throbber

`
`LGE Exhibit-1018/Page 1 of 10
`LGEv. Uniloc
`
`

`

`
`
`pentiey & Sedgewick’s New Sorting Algorithm!
`LL §_|same
`
`va D gr STARE_
`
`F Qa]70015FokTHea bii, )
`
`he LFVWD PROFESSIONAL
`
`
`
`
`
`feo,
`
` «SCOBaifrtPp OWG
`
`
`i
`BUaif)TitOBiB.
`
`
`Od
`. -.
`
`ove
`PiWy Sylvie Io
`
`
`
`CTienehea A NN
`SE aii ia
`wo
`
`-
`“o=6-
`:
`>
`-
`productive,
`L
`4
`
`
`TUMGaue
`| °5.(S5.95 CANADA}
`=
`
`Wes, g AMT
`|
`e a) - .,
`* Drag-And-Drop forJava
`
`f
`‘iljae i* =
`Py han
`;
`1
`couse.
`Y
`.
`
`
`
`
`
`
`09921
`j
`: *) WESC TTeyagTT |
`92135566
`eden» <2
`2
` Her Fron’
`me ace Meniielten F Six
` i _
`
`:
`
`oN
`
`Pars,
`je
`
`P
`
`'
`
`:
`
`te
`“ook.
`
`4
`
`.
`
`LGE Exhibit-1018/Page 2 of 10
`
`

`

`to be.
`
`ised to be.
`
`LEA.
`
`like it used to
`
`EELLL like it used to b
`
`t used to be.
`
`LGEExhibit-1018/Page 3 of 10
`
`

`

`9|sorrmare
`I.
`()
`§ TOOLSFORTHE
`PROFESSIONAL
`&
`0 URN A
`_L_ |g
`
`J
`
`
`
`FEATURES
`NCSA SYMERA
`by Pai Flanigan andJawed Karim
`NCSA Symera is a distributed-object andcluster-management system with application support libraries
`buili on Microsoft’s Distributed Component Object Model (DCOM), Our authors examine Syment,
`then
`convert a stand-alone Windowsprograminto a Symera application that uses distributed resources.
`A CORBA BEAN FRAMEWORK
`by David Holding
`David presents a framework based on the JavaBeans Standard that provides a layer of abstraction over
`CORBA— and,
`in particular, the CORBA Dynamic Invocation Interface (DI)— toencapsulate its
`complexity andfacilitate visual rapid application development.
`
`|
`
`
`20
`
`34
`
`THE MICO CORBA-COMPLIANT SYSTEM
`by Arno Pider
`MICO is afreely available CORBA implementation that supports IDL-to-C++ mapping, Dynamic
`Invocation Interface (DID, IOP as native protocol, nested method invacations, and more,
`
`CREATING ELECTRONIC MARKETS
`by Ming Fan, Jan Stallaert, and AndrewB. Whinston
`Ourauthors describe a web-based Financial Bundle ‘Tracing Systemthat lets you access financial
`markets using Java applets embedded in web browsers.
`
`THE GEF GENERAL EXCEPTION-HANDLING LIBRARY
`by Bruce W, Bigby
`GEFis a general exception-handling and contract-programmingfacility for C programmers. With GEF,
`its special control macros, and other support functions, you can separate the main. purpose of a
`function fromits exception-handling, contract-validation, and resource-reclamation code,
`
`WINDOWSCE DEVICE DRIVER DEVELOPMENT,PART II
`by James Y. Wilson
`In the secondinstallment of this wo-partarticle, Jim identifies the basic skills you needto develop
`Windows CE device drivers, and implements a driver for an onboard peripheral device.
`
`EMBEDDEDSYSTEMS
`FILE FORMATS & AUTOMOTIVE DATA ACQUISITION
`byLee R. Copp
`When it comes 10 automotivedata acquisition, the files generated while a vehicle is being tested
`are as different and varied as the vehicles themselves. Lee presents atoolthat enables viewing.
`filtering, or analysis of this disparate data.
`
`INTERNET PROGRAMMING
`THE WIDLSPECIFICATION
`by Lynn Monson
`The WebInterface Definition Language (WIDL) is an XML file format for describing
`progrummatic interfaces to the Web. Borrowing fromthe object community's ORB ideas, WIDL
`describes an abstract interface to a “service” existing on the Web.
`
`1
`
`Dr. Dobb'sJournal, November 1998
`
`LGE Exhibit-1018/Page 4 of 10
`
`

`

`NOVEMBER 1998
`VOLUME23, ISSUE 11
`
`98
`
`106
`
`COLUMNS
`PROGRAMMING PARADIGMS
`by Michael Swaine
`Michael examinesJini, Sun's system architecture for distributed computing.Jini
`embodies a model for howdevices and software connect on a network and how
`distributed systems can operate.
`
`113
`
`C PROGRAMMING
`byAl Stevens
`Al updates a C++ class template library that implements undo operations of
`interactive programs. Thelibrary assumesthat the user modifies a documentclass
`object and might want to undo those modifications in reverse order.
`
`119
`
`JAVA Q&A
`byJason W. Purdy
`Jason examines the drag-and-drop (DnD) capabilities of both JavaSoft's Java
`Foundation Classes (JFC) and Microsoft's Windows Foundation Classes (WFC),
`
`127
`
`ALGORITHM ALLEY
`byJon Bentley and Robert Sedgewick
`Jon and Robert describe a new algorithmfor sorting strings that combines the best
`of quicksort andradix sort.
`
`133
`
`DR. ECCO’S OMNIHEURIST CORNER
`by Dennis E. Shasha
`Dr. Ecco andLiane use “directed evolution" to cure the ills that ail some.
`
`140
`
`PROGRAMMER’S BOOKSHELF
`by Gregory V. Wilson
`Greg examines a bevy of books this month, including Web Site Usability: A
`Designer's Guide, Information Architecturefor the World Wide Web, Official
`Guideto Programming with CGI.pm, Jesse Liberty's Clouds to Code, Advanced
`Programming Language Design, and Practical Software Configuration
`Management.
`
`143
`
`FORUM
`
`EDITORIAL
`byJonathan Erickson
`
`LETTERS
`by you
`
`NEWS & VIEWS
`bythe DD]staff
`
`OF INTEREST
`by Eugene Eric Kim
`
`SWAINE’S FLAMES
`by Michael Swaine
`
`RESOURCE CENTER
`As 2 service to Our readers, source code (and related
`files, back-referencedarticles, and relevant links
`areavailableelectronicallyat hitp://www.cdkdj.com/
`ladividual articles can be purchased electronically
`as ZIPfiles, also at hitp://www.ddj.conv. Source
`codeis also available via anonymous FTP from
`ftp,ddj,com (199.125,85.76), the DD] Forum on
`CompuServe (type GO DD)}), and DD) Online (650-
`358-8857, 14.4 kbps, 8-N-1). Letters to the editor
`and article proposals/submissions should be
`mailed or faxed to the DD/ office or sent
`electronicallyto editors®ddj. com. Author guidelines
`are available at hetp://www.ddj.com/. Sendinquiries
`or requests to Dr: Dobb'sJournal, 411 Borel Ave
`San Mateo, CA 94402, For subscription questions
`(including change of adclress), call 800-456-1215
`(U.S. and Canada); other countries, call 303-678-
`0439 or fax 303-661-1985. E-mail subscription
`questions (o ddj@neodata comor write 10 Dr. Dobb's
`Journal, ?:0. Box 56188, Boulder, CO 80322-6188
`
`NEXT MONTH
`
`In December, we'll be examiningthe latesi
`
`2ing tested
`viewing,
`
`as, WIDL
`
`PROGRAMMER’S TOOLCHEST
`EXAMINING THE WIN32 DEBUG API
`byFritz Lowrey
`The Win32 Debug APIis a set of functions that provides a numberofuseful tools
`for both the debugger and the debugged.Since these functions are supported by
`the operating system,it doesn’t matter whether the program being debugged has
`been compiled or optimized in Debug or Release mode, nor does it make any
`difference what languageor tool you opttouse.
`BUILDING SOLID CODE
`by Wes Faler
`The company Wes works for has refinedits development process to produce well-
`structured, clean source code. Wes presents this process, along with notes on the
`tools theyuse.
`
`in cryptography and computer security.
`
`ember 199°
`
`Dr. Dobb'sJournal, November 1998
`
`LGE Exhibit-1018/Page 5 of 10
`
`

`

`ee
`
`Sun Dreams ofJini
`
` rf ROGRAMMING PARADIGMS
`
`Michael Swaine
`
`Ithough next month | expect to be
`all over the paradigmatic map with
`my annual stocking stuffers colutnn,
`this month I'm focusing on a single
`paradigm.
`It's Sun’s Jini, a newsystem architec-
`ture for distributed computing and im-
`proved device connection,
`| think that’s
`an :iccurate description, but it certainly
`doesn’t do Jini justice. Jini is so revolu-
`tionary a technologythat it has appeared
`on the cover of Wired magazine. Oh, sor-
`ry,
`| forgot to tum on mycynicismfilter.
`And I do need to hold my cynicism in
`abeyance, even thoughJini is a Sun tech-
`nology and starts with the letter j andis
`therefore fated to be hyped to the heav-
`ens. Because technologically speaking, Jini
`is clearly important, clever, impressive, and
`worthyof serious attention.
`Ofcourse technological menit is seldom
`the deciding factor in the success orfail-
`ure of technologies in certain strata of soft-
`Ware development...
`
`The Vision
`Jini is part of a four-year research project
`carried on at Bill Joy’s Sun Aspen Small-
`works R&Dlab in the Rockies. Java was
`also a part of that project, but only a part.
`Therelease of information onJini this sum-
`mer is the soundof the other shoe drop-
`ping. Jini expands onthe Write Once, Run
`Anywhere concept of Java and articulates
`a more ambitious and more complete vi-
`sion for the future of computing. Oneel-
`ementof that visionis a radical simplifica-
`tion of the way hardware is connectedanc
`configured,
`In the Jini model, every de-
`vice— computer, disk drive, telephone,
`Camera, or coffeepot— hasjust two cords
`coming out the back— one for power and
`anotherfor the network. (Or just one: The
`Network cord might be replaced by a wire-
`
`Michaelis editor-at-large for DD), He can
`be contacted at mswaine@swaine.com.
`
`Dr, Dobb’s Journal, Noveniber 1998
`
`it announces it-
`less link.) You plug it in,
`self to the network, and it's all connected
`and configured and jumpered and regis-
`tered and immediately usable.
`Sounds nifty, but talk is cheap and
`hardwareis expensive. Wouldn't such a
`scheme require all new hardware? Yes,
`although it would be possible for the
`smarts that let the device be a playerin
`a Jini system to reside on another de-
`vice. In this way, old devices couldjoin
`a Jini system,
`Another clementofthe vision is a mod-
`el for distributed computing, It's also an
`ambitious model—in a way, In the Jini
`model, anything can be a service, avail-
`able to clients on the network, A service
`might be the printing capability of a print-
`er somewhere on the network, or a math
`routine, or a search engine, or a slice of
`processing power of a mainframe made
`available to underpowered PCs doing
`heavy but decomposable computations.
`In anothersense, the Jini model is very
`modest, The core software is 48 KB of
`binaries. Andit is intended to run on top
`of any OS (although currently has been
`implemented only for Solaris and NT).
`On the less modest hand, while living
`in apparent harmony with any operating
`system, it quietly usurps all the interest-
`ing networking functions, And it attempts
`to promote the network to a level of im-
`portance and control currently occupied
`by the operating system, In this respect,
`Jini is clearly another Sun attempt to do
`a technological end run aroundMicrosoft's
`hegemony.
`Maybe wecouldcall it Sun’s version of
`“Embrace and extend.” Anyway, that’s the
`vision. Oh, and Joy's boys want you to be
`able to walk up to any device, not just
`any computer but any device connected
`to a Jini system, and have all of the sys-
`tem’s services as available to youas they
`would be if you were sitting in front of
`your own PC; and they wantal] this to be
`
`7200.
`
`sysrouss16
`
`
`
`113
`
`
`
`LGE Exhibit-1018/Page 6 of 10
`
`
`
`
`
`
`
`
`
`
`
`so automatic and transparent to the user
`thatit is in effect a network dialtone.
`Sure, why not. All this sounds like net-
`work heaven, but is there any reason to
`believe that Sun has the keys to the king-
`dom? That’s the 64-euro question, of
`course, I'll just spell out some of the de-
`tails of the Jini model and you can decide
`that for yourself.
`
`Joining Jini
`Jini embodies a model for howdevices and
`software connect on a network and how
`distributed systems can operate. Sun de-
`scribes the technology underlying this mod-
`el in terms of two areas of software— the
`infrastructure that defines the connections,
`and the distributed programming model.
`In addition to these, there is the con-
`cept of a network service, a conceptthat
`runs throughout the entire Jini model.
`A service is, according to Sun's Jini Ar-
`chitecture Overview white paper Chttp://
`java.sun.com/products/jini/whitepapers/
`architectureoverview.pdf), “an entity that
`can be used by a person, a program, or
`another service.” It can be “a computa-
`tion, storage, a communication channel
`to another user, a software filter, a hard-
`ware device, or another user,”
`The infrastructure consists of two com-
`ponents that, between them, make it pos-
`sible for devices to be hot-plugged into
`the network, manage the process of de-
`vices identifying themselves to the network
`and vice-versa, and allow clients to access
`services anywhere on the network. These
`are “Discovery andJoin” (that's one com-
`ponent with two names) and “Lookup”
`(also referred to as “Boot and Join” and
`“Install”). Discovery andJoin is the mech-
`anism by which a device or application
`identifies itself to the network. When a
`Jini-enabled device is plugged intoa Jini-
`enabled network, the device broadcasts
`a small Discovery packet to the net. This
`512-byte packet contains sufficient
`
`
`
`
`
`
`
`

`

`
`
`Beyond Java
`‘The distributed programming model it
`Jini brings thice technologies to the pig.
`ture — leasing, distributed transac lions,
`anddistributed events. In leasing, an ob:
`ject negotiates ffor the use of a service for
`a period of time. This is the bitsis for,
`among other things, the system's dis.
`tributed garbagecollection, Leases can je
`exdlisive or nonexclusive, nonexclusive
`leases allowing for simultaneous resource
`sharing. Java APIs provide the bisic dis.
`tributedtransaction capability, called “two,
`phase commit.” This allows an object to
`fire up a transaction manager. Every ob.
`ject that will take part in the transaction
`has to register with the transaction man-
`ager, andit runs the transaction, holding
`up objects or causing them to backtiack
`or move ahead as needed to ensurethat
`the steps of the transaction are propei
`synchronized, Jini also provides for clis-
`tributed events. Specifically, an object can
`allow other objects to register an interest
`in an event that resides in the first object,
`and provide notification to them ofthe
`occurrence ofthe event.
`Underlying all communication between
`services in Jini is Java Remote Method In-
`vocation (RMI). Althoughit might seem
`morelike part of the programming mwd-
`el,
`it
`is regarded as part of theinfrastiuc-
`ture. Wherever it falls in the architecture
`of Jini,
`its role is to allow complete ob-
`jects,
`including code, to be passed among
`objects over the network.
`Network services is an open-ended col-
`lection ofservices that bear somewhat the
`same relationship to the infrastructureind
`distributed programming model as appli-
`cations do to an operiting system, fin-
`ning on top of these lower-level elements,
`The most important of these is Jiva-
`Spaces, a model for facilitating distribut-
`ed programming. The JavaSpaces model
`is drawn from work by David Gelernter
`that simplifies the challenge of distribut-
`ing tusks among multiple processors, Gel-
`ernter’s project, named Linda, creates 4
`shared memory space called a TupleSp.ace
`where results of a computer's processes
`or the processes themselves are stored
`and can be accessed by multiple CPUs.
`Contents of « TupleSpace are taggedwith
`self descriptive tags, and effectively pusl-
`pinnedtoa bulletin board.
`
`Jini is Not a Dictatorship
`Jim Waldo, authorof the Jini Architecture
`Overview white paper, characterizes «t [ini
`system as a federation. Members ofui fed-
`eration are peers andare assumed To agree
`on certain basic issues. Trust, identilica-
`tion, policy, things like that.
`“AJini federation should not bethi rat
`of as sets of clients and servers, or sels
`(continued on page 117)
`
`Ir. Dobb'sJournal, November 1998
`
`oug Carlston was a computer hack-
`er in college in the 1970s, and even
`when he started his law practice he
`continued to play with computers. When
`Radio Shack introduced its TRS-80, he
`bought one immediately and stayed
`glued to it all weekend.
`So did others, including the author of
`this column, but something actually came
`of Doug Carlston’s Trashed weekend, He
`wrote a game called Galactic Saga, and
`with his brothers Gary and Don started
`a companythat became a leader in a half-
`billion dollar segmentof the software in-
`dustry—Broderbund (Swedish for broth-
`erhood),
`It wasn't immediate, This was early
`1980, before Windows, before DOS, be-
`fore the IBM PC, and the brothers were
`down to $24 before Doug took to the
`toad, selling copies of Galactic Saga out
`of his car to early computer stores. The
`big breakthrough, though, came when
`a Japanese entrepreneur sold Doug some
`microcomputer versions of popular
`video arcade games.
`It's not clear that there wasn’t some
`infringement of copyright, but the com-
`puter game industry was free and fast-
`moving in the early '80s, and nobody
`cared. Among Broderbund and Sierra
`On-Line andSirius, the main game com-
`panies ofthe early '80s, there was much
`sharing of technology, muchflouting of
`the usual rules of business, muchspirit
`of brotherhood.
`It has been called the hacker ethic.
`Broderbund was built on it, and cid well.
`In recent years, its stars included Rand
`and Robyn Miller, with their intensely
`popular game Myst. Gradually, Broder-
`
`bundadded educational and productiv-
`ity software titles, ultimately becoming
`an educational software companythat
`also did games.
`Recently, though, Broderbund has
`been losing money, and this summerit
`agreed to be acquired by The Learning
`Company. But it would be a mistake to
`connect Broderbund's fall with the hack-
`er ethic it still, to some extent, embod-
`ies. Broderbund was the only one of the
`early game companies to survive into
`the late ‘90s, and it was the gentlest, mast
`generous of those companies. As the
`other game companies ran into hard
`times,they got tougher, refusing to share
`ideas and technology with competitors,
`giving less credit to the actual game de-
`velopers, negotiating stingier cleals. But
`although Broderbund changed, too, it
`kept some of that spirit. And as the oth-
`er companies failed, Broderbundpros-
`pered— until quite recently.
`If Broderbund has remaineda differ-
`ent kind of company, it is probably be-
`cause,like Microsoft, it has been led for
`nearly 20 years by one person, Earlyin-
`dications are that Doug Carlston will re-
`main in charge of the operation and
`there won't be many jobs lost. And a
`consolidation that will give the combined
`companies 40 percentof the educational
`software market can’t exactly be bad
`news for either company. That's all true,
`butit’s also true that one of the pioneer
`software companies is no more. We
`should mark its passing.
`Thanks to Steven Levy's book Hack-
`ers for refreshing my memory about
`Broderbund's early days.
`
`—MS.
`
`114
`
`LGE Exhibit-1018/Page 7 of 10
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`information to allow the net to start a di-
`alog with the device, whichit does, on en-
`countering the packet on a known port,
`by sending the device a packet that de-
`scribes the network's characteristics. (The
`device doesn't need to know anything
`about the network in advance.) That’s Dis-
`covery. Nowthe device can Join the net-
`work, which it does by sending a more
`comprehensive message back, containing
`all its own characteristics (I print in color,
`T respondto the following voice com-
`mands, I chop small vegetables), This mes-
`sage can contain more than just device
`characteristics: it can also include code o1
`code pointers, as for example a printer
`driver, an interface to a printerdriver, o1
`a help wizard. The medium of communi-
`cation here is a Java interface. Jini is per-
`fectly willing to work with C code at some
`levels, but hereit's built firmly on Java,
`
`
`
`Lookup is the component that does
`what [ have loosely attributed to the net
`in previous paragraphs. It
`is a small bul-
`letin board for the net, dynamicallystor-
`ing pointers to services, and also code or
`pointers {6 code provided by services,
`Clients for these services talk to Lookup
`to get, for example, the driverfor a print-
`er downloaded when needed, Lookupis
`the main point of contact between the sys-
`tem andits users, What it does is to map
`Java interfaces that identify offered fune-
`tionality to a set of objects that provide
`that functionality (that is, that service).
`A twist on this Lookup capability is Peer
`Lookup, in which a client can masquer-
`ade as a Lookupif no Lookup is avail-
`able. Theclient itself then engages in the
`Discovery and Join conversation with the
`service providers, who register with the
`client just as if it were a Lookup.
`
`
`Paradigms Past: The End of the Brotherhood
`
`
`
`
`
`
`
`
`

`

`{continuedfrom page 114)
`chance of coming toreality. Microsoft
`tion of companiesthat al] buyinto Bill Joy's
`dream, Hardware companies will have to_isn’t about to endorse it, can in fact be
`and progrims, Or even programs a nd files,”
`Waldo says. Insteacl, you shouldthink ofit
`rework their equipment, and software com-
`counted on to embraceit about the same
`as an open-ended, dynamically changing
`panies will have to rework their minds if way they embraced Java. And other
`collection of independentservices that can
`theyare to buy into this thing.
`companies are being asked, at minimum,
`be composedtogether to performa task,
`to make an investment in an unproven
`But some companies have, to one ex-
`Services communicate with one anoth-
`technology, and at max, to rethink their
`tent or another, bought into the Jini vi-
`ey vid a service protocol, which is a Java
`sion, including Canon, Computer Asso-
`entire business and software develop-
`ment models.
`interface. There can be any numberof
`ciates, Epson, Ericsson, FedEx, Mitsubishi,
`Novell, Oki, Salomon Brothers, Seagate,
`Against that imposing challenge, there
`such protocols; theyare, like the services,
`is this small thought: Something likethis is
`Siemens, and Toshiba. Sun says that the
`an open-ended collection
`going to happen someday. Why not now?
`source code will be open as in the Mozil-
`Security in Jini follows a provider/access
`And whynot from the guy whohas been
`la model andthat they will enforce com-
`control list model. The principal is whomey-
`er or Whateverthe service is accessed for—
`patibility in some way, probably through—thinking about it for all his adult life, Mr.
`an authorized label for Sun-certified com-
`“The network is the computer” himself? It's
`ultimately it will probably be some user
`patible commercial products.
`somewhere, but the immediate principal
`Bill Joy’s dream. Andit might come true.
`It would be easy to dismiss the Jini
`maybe another object. The access control
`list is associated with and controlled bythe
`effort as a dream that has verylittle
`object that implements theservice. In short,
`the ownerof the service gets to decide who
`does what with it when. Jini is designed to
`be decoupleable, so that it
`is possible to
`implement parts of the system andstill get
`many ofits benefits. I haven’t dug deeply
`enough to knowwhat parts and what ben-
`efits, but the idea is to allowlegacy code
`to play a (perhapslimited) role in a Jini
`federation with only minor modification,
`That legacy code would probably be C
`code. Jini itself is built on Java, though,
`and Java underlies all the components of
`Jini, When you lump in that Java infra-
`infrastructure, those components looklike
`Table 1.
`
`
`
`
`
`
`
`
`
`DDJ
`
`CopyProtection and
`Software Licensing with No
`
`
`
`Distribute your softwarevia Internet,
`CD or floppy with full security.
`
`CrypKey provides solid copy protection with a
`broad range of features to contro! all aspects of
`your product's operation. You can offer free,
`automatic one-timetrials, turn demosinto full multi-
`user network versions, or sell specific options by
`phone, fax or email. Sell usage by time, runs,
`features - the controlis all there - easy to implement,
`and even easier to support.
`
`CrypKeyalso offers choices - integrate our SDK
`into your software, or use CrypKey Instant to
`protect your compiled exe in 5 minutes; no coding.
`Try it free from our website to see why we're
`rated #1 by professional programmers who seek
`the best combination of security, features, ease
`of use, reliability & price,
`
`
`
`Whatif Means
`This is a powerful vision, but it doesn’t add
`up to a product
`that Sun can sell
`in
`shrinkwrappedform to consumers with a
`marketing blitz featuring Larry Hagmanand
`Barbara Eden.Jiniis really an appeal to the
`industry to join Sun in forming a federa-
`
`(a)
`Java VM*
`RMI"
`Java security model*
`Discovery and Join
`Lookup
`Distributed security
`
`()
`Java APIs*
`JavaBeans*
`Leasing
`Two-phase commit
`Events
`
`(c)
`JNDI*
`Enterprise Beans*
`JTs*
`JavaSpaces
`Two-phase commit manager
`Other services
`
`enh _—__——————
`
`100% Satisfaction Guaranteed!
`
`
`
`Table 1:JiniJava infra- infrastructure.
`(a) Jini infrastructure; (b) Jini
`Progranuning model; (c) Jini services.
`(lava-supplied elements).
`
`:
`
`Dr. Dobb'sJournal, November 1998
`
`117
`
`LGE Exhibit-1018/Page 8 of 10
`
`Hardware Key or Disk Key
`
`
`

`

`N. MANCHESTER,INDIANA 46962
`
`A
`y
`, CID
`
`ae
`
`o.
`

`
`BoundTo-Please*
`
`00-9S1505
`
`LGE Exhibit-1018/Page 9 of 10
`
`

`

`illi||T
`
`
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket