throbber
N_E_____WTON’
`:ELEGOM
`minimum
`
`Etlltlon
`
`The Official Dictionary of
`
`Telecommunications & the Internet
`
`- IP Telephony 0 Little & Intranets - Call Centers & Computer Telephony
`
`- Fiber Opticsi SONET and DWDNI - Satellites
`. Voice, Data. image a. Video Networking . Wired
`
`Updated
`
`and WirelessTelecom-IIoIP-1-1. 1-3, M. 5-1,
`
`E-3 - ISBN & ADSL - Cable Modems - Ceilutar,
`ms at GSIVI - Windows 95, 98, NT, NetWare,
`Apple, Sun 8. Unix Networking - Ecommerce
`
`15"]
`
`Expanded
`
`Exhibit 1021
`Exhibit 1021
`Unified Patents v. Synkloud Technologies
`Unified Patents v. Synkloud Technologies
`Page 001
`Page 001
`
`

`

`
`
`—-‘-—#-.‘.—~»-—-——
`
`
`
`.._..-'-——_—-——-—-.—v—~—--——-—-
`
`
`
`
`
`NEWTON? IELECOHI DICTIOIIIII‘I
`
`oopyright©1999 Harry Newton
`email: Harry_Newlon@HarrvNevvion,eom
`personal web site: wwwharrynevvtoncom
`
`All rights reserved under International and Pan-American Copyright conventions. including the right to reproduce this
`book or portions thereof In any form whatsoever
`
`Published in the United States by
`Miller Freeman. lne.
`Tenth floor
`12 West 21 Street
`
`.
`New York. NY 10010
`21 24391-8215 Fax 213691-1191
`1—800-999-0345 and LEGO-LIBRARY
`
`lSBN Number 1—57820-031-8
`
`February. 1999
`
`Manutaetured in the United States at America
`
`Fifteenth Expanded and Updated Edition
`Cover Design by Saul Holden and Heguta Hotlrnan
`Matt Kelsey. Publisher
`Christine Kern. Manager
`
`Printed at Command Web. Sensuous. New Jersey
`wmommandweboorn
`
`Exhibit 1021
`Exhibit 1021
`Unified Patents v. Synkloud Technologies
`Unified Patents v. Synkloud Technologies
`Page 002
`Page 002
`
`

`

`NEWTON'S TELECOM DICTIONARY
`
`—'——fi_-?_——
`
`I
`
`I
`
`I
`
`International service which provides cabtegram communica-
`tion to International destinations through the use of a com-
`puterized message switching center in New York City.
`Calalehead The point where a marine cable connects to ter-
`restrial facilities.
`CahleLahs Cable Television Laboratories. Inc. A research
`and development consortium of cable television system operw
`ators established in 1988. CableLabs plans and funds
`research and development projects to help member compa-
`nies and the cable industry take advantage of opportunities
`and meet challenges in the telecommunications industry. A
`good deal of emphasis is placed on digital cable and cable
`modem technologies. www.cablelabscorn
`Cahlaparl
`Intel Corporation's new technology, which
`brings high speed multimedia-rich interactive services to per-
`sonal computers in the home via cable.
`Cahlespan A Tellabs Operations. Inc. product which deliv-
`er two-way voice and data services over coaxial cable used by
`cable TV operators. Tellabs is in Lisle. Illinois.
`Cahleway An opening in a work surface that allows access
`to cords or cables from below. or mounting of an electrical
`receptacle or telephone jack. Cableways typically come with
`removable plastic grommets.
`Cabling The combination of all cables. wire. cords. and
`connecting hardware installed. A term used to refer collec-
`tively to the installed wiring In a given space.
`CABS Carrier Access Billing Specifications
`CABS IDS Carrier Access Billing Specifications - Billing
`Output Specifications
`in
`CBC l . Carrier Access Code. The digits you must dial
`North America to reach the long distance carrier of your
`choice. Those digits fit the following format rotxxxx.
`2. Customer Administration Center. A type of terminal used by
`a PBX user to maintain and troubleshoot his PBX.
`3. Connection Admission Control
`is defined as the set of
`actions taken by the network during the call setup phase (or
`during cell re-negotiation phase) in order to determine whether
`a connection request can be accepted or should be reiected (or
`whether a request for reallocation can be accomplished).
`CACI'I Call Appearance Call Handling.
`Cache From the French “cachet." which translates ”to press or
`hide." especially In terms of tools or provisions. to the context
`of computer systems and networks, information is cached by
`placing it closer to the user or user application in order to make
`it more readily and speedily accessible, and transparently so. At
`the same time. information which is cached places less stain on
`limited computer V0 (Input/Output) resources and limited net-
`work resources. Let's consider two specific definitions. the first
`of which relates to computer systems and the second of which
`relates to computer networks. Let's also consider a combination
`of the first two. in the context of the Internet.
`1. in the context of a computer system. cache memory gener~
`ally is a partition of SRAM (Static Random Access Memory).
`Since much of computing is highly repetitive or predictable in
`nature. and since solid state components (silicon chips) are
`much faster than mechanical disk drives, the speed of infor-
`mation access can be enhanced if certain information can be
`stored to RAM. That information typically is in the form of
`program information. memory addresses. or data. Thereby.
`the information can be stored in anticipation of your need for
`it. and can be presented to you faster than if the computer
`needed to access the hard drive through the execution of an
`IA] function. The cache memory sits (logically and. perhaps
`physically) between the CPU and the main memory (RAM).
`
`Caching works because of a phenomenon known as the local-
`ity principle which'states that a von Neumann CPU (i.e.. one
`that performs instructions and makes database calls sequen-
`tially. one after another) tends to access the same memory
`locations over and over again. A cache works like this. When
`the CPU needs data from memory. the system checks to see
`if the information is already In the cache. If it is. it grabs that
`Information; this is called a cache hit.
`If it isn't. it's called a
`. cache miss and the computer has to fetch the information by
`accessing the main memory or hard disk. which is slower.
`Data retrieved during a cache miss is often written into the
`cache in anticipation of turther need for it. Lets assume that
`you open a CD~HOM application with hyperlinks. As the sys-
`tem can reasonably assume that you will exercise the hyper
`link options. the information associated with them can be
`stored in cache memory.
`If you do.
`indeed. exercise those
`options. it‘s a cache hit and the data is there waiting for you.
`The cache also will hold information that you recently
`accessed.
`in anticipation of your wanting to back up. or
`access it again. Caching can take place through partitioned or
`segmented cache memory. which can be in the form of L1
`(Level 1) primary cache and L2 (Level 2) secondary cache. Lt
`cache memory is accessed first, L2 second. the main memo-
`ry (RAM) and then hard drive last. Also. one cache might hold
`program instructions and the other might hold data. Generally
`when the cache is exhausted. it is flushed and the data is writ-
`ten back to main memory. to be replaced with the next cache
`according to a replacement algorithm. Cache trashing and
`flushing mechanism is designed differently by different ven-
`dors. It behaves slightly different. However it mainly depends
`on main memory type.
`like write back or WB. write through
`Wt. write protected or WT. write combining or WC and
`uncached or UC. See also Cache Memory.
`2. In the context of a computer network such as a LAN. or the
`combination of the Internet and World Wide Web. data can be
`cached in a server which is close to you.
`in anticipation of
`your imminent request for that data in a logical sequence of
`data access. it will be transmitted from the main server to the
`remote server. Thereby. the data is accessible to you more
`quickly than if it had to be transmitted across the entire net-
`work each time you had a need for it. Should you accessa
`certain set of data frequently.
`it might be permanently stored
`on a server in proximity. and refreshed by the main server
`from time to time in order to ensure its currency (is. that It
`remains up to date).
`3.
`in the context of an Internet clientfserver application.
`caching really shows its stuff. First. the network uses distrib-
`uted cache servers to house the WWW Information that users
`In your region use frequently. As you access a Web site. your
`speed of access and response is improved because the data
`is housed on a server closer to you. The data then is loaded
`into cache memory on your client computer workstation. AS
`you move forward, from page to page and link to link. Your
`client caches the Information provided by the cache server.
`with all of this happening in anticipation of your next move-
`As you move backward. the same thing happens. in anticipa-
`tion of that next move. as well. Just in case you don‘t believe
`the client side of
`this story. on to Internet Explorer 0f
`Netscape, and click on cache. (The fastest way to regain spacti
`on your hard disk is to flush the cache which these programs
`dum to your hard disk.)
`Car 9 Coheremy Managing a cache so that data is but
`lost or overwritten. See also Cache.
`Cache Controller A chip. such as the Intel 82385. that
`
`5
`manages the retrieval,
`from memory or the her:
`In either clients or serve
`(arise Engine A car
`speed dedicated Internet
`caching and retrieval. W
`cache engine locally st:
`text. When another user I
`content
`is pulled fron
`improves download timr
`use on the network. Here
`from Cisco. which main
`work? The cache enginr
`which redirects Web rer
`Web Cache Control Prof
`of Cisco IOS software. T
`ing oftratflc across mull
`tolerant. fail-safe opera
`caching? By reducing th
`on overburdened Web 2
`benefits to ISPs. enterp
`benefits include cost 5
`usage and dramatic imp
`users. The cache engine
`with a simple method ‘
`through URL filtering. 8
`Cache l-lit When the
`Thus you don't have to .
`puting is faster. See Car
`Cache Memory Avai
`or SRAM (Static HAM) I
`at to "remember" stuff
`wants that information.
`searching through a 5
`process. This high spe
`wall state. When the C
`copy of this data is storr
`the CPU reads the actor
`the cache memory ins
`liefWare. for example.
`server access time. In |
`directory and file cache
`Table). the turbo FAT.
`it
`other functions. See ats
`Cache Miss When it
`and you have to read yr
`leading it from the cast
`Hit and Cache Memory
`Caching A process by
`cry or server in anticip
`See Cache for a full ext
`CAD 1. Computer Aide
`2- Computer Aided De:
`Willie and terminals us
`mlElitt be as simple a
`Complex as detailed l
`Statems often have ter
`Ital maxi-computer in
`CAD terminals are of
`Works] or through tel
`often moved. thus hat-
`Snitching system #
`EXttemely useful.
`tMl/Clll'il Compul
`
`l I
`
`Exhibit 1021
`Exhibit 1021
`Unified Patents v. Synkloud Technologies
`Unified Patents v. Synkloud Technologies
`Page 003
`Page 003
`
`125
`
`

`

`T'-I
`
`NEWTON‘S TELECDM DICTIONARY
`
`I
`
`-
`
`tenon known as the locak
`Neumann CPU (i.e.. one
`as database calls SHONE”-
`recess the same memo“.
`:he works like this. whey,
`the system checks to see
`ache. it it is. it grabs (hay
`iii.
`It it isn't.
`it’s caileda
`listen the information by
`rd disk, which is slows;
`:
`is often written into the
`i for it. Let's assume that
`th hyperlinks. As the 855.
`J will exercise the hype[.
`stated with them can he
`i.
`indeed. exercise triage
`t is there waiting for you
`ration that you recently
`wanting to back Up. or
`ice through partitioned or
`:an be in the form of L1
`31 2) secondary cache. L1
`second, the main memo.
`so. one cache might hold
`Tight hold data. Generaily
`shed and the data is writ-
`laced with the next cache
`hm. Cache treshing and
`terentiy by different ven-
`)wever it mainly depends
`rck or WB. write through
`combining or WC and
`emery.
`ark such as a LAN. or the
`d Wide Web. data can be
`c you.
`in anticipation of
`in a logical sequence of
`1m the main server to the
`accessibie to you more
`ed across the entire net-
`it. Should you accessa
`it be permanently stored
`shed by the main server
`a itscurrency (ie. that it
`
`:lientfserver application.
`the network uses distrib—
`W iniormation that users
`I access a Web site. your
`proved because the data
`The data than is loaded
`omputer workstation. As
`go and link to link. your
`led by the cache server.
`ation of your next move.
`ng happens. in anticipa-
`in case you don‘t believe
`to internet Explorer or
`stest way to regain space
`to which these programs
`
`:ache so that data is not
`
`as the Intel 82385. that
`
`manages the retrieval. storage and delivery at data to and
`from memory or the hard disk. Cache controllers may reside
`in either clients or servers. See also Cache.
`.
`cache Engine A cache engine iS a carrier-class. high-
`speed dedicated Internet appliance that performs Web content
`caching and retrieval. When a user accesses a‘Web page. the
`cache engine locally stores the page's graphics and HTML
`test When another user later requests the same Web page. the
`content
`is pulled from the cache engine. This process
`improves download time tor the user and reduces bandwrdth
`use on the network. Here is a an explanation of a cache engine
`from Cisco. which makes one. How doesthe cache engine
`work? The cache engine communicates wrth a Cisco'router.
`which redirects Web reouasts to the cache engine usrng the
`web Cache Control Protocol (WCCP). a new standard feature
`of Cisco |OS software. The WCCP also enables load baianc-
`mg of lratiic across multiple cache engines and ensures fault—
`lelerant. fail-sate operation. What are the benefitslof Web
`caching? By reducing the amount of tratfic on WAN links and
`on overburdened Web servers. caching provides significant
`benefits to ISPs. enterprise networks and end users. These
`benefits include cost savings due to a reduction on WAN
`usage and dramatic improvements in response times for end
`users. The cache engine also provides network administrators
`with a simpie method to enforce a site-wide access policy
`through URL filtering. See also Cache.
`Cache Hi! When the data you want is actually in cache.
`Thus you don't have to access your hard disk and your com-
`puting is faster. See Cache. Cache Miss and Cache Memory.
`Cache Memory Available RAM (Random Access Memory)
`or SRAM (Static RAM) that you set up to ailow your comput-
`er lo "remember" stuft — so the next time your computer
`wants that information, it can find it last from RAM. instead of
`searching through a slower hard disk iiO (Input/Output)
`process. This high speed cache memory eliminates the CPU
`wail state. When the CPU reads data from main memory. a
`copy of this data is stored in the cache memory. The next time
`the CPU reads the same address. the data is transferred from
`the cache memory instead of from main memory. Novell's
`NetWare. for example. uses cache memory to improve tile
`server access time. In NetWare. cache memory contains the
`directory and tile caches. along with the FAT (File Allocation
`Table). the turbo FAT. the Hash table. and an open Space for
`other functions. See also Cache.
`Curiae Miss When the caching software guesses wrongly
`and you have to read your data off your hard disk rather than
`reading it from the cache in memory. See also Cache. Cache
`Hit and Cache Memory.
`Cashing A process by which information is stored in mem-
`ory or server in anticipation of next request for information.
`See Cache for a full explanation.
`CAD 1. Computer Aided Dispatch.
`2. Computer Aided Design. A computer and its related soil-
`ware and terminals used to design things. A CAD system
`might be as simple as computerized drafting tools or as
`complex as detailed layouts of
`integrated circuits. CAD
`systems otten have terminate on peoples' desks and a cen-
`tral maxi-computer in the company's main computer room.
`CAD terminals are often run over LANs (local area net-
`works) or through telephone systems. The terminais are
`often moved. thus having universal wiring and a universal
`switching system — a LAN or a phone system — is
`extremely useful.
`CAD/CAM Computer Aided DesignlComputer Aided
`
`Manufacturing. See CAD.
`(All! Gatling Area Data Base. Arr MCI deiinition. An MCI
`System that stores reference data for various lvlCl Systems
`and reconciies MCI Calling Areas with those of Bell.
`Caddy The shell of an optical disc. Protects it from grubby
`fingerprints. and includes write protection devices. AKA case.
`Cadence In voice processing. cadence is used to refer to the
`pattern of tones and silence intervals generated by a given
`audio signal. Examples are busy and ringing tones. A typical
`cadence pattern is the US ringing tone. which is one second
`of tone followed by three seconds of silence. Some other
`countries. such as the UK. use a double ring, which is two
`short tones within about a second. followed by a little over
`two seconds of silence.
`CAD! Code Abuse Detection System.
`(A! Computer Aided Engineering.
`Cage Anlennn An antenna having conductors arranged
`cylindrically.
`(n61! Compound Annual Growth Rate.
`CAI 1. Computer Assisted Instruction. Commonly known as
`CBT {Computer Based Training). See CBT. See also CAD for
`a discussion on telecom needs.
`the intertace
`2. Common Air
`Interface. A standard for
`between a radio network and equipment. A CAI allows mul-
`tiple vendors to deveiop equipment, such as radio tenninat
`devices (e.g.. cordless phones. cellular phones and PCS
`terminals) and base stations (e.g.. ceilutar antenna sites).
`which will
`interoperate. The yield is a competitive (read
`less expensive) market
`for equipment. The British
`CT2/Tetepoint system incorporated one of
`the first CAI
`standards. See also CT2.
`can: Customer Access Line Charge. Also known variously
`as Access Charge. EUCL (End User Line Charge). and SLC
`(Subscriber Line Charge). See Access Charge.
`(ALIA Communications Assistance for Law Enforcement Act
`1994.
`
`Calendar Routing A call center term for directing calls
`according to the day of the week and time of day. See also
`SOURCEIDESTINATIDN ROUTING. SKILLS BASED ROUTING
`and END-OF-SHIFT ROUTING.
`Culflmfle To test and reset a measuring or timing device
`against a standard to make sure it is functioning correctly.
`Cull Everyone has a different definition for "call." My defini-
`tion is simplest: Two people or two machines are on a phone
`line speaking to each other. That's a call. Betlcore's definition
`of a call: An arrangement providing for a relation between two
`or more simultaneously present users for the purpose of
`exchanging information. The ATM Forum's definition: A call is
`an association between two or more users or behveen a user
`and a network entity that is established by the use oi network
`capabilities. This association may have zero or more connec-
`tions. Here are some more formal definitions:
`1. In communications. any demand to setup a connection.
`2. A unit of traitic measurement.
`_
`3. The actions performed by a call originator.
`4. The operations required to establish. maintain. and release
`a connection.
`5. To use a connection between two stations.
`6. The action of bringing a computer program, a routine. or a
`subroutine into etiect. usuaiiy by specifying the entry condi-
`tions and the entry point.
`Cull Abandon: Also called ABANDONED CALLS. Call
`Abandons are caiis that are dropped by the calling party
`before their intended transaction is completed. The call may
`
`12?
`
`Exhibit 1021
`Exhibit 1021
`Unified Patents v. Synkloud Technologies
`Unified Patents v. Synkloud Technologies
`Page 004
`Page 004
`
`

`

`Y"
`
`i l
`
`NEWTON’S TELECDM DICTIONARY
`
`It includes the PC Card Standard
`my. PC Card Standards.
`Release v2.01. Socket Services Specification Release v2.0.
`Card Services Specification Release v2.0. ATA Specification
`palettes v1.01. AIMS. Specification Release v1.0. and the
`Recommended Extensrons Release v1.0. Standard v3.0 has
`been proposed. See PCMCIA. wwwpcmciaorg
`PCN Personal Communications Network. A new type of wire-
`less telephone system that would use light.
`inexpensive
`handheld handsets and communicate via low-power anten-
`has. When it was originally conceived. PCN was primarily
`seen as an a city communications system. with far less range
`than cellular. Subscribers would be able to make and receive
`calls while they are traveling. as they can do today with cellu-
`lar radio systems. but at a low price. Now PCN is seen as
`what Dr. Sorin Cohn of Northern Telecom calls an "enabler of
`unplanned growth." One idea for PCN is to locate a PCN cell
`site {transmitterfreceiveri in a residential community. When
`someone wanted a new phone line. they'd simply drop down
`to their local phone store. pick up a PCN portable phone and.
`by the time. they got back home. their frequency would be
`”switched on“ and they'd be “live.” The original plansfor PCN
`never materialized fully. However,
`the concept has been
`implemented in the forms of Personal Communications
`Service (PCS) and Wireless Local Loop (WLL). See also PCS.
`Personal Communications Network. Wireless Local Loop.
`pco Point of Control and Observation: A place (point) with-
`in a testing environment where the occurrence of test events
`is to be controlled and observed as defined by the particular
`abstract test method used.
`PCP 1. Post Call Processing.
`2. Program Clock Reference: A timestamp that is inserted by
`the MPEG-2 encoder into the Transport Stream to aid the
`decoder to the recovering and tracking the encoder clock.
`in
`ecn An ATM term. Peak Cell Rate: The Peak Cell Rate.
`cells/sec. is the call rate which the source may never exceed.
`PCS 1. the plural of PCs. is. File.
`2. Personal Communications Service. A new. lower powered.
`higherwtreeuency competitive technology to cellular. Whereas
`cellular typically operates in the BOO-SOD MHZ range. PCS
`operates in the 1.5 to 1.8 6112 range. The idea with PCS is that
`the phones are cheaper. have less range. are digital; the cells
`would be smaller and closer together and the airtime would be
`cheaper also. Several licenses have been awarded and sever-
`al systems have started in North America. The concept of PCS
`is evolving. It is not clear exactly where it will and up. So far.
`it looks like another cellular system with some digital mes-
`saging on the phone's larger screen. this is how the Federal
`Government awarded PCS licenses:
`0 ‘C-Eltock' Carrier
`A 30 MHz PCS carrier serving a Basic Trading Area (ETA) in
`the frequency
`block 1895-1910 wit-I2 paired with 1975-1990 MHz.
`- "D-Block" Carrier
`A 10 MHz PCS carrier serving a Basic Trading Area (ETA) in
`the frequency
`block 1865-18TO lvin paired with 1945-1950 MHz.
`0 “E-Btock“ Carrier
`A 10 MHz PCS carrier serving a Basic Trading Area (BTA) in
`the frequency
`block 1885-1890 llez paired with 19654970 MHz.
`0 "F-Biock" Carrier
`A 10 MR: PCS carrier serving a Basic Trading Area (BTA) in
`the frequency
`block 18904895 lvin paired with 1970-1975 MHz.
`
`See PERSONAL COMMUNICATIONS NETWORKS and PER-
`SONAL COMMUNICATION SERVICES.
`PCS Over Cllllll You run a CATtl — cable TV company.
`You have a wires strung all over the neighborhood. On one at
`your wires you attach a six foot by four foot by four box of
`electronics and three two feet attennae. Bingo. you're now a
`way station — also called a cell site — lor a PCS cellular
`phone system. People who are PCS subscribers will talk and
`receive calls when they're close to your cell site. Calls come
`and go via your coax cable. up it to a landline connection
`point with the PCS carrier. You. the CATV company. get paid
`money for completing calls. See wwsanderscomltelecomm
`PCS! Personal Computing System Architecture. A PC imple-
`mentation of DECnet. that lets PCs work in a OECnet environ-
`ment. PCSA is a network architecture defined and supported
`by Digital Equipment Corporation forthe incorporation of per-
`sonal computers into server-based networks.
`PCI' Personal Communications Technology. A security proto-
`col developed by Microsoft for online Web commerce and
`financial transactions. Transparent to the user. PCT provides
`authentication and encryption routines that complement cred-
`it-card based commerce on the World Wide Web. internet
`Explorer. Microsoft's Web browser. makes use of PCT. See
`also AUTHENTICATION and ENCRYPTION.
`I'C'I'l Personal Computer Terminal Adapter. A printed circuit
`card that slips into an lBM PC or PC compatible and allows
`that PC to be connected to the ISDN T-interiaoe. See PER-
`SONAL COMPUTER TERMINAL ADAPTER.
`PCT! Portable Common Tool Environment.
`PC'I‘S Public Cordless Telephone Service. A Canadian digital
`cordless telephone service for residential, business and pub—
`lic use. For other variations of digital cordless telephone ser—
`vice. see CTl. CT2. CTZPlus. CTS. and DEC'I'.
`PCWG
`Personal
`Conferencing
`Work
`(way-ouccwoorcfocwoli
`PC! Server Software PCX server software turns your
`PC into a graphics terminal front-end for Unix and it applica-
`tions. Thus. your PC can display application output generat-
`ed by remote X—based client applications.
`PM Personal Digital Assistant A consumer electronics gadget
`that looks like a palmtop computer. Unlike personal computers.
`PDAs will perionn specific tasks - acting like an electronic
`diary. catty-along personal database. multimedia player. per-
`sonal communicator. memo latter. calctdator. alarm ctodt. The
`comrrumlcefions will take place litrough the
`he or titrwgh
`wireless. A pie has annorrnwd a PDA, wb 11 it has owned
`Newton.
`11
`I added this definition in the late fall of 1992.
`sales otPDAsweren't doingwelland sonrevrag in Silicon Vail
`1
`railed them Probably Diwppolnted Again. IBM preters to
`them Personal Communicators. General Magic pretershr called
`them PICs. Personal intelligent Communicators.
`PM" Physical Delivery Access Unit. A gateway device that
`facilitates the delivery of messages {excluding probes and
`reports) in physical form. This is an X3100 term.
`PM )1 Personal Digital Cellular. (Digital system used in
`Japan.
`2. See Primary Domain Controller
`PDF Portable Document Format. This is the file tunnel for
`documents viewed and created by Adobeb Acrobat Reader.
`Capture. Distiller. Exchange and the Acrobat Amber Plug-in
`for Netscape Navigator. The PDF file format was developed to
`standardize internal-based documents. One at the benefits at
`
`Group
`
`using Acrobat and the .pdi iorrnat is you can deliver business
`documents others without reauthoring them and read them
`
`593
`
`
`
`Exhibit 1—021
`Exhibit 1021
`Unified Patents v. Synkloud Technologies
`Unified Patents v. Synkloud Technologies
`Page 005
`Page 005
`
`neans application sol.
`rt faster and not requlrle
`
`ltware architectur
`ekel Services is agilgse
`: a way to access the
`. Sockett Services iden-
`compu or system
`fC Card while the 311“
`IS part of the PCMCIA
`Card Services. Card
`ltedace that allows the
`as memory and inter-
`Services detects thata
`as also releases these
`been removed. Care
`rterface to higher level
`drivers.
`a. Card Services soli-
`vrdes an almost "plug-
`rmputlng environment.
`: IS theoretically possi-
`It powering off the sys-
`:e.
`if has worked only
`talk for network cards.
`a. to insert a modem
`oter system. download
`5 memory. remove the
`a flash PCMCIA Card.
`to — all while your
`Great theory.
`3. including manufac-
`peripherals and sys-
`evelopers and related
`BM, Toshiba, Lotus.
`based in Sunnyvale,
`nc bulletin board —
`o recognized by the
`cement Association
`as book listing all the
`ply to their standards.
`31A standards are still
`standards. Check that
`re. The manufacturer
`Jon't assume compat-
`ervtces supports that
`instead. Avoid PCM-
`You lose them. Use
`can plug directly into
`Ivalent. if you have to
`plgtail. just in case.
`its specs. PC Card.
`1 people claimed that
`vtemorize Computer
`
`came out with a new
`
`32-bit bus, as against
`extension of the PCI
`I support t32 Mbps.
`ee CardBus for a full
`also Card Services.
`5. and Slot Sizes.
`
`at of all of the PCM-
`
`l l
`
`l l l l l l y
`
`

`

`Ju want. It's very easy
`to a mistake and con-
`1 laugh. We've done it
`
`ode that represents a
`common peer group,
`rcf one of the border
`
`PP). The negotiation
`'nent methodology in
`rts Initiative (JEPI). a
`a Consortium (W30)
`rent platform to allow
`nsacl E-Commerce
`t. UPP works in con-
`tent (PEP). an exten-
`(HyperText Transier
`ad to make payment
`r. happening at
`the
`ir configurations See
`
`ompatibie PC, upper
`d 1MB of RAM. This
`rs (UMBs) of various
`only with a special
`386.EXE.
`R MEMORY AREA.
`Fl SUPPLY.
`liverer that regularly
`ely speedy delivery
`
`owe a local area not-
`lninlerruptible Power
`ccurs. NelWare notl—
`th SERVERCFG and
`malning users. clos-
`uwn.
`If you install a
`stall a printed circuit
`3S.
`If you have a file
`mpared to the more
`1 through the mouse
`
`lng. A SONET term.
`fiber optic transmis-
`h one fiber transmit»
`rfibertransmitting in
`Eckup takes over. See
`speak is the annoy-
`
`it. there are two cir-
`from you. Upstream
`not going away from
`e delinition of the
`t is the channel from
`tTV headend. See
`
`:ations circuit, there
`oing away from you.
`if the channel going
`ark. the definition of
`tilt. It is the channel
`tTV headend.
`In yet
`ustry.
`the upstream
`
`NEWTDN'S TELECOM DICTIONARY
`
`is a collection of frequencies on a CATV channel
`channel
`reserved for transmission from the terminal next to the user’s
`TV set to (upstream to) the CATV company's computer. Such'
`signals might be requests for pay movies. See UPSTREAM.
`Upstream Operation Functions that provide a BCC
`(Belicore Client Company) control of features and service
`configurations and subject
`to 800 control. some service
`management capabilities for subscribers. These functions
`include Service Negotiation and Management, Service
`Provisioning and Repair Service Answerinngork Force
`Administration. Deilnition from Bellcore in reference to Its
`concept of the Advanced intelligent Network.
`II" Universal Personal Telecommunications. According to
`L.M. Ericsson. Swedish telecom manufacturer. UPT is a “new
`service concept
`in the field of telecommunications which
`aims at making telecommunications both universal and per-
`sonal. instead of calling a telephone line or a mobile termi-
`nal, you call the person you wish to get in touch with and
`leave it to the network to locate the line or terminal where
`helshe can be reached.” There was an article on UTP In the
`1993 No.4 issue of the Ericsson Review. An article In the
`June. 1996 issue at
`IEEE Communications Magazine
`described UPT as a service that enables users to access var-
`ious services through personal mobility. It enables each UPT
`user to participate in a user-defined set of subscribed ser-
`vices. and to initiate and receive calls on the basis of a per-
`sonal. network transparent UPT number across multiple net-
`works on any fixed or mobile terminal. irrespective of geo~
`graphical location. This service is limited only by terminal
`and network capabilities and restrictions imposed by the net—
`work operator. ln short. UPT is still not totally defined and is
`under discussion by the world's major standards bodies. For
`more information on UPT, see lTU-T Recommendation PBSD.
`Principles for Universal Personal Telecommunications.
`Geneva. 1993.
`the uninterrupted
`Upllm Collocuial expression for
`amount of time that network or computer resources are work-
`ing and available to a user. In short. time between failures or
`periods of nonavailability (as for maintenance).
`Upward Compuliblo Any device that can be easily
`organized. fixed or configured to work in either a ditterent,
`expanded operating environment or some enhanced mode.
`Software is said to be upward compatible If a computer larg-
`er than the one for which it was written can run the program.
`“than Service Any of the grades of service regularly fur-
`nished inside base or locality rate areas. or outside base or
`locality rate areas at base or locality rates plus zone connec-
`tion charges or incremental rates. Another way of saying
`expanded metropolitan phone service.
`URI. Universal Resource Locator. An lntemettenn. A URL is
`a fancy name for an internet address. A URL is an address
`that can lead you to a file on any computer connected to the
`lntemet anywhere in the world. Thus. its name * Universal
`Resource Loutor.
`in more technical terms. a URL to a string expression that can
`represent any resource on the Internet or local TCIIP system.
`The standard convention for a URL is as follows:
`method of protocol to be usedtlmost‘s nameitolder or direc-
`tory on hoslfname of file or document
`a
`of
`Here's
`an
`example
`http:/lwvrwharrynewton.com/fantasylhappyniml
`Let's see what It all means. The http stands tor i-lyperText
`Transport Protocol. That tells your browser (e.g. Netscape or
`interest Explorer) to use that protocol when searching for the
`
`URL:
`
`address. Http is the 'deiaulr' protocol of the Internet. But it's
`not the only one. There are other
`rotocois. Including ftp (file
`transfer protocol). news (for
`senet news groups). and
`“mailto'
`to send ernari to a specific address).
`The wwwharrynewtoncom is simply the me or my cum.
`outer. All Web addresses start as numbers. This one Is no
`different. You can reach my home page by giving your
`browser the following command http11209.94.129.297/.
`The Web's own Icotnrp tables do an lnstaneous transiation to
`that number from www.harrynewton.oom when you type in
`numharrynewtoncom. The translation mechanism to very
`much like the translation the phone Industry does when you
`dial any

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket