throbber
Facebook's Exhibit No. 1010
`
`Page 1
`
`Facebook's Exhibit No. 1010
`Page 1
`
`

`
`A Flatiron Publishing, Inc. Book
`
`Published by Flatiron Publishing, Inc.
`
`Copyright © 1994 by Harry Newton
`
`All rights reserved under International and Pan—Arnerican Copyright conventions,
`including the right to reproduce this book or portions thereof in any form
`whatsoever. Published in the United States by Flatiron Publishing, Inc., New
`
`York.
`
`ISBN O»936648-60—O
`
`Manufactured in the United States of America
`
`Eighth Edition, November 1994
`
`Cover Designed by Saul Roldan
`
`Printed at Bookcrafters, Chelsea, Ml.
`
`Facebook's Exhibit No. 1010
`Page 2
`
`

`
`NEWTON’5 TELECOM "DICTIONARY
`
`AP See ADD-ON or APPLICATIONS PROCESSOR. AP is an AT&T word for a
`piece of equipment which hangs off the side of their PBX and makes it do more
`things, like voice mail.
`ADA Ail Points Addressable (APA) method of host graphics implementation which
`uses vertical and horizontal pixel coordinates to create a more graphic image. An
`SNA definition.
`
`APAD Asynchronous Packet Assembler/Disassembler.
`AFC Adaptive predictive coding. A narrowband analog-to-digital conversion tech-
`nique employing a one-level or multilevel sampling system in which the value of
`the signal at each sample time is adaptively predicted to be a linear function of
`the past values of the quantized signals. APC is related to linear predictive cod-
`ing (LPC) in that both use adaptive predictors. However, APC uses fewer predic-
`tion coefficients, thus requiring a higher bit rate than LPG.
`APCC The American Public Communications Council, which is part of the North
`American Telecommunications Association (NATA).
`APB Avaianche PhotoDiode. Adiode that, when hit by light, increases its electri-
`cal conductivity by a multiplication effect. APDs are used in lightwave receivers
`because the APDs have great sensitivity to weakened light signals (i.e. those
`which have traveled long distances over fiber). APDs are designed to take advan-
`tage of avalanche multiplication of photocurrent.
`APEIIIODIC AIl1'EHHAAn antenna designed to have an approximately con-
`stant input impedance over a wide range of frequencies; e.g., terminated rhombic
`antennas and wave antennas.
`
`APEIITIIIIE For a parabolic reflector or a horn antenna, aperture is the dimen-
`sion of the open mouth and represents a surface over which it is possible to cal-
`culate the radiation pattern. For a series of n stacked transmitting elements such
`as dipoles or slots, the vertical aperture is usually defined as n times the element
`spacing in wavelengths.
`APEIITIJIIE DISTOIITIOII In facsimile, the distortions in resolution. density,
`and shape of the recorded image caused by the shape and finite size of the scan-
`ning and recording apertures or spots.
`API An Appiication Programming Interface is software that an application pro-
`gram uses to request and carry out lower—level services performed by the com-
`puter's or a telephone system's operating system. For Windows, the API also
`helps applications manage windows, menus, icons, and other GUI elements. in
`short. an API is a “hook" into software. An API is a set of standard software inter-
`rupts. calls, and data formats that application programs use to initiate contact with
`network services, mainframe communications programs, telephone equipment or
`program-to-program communications. For example. applications use APls'to call
`services that transport data across a network. Standardization of APIs at various
`layers of a communications protocol stack provides a uniform way to write appli-
`cations. NetBIOS is an early example of a network API. Applications use APls to
`call services that transport data across a network.
`API. Automatic Program Load in telecom. In data processing, its a popular pro-
`gramming language.
`
`74
`
`Facebook's Exhibit No. 1010
`Page 3
`
`

`
`C'|'I OIIAIIY
`
`1 about 15 to 20,000 hertz.
`
`(approximately 20 hertz to 15
`ear.
`
`oh the human ear can detect
`those from 300 to 3,000 hertz
`a phone doesn't sound "Hi-Fl."
`
`:essing system. The user can
`; a menu option by hitting a
`two. Computer or voice pro-
`ays — menu-driven and non-
`or users to use, but they can
`bly spoken in a few seconds.
`omated attendantfvoice mes-
`sing applications. See also
`
`IIFICATION AMIS. Issued in
`I at addressing the problem of
`rent vendors can network or
`vendors could not exchange
`rion between two systems for
`rot describe the user Interface
`nent AMIS in a particuiar sys-
`
`'
`
`is based on com-
`IS-Digitai,
`iging systems. All the control
`ad between systems in digital
`Ils for the use of DTMF tones
`ie message itself is in analog
`oer 1990 issue of Business
`at Hinsdale, IL. AMIS specifi-
`=55-7785.
`
`tes computer output into spo-
`1 '‘If you want the weather in
`er. But that weather would be
`i more technical explanation:
`tthesized voice responses to
`«ices process calls based on
`ita base, and information car-
`ire used to increase the num-
`sistent quality in information
`'OICE RESPONSE.
`
`sound and visual images to
`idiographics generally refers
`Jposed to continuous frame
`'ansmission is often used to -
`iucational institution or busi-
`'
`
`NEWTON’S TELECOM DICTIONARY
`
`"955 training center, saving travel and housing expense.
`‘up|O'I'EX A generic term for interactive voice response equipment and ser-
`vices_ Audiotex is to voice what on-line data processing is to data terminals. The
`idea is you call a phone number. A machine answers, presenting you with sever-
`al options, "Push 1' for information on Plays, Push 2 for information on movies,
`Push 3 for information on Museums." If you push 2, the machine may come back,
`“Push 1 for movies on the south side of town, Push 2 for movies on the north side
`oftown, etc." See also INFORMATION CENTER MAILBOX.
`”;p|o'l‘EXTA different, and less preferred, spelling ofAUDlOTFJ<. See AUDIO-
`TEX-
`Ll.lDl'l'0|IY PATTERN ucoetmlou Auditory pattern recognition is the
`ability to recognize spoken words.
`‘um!’ To conduct an independent review and examination of system records
`and activities in order to test the adequacy and effectiveness of data security and
`data Integrity procedures, to ensure compliance with established policy and oper-
`ational procedures. and to recommend any necessary changes.
`,'AI.IDl'l' TIIAILA record of all the events that occur when users request and use
`specific resources. An audit trail gives you the ability to trace who did what and
`who was responsible for what. An audit trail is a chronologicai record of system
`activities that is sufficient to enable the reconstruction, review, and examination of
`the sequence of environments and activities surrounding or leading to an opera-
`man, a procedure or an event in a transaction from its inception to final results.
`- Audit trail may apply to information in an automated information system, to the
`routing of messages in a communications system, or to material exchange trans-
`actions, such as in financial audit trails.
`
`'
`
`AUDITING An AT&T ISDN term for the monitoring of the status of either the
`network or the ISDN set.
`
`AIIIIIX VOICE POWER A voice processing application, part at Integrated
`Solution Ill {IS-Ill), that provides Automated Attendant, call answering, voice-
`mail, message drop, and information services for use with the AT&T Merlin tele-
`phone system.
`. AIIGIII A type of drill bit typically used to make large, deep holes for passing
`wire or cable through wood.
`Alll Autonomous Unit interface or Attachment Unit Interface. Most commonly
`used in reference to the 15 pin D type connector and cables used to connect sin-
`gle and multiple channel equipment to an Ethernet transceiver.
`All! Acceptable Use Policy. The term used to refer to the restrictions placed on
`use of a network; usually refers to restrictions on use for commercial purposes.
`IUIIAI. Relating to the sense of hearing.
`. AIISTHAC A packet-switched network implemented in Australia.
`MlI'I-IEIl1'lcAI'l To establish, usually by challenge and response, that a trans-
`I mission attempt is authorized and valid. To verify the identity of a user, device, or
`other entity in a computer system, or to verify the integrity of data that have been
`' Stored. transmitted, or otherwise exposed to possible unauthorized modification.
`
`101
`
`Facebook's Exhibit No. 1010
`Page 4
`
`

`
`Facebook's Exhibit No. 1010
`
`Page 5
`
`Facebook's Exhibit No. 1010
`Page 5
`
`

`
`HEWTOH’S TELECOM DICTIONARY
`
`consoles your chosen PBX can use.
`MULTIPLE CUSTOMER GROUP OPERATION A PBX shared by several
`different companies, each having separate consoles and trunks.
`MULTIPLE DOMAINS A set of domains on a single LAN, each of which has
`its own domain-wide post office. Hosts within each domain can exchange mail by
`going through one domain post office. Hosts in different domains must generally
`send mail though two intermediary post offices: the sender’s domain post office
`and the receiver’s domain post office.
`'
`
`MULTIPLE FREQUENCY-SHIFT KEYING MFSK. Aform of frequency—shift
`keying in which multiple codes are used in the transmission of digital signals. The
`coding systems may use multiple frequencies transmitted concurrently or sequen-
`tially.
`
`MULTIPLE HOMING Connecting your phone so it can be served by one or
`severalswitching centers. This service may use a single directory number. It may
`also use several directory numbers (another term for phone numbers).
`It all
`depends on how you set the service up with your local phone company. The idea
`is to give you more ways of reaching the switched network — in case one or more
`of your local loops breaks.
`
`MULTIPLE LISTED DIRECTORY NUMBER SERVICE Permits more than
`
`one listed directory number to be associated with a single PBX.
`
`MULTIPLE NAME SPACES The association of several names or other pieces
`of information with the same file. This allows renaming files and designating them
`for dissimilar computer systems such as the PC and the Mac.
`
`MULTIPLE PARALLEL PROCESSING A method of fault tolerance used with
`host computers. Several CPUs cooperate to process data.
`It one CPU fails, its
`processing tasks are automatically assigned to other processors.
`
`MULTIPLE PROTOCOL ROUTER A communications device designed to
`make decisions about which path a packet of information will take. The packets
`are routed according to address information contained within, and can route
`across different protocols.
`
`MULTIPLE ROUTING The process of sending a message to more than one
`recipient, usually. when all destinations are specified in the headerof the message.
`MULTIPLE SPOT SCANNING In facsimile systems, the method in which
`scanning is carried on simultaneously by two or more scanning spots, each one
`analyzingits fraction of the total scanned area of the subject copy.
`MULTIPLE TOILEN OPERATION Variant of token passing for rings in which
`a free token on a LAN is transmitted immediately after the last bit of the data pack-
`et, allowing multiple tokens on ring (but only one free token) simultaneously.
`MULTIPLE TUNED ANTENNA An antenna with connections through induc-
`tances to ground at more than one point and so determined that the total reac-
`tances in parallel are equal to those necessary to give the antenna the desired
`natural frequency.
`'
`
`‘
`MULTIPLE! To transmit two or more signals over a single channel.
`MULTIPLEI AGGREGATE BIT RATE The bit rate in a time division multi-
`
`677
`
`Facebook's Exhibit No. 1010
`Page 6
`
`

`
`HE‘W'I'OH’S TELECOHI DICTIONARY
`
`plexer that is equal to the sum of the input channel data signaling rates available
`to the user plus the rate of the overhead bits required.
`IlI.|I.1'lPl.EX BASEBAIIID in frequency division multiplexing, the frequency
`band occupied bythe aggregate of the signals in the line interconnecting the mult
`tiplexing and radio or line equipment.
`
`M.I.lI.1'|PI.EX HIERAIICI-IY In the U.S. frequency division multiplex hierarchy,
`
`12 channels = 1 group
`
`5 groups (60 channels) = 1 supergroup
`
`10 supergroups (600 channels) = 1 mastergroup
`
`6 mastergroups = 1 jumbo group
`
`in contrast, the CCITT standard says 5 supergroups (i.e. 300 channels) = 1 mas-
`tergroup.
`
`MULTIPLEXED CHAIIHEI. A communications channel capable of carrying thg
`telecommunications transmissions of a number of devices or users at one time.
`
`MULTIPLEXER Electronic equipment which allows two or more signals to pass
`over one communications circuit. That “circuit’ may be a phone line, a microwave
`circuit, a through-the-air TV signal. That circuit may be analog or digital. There are
`many multiplexing techniques to accommodate both.
`
`HULTIPLEXIHG EFFICIENCY Figure of merit for multiplexers. The ratio of the
`aggregate channel input data rate to the composite output data rate. Many statis-
`tical multiplexers achieve a multiplexing efficiency of 8 or more.
`
`M|lI.I'IPOII'l'l' GROIINDIHG SYSTEH A system of equipment bonded
`together and also bonded to the facility ground.
`
`MIll.'l'IPOR'I' CARD Acircuit board with two or more ports for modems or other
`devices. Useful for enabling one PC to handle multiple incoming or outgoing calls
`at one time.
`
`MULTIPORT REPEATEII A repeater, either standalone or connected to stan-
`dard Ethernet cable, for interconnecting up to eight Thinwire Ethernet segments.
`
`MULTIPORT SWITCH A local area network term. A device which allows pack-
`ets to switch from one cable to another.
`
`Mlllfi PROCESSING A type of computing characterized by systems that use
`more than one CPU to execute applications. Multi processing is not multi tasking,
`which is the ability to have more one application running on a system at the same
`time. The technique is not associated with multi processing, nor does it require multi
`processing to take place. Multitasking typically uses a computer with one CPU (e.g.
`your desktop or laptop). Multi processing uses a computer with several CPUs, often
`a sewer. See MLJLTI-PROCESSING, MULTl-TASKING and MULTI-THREADED.
`
`HULTISESSIOH An incrementally updated Kodak Photo CD. See MULTl-SES-
`SION for a fuller explanation.
`
`M.|lI.'I'I TASKIHG See MULTI-TASKING.
`
`HULTITHREADED See MULTI-THREADED.
`
`IMJIIIEI. Muriel Fullam worked for me for ten years before she worked with me
`
`678
`
`Facebook's Exhibit No. 1010
`Page 7
`
`

`
`HEVI‘I'ON'S TELECOM DICTIONARY
`
`And it's a success because the French phone company funds it.
`VIEW 1. in satellite communications, the ability of a satellite to “see" a satellite I
`earthstation, aimed sufficientiy above the horizon and clear of other obstructions
`so that it is within a tree line of sight. A pair of satellite earthstations has a satel-
`lite in "mutual" view when both enjoy unobstructed Iine—of~sight contact with the
`satellite simultaneously. 2. An alternative way of looking at the data in one or more
`database tables. A view is usually created as a subset of columns from one or
`more tables.
`
`VIEVIDATA An information retrieval system that uses a remote database acces~
`sible through the public telephone network. Video display of the data is on a mon-
`itor or television receiver. Another name for Videotex, the original English (UK)
`name for it. See VIDEOTEX.
`
`VIM Vendor Independent Messaging. A new E-mail protocol developed by Lotus,
`Apple, Novell and Borland to provide a common layer where dissimilar messag-
`ing programs can share data and back-end services. A group called the Vendor
`Independent Messaging Group will is intent on developing an open, industry—stan-
`dard interface that will allow email features to be built into a variety of software
`products.
`
`VIIIES Virtual NEtwork System. A network operating system developed and mar-
`keted by Banyan Systems. Westboro, MA. Vines is based on Unix system V. This
`network operating system provides transparent communication across heteroge-
`neous networks and is more expansive, although attracting far fewer users. than
`Novell’s Netware.
`
`VIIITIIAI. in the telephone industry, "Virtual" is something that pretends to be
`something it isn’t, but can be made to appear to be that thing. A virtual private line
`is effectively a dial up phone line with an auto—dia|er on it. To the user, it appears
`to be a private line. (But the phone company can re-sell that capacity when it's not
`in use.) The concept of "virtual" is to give the telephone company an excuse to
`lower the price to the end user. See VIRTUAL NETWORK.
`
`VIIITIIAI. 8036 MORE Virtual 8086 mode allows the Intel 80386 and beyond
`microprocessors to emulate multiple real mode processors and still switch to and
`from protected modem. The processor can load and execute real mode applica-
`tions (in virtual 8086 mode), then switch to protected mode and load and execute
`another application that requires access to the full extended memory available.
`The microprocessor, together with a control program like Microsoft Windows 3.x
`or OS/2 assumes the responsibility of protectin applications from one another.
`See REAL MODE and PROTECTED MODE.
`
`in WATS services, virtual banding is the ability of
`VIIITIIAI. IAHDIIIG 1.
`trunks to carry traffic to all WATS bands, with billing based on the end points of
`the call instead of the band over which the traffic went. 2. MCl's definition: Allows
`customers of MCl’s, PRISM, Hotel WATS, and University WATS to call nationwide
`while only paying for the distance to the actual area. For example, if a customer
`calls to a Band 1 area, Band 1 pricing is used. Similarly,
`if a call is placed to a
`Band 4 area, Band 4 pricing is used.
`VIIIHIAI. BYPASS Virtual bypass is a way smaller users can fill the unused
`portion of local T-1 dedicated loops going from a user site to a local office cl‘ a long
`
`1114
`
`Facebook's Exhibit No. 1010
`Page 8
`
`

`
`NE\V'I'ON'S TELECOM DICTIONARY
`
`distance company, called a PCP (Point of Presence}.
`VIIIIIIAI. CALI. CAPABILITY Provides setup and clearing on a per call basis.
`Each call placed appears to have a dedicated connection for the duration of the call.
`VIRTUAL CEI.I. A call, established over a network, that uses the capabilities of
`either a real or virtual circuit by sharing all or any part of the resources of the cir-
`cuit for the duration of the call.
`
`VIIITIIAI. CALI. CAPABILITY A data communications packet network service
`feature in which a call setup procedure and a call-clearing procedure will deter-
`mine a period of communication between two DTEs. This service requires end—to-
`end transfer control of packets within a network. Data may be delivered to the net-
`work before the call setup has been completed but it will not be delivered to the
`destination address if the call setup is not successful. The user's data are deliv-
`ered from the network in the same order in which they are received by the net-
`work. See also VIRTUAL ClRCUlT.
`
`VIIl'l'l.|AI. CIIlCl.|I‘I' A communications link —- voice or data — that appears to
`the user to be a dedicated point-to-point circuit. Virtual circuits are generally set
`up on a per-call basis and disconnected when the call is ended. The concept of a
`virtual circuit was first used in data communications with packet switching. A pack-
`etized data call may send packets over different physical paths through a network
`to its destination, but is considered to have a single virtual circuit. Virtual circuits
`have become more common in ultra-high speed applications; like frame relay or
`SMDS. There the connection might be permanently connected like a LAN. when
`the user wants to transmit he simply transmits. There's no dialing in the conven-
`tional sense, just the addition of an address field on the information being trans-
`mitted. A virtual circuit is referred to as a logical, rather than physical path for a
`call. A virtual voice circuit is anything from as simple as a phone with an auto
`dialer in it to a high-speed link in which voice calls are digitized and send on the
`equivaient of a ultra high-speed, wide-area equivalent of a Iocai area network.
`There are two basic reasons people buy virtual circuits. They’re cheaper and
`faster. See PERMANENT VIRTUAL CIRCUIT
`
`-
`
`VIIITIIAL ¢_IIl¢l.|lT ¢APABII.I'I'Y A network service feature providing a user
`with a virtual circuit. This feature is not necessarily limited to packet mode trans-
`mission. e.g., an analog signal may be converted at its network node to a digital
`form, which may then be routed over the network via any available route. See VIR-
`TUAL CIRCUIT.
`
`VIIt'I'I.IAI. CO-I.O¢A'l'IOII There are several definitions of this evolving. First:
`Someone other than the local phone company (called an interconnector) can des-
`ignate his choice of transmission equipment to be located within a local exchange
`carriers central office and dedicated to its use. The interconnector would have the
`right to remotely monitor and control the equipment, but the local exchange carri-
`er would instali, maintain, and repair it. Second; And this is a more restricted def-
`inition. Connection is done from sites near telephone central offices, but not with-
`in them.
`VIIl'I'lJAI. GOMPUTIHG A new term for software that shapes computing hard-
`ware into hardware that never was. Virtual computing uses FPGAs — Field
`Programmable Gate Arrays. See FPGAS.
`
`1115
`
`Facebook's Exhibit No. 1010
`Page 9
`
`

`
`NEWTOIFS TELEGOM DICTIONARY
`
`VIRTUAL CONNECTION A logical connection that is made to a virtual circuit.
`VIRTUAL DEVICE A device that software can refer to but that doesn't physical-
`ly exist.
`VIRTUAL DISK A portion of RAM (Random Access Memory) assigned to sim-
`ulate a disk drive. Also called a ram disk. See RAM DISK.
`VIRTUAL I-IARD DRIVE MEMORY FACTOR The available space on a hard
`drive partition that Windows can address as physical memory.
`VIRTUAL LAN A logical grouping of users regardless of their physical locations
`on the network. Racal—Datacom defines a virtual LAN as "a LAN extended beyond
`its geographical limit and flexibly configured to add or remove Iocations." LANs are
`typically extended beyond their geographical limits (i.e. several thousand feet with-
`in a building or campus) by using telephone company facilities, like T-1,T-3, Sonet,
`etc.
`
`VIRTUAL MACHINE FACILITY VM/370. An IBM system control program,
`essentially an operating system that controls the concurrent execution of multiple
`virtual machines on a single System/370 mainframe.
`VIRTUAL IAACIIIINE VM. Software that mimics the performance of a hardware
`device. For Intel 80386 and higher processors, a virtual machine is protected
`memory space that is created through the processor's hardware capabilities.
`VIR1'UAL MEMORY 1. In computer systems, the memory as it appears to the
`operating programs running in the CPU. This memory may appear smaller, equal
`to, or larger than the real memory present in the system.
`2. The term used with Apple Macintoshes to connote the ability to use disk swap
`files as RAM. This requires the Macintosh to be running System 7 and PMMU. 3.
`The space on your hard disk that Windows NT uses as if it were actually memo-
`ry. Windows NT does this through the use of swap files. The benefit of using vir-
`tuai memory is that you can run more applications at one time than your system’s
`physical memory would otherwise allow. The drawbacks are the disk space
`required for the virtual-memory swap file and the decreased execution speed
`when swapping is reburied.
`VIRTUAL MEMORY HANAGER Virtual Memory Manager is a software-only
`approach to Expanded Memory. These work almost identically to the EMS emu-
`lators. except that they use your hard disk rather than extended memory as the
`storage medium for blocks of memory copied out of your program. As you can
`imagine, this is painfully s-I-o-w. Use this approach only as a last resort.
`VIRTUAL NETWORK A network that is programmed, not hard-wired, to meet
`a customer's specifications. Created on as—needed basis. Also called Software
`Defined Network by AT&T. See SOFTWARE DEFINED NETWORK and VIRTUAL
`PRIVATE NETWORK.
`
`VIRTUAL PRINTER TECHNOLOGY VPT. Virtuai Printer Technology is the
`enterprise network printer architecture developed by Dataproducts Corporation
`that enables a printer to become an intelligent node in a networked computing
`environment and provide printing services to other network nodes through a
`Client/Server type relationship.
`VIRTUAL PRIVATE NETWORK A carrier—provided service in which the pub-
`
`1 1 16
`
`Facebook's Exhibit No. 1010
`Page 10

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket