception to final results.
`
`Audit trail may apply to information in an automated information system, to the
`routing of messages in a communications system, or to material exchangetrans-
`
`actions, such as in financial audit trails.
`
`AUDITING An AT&T ISDNterm for the monitoring of the status of either the
`network or the ISDN set.
`
`AUDIX VOICE POWERA voice processing application, part of Integrated
`Solution Ill (IS-IIl), that provides Automated Attendant,call answering, voice-
`
`mail, message drop, andinformation services for use with the AT&T Merlin tele-
`
`phone system.
`_ AUGERA type of drill bit typically used to make large, deep holes for passing
`
`wire or cable through wood.
`
`AUI Autonomous Unit Interface or Attachment Unit Interface. Most commonly
`used in reference to the 15 pin D type connector and cables used to connect sin-
`
`gle and multiple channel equipmentto an Ethernettransceiver.
`
`AUPAcceptable Use Policy. The term usedto refer to the restrictions placed on
`use of a network; usually refers to restrictions on use for commercial purposes.
`
`AURALRelating to the sense of hearing.
`
`_ AUSTPACA packet-switched network implementedin Australia.
`AUTHENTICATE To establish, usually by challenge and response,that a trans-
`Mission attempt is authorized and valid. To verify the identity of a user, device, or
`_ other entity in a computer system,or to verify the integrity of data that have been
`Stored, transmitted, or otherwise exposed to possible unauthorized modification.
`
`~
`
`
`
`
`
`
`_
`
`~
`
`CTIONARY
`
`1 about 15 to 20,000 hertz.
`(approximately 20 hertz to 15
`Par,
`
`ch the human ear can detect
`those from 300 to 3,000 hertz
`2 phone doesn't sound “Hi-Fi,”
`‘essing system. The user can
`} a menuoption by hitting a
`two. Computer or voice pro-
`ays — menu-driven and non-
`or users to use, but they can
`bly spoken in a few seconds,
`omated attendant/voice mes-
`‘sing applications. See also
`
`IFICATION AMIS.Issued in
`{ at addressing the problem of
`rent vendors can network or
`vendors could not exchange
`‘ion between two systemsfor
`‘ot describe the userinterface
`nent AMISin a particular sys-
`
`is based on com-
`IS-Digital,
`iging systems.All the control
`2d between systemsin digital
`lls for the use of DTMF tones
`le messageitself is in analog
`der 1990 issue of Business
`of Hinsdale, IL. AMIS specifi-
`'55-7785.
`
`tes computer output into spo-
`i “If you want the weatherin
`er. But that weather would be
`/ more technical explanation:
`ithesized voice responsesto
`vices process calls based on
`\ta base, and information car-
`ire used to increase the num-
`sistent quality in information
`‘OICE RESPONSE.
`sound and visual images to
`idiographics generally refers
`2posed to continuous frame
`‘ansmission is often used to —
`jucational institution or busi-
`—
`
`NEWTON’S TELECOM DICTIONARY
`
`
`
` 101
`
`Facebook's Exhibit No. 1010
`Page 4
`
`Facebook's Exhibit No. 1010
`Page 4
`
`

`

`NEWTON’S TELECOM DICTIONARY
`
`
`
`102
`
`A challenge given by voice or electrical means to attest to the authenticity of q—
`messageor transmission.
`AUTHENTICATIONTheprocess whereby a useror information source proves
`they are who theyclaim to be.
`AUTHORING Authoring is the process of using multimedia applications tg
`create multimedia materials for others to view. Multimedia authoring uses many
`tools, from the more familiar text editor or desktop publishing application, tg |
`tools for capturing and manipulating video images or editing audiofiles. Authors 7
`might include specialized creators of training, sales, or corporate applications ©
`such as insurance claims processing. Or, they might be creators of everyday|
`business communications like voice-annotated email. Over time, everyone —
`involved in business communications will probably have somelevel of multime- 7
`dia authoring capability.
`q
`AUTHORING SYSTEM Software which helps developers design interactive —
`courseware easily, without heavy computer programming. See AUTHORING.
`|
`AUTHORIZED AGENTAlso called Authorized Sales Agent. A term chosenby ©
`someofthe Bell operating companies and manyofthe cellular phone companies
`to refer to companies which sell their network services on commission. Some of
`these companies have specific industry knowledge and have written specialized ©
`software. The idea is to work with businesses to arm them with the absolute best ”
`package of telecommunications hardware, software and services.
`AUTHORIZED BANDWIDTH The necessary bandwidth required for trans-
`mission and reception of intelligence. This definition does not include allowance
`for transmitter drift or Doppler shift.
`AUTHORIZED FREQUENCYA frequency thatis allocated and assigned by an
`authority to a specific user for a specific purpose.
`AUTHORIZATION Think of charging things on your MasterCard, Visa, or
`American Expresscard.If the store cannot authorize the amountof your purchase,
`your Visa card will not allow you to make the purchase. Authorization is needed for
`many long distance calls, especially those made using credit cards, telephone
`companycalling card, etc. Authorization is done by the operator’s computer check-
`ing with the remote validation database service. See BVA, BVS and VALIDATION.
`AUTHORIZATION CODEA code in numbers and/orletters employed by a
`user to gain access to a system or service.
`If you are making a call out on a
`restricted line, the PBX will ask you for an authorization code. If you have one,
`your call will go through.
`If not, your call will be denied (i.e. not go through).
`Authorization codes comein various flavors. Some can be used for making long
`distance calls. Some can be used also for international calls, etc. See AUTHO-
`RIZED USER.
`AUTHORIZED USERA person, firm, corporation or any other legal entity
`4
`authorized by the provider of the service to use the service being provided.
`AUTO ADJUST An AT&T ISDN term. The automatic setting of the baud rate. ©
`The baud rate is automatically set through the use of the AT portion of the com-
`mandline. The speed of the computeris determined from the A and the parity is ©
`determined from the combination of the A andT. Forthis reason, it is not neces- 7
`
`Facebook's Exhibit No. 1010
`Page 5
`
`Facebook's Exhibit No. 1010
`Page 5
`
`

`

`NEWTON’S TELECOM DICTIONARY
`
`consoles your chosen PBX can use.
`MULTIPLE CUSTOMER GROUP OPERATION A PBX shared by several
`different companies, each having separate consoles andtrunks.
`MULTIPLE DOMAINSA set of domains on a single LAN, each of which has
`its own domain-wide postoffice. Hosts within each domain can exchange mail by
`going through one domain postoffice. Hosts in different domains must generally
`send mail though two intermediary post offices: the sender’s domain postoffice
`and the receiver’s domain postoffice.
`MULTIPLE FREQUENCY-SHIFT KEYING MFSK. A form of frequency-shift
`keying in which muitiple codes are used in the transmission of digital signals. The
`coding systems may use multiple frequencies transmitted concurrently ar seauen-
`tially.
`MULTIPLE HOMING Connecting your phone soit can be served by one or
`several switching centers. This service may use a single directory number.It may.
`also use several directory numbers (another term for phone ‘numbers).
`It all
`depends on how yousetthe service up with your local phone company. The idea
`is to give you more ways of reaching the switched network — in case one or more
`of your local loops breaks.
`MULTIPLE LISTED DIRECTORY NUMBER SERVICE Permits more than
`onelisted directory number to be associated with a single PBX.
`=
`MULTIPLE NAME SPACES The association of several names or other pieces
`of information with the samefile. This allows renamingfiles and designating them
`for dissimilar computer systems such as the PC and the Mac.
`MULTIPLE PARALLEL PROCESSINGA method offault tolerance used with
`host computers. Several CPUs cooperate to process data.
`It one CPU fails, its
`processing tasks are automatically assigned to other processors.
`MULTIPLE PROTOCOL ROUTER A communications device designed to
`make decisions about which path a packet of information will take. The packets
`are routed according to address information contained within, and can route
`across different protocols.
`MULTIPLE ROUTING The process of sending a message to more than one
`recipient, usually whenall destinations are specified in the header of the message.
`MULTIPLE SPOT SCANNINGIn facsimile systems, the method in which
`scanning is carried on simultaneously by two or more scanning spots, each one
`analyzingits fraction of the total scanned area of the subject copy.
`MULTIPLE TOKEN OPERATION Variant of token passing for rings in which
`a free token on a LANis transmitted immediately after the last bit of the data pack-
`et, allowing multiple tokens on ring (but only one free token) simultaneously.
`MULTIPLE TUNED ANTENNA Anantenna with connections through induc-
`tances to ground at more than one point and so determined that the total reac-
`tancesin parallel are equal to those necessary to give the antenna the desired
`natural frequency.
`—
`MULTIPLEX To transmit two or more signals over a single channel.
`MULTIPLEX AGGREGATE BIT RATE Thebit rate in a time division multi-
`
`677
`
`Facebook's Exhibit No. 1010
`Page 6
`
`Facebook's Exhibit No. 1010
`Page 6
`
`

`

`NEWTON’S TELECOM DICTIONARY
`
`plexer that is equal to the sum of the input channel data signaling rates available
`to the user plus the rate of the overhead bits required.
`MULTIPLEX BASEBAND in frequency division multiplexing, the frequency
`band occupied by the aggregate of the signals in the line interconnecting the mul-
`tiplexing and radio or line equipment.
`MULTIPLEX HIERARCHYIn the U.S. frequency division multiplex hierarchy,
`12 channels = 1 group
`5 groups (60 channels) = 1 supergroup
`10 supergroups (600 channels) = 1 mastergroup
`6 mastergroups = 1 jumbo group
`In contrast, the CCITT standard says 5 supergroups(i.e. 300 channels) = 1 mas-
`tergroup.
`MULTIPLEXED CHANNEL A communications channel capable of carrying the
`telecommunications transmissions of a number of devices or users at one time.
`MULTIPLEXER Electronic equipment which allows two or more signals to pass
`over one communicationscircuit. That “circuit may be a phone line, a microwave
`circuit, a through-the-air TV signal. That circuit may be analog or digital. There are
`many multiplexing techniques to accommodate both.
`MAULTIPLEXING EFFICIENCY Figure of merit for multiplexers. Theratio of the
`aggregate channelinput data rate to the composite output data rate. Manystatis-
`tical multiplexers achieve a multiplexing efficiency of 8 or more.
`MULTIPOINT GROUNDING SYSTEMAsystem of equipment bonded
`together and also bondedto thefacility ground.
`MULTIPORT CARBA circuit board with two or more ports for modems orother
`devices. Useful for enabling one PC to handle multiple incoming or outgoing calls
`at one time.
`MULTIPORT REPEATERA repeater, either standalone or connected to stan-
`dard Ethernet cable, for interconnecting up to eight ThinWire Ethernet segments.
`MULTIPORT SWITCH A local area network term. A device which allows pack-
`ets to switch from one cable to another.
`MULTi PROCESSINGA type of computing characterized by sysiems that use
`more than one CPUto execute applications. Multi processing is not multi tasking,
`whichis the ability to have more one application running on a system at the same
`time. The technique is not associated with multi processing, nor does it require multi
`processing to take place. Multi tasking typically uses a computer with one CPU (e.g.
`your desktop or laptop). Multi processing uses a computer with several CPUs, often
`a server. See MULTI-PROCESSING, MULTI-TASKING and MULTI-THREADED.
`MULTISESSIONAn incrementally updated Kodak Photo CD. See MULTI-SES-
`SION for a fuller explanation.
`MULTI TASKING See MULTI-TASKING.
`MULTITHREADED See MULTI-THREADED.
`MURIEL Muriel Fullam worked for me for ten years before she worked with me
`
`678
`
`Facebook's Exhibit No. 1010
`Page 7
`
`Facebook's Exhibit No. 1010
`Page 7
`
`

`

`NEWTON’S TELECOM DICTIONARY
`
`Andit's a success because the French phone companyfundsit.
`VIEW 1. In satellite communications, the ability of a satellite to “see” a satellite
`earthstation, aimed sufficiently above the horizon and clear of other obstructions
`so thatit is within a free line of sight. A pair of satellite earthstations has a satel.
`lite in “mutual” view when both enjoy unobstructedline-of-sight contact with the
`satellite simultaneously. 2. An alternative way of looking at the data in one or more
`database tables. A view is usually created as a subset of columns from one or
`moretables.
`VIEWDATAAninformationretrieval system that uses a remote database acces-
`sible through the public telephone network. Video display of the data is on a mon-
`itor or television receiver. Another name for Videotex, the original English (UK)
`name forit. See VIDEOTEX.
`VIM Vendor Independent Messaging. A new E-mail protocol developed by Lotus,
`Apple, Novell and Borland to provide a commonlayer where dissimilar messag-
`ing programs can share data and back-end services. A group called the Vendor
`Independent Messaging Groupwill is intent on developing an open, industry-stan-
`dard interface that will allow e-mail features to be built into a variety of software
`products.
`VINES Virtual NEtwork System. A network operating system developed and mar-
`keted by Banyan Systems, Westboro, MA. Vines is based on Unix system V. This
`network operating system provides transparent communication across heteroge-
`neous networks and is more expansive, although attracting far fewer users, than
`Novell's NetWare.
`VIRTUALIn the telephone industry, “Virtual” is something that pretends to be
`somethingit isn’t, but can be made to appearto bethat thing. A virtual private line
`is effectively a dial up phoneline with an auto-dialer onit. To the user, it appears
`to be a private line. (But the phone company can re-sell that capacity whenit’s not
`in use.) The conceptof “virtual” is to give the telephone company an excuse to
`lowerthe price to the end user. See VIRTUAL NETWORK.
`VIRTUAL 8086 MODEVirtual 8086 mode allowsthe Intel 80386 and beyond
`microprocessors to emulate multiple real mode processors andstill switch to and
`from protected modem. The processor can load and execute real mode applica-
`tions (in virtual 8086 mode), then switch to protected mode and load and execute
`another application that requires access to the full extended memory available.
`The microprocessor, together with a control program like Microsoft Windows 3.x
`or OS/2 assumes the responsibility of protecting applications from one another.
`See REAL MODE and PROTECTED MODE.
`VIRTUAL BANDING 1.
`In WATSservices, virtual banding is the ability of
`trunks to carry traffic to all WATS bands, with billing based on the end points of
`the call instead of the band over which thetraffic went. 2. MCI’s definition: Allows
`customers of MCI’s, PRISM, Hotel WATS, and University WATSto call nationwide
`while only paying for the distance to the actual area. For example,if a customer
`calls to a Band 1 area, Band 1 pricing is used. Similarly,
`if a call is placed to a
`Band 4 area, Band4 pricing is used.
`VIRTUAL BYPASSVirtual bypass is a way smaller users can fill the unused
`portion of local T-1 dedicated loops going from a usersite to a local office of a long
`
`1114
`
`Facebook's Exhibit No. 1010
`Page 8
`
`Facebook's Exhibit No. 1010
`Page 8
`
`

`

`NEWTON’S TELECOM DICTIONARY
`
`distance company,called a POP (Point of Presence).
`VIRTUAL CALL CAPABILITY Provides setup and clearing on a percall basis.
`Eachcall placed appears to have a dedicated connectionfor the duration ofthe call.
`VIRTUAL CELLAcall, established over a network, that uses the capabilities of
`eithera real orvirtual circuit by sharing all or any part of the resourcesofthecir-
`cuit for the duration of the call.
`VIRTUAL CALL CAPABILITY A data communications packet network service
`feature in which a call setup procedure and a call-clearing procedure will deter-
`mine a period of communication between two DTEs.This service requires end-to-
`end transfer control of packets within a network. Data may bedelivered to the net-
`work before the call setup has been completed butit will not be delivered to the
`destination addressif the call setup is not successful. The user's data are deliv-
`ered from the network in the sameorder in which they are received by the net-
`work. See also VIRTUAL CIRCUIT.
`VIRTUAL CIRCUIT A communicationslink — voice or data — that appears to
`the user to be a dedicated point-to-point circuit. Virtual circuits are generally set
`up on a per-call basis and disconnected whenthe call is ended. The concept of a
`virtualcircuit was first used in data communications with packet switching. A pack-
`etized data call may send packets overdifferent physical paths through a network
`to its destination, but is considered to haveasingle virtual circuit. Virtual circuits
`have become more commonin ultra-high speed applications,like frame relay or
`SMDS.There the connection might be permanently connectedlike a LAN. When
`the user wants to transmit he simply transmits. There’s no dialing in the conven-
`tional sense, just the addition of an address field on the information being trans-
`mitted. A virtual circuit is referred to as a logical, rather than physical path for a
`call. A virtual voice circuit is anything from as simple as a phone with an auto
`dialerin it to a high-speedlink in which voice calls are digitized and sendon the
`equivalent of a ultra high-speed, wide-area equivalent of a local area network.
`There are two basic reasons people buy virtual circuits. They're cheaper and
`faster. See PERMANENTVIRTUAL CIRCUIT.
`VIRTUAL CIRCUIT CAPABILITY A network service feature providing a user
`with a virtual circuit. This feature is not necessarily limited to packet mode trans-
`mission. @.g., an analog signal may be convertedatits network node to a digital
`form, which may then be routed over the network via any available route. See VIR-
`TUAL CIRCUIT.
`VIRTUAL CO-LOCATIONThere are several definitions of this evolving.First:
`Someoneotherthanthe local phone company(called an interconnector) can des-
`ignate his choice of transmission equipmentto be located within a local exchange
`carrier's central office and dedicated to its use. The interconnector would have the
`right to remotely monitor and control the equipment, but the local exchangecarri-
`er would install, maintain, and repairit. Second; And this is a more restricted def-
`inition. Connection is done from sites near telephonecentraloffices, but not with-
`in them.
`VIRTUAL COMPUTINGA new term for software that shapes computing hard-
`ware into hardware that never was. Virtual computing uses FPGAs — Field
`Programmable Gate Arrays. See FPGAs.
`
`1495
`
`Facebook's Exhibit No. 1010
`Page 9
`
`Facebook's Exhibit No. 1010
`Page 9
`
`

`

`NEWTON’S TELECOM DICTIONARY
`
`VIRTUAL CONNECTIONA logical connection that is madeto a virtualcircuit.
`VIRTUAL DEVICE A device that software can refer to but that doesn’t physical-
`ly exist.
`VIRTUAL DISK A portion of RAM (Random Access Memory) assigned to sim-
`ulate a disk drive. Also called a ram disk. See RAM DISK.
`VIRTUAL HARD DRIVE MEMORY FACTORTheavailable space on a hard
`drive partition that Windows can address as physical memory.
`VIRTUAL LANA logical grouping of users regardless oftheir physical locations
`on the network. Racal-Datacom defines a virtual LAN as “a LAN extended beyond
`its geographicallimit and flexibly configured to add or removelocations.’ LANsare
`typically extended beyond their geographicallimits (i.e. several thousand feet with-
`in a building or campus) by using telephone companyfacilities,like T-1, T-3, Sonet,
`etc.
`VIRTUAL MACHINE FACILITY VM/370. An IBM system control program,
`essentially an operating system that controls the concurrent execution of multiple
`virtual machines on a single System/370 mainframe.
`VIRTUAL MACHINEVM. Software that mimics the performance of a hardware
`device. For Intel 80386 and higher processors, a virtual machine is protected
`memory spacethat is created through the processor's hardware capabilities.
`VIRTUAL MEMORY j. in computer systems, the memory asit appears to the
`operating programs running in the CPU. This memory may appear smaller, equal
`to, or larger than the real memory presentin the system.
`2. The term used with Apple Macintoshes to connotethe ability to use disk swap
`files as RAM. This requires the Macintosh to be running System 7 and PMMU.3.
`The space on your hard disk that Windows NTusesasif it were actually memo-
`ry. Windows NT doesthis through the use of swapfiles. The benefit of using vir-
`tual memory is that you can run more applications at one time than your system's
`physical memory would otherwise allow. The drawbacks are the disk space
`required for the virtual-memory swapfile and the decreased execution speed
`when swappingis reburied.
`VIRTUAL MEMORY MANAGERVirtual Memory Manageris a software-only
`approach to Expanded Memory. These work almostidentically to the EMS emu-
`lators, except that they use your hard disk rather than extended memory as the
`storage medium for blocks of memory copied out of your program. As you can
`imagine, this is painfully s-I-o-w. Use this approachonly asa last resort.
`VIRTUAL NETWORKA network that is programmed, not hard-wired, to meet
`a customer's specifications. Created on as-needed basis. Also called Software
`Defined Network by AT&T. See SOFTWARE DEFINED NETWORK and VIRTUAL
`PRIVATE NETWORK.
`VIRTUAL PRINTER TECHNOLOGYVPT.Virtual Printer Technology is the
`enterprise network printer architecture developed by Dataproducts Corporation
`that enables a printer to becomean intelligent node in a networked computing
`environment and provide printing services to other network nodes through a
`Client/Servertype relationship.
`VIRTUAL PRIVATE NETWORKAcarrier-provided service in which the pub-
`
`1116
`
`Facebook's Exhibit No. 1010
`Page 10
`
`Facebook's Exhibit No. 1010
`Page 10
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket