throbber
RUaae OC
`
`iE mT TETCTE:Lat
`Telecommunications & the Internet
`Seeemm ECO RAULCas Telephony
`BAacmeRCts
`@ Me Data, Image & Video Networking
`RATUmsemaLY
`CSSAee Reese ee
`SE eR aa a
`ASLa NetWare, Apple,.
`
`SAMSUNG 1058
`SAMSUNG 1058
`SAMSUNG v. SMART MOBILE
`SAMSUNGv. SMART MOBILE
`IPR2022-01004
`IPR2022-01004
`
`1
`
`

`

`NEWTON’s TELECOM DICTIONARY
`
`copyright © 1998 Harry Newton
`email: Harry_Newton@HarryNewton.com
`personal web site: www.harrynewton.com
`
`All rights reserved underInternational and Pan-American Copyright conventions,includingthe right to
`book orportions thereof in any form whatsoever.
`
`Published in the United States by
`Telecom Books,
`An Imprint of Miller Freeman,Inc.
`12 West 21 Street
`New York, NY 10010
`212-691-8215 Fax 212-691-1011
`1-800-999-0345 and 1-800-LIBRARY
`
`ISBN Number 1-57820-023-7
`
`October, 1998
`
`Manufactured in the United States of America
`
`Fourteenth Considerably Expanded and Updated Edition
`Cover Design by Saul Roldan
`Printed at Command Web, Secaucus, New Jersey
`www.commandweb.com
`
`2
`
`

`

`NEWTON’S TELECOM DICTIONARY
`
`ig the first town to aggressively ensure that the bulk of citi-
`don't wantouractivities to cut someoneelse’s cabLe. There are
`enty could and would haveaccesstoelectronic mail and to
`expensive implications to doing this. So what we do is we
`the various resources on the Internet. It has apparently made
`hand dig pot holes every so often along what's known as the
`a major difference to how people live and communicate in
`running line — wheretheutilities are meant to be buried. The
`Blacksburg. www.bev.net
`idea is that our potholes will locate the existing underground
`BLAM Binary Logarithmic Access Method.A proposed alter-
`cables and thus makeit safer to bore our owncable. Blind bor-
`native to the IEEE 802.3 backoff algorithm.
`ing occurs when we bore underground without digging pot
`BlamestormingBlamestorming occurs when peoplesit
`holes. The reason we might do this? Some states and some
`around in a group and discuss whya deadline was missedor
`cities simply don't allow pot holing. They trade the risk of hit-
`a project failed, and mostimportantly, who was responsible.
`ting a utility line against creating a holein the middleofstreet.
`Blank A characteron teletype terminals that does not punch
`They don't wantpotholesin their street, since an asphalt patch
`holes in paper tape (except for feed holes to push the paper
`has never the sameintegrity as a total overlay and they don’t
`through). Also the character between words, usually called a
`wanttheir streets messed up. See BLUE STAKE.
`“Space” is referredto in IBM jargon asa Blank.
`Blind Dialing All modemsare programmed
`Blank and Burst Onthe AMPScellular telephone net-
`Blind Transfer Someonetransfers a call to someone else
`work, certain administrative messages are sent on the voice
`without
`telling the person who's calling. Also called
`channel by blocking the voice signal (blanking) and sending
`Unsupervised or Cold Transfer. Contrast with Screened Transfer.
`ashort high speed data message(burst). The blank and burst
`Blinking Anintentional periodic changein the intensity of
`technique is one that causes a momentary dropout of the
`one or more display elements or display segments.
`audio connection (and sometimes disconnection of cellular
`Blister Pack A pocketed polyvinyl chloride shipping con-
`modem connections) when a powerlevel messageis trans-
`tainer with a snap-on cover.
`mitted to the cellular phone.
`Blitz A call center/marketing term. Used to describetele-
`Blank Cell The hollow spaceofa cellular metal or cellular
`phonesales or prospecting activity of intense, high volume
`concrete floor unit withoutfactory installedfittings.
`accomplishedin a short period of time.
`Blanking The suppression of the display of one or more
`Bloatware Ever-fatter packages of “upgraded” software
`display elements or display segments.
`that, with each upgrade, come with dozens and dozens of new
`Blanking IntervalPeriod during the television picture for-
`features. With each upgrade, the customer hasless need to
`mation when the electron gun returns from right to left after
`look elsewhere.At least that’s the theory. See also hyperware
`each line (horizontal blanking) or from top to bottom after each
`and vaporware.
`field (vertical blanking) during which the picture is suppressed.
`BLOBBinary Large OBjects. When a database includes not
`Blanking Pulses The processoftransmitting pulses that
`only the traditional character, numeric, and memofields but
`extinguish or blank the reproducing spot during the horizon-
`also pictures or other stuff consuming of large space, a data-
`lal and vertical retrace intervals.
`baseis said to include BLOBs — binary large objects.
`Blast BLocked ASynchronousTransmission.
`Block In data communications,a groupofbits transmitted as
`BlathererA Internet user who takes four screens to say
`a unit and treated as a unit of information. Usually consists of
`something where four words would worka lot better.
`its own starting and ending control deliminators, a header, the
`text to be transmitted and check characters at the end used for
`BlendTo have outbound and inboundphonecalls answered
`error correction. Sometimescalled a Packet.
`bythe sameagents. See the next two definitions.
`Blended AgentA call center person who answers both
`Block Character Check BCC. Theresult of transmission
`incoming and makes outgoing calls. This idea of a blended
`verification algorithm accumulated overa transmission block,
`and normally appended at the end, e.g. CRC, LRC.
`agent is a new conceptin a Call Center. In the pastcall cen-
`Block Cipher A digital encryption method which ciphers
`ters have typically kept their inbound and outbound agents
`long messages by segmenting them into blocks of fixed
`Separate. The reason? Management felt that the necessary
`skills were very different and no one could master both.
`length, prior to encryption. Each block, which typically is 64
`Blended Call CenterAtelephone call center whose
`bits in length,
`is encrypted individually. The blocks may be
`sent as individual units, or they may be linked in a method
`agents both receive and makecalls.In other words, a call cen-
`knowsas Cipher-Block-Chaining. See also ENCRYPTION.
`ler whose phone system acts both as an automatic call dis-
`Block Diagram A graphic way to showdifferent elements
`{ributor and a predictive dialer.
`Blended Floor System A combination of cellular floor
`of a program or process by the use of squares, rectangles,
`diamonds and various shapes connected by lines to show
`units with raceway capability and otherfloor units with race-
`what must be done, when it must be done and what happens
`Waycapability systematically arranged in a modularpattern.
`if it's done this way orthat. In short, it shows howall the small
`BLER Block Error Ratio. The ratio of the blocks in error
`decision points add up to the whole process.
`feceived in a specified time period to the total number of
`Block Error Ratio BLER.Theratio of the blocksin error
`blocks received in the sameperiod.
`received in a specified time period to the total number of
`BLERT-BLock Error Rate Test.
`blocks received in the sameperiod.
`BLF The Busy LampFieldis a visual display of the status of
`Block Misdelivery Probability The ratio of the num-
`all or some of your phones. Your BLFtells you if a phoneis
`ber of misdelivered blocksto the total numberofblock trans-
`busy or on hold. Your Busy Lamp Field is typically attached
`fer attempts during a specified period.
`to or part of your operator's phone. See BUSY LAMPFIELD.
`Block Mode Terminal Interface BMTI. A device used
`Blind Bore Imagine you wantto lay fiber cable along the
`to create (and break down) packetsto be transmitted through
`side of a highway. You know from blue staking and from the
`a ITU-T X.25 network. This device is needed if block-mode
`City mapsthat there are otherutility cables along the highway
`terminals (such as IBM bisync devices) are to be connected
`you want. Thefirst thing we know is that we can’ttrust the
`to the network without an intermediate computer.
`Maps or the blue staking. The second thing we know is that we
`
`101
`
`3
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket