`:ELEGOM
`minimum
`
`Etlltlon
`
`The Official Dictionary of
`
`Telecommunications & the Internet
`
`- IP Telephony 0 Little & Intranets - Call Centers & Computer Telephony
`
`- Fiber Opticsi SONET and DWDNI - Satellites
`. Voice, Data. image a. Video Networking . Wired
`
`Updated
`
`and WirelessTelecom-IIoIP-1-1. 1-3, M. 5-1,
`
`E-3 - ISBN & ADSL - Cable Modems - Ceilutar,
`ms at GSIVI - Windows 95, 98, NT, NetWare,
`Apple, Sun 8. Unix Networking - Ecommerce
`
`15"]
`
`Expanded
`
`Exhibit 1021
`Exhibit 1021
`Unified Patents v. Synkloud Technologies
`Unified Patents v. Synkloud Technologies
`Page 001
`Page 001
`
`
`
`
`
`—-‘-—#-.‘.—~»-—-——
`
`
`
`.._..-'-——_—-——-—-.—v—~—--——-—-
`
`
`
`
`
`NEWTON? IELECOHI DICTIOIIIII‘I
`
`oopyright©1999 Harry Newton
`email: Harry_Newlon@HarrvNevvion,eom
`personal web site: wwwharrynevvtoncom
`
`All rights reserved under International and Pan-American Copyright conventions. including the right to reproduce this
`book or portions thereof In any form whatsoever
`
`Published in the United States by
`Miller Freeman. lne.
`Tenth floor
`12 West 21 Street
`
`.
`New York. NY 10010
`21 24391-8215 Fax 213691-1191
`1—800-999-0345 and LEGO-LIBRARY
`
`lSBN Number 1—57820-031-8
`
`February. 1999
`
`Manutaetured in the United States at America
`
`Fifteenth Expanded and Updated Edition
`Cover Design by Saul Holden and Heguta Hotlrnan
`Matt Kelsey. Publisher
`Christine Kern. Manager
`
`Printed at Command Web. Sensuous. New Jersey
`wmommandweboorn
`
`Exhibit 1021
`Exhibit 1021
`Unified Patents v. Synkloud Technologies
`Unified Patents v. Synkloud Technologies
`Page 002
`Page 002
`
`
`
`NEWTON'S TELECOM DICTIONARY
`
`—'——fi_-?_——
`
`I
`
`I
`
`I
`
`International service which provides cabtegram communica-
`tion to International destinations through the use of a com-
`puterized message switching center in New York City.
`Calalehead The point where a marine cable connects to ter-
`restrial facilities.
`CahleLahs Cable Television Laboratories. Inc. A research
`and development consortium of cable television system operw
`ators established in 1988. CableLabs plans and funds
`research and development projects to help member compa-
`nies and the cable industry take advantage of opportunities
`and meet challenges in the telecommunications industry. A
`good deal of emphasis is placed on digital cable and cable
`modem technologies. www.cablelabscorn
`Cahlaparl
`Intel Corporation's new technology, which
`brings high speed multimedia-rich interactive services to per-
`sonal computers in the home via cable.
`Cahlespan A Tellabs Operations. Inc. product which deliv-
`er two-way voice and data services over coaxial cable used by
`cable TV operators. Tellabs is in Lisle. Illinois.
`Cahleway An opening in a work surface that allows access
`to cords or cables from below. or mounting of an electrical
`receptacle or telephone jack. Cableways typically come with
`removable plastic grommets.
`Cabling The combination of all cables. wire. cords. and
`connecting hardware installed. A term used to refer collec-
`tively to the installed wiring In a given space.
`CABS Carrier Access Billing Specifications
`CABS IDS Carrier Access Billing Specifications - Billing
`Output Specifications
`in
`CBC l . Carrier Access Code. The digits you must dial
`North America to reach the long distance carrier of your
`choice. Those digits fit the following format rotxxxx.
`2. Customer Administration Center. A type of terminal used by
`a PBX user to maintain and troubleshoot his PBX.
`3. Connection Admission Control
`is defined as the set of
`actions taken by the network during the call setup phase (or
`during cell re-negotiation phase) in order to determine whether
`a connection request can be accepted or should be reiected (or
`whether a request for reallocation can be accomplished).
`CACI'I Call Appearance Call Handling.
`Cache From the French “cachet." which translates ”to press or
`hide." especially In terms of tools or provisions. to the context
`of computer systems and networks, information is cached by
`placing it closer to the user or user application in order to make
`it more readily and speedily accessible, and transparently so. At
`the same time. information which is cached places less stain on
`limited computer V0 (Input/Output) resources and limited net-
`work resources. Let's consider two specific definitions. the first
`of which relates to computer systems and the second of which
`relates to computer networks. Let's also consider a combination
`of the first two. in the context of the Internet.
`1. in the context of a computer system. cache memory gener~
`ally is a partition of SRAM (Static Random Access Memory).
`Since much of computing is highly repetitive or predictable in
`nature. and since solid state components (silicon chips) are
`much faster than mechanical disk drives, the speed of infor-
`mation access can be enhanced if certain information can be
`stored to RAM. That information typically is in the form of
`program information. memory addresses. or data. Thereby.
`the information can be stored in anticipation of your need for
`it. and can be presented to you faster than if the computer
`needed to access the hard drive through the execution of an
`IA] function. The cache memory sits (logically and. perhaps
`physically) between the CPU and the main memory (RAM).
`
`Caching works because of a phenomenon known as the local-
`ity principle which'states that a von Neumann CPU (i.e.. one
`that performs instructions and makes database calls sequen-
`tially. one after another) tends to access the same memory
`locations over and over again. A cache works like this. When
`the CPU needs data from memory. the system checks to see
`if the information is already In the cache. If it is. it grabs that
`Information; this is called a cache hit.
`If it isn't. it's called a
`. cache miss and the computer has to fetch the information by
`accessing the main memory or hard disk. which is slower.
`Data retrieved during a cache miss is often written into the
`cache in anticipation of turther need for it. Lets assume that
`you open a CD~HOM application with hyperlinks. As the sys-
`tem can reasonably assume that you will exercise the hyper
`link options. the information associated with them can be
`stored in cache memory.
`If you do.
`indeed. exercise those
`options. it‘s a cache hit and the data is there waiting for you.
`The cache also will hold information that you recently
`accessed.
`in anticipation of your wanting to back up. or
`access it again. Caching can take place through partitioned or
`segmented cache memory. which can be in the form of L1
`(Level 1) primary cache and L2 (Level 2) secondary cache. Lt
`cache memory is accessed first, L2 second. the main memo-
`ry (RAM) and then hard drive last. Also. one cache might hold
`program instructions and the other might hold data. Generally
`when the cache is exhausted. it is flushed and the data is writ-
`ten back to main memory. to be replaced with the next cache
`according to a replacement algorithm. Cache trashing and
`flushing mechanism is designed differently by different ven-
`dors. It behaves slightly different. However it mainly depends
`on main memory type.
`like write back or WB. write through
`Wt. write protected or WT. write combining or WC and
`uncached or UC. See also Cache Memory.
`2. In the context of a computer network such as a LAN. or the
`combination of the Internet and World Wide Web. data can be
`cached in a server which is close to you.
`in anticipation of
`your imminent request for that data in a logical sequence of
`data access. it will be transmitted from the main server to the
`remote server. Thereby. the data is accessible to you more
`quickly than if it had to be transmitted across the entire net-
`work each time you had a need for it. Should you accessa
`certain set of data frequently.
`it might be permanently stored
`on a server in proximity. and refreshed by the main server
`from time to time in order to ensure its currency (is. that It
`remains up to date).
`3.
`in the context of an Internet clientfserver application.
`caching really shows its stuff. First. the network uses distrib-
`uted cache servers to house the WWW Information that users
`In your region use frequently. As you access a Web site. your
`speed of access and response is improved because the data
`is housed on a server closer to you. The data then is loaded
`into cache memory on your client computer workstation. AS
`you move forward, from page to page and link to link. Your
`client caches the Information provided by the cache server.
`with all of this happening in anticipation of your next move-
`As you move backward. the same thing happens. in anticipa-
`tion of that next move. as well. Just in case you don‘t believe
`the client side of
`this story. on to Internet Explorer 0f
`Netscape, and click on cache. (The fastest way to regain spacti
`on your hard disk is to flush the cache which these programs
`dum to your hard disk.)
`Car 9 Coheremy Managing a cache so that data is but
`lost or overwritten. See also Cache.
`Cache Controller A chip. such as the Intel 82385. that
`
`5
`manages the retrieval,
`from memory or the her:
`In either clients or serve
`(arise Engine A car
`speed dedicated Internet
`caching and retrieval. W
`cache engine locally st:
`text. When another user I
`content
`is pulled fron
`improves download timr
`use on the network. Here
`from Cisco. which main
`work? The cache enginr
`which redirects Web rer
`Web Cache Control Prof
`of Cisco IOS software. T
`ing oftratflc across mull
`tolerant. fail-safe opera
`caching? By reducing th
`on overburdened Web 2
`benefits to ISPs. enterp
`benefits include cost 5
`usage and dramatic imp
`users. The cache engine
`with a simple method ‘
`through URL filtering. 8
`Cache l-lit When the
`Thus you don't have to .
`puting is faster. See Car
`Cache Memory Avai
`or SRAM (Static HAM) I
`at to "remember" stuff
`wants that information.
`searching through a 5
`process. This high spe
`wall state. When the C
`copy of this data is storr
`the CPU reads the actor
`the cache memory ins
`liefWare. for example.
`server access time. In |
`directory and file cache
`Table). the turbo FAT.
`it
`other functions. See ats
`Cache Miss When it
`and you have to read yr
`leading it from the cast
`Hit and Cache Memory
`Caching A process by
`cry or server in anticip
`See Cache for a full ext
`CAD 1. Computer Aide
`2- Computer Aided De:
`Willie and terminals us
`mlElitt be as simple a
`Complex as detailed l
`Statems often have ter
`Ital maxi-computer in
`CAD terminals are of
`Works] or through tel
`often moved. thus hat-
`Snitching system #
`EXttemely useful.
`tMl/Clll'il Compul
`
`l I
`
`Exhibit 1021
`Exhibit 1021
`Unified Patents v. Synkloud Technologies
`Unified Patents v. Synkloud Technologies
`Page 003
`Page 003
`
`125
`
`
`
`T'-I
`
`NEWTON‘S TELECDM DICTIONARY
`
`I
`
`-
`
`tenon known as the locak
`Neumann CPU (i.e.. one
`as database calls SHONE”-
`recess the same memo“.
`:he works like this. whey,
`the system checks to see
`ache. it it is. it grabs (hay
`iii.
`It it isn't.
`it’s caileda
`listen the information by
`rd disk, which is slows;
`:
`is often written into the
`i for it. Let's assume that
`th hyperlinks. As the 855.
`J will exercise the hype[.
`stated with them can he
`i.
`indeed. exercise triage
`t is there waiting for you
`ration that you recently
`wanting to back Up. or
`ice through partitioned or
`:an be in the form of L1
`31 2) secondary cache. L1
`second, the main memo.
`so. one cache might hold
`Tight hold data. Generaily
`shed and the data is writ-
`laced with the next cache
`hm. Cache treshing and
`terentiy by different ven-
`)wever it mainly depends
`rck or WB. write through
`combining or WC and
`emery.
`ark such as a LAN. or the
`d Wide Web. data can be
`c you.
`in anticipation of
`in a logical sequence of
`1m the main server to the
`accessibie to you more
`ed across the entire net-
`it. Should you accessa
`it be permanently stored
`shed by the main server
`a itscurrency (ie. that it
`
`:lientfserver application.
`the network uses distrib—
`W iniormation that users
`I access a Web site. your
`proved because the data
`The data than is loaded
`omputer workstation. As
`go and link to link. your
`led by the cache server.
`ation of your next move.
`ng happens. in anticipa-
`in case you don‘t believe
`to internet Explorer or
`stest way to regain space
`to which these programs
`
`:ache so that data is not
`
`as the Intel 82385. that
`
`manages the retrieval. storage and delivery at data to and
`from memory or the hard disk. Cache controllers may reside
`in either clients or servers. See also Cache.
`.
`cache Engine A cache engine iS a carrier-class. high-
`speed dedicated Internet appliance that performs Web content
`caching and retrieval. When a user accesses a‘Web page. the
`cache engine locally stores the page's graphics and HTML
`test When another user later requests the same Web page. the
`content
`is pulled from the cache engine. This process
`improves download time tor the user and reduces bandwrdth
`use on the network. Here is a an explanation of a cache engine
`from Cisco. which makes one. How doesthe cache engine
`work? The cache engine communicates wrth a Cisco'router.
`which redirects Web reouasts to the cache engine usrng the
`web Cache Control Protocol (WCCP). a new standard feature
`of Cisco |OS software. The WCCP also enables load baianc-
`mg of lratiic across multiple cache engines and ensures fault—
`lelerant. fail-sate operation. What are the benefitslof Web
`caching? By reducing the amount of tratfic on WAN links and
`on overburdened Web servers. caching provides significant
`benefits to ISPs. enterprise networks and end users. These
`benefits include cost savings due to a reduction on WAN
`usage and dramatic improvements in response times for end
`users. The cache engine also provides network administrators
`with a simpie method to enforce a site-wide access policy
`through URL filtering. See also Cache.
`Cache Hi! When the data you want is actually in cache.
`Thus you don't have to access your hard disk and your com-
`puting is faster. See Cache. Cache Miss and Cache Memory.
`Cache Memory Available RAM (Random Access Memory)
`or SRAM (Static RAM) that you set up to ailow your comput-
`er lo "remember" stuft — so the next time your computer
`wants that information, it can find it last from RAM. instead of
`searching through a slower hard disk iiO (Input/Output)
`process. This high speed cache memory eliminates the CPU
`wail state. When the CPU reads data from main memory. a
`copy of this data is stored in the cache memory. The next time
`the CPU reads the same address. the data is transferred from
`the cache memory instead of from main memory. Novell's
`NetWare. for example. uses cache memory to improve tile
`server access time. In NetWare. cache memory contains the
`directory and tile caches. along with the FAT (File Allocation
`Table). the turbo FAT. the Hash table. and an open Space for
`other functions. See also Cache.
`Curiae Miss When the caching software guesses wrongly
`and you have to read your data off your hard disk rather than
`reading it from the cache in memory. See also Cache. Cache
`Hit and Cache Memory.
`Cashing A process by which information is stored in mem-
`ory or server in anticipation of next request for information.
`See Cache for a full explanation.
`CAD 1. Computer Aided Dispatch.
`2. Computer Aided Design. A computer and its related soil-
`ware and terminals used to design things. A CAD system
`might be as simple as computerized drafting tools or as
`complex as detailed layouts of
`integrated circuits. CAD
`systems otten have terminate on peoples' desks and a cen-
`tral maxi-computer in the company's main computer room.
`CAD terminals are often run over LANs (local area net-
`works) or through telephone systems. The terminais are
`often moved. thus having universal wiring and a universal
`switching system — a LAN or a phone system — is
`extremely useful.
`CAD/CAM Computer Aided DesignlComputer Aided
`
`Manufacturing. See CAD.
`(All! Gatling Area Data Base. Arr MCI deiinition. An MCI
`System that stores reference data for various lvlCl Systems
`and reconciies MCI Calling Areas with those of Bell.
`Caddy The shell of an optical disc. Protects it from grubby
`fingerprints. and includes write protection devices. AKA case.
`Cadence In voice processing. cadence is used to refer to the
`pattern of tones and silence intervals generated by a given
`audio signal. Examples are busy and ringing tones. A typical
`cadence pattern is the US ringing tone. which is one second
`of tone followed by three seconds of silence. Some other
`countries. such as the UK. use a double ring, which is two
`short tones within about a second. followed by a little over
`two seconds of silence.
`CAD! Code Abuse Detection System.
`(A! Computer Aided Engineering.
`Cage Anlennn An antenna having conductors arranged
`cylindrically.
`(n61! Compound Annual Growth Rate.
`CAI 1. Computer Assisted Instruction. Commonly known as
`CBT {Computer Based Training). See CBT. See also CAD for
`a discussion on telecom needs.
`the intertace
`2. Common Air
`Interface. A standard for
`between a radio network and equipment. A CAI allows mul-
`tiple vendors to deveiop equipment, such as radio tenninat
`devices (e.g.. cordless phones. cellular phones and PCS
`terminals) and base stations (e.g.. ceilutar antenna sites).
`which will
`interoperate. The yield is a competitive (read
`less expensive) market
`for equipment. The British
`CT2/Tetepoint system incorporated one of
`the first CAI
`standards. See also CT2.
`can: Customer Access Line Charge. Also known variously
`as Access Charge. EUCL (End User Line Charge). and SLC
`(Subscriber Line Charge). See Access Charge.
`(ALIA Communications Assistance for Law Enforcement Act
`1994.
`
`Calendar Routing A call center term for directing calls
`according to the day of the week and time of day. See also
`SOURCEIDESTINATIDN ROUTING. SKILLS BASED ROUTING
`and END-OF-SHIFT ROUTING.
`Culflmfle To test and reset a measuring or timing device
`against a standard to make sure it is functioning correctly.
`Cull Everyone has a different definition for "call." My defini-
`tion is simplest: Two people or two machines are on a phone
`line speaking to each other. That's a call. Betlcore's definition
`of a call: An arrangement providing for a relation between two
`or more simultaneously present users for the purpose of
`exchanging information. The ATM Forum's definition: A call is
`an association between two or more users or behveen a user
`and a network entity that is established by the use oi network
`capabilities. This association may have zero or more connec-
`tions. Here are some more formal definitions:
`1. In communications. any demand to setup a connection.
`2. A unit of traitic measurement.
`_
`3. The actions performed by a call originator.
`4. The operations required to establish. maintain. and release
`a connection.
`5. To use a connection between two stations.
`6. The action of bringing a computer program, a routine. or a
`subroutine into etiect. usuaiiy by specifying the entry condi-
`tions and the entry point.
`Cull Abandon: Also called ABANDONED CALLS. Call
`Abandons are caiis that are dropped by the calling party
`before their intended transaction is completed. The call may
`
`12?
`
`Exhibit 1021
`Exhibit 1021
`Unified Patents v. Synkloud Technologies
`Unified Patents v. Synkloud Technologies
`Page 004
`Page 004
`
`
`
`Y"
`
`i l
`
`NEWTON’S TELECDM DICTIONARY
`
`It includes the PC Card Standard
`my. PC Card Standards.
`Release v2.01. Socket Services Specification Release v2.0.
`Card Services Specification Release v2.0. ATA Specification
`palettes v1.01. AIMS. Specification Release v1.0. and the
`Recommended Extensrons Release v1.0. Standard v3.0 has
`been proposed. See PCMCIA. wwwpcmciaorg
`PCN Personal Communications Network. A new type of wire-
`less telephone system that would use light.
`inexpensive
`handheld handsets and communicate via low-power anten-
`has. When it was originally conceived. PCN was primarily
`seen as an a city communications system. with far less range
`than cellular. Subscribers would be able to make and receive
`calls while they are traveling. as they can do today with cellu-
`lar radio systems. but at a low price. Now PCN is seen as
`what Dr. Sorin Cohn of Northern Telecom calls an "enabler of
`unplanned growth." One idea for PCN is to locate a PCN cell
`site {transmitterfreceiveri in a residential community. When
`someone wanted a new phone line. they'd simply drop down
`to their local phone store. pick up a PCN portable phone and.
`by the time. they got back home. their frequency would be
`”switched on“ and they'd be “live.” The original plansfor PCN
`never materialized fully. However,
`the concept has been
`implemented in the forms of Personal Communications
`Service (PCS) and Wireless Local Loop (WLL). See also PCS.
`Personal Communications Network. Wireless Local Loop.
`pco Point of Control and Observation: A place (point) with-
`in a testing environment where the occurrence of test events
`is to be controlled and observed as defined by the particular
`abstract test method used.
`PCP 1. Post Call Processing.
`2. Program Clock Reference: A timestamp that is inserted by
`the MPEG-2 encoder into the Transport Stream to aid the
`decoder to the recovering and tracking the encoder clock.
`in
`ecn An ATM term. Peak Cell Rate: The Peak Cell Rate.
`cells/sec. is the call rate which the source may never exceed.
`PCS 1. the plural of PCs. is. File.
`2. Personal Communications Service. A new. lower powered.
`higherwtreeuency competitive technology to cellular. Whereas
`cellular typically operates in the BOO-SOD MHZ range. PCS
`operates in the 1.5 to 1.8 6112 range. The idea with PCS is that
`the phones are cheaper. have less range. are digital; the cells
`would be smaller and closer together and the airtime would be
`cheaper also. Several licenses have been awarded and sever-
`al systems have started in North America. The concept of PCS
`is evolving. It is not clear exactly where it will and up. So far.
`it looks like another cellular system with some digital mes-
`saging on the phone's larger screen. this is how the Federal
`Government awarded PCS licenses:
`0 ‘C-Eltock' Carrier
`A 30 MHz PCS carrier serving a Basic Trading Area (ETA) in
`the frequency
`block 1895-1910 wit-I2 paired with 1975-1990 MHz.
`- "D-Block" Carrier
`A 10 MHz PCS carrier serving a Basic Trading Area (ETA) in
`the frequency
`block 1865-18TO lvin paired with 1945-1950 MHz.
`0 “E-Btock“ Carrier
`A 10 MHz PCS carrier serving a Basic Trading Area (BTA) in
`the frequency
`block 1885-1890 llez paired with 19654970 MHz.
`0 "F-Biock" Carrier
`A 10 MR: PCS carrier serving a Basic Trading Area (BTA) in
`the frequency
`block 18904895 lvin paired with 1970-1975 MHz.
`
`See PERSONAL COMMUNICATIONS NETWORKS and PER-
`SONAL COMMUNICATION SERVICES.
`PCS Over Cllllll You run a CATtl — cable TV company.
`You have a wires strung all over the neighborhood. On one at
`your wires you attach a six foot by four foot by four box of
`electronics and three two feet attennae. Bingo. you're now a
`way station — also called a cell site — lor a PCS cellular
`phone system. People who are PCS subscribers will talk and
`receive calls when they're close to your cell site. Calls come
`and go via your coax cable. up it to a landline connection
`point with the PCS carrier. You. the CATV company. get paid
`money for completing calls. See wwsanderscomltelecomm
`PCS! Personal Computing System Architecture. A PC imple-
`mentation of DECnet. that lets PCs work in a OECnet environ-
`ment. PCSA is a network architecture defined and supported
`by Digital Equipment Corporation forthe incorporation of per-
`sonal computers into server-based networks.
`PCI' Personal Communications Technology. A security proto-
`col developed by Microsoft for online Web commerce and
`financial transactions. Transparent to the user. PCT provides
`authentication and encryption routines that complement cred-
`it-card based commerce on the World Wide Web. internet
`Explorer. Microsoft's Web browser. makes use of PCT. See
`also AUTHENTICATION and ENCRYPTION.
`I'C'I'l Personal Computer Terminal Adapter. A printed circuit
`card that slips into an lBM PC or PC compatible and allows
`that PC to be connected to the ISDN T-interiaoe. See PER-
`SONAL COMPUTER TERMINAL ADAPTER.
`PCT! Portable Common Tool Environment.
`PC'I‘S Public Cordless Telephone Service. A Canadian digital
`cordless telephone service for residential, business and pub—
`lic use. For other variations of digital cordless telephone ser—
`vice. see CTl. CT2. CTZPlus. CTS. and DEC'I'.
`PCWG
`Personal
`Conferencing
`Work
`(way-ouccwoorcfocwoli
`PC! Server Software PCX server software turns your
`PC into a graphics terminal front-end for Unix and it applica-
`tions. Thus. your PC can display application output generat-
`ed by remote X—based client applications.
`PM Personal Digital Assistant A consumer electronics gadget
`that looks like a palmtop computer. Unlike personal computers.
`PDAs will perionn specific tasks - acting like an electronic
`diary. catty-along personal database. multimedia player. per-
`sonal communicator. memo latter. calctdator. alarm ctodt. The
`comrrumlcefions will take place litrough the
`he or titrwgh
`wireless. A pie has annorrnwd a PDA, wb 11 it has owned
`Newton.
`11
`I added this definition in the late fall of 1992.
`sales otPDAsweren't doingwelland sonrevrag in Silicon Vail
`1
`railed them Probably Diwppolnted Again. IBM preters to
`them Personal Communicators. General Magic pretershr called
`them PICs. Personal intelligent Communicators.
`PM" Physical Delivery Access Unit. A gateway device that
`facilitates the delivery of messages {excluding probes and
`reports) in physical form. This is an X3100 term.
`PM )1 Personal Digital Cellular. (Digital system used in
`Japan.
`2. See Primary Domain Controller
`PDF Portable Document Format. This is the file tunnel for
`documents viewed and created by Adobeb Acrobat Reader.
`Capture. Distiller. Exchange and the Acrobat Amber Plug-in
`for Netscape Navigator. The PDF file format was developed to
`standardize internal-based documents. One at the benefits at
`
`Group
`
`using Acrobat and the .pdi iorrnat is you can deliver business
`documents others without reauthoring them and read them
`
`593
`
`
`
`Exhibit 1—021
`Exhibit 1021
`Unified Patents v. Synkloud Technologies
`Unified Patents v. Synkloud Technologies
`Page 005
`Page 005
`
`neans application sol.
`rt faster and not requlrle
`
`ltware architectur
`ekel Services is agilgse
`: a way to access the
`. Sockett Services iden-
`compu or system
`fC Card while the 311“
`IS part of the PCMCIA
`Card Services. Card
`ltedace that allows the
`as memory and inter-
`Services detects thata
`as also releases these
`been removed. Care
`rterface to higher level
`drivers.
`a. Card Services soli-
`vrdes an almost "plug-
`rmputlng environment.
`: IS theoretically possi-
`It powering off the sys-
`:e.
`if has worked only
`talk for network cards.
`a. to insert a modem
`oter system. download
`5 memory. remove the
`a flash PCMCIA Card.
`to — all while your
`Great theory.
`3. including manufac-
`peripherals and sys-
`evelopers and related
`BM, Toshiba, Lotus.
`based in Sunnyvale,
`nc bulletin board —
`o recognized by the
`cement Association
`as book listing all the
`ply to their standards.
`31A standards are still
`standards. Check that
`re. The manufacturer
`Jon't assume compat-
`ervtces supports that
`instead. Avoid PCM-
`You lose them. Use
`can plug directly into
`Ivalent. if you have to
`plgtail. just in case.
`its specs. PC Card.
`1 people claimed that
`vtemorize Computer
`
`came out with a new
`
`32-bit bus, as against
`extension of the PCI
`I support t32 Mbps.
`ee CardBus for a full
`also Card Services.
`5. and Slot Sizes.
`
`at of all of the PCM-
`
`l l
`
`l l l l l l y
`
`
`
`Ju want. It's very easy
`to a mistake and con-
`1 laugh. We've done it
`
`ode that represents a
`common peer group,
`rcf one of the border
`
`PP). The negotiation
`'nent methodology in
`rts Initiative (JEPI). a
`a Consortium (W30)
`rent platform to allow
`nsacl E-Commerce
`t. UPP works in con-
`tent (PEP). an exten-
`(HyperText Transier
`ad to make payment
`r. happening at
`the
`ir configurations See
`
`ompatibie PC, upper
`d 1MB of RAM. This
`rs (UMBs) of various
`only with a special
`386.EXE.
`R MEMORY AREA.
`Fl SUPPLY.
`liverer that regularly
`ely speedy delivery
`
`owe a local area not-
`lninlerruptible Power
`ccurs. NelWare notl—
`th SERVERCFG and
`malning users. clos-
`uwn.
`If you install a
`stall a printed circuit
`3S.
`If you have a file
`mpared to the more
`1 through the mouse
`
`lng. A SONET term.
`fiber optic transmis-
`h one fiber transmit»
`rfibertransmitting in
`Eckup takes over. See
`speak is the annoy-
`
`it. there are two cir-
`from you. Upstream
`not going away from
`e delinition of the
`t is the channel from
`tTV headend. See
`
`:ations circuit, there
`oing away from you.
`if the channel going
`ark. the definition of
`tilt. It is the channel
`tTV headend.
`In yet
`ustry.
`the upstream
`
`NEWTDN'S TELECOM DICTIONARY
`
`is a collection of frequencies on a CATV channel
`channel
`reserved for transmission from the terminal next to the user’s
`TV set to (upstream to) the CATV company's computer. Such'
`signals might be requests for pay movies. See UPSTREAM.
`Upstream Operation Functions that provide a BCC
`(Belicore Client Company) control of features and service
`configurations and subject
`to 800 control. some service
`management capabilities for subscribers. These functions
`include Service Negotiation and Management, Service
`Provisioning and Repair Service Answerinngork Force
`Administration. Deilnition from Bellcore in reference to Its
`concept of the Advanced intelligent Network.
`II" Universal Personal Telecommunications. According to
`L.M. Ericsson. Swedish telecom manufacturer. UPT is a “new
`service concept
`in the field of telecommunications which
`aims at making telecommunications both universal and per-
`sonal. instead of calling a telephone line or a mobile termi-
`nal, you call the person you wish to get in touch with and
`leave it to the network to locate the line or terminal where
`helshe can be reached.” There was an article on UTP In the
`1993 No.4 issue of the Ericsson Review. An article In the
`June. 1996 issue at
`IEEE Communications Magazine
`described UPT as a service that enables users to access var-
`ious services through personal mobility. It enables each UPT
`user to participate in a user-defined set of subscribed ser-
`vices. and to initiate and receive calls on the basis of a per-
`sonal. network transparent UPT number across multiple net-
`works on any fixed or mobile terminal. irrespective of geo~
`graphical location. This service is limited only by terminal
`and network capabilities and restrictions imposed by the net—
`work operator. ln short. UPT is still not totally defined and is
`under discussion by the world's major standards bodies. For
`more information on UPT, see lTU-T Recommendation PBSD.
`Principles for Universal Personal Telecommunications.
`Geneva. 1993.
`the uninterrupted
`Upllm Collocuial expression for
`amount of time that network or computer resources are work-
`ing and available to a user. In short. time between failures or
`periods of nonavailability (as for maintenance).
`Upward Compuliblo Any device that can be easily
`organized. fixed or configured to work in either a ditterent,
`expanded operating environment or some enhanced mode.
`Software is said to be upward compatible If a computer larg-
`er than the one for which it was written can run the program.
`“than Service Any of the grades of service regularly fur-
`nished inside base or locality rate areas. or outside base or
`locality rate areas at base or locality rates plus zone connec-
`tion charges or incremental rates. Another way of saying
`expanded metropolitan phone service.
`URI. Universal Resource Locator. An lntemettenn. A URL is
`a fancy name for an internet address. A URL is an address
`that can lead you to a file on any computer connected to the
`lntemet anywhere in the world. Thus. its name * Universal
`Resource Loutor.
`in more technical terms. a URL to a string expression that can
`represent any resource on the Internet or local TCIIP system.
`The standard convention for a URL is as follows:
`method of protocol to be usedtlmost‘s nameitolder or direc-
`tory on hoslfname of file or document
`a
`of
`Here's
`an
`example
`http:/lwvrwharrynewton.com/fantasylhappyniml
`Let's see what It all means. The http stands tor i-lyperText
`Transport Protocol. That tells your browser (e.g. Netscape or
`interest Explorer) to use that protocol when searching for the
`
`URL:
`
`address. Http is the 'deiaulr' protocol of the Internet. But it's
`not the only one. There are other
`rotocois. Including ftp (file
`transfer protocol). news (for
`senet news groups). and
`“mailto'
`to send ernari to a specific address).
`The wwwharrynewtoncom is simply the me or my cum.
`outer. All Web addresses start as numbers. This one Is no
`different. You can reach my home page by giving your
`browser the following command http11209.94.129.297/.
`The Web's own Icotnrp tables do an lnstaneous transiation to
`that number from www.harrynewton.oom when you type in
`numharrynewtoncom. The translation mechanism to very
`much like the translation the phone Industry does when you
`dial any