throbber
The e Pen uis
`of Computing
`
`ictionary
`
`Dick Pountain
`
`PENGUIN BOOKS
`
`Adobe - Exhibit 1027, cover
`
`Adobe - Exhibit 1027, cover
`
`

`

`PENGUIN BOOKS
`
`Penguin Books Ltd. 8o Strand, London wc 2R OM, England
`Penguin Putnam Inc..375 Hudson Street, New York. New York 10014, USA
`Penguin Books Australia Ltd. 250 Camberwell Road. Camberwell, Victoria 3124, Australia
`Penguin Books Canada Ltd, 10 Alcorn Avenue, Toronto, Ontario, Canada m4v 3B 2
`Penguin Books India (P) Ltd. 11, Community Centre, Panchsheel Park. New Delhi -110 017, India
`Penguin Books (NZ) Ltd, Cnr Rosedale and Airborne Roads, Albany, Auckland, New Zealand
`Penguin Books (South Africa) (Pty) Ltd, 24 Sturdee Avenue, Rosebank 2196, South Africa
`Penguin Books Ltd. Registered Offices: 8o Strand, London WC2R ORL, England
`www.penguin.com
`
`First published 2001
`
`Copyright Dick Pountain, 2001
`All rights reserved
`
`The moral right of the author has been asserted
`
`Typeset in TheAntiquaB and TheSans
`Edited and typeset by Book Creation Services Ltd, London
`Printed in England by Clays Ltd, St Ives plc
`
`Except in the United States of America, this bcok is sold subject
`to the condition that it shall not, by way of trade or otherwise, be lent,
`re-sold, hired out, or otherwise circulated without the publisher's
`prior consent in any form of binding or cover other than that in
`which it is published and without a similar condition including this
`
`hilcondition being imposed on the subsequent purchaser
`
`Adobe - Exhibit 1027, page i
`
`Adobe - Exhibit 1027, page i
`
`

`

`Ci security
`C# contains many features aimed at creating
`more secure and stable programs including
`hierarchical namespaces to control overriding
`of methods, STRUCTURED EXCEPTION HAN-
`DLING, restrictions on the use of POINTERS and
`TYPE CASTS and automatic array BOUNDS
`CHECKING. Pseudo-code compiled from a C#
`program runs within a runtime system (see
`COMMON LANGUAGE RUNTIME) that imposes all
`these safety features and is therefore called
`MANAGED CODE, though it can also make out-
`side calls to code within traditional, unman-
`is
`LIBRARIES. Cft
`aged DYNAMIC-LINKED
`intended to eventually replace VISUAL BASIC as
`the programming language for Microsoft's
`web development systems.
`
`Ci security The lowest of the levels of compu-
`ter security defined in the US Government's
`ORANGE BOOK, which requires that users
`should log on to the system, but permits
`groups of users to share the same password.
`See also C2 SECURITY.
`
`C2 security A medium level of computer secu-
`rity as defined in the US Government's
`ORANGE BOOK, which requires that users
`should log on to a system with individual
`passwords, and that an audit record of who
`has logged in be maintained. See also ci
`SECURITY.
`
`CA Abbreviation of COMPUTER ASSOCIATES.
`
`cable
`i A multi-core wire terminated with
`multi-pin plugs used to connect a piece of
`PERIPHERAL equipment to a computer.
`2 Shorthand for 'cable television'.
`cable modem A MODEM that allows computer
`DATA TRANSFERS and Internet access via cable
`TV connections. Cable TV services employ
`COAXIAL CABLING, so a cable modem can oper-
`ate at much a higher maximum speed than a
`telephone modem, typically between o.5 and
`20 megabits per second. However, cable TV
`systems support only downstreani traffic (i.e.
`from TV station to the home) so require a tele-
`phone modem to be used in parallel to carry
`upstream traffic. Also cable TV lines are
`shared by many households, so the BAND-
`WIDTH achieved in practice may be highly var-
`iable and far below the maximum.
`cable TV A communication technology that
`transmits television signals into the home
`
`60
`
`over a local area network of optical or coaxial
`cable, rather than via radio-frequency broad-
`cast or satellite transmission. Its significance
`for computing is that this relatively high-
`speed network may also be used for Internet
`access and other data transmissions by
`installing a CABLE MODEM.
`
`cabling The physical conductors used to carry
`data around a NETWORK. The term is applied to I
`both metal wire that conducts electrical sig-
`nals and to OPTICAL FIBRE that conducts light
`signals, since the engineering problems of
`running either sort around a building are
`related. See also various cable types such as
`TWISTED-PAIR, UTP, COAXIAL CABLE, THICK
`ETHERNET and THIN ETHERNET.
`
`11.
`•
`
`cache A small region of fast MEMORY inter-
`posed between a data processing device and a
`larger slower memory to hold copies of the
`most frequently or recently used data so that
`they may be accessed more quickly. The same
`principle is at work in a library when someone
`takes several books they are consulting from
`the main shelves and places them on their
`desktop for easier access.
`Caches are universally employed between
`the c PUs of modern computers and their main
`memory, reflecting the fact that the speed of
`processors has been enhanced far more rap-
`idly than the speed of memory: a cache helps
`to bridge this growing discrepancy. Indeed the
`latest generations of PENTIUM and other
`processors employ two (or even three) levels
`of cacheing. A small, typically 32 to 64 kilo-
`byte, cache on the chip itself acts as a cache for
`a larger off-chip cache which may be many
`megabytes in size, and which in turn caches
`the main memory accesses. (See more under
`Li CACHE and L2 CACHE.)
`The mechanics of deciding precisely how to
`arrange the data within a cache, how much to
`read at a time, and how to ensure consistency
`between the cache contents and main mem
`ory constitute a complex area of engineering:
`see more under CACHE LINE, CACHE HIT, CACHE
`COHERENCY, ASSOCIATIVE CACHE, DIRECT MAPPED
`CACHE, SET-ASSOCIATIVE CACHE, FULLY ASSOCIA-
`TIVE CACHE, UNIFIED CACHE, HARVARD ARCHITEC-
`TURE.
`Caches may be employed in many other
`to
`forms of communication, for example
`enable WEB PAGES recently read to be read
`
`Adobe - Exhibit 1027, page E
`
`Adobe - Exhibit 1027, page 60
`
`

`

`61
`
`again more quickly, and between a computer's
`CPU and disk drives of various kinds (where
`the speed discrepancy is even greater than
`with memory): see for example DISK CACHE,
`WRITE-THROUGH CACHE, WRITE-BACK CACHE.
`cacheable Capable of, or allowed to be, stored
`in a CACHE. Many operating systems permit
`certain regions of memory to be declared as
`NONCACHEABLE, particularly those used for /o
`by MEMORY -MAPPED peripherals.
`
`cache coherency A problem intrinsically
`associated With SHARED-MEMORY MULTIPROC-
`ESSOR computer systems. When multiple
`processors access the same memory, it is pos-
`sible for a data item that currently resides in
`one processor's CACHE to be updated in main
`memory by a different processor, leaving the
`first processor unaware that it holds stale,
`out-of-date, data. 'lb avoid this situation it is
`necessary to maintain cache coherency, and
`the most popular method is to implement the
`MESI PROTOCOL.
`
`cache controller An INTEGRATED CIRCUIT that
`controls access to the Bus connecting a com-
`puter's CPU core to its CACHE memory, per-
`include
`forming several
`functions
`that
`locating a requested address in the cache, stor-
`ing the TAGS for an ASSOCIATIVE CACHE and
`sorting memory accesses into line-order to
`economize on bus bandwidth.
`All modern MICROPROCESSORS incorporate
`an on-chip or LEVEL 1 CACHE whose controller is
`part of the on-chip circuitry. However, some
`recent designs (for instance the POWERPC G3
`and G4) also integrate a controller for an
`external or LEVEL 2 CACHE onto the chip, pro-
`vided with its own bus to enable access to the
`L2 cache faster than the system bus would per-
`mit. Intel's PENTIUM family of CPUs employ an
`external L2 cache controller that is integrated
`instead into the SYSTEM CHIP SET. See also
`CACHE COHERENCY, BACKSIDE BUS, MESI PROTO-
`COL, BUS SNOOPING.
`
`cache hit A request by a computer's processor
`to read or write a data item that finds its target
`in the processor's CACHE and therefore does
`not have to reach out over the bus to external
`memory to access it. Since the purpose of a
`cache is to keep traffic local to the processor
`
`Cairo
`and reduce the traffic to external memory, a
`high ratio of cache hits to CACHE MISSES is a
`good thing.
`cache line The unit of data that is stored
`within a processor CACHE. For example each
`line might be 64 bytes long, so that whenever
`a single byte in main memory is accessed, its
`surrounding 64 bytes are fetched into the
`cache too. See also ASSOCIATIVE CACHE, TAG.
`cache memory A region of memory (whether
`on-chip, or external in the form of RAM chips)
`that is dedicated to use as a CACHE.
`cache miss A request by a computer's proces-
`sor to read or write a data item that does not
`find its target in the processor's CACHE and
`therefore must continue through into main
`memory to access the item. See also CACHE HIT.
`CACM Abbreviation of COMMUNICATIONS OF
`THE ACM.
`
`CAD Abbreviation of COMPUTER AIDED DESIGN.
`
`CAD/CAM (Computer Aided Design/Compu-
`ter Aided Manufacturing) The use of comput-
`ers to assist in the complete manufacturing
`cycle of a product, from design to final deliv-
`ery. The term implies a degree of integration
`between the design software, a parts database,
`ordering and stock control software for parts
`from outside suppliers, and software that con-
`trols the manufacturing process itself, so that
`information flows from one stage to the next.
`See more under COMPUTER AIDED DESIGN, COM-
`PUTER AIDED MANUFACTURING, JUST-IN-TIME.
`CADD Abbreviation of COMPUTER AIDED
`DESIGN AND DRAFTING.
`caddy A shallow removable plastic tray with a
`hinged lid used by early c D-ROM drives: a disk
`was loaded into the caddy and the caddy
`inserted into the drive. Most modem drives
`use instead a retractable, lidless tray.
`CAE Abbreviation of COMPUTER AIDED ENGI-
`NEERING.
`
`CAI Abbreviation of COMPUTER AIDED INSTRUC-
`
`TION.
`
`Cairo The internal codename given by Micro-
`soft to its unified, 3z-bit OBJECT-ORIENTED
`
`Adobe - Exhibit 1027, page 61
`
`Adobe - Exhibit 1027, page 61
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket