Brief for Appellees United States and the State Plaintiffs ______

Total Page:16

File Type:pdf, Size:1020Kb

Brief for Appellees United States and the State Plaintiffs ______ ORAL ARGUMENT SCHEDULED FOR FEBRUARY 26-27, 2001 ______________________________________________________________________________ ______________________________________________________________________________ Nos. 00-5212, 00-5213 IN THE UNITED STATES COURT OF APPEALS FOR THE DISTRICT OF COLUMBIA CIRCUIT _______________ UNITED STATES OF AMERICA and STATE OF NEW YORK, et al., Plaintiffs-Appellees v. MICROSOFT CORPORATION, Defendant-Appellant _______________ ON APPEAL FROM THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA _______________ BRIEF FOR APPELLEES UNITED STATES AND THE STATE PLAINTIFFS _______________ ELIOT SPITZER A. DOUGLAS MELAMED Attorney General of the Acting Assistant Attorney General State of New York JEFFREY H. BLATTNER PREETA D. BANSAL Deputy Assistant Attorney General Solicitor General JEFFREY P. MINEAR HARRY FIRST DAVID C. FREDERICK Assistant Attorney General Assistants to the Solicitor General MELANIE L. OXHORN MARY JEAN MOLTENBREY Assistant Solicitor General Director, Civil Non-Merger Enforcement RICHARD L. SCHWARTZ CATHERINE G. O'SULLIVAN Assistant Attorney General ROBERT B. NICHOLSON 120 Broadway DAVID E. BLAKE-THOMAS New York, NY 10271 JOHN F. COVE, JR. JAMES E. DOYLE SUSAN M. DAVIES Attorney General of Wisconsin ADAM D. HIRSH KEVIN J. O'CONNOR ANDREA LIMMER Lead State Counsel PHILLIP R. MALONE Office of the Attorney General DAVID SEIDMAN State Capitol, Suite 114 East CHRISTOPHER SPRIGMAN Madison WI 53707-7857 Attorneys (608) 266-8986 Department of Justice Washington D.C. 20530 (202) 514-2413 CERTIFICATE AS TO PARTIES, RULINGS, AND RELATED CASES A. All parties, intervenors and amici appearing before the district court and in this court are listed in the Brief for Appellant. B. References to the rulings at issue appear in the Brief for Appellant. C. This case was previously before this Court in Nos. 98-5399 and 98-5400, United States v. Microsoft Corp., 165 F.3d 952 (D.C. Cir. 1999). There are no other related cases currently pending in this Court or in any other court. TABLE OF CONTENTS CERTIFICATE AS TO PARTIES, RULINGS, AND RELATED CASES ................. i TABLE OF CONTENTS ...................................................... ii TABLE OF AUTHORITIES ................................................... vi GLOSSARY ...............................................................xvi STATEMENT AS TO STATUTES AND REGULATIONS .......................... xix STATEMENT OF ISSUES......................................................1 STATEMENT OF THE CASE...................................................1 A. Introduction ..........................................................1 B. Course Of Proceedings .................................................4 C. Statement Of Facts ....................................................6 1. Microsoft’s Operating System Monopoly ..............................7 a. The Market..................................................7 b. The Applications Barrier To Entry................................9 2. Combating The Middleware Threats .................................11 a. The Attempt To Obtain Agreement With Netscape..................12 b. Denying Netscape Access To Crucial Channels Of Distribution........14 (i) Excluding Navigator From The OEM Channel ....................16 (a)Contractual Restrictions And Coercion Of OEMs...............16 (b) Additional Means To Prevent OEMs From Distributing Navigator..............................................20 (ii) The IAP Channel...........................................24 (iii) Apple ....................................................28 -ii- (iv) ICPs And ISVs ............................................30 (v) Effects Of The Campaign.....................................31 c. Java.......................................................35 d. Intel And Others.............................................39 SUMMARY OF ARGUMENT..................................................41 ARGUMENT................................................................45 STANDARD OF REVIEW .....................................................45 I. MICROSOFT VIOLATED SECTION 2 OF THE SHERMAN ACT THROUGH A COURSE OF ANTICOMPETITIVE CONDUCT THAT MAINTAINED ITS OPERATING SYSTEM MONOPOLY ...................................................47 A. The Offense Of Monopolization .........................................47 B. Microsoft Has Monopoly Power .........................................51 1. The District Court Correctly Found That The Relevant Market Is “The Licensing Of All Intel-Compatible PC Operating Systems Worldwide” . 52 2. The District Court Correctly Concluded That Microsoft Has Monopoly Power .....................................55 a. Microsoft’s Dominant, Persistent, And Increasing Market Share Supports A Finding Of Monopoly Power .........................55 b. Microsoft Is Protected By Barriers To Entry That Support A Finding Of Monopoly Power ..........................57 c. Microsoft’s Conduct Did Not Negate A Finding Of Monopoly Power ...60 C. Microsoft Engaged In A Multifaceted Campaign Of Exclusionary Conduct That Maintained Its Monopoly Power ....................................62 1. The District Court Imposed Liability Based On Microsoft’s Anticompetitive Conduct ..........................................63 2. The District Court Did Not Condemn Microsoft For Developing -iii- Or Improving Its Products .........................................65 3. The District Court Correctly Concluded That Microsoft Wrongfully Excluded Netscape Navigator From The OEM Channel..................68 a. Copyright Law Does Not Insulate Microsoft’s Restrictive OEM License Provisions From The Antitrust Laws .............................68 b. Microsoft’s Conduct Was Exclusionary Even Though It Did Not Completely Exclude Navigator From The OEM Distribution Channel ....................................73 4. The District Court Correctly Concluded That Microsoft Wrongfully Excluded Netscape Navigator From The IAP Channel..........76 a. The Court’s Section 1 Determination Does Not Preclude A Finding That Microsoft’s Exclusion Of Navigator From The IAP Channel Violated Section 2 ...........................................77 b. Microsoft’s Conduct Was Exclusionary Even Though It Did Not Completely Exclude Navigator From The IAP Distribution Channel....78 5. The District Court Correctly Ruled That Aspects Of Microsoft’s Java Implementation Violated Section 2 ..................................79 6. The District Court Correctly Based Liability On Microsoft’s Course Of Conduct As A Whole, As Well As On Its Individual Acts .......80 D. Microsoft’s Exclusionary Conduct Contributed Significantly To The Maintenance Of Its Operating Systems Monopoly ...........................83 II. MICROSOFT ATTEMPTED TO MONOPOLIZE THE BROWSER MARKET .......87 A. Microsoft’s Proposal To Netscape In June 1995 Constituted Attempted Monopolization .....................................................88 B. Microsoft’s Pattern Of Conduct Following Netscape’s Failure To Accept Its Proposal Constituted Attempted Monopolization ............................93 III. MICROSOFT VIOLATED SECTION 1 OF THE SHERMAN ACT BY TYING INTERNET EXPLORER TO WINDOWS .....................................97 A. Microsoft Is Liable Under The Supreme Court’s Tying Decisions ..............98 -iv- B. Microsoft Is Liable Under The Microsoft II Rationale For Distinguishing Integrated Products ..................................................102 1. The District Court Condemned Tying, Not Integrated Design .............102 2. Windows and IE Would Be Considered Separate Products If Microsoft II Were Applied To The Facts Of This Case............................104 C. Microsoft’s Tying Had Significant Competitive Consequences ................107 IV. THE DISTRICT COURT DID NOT COMMIT REVERSIBLE ERROR IN THE SCHEDULING OR CONDUCT OF THE PROCEEDINGS ON LIABILITY .........110 A. The District Court Did Not Abuse Its Discretion In Managing Its Docket........110 B. The District Court Did Not Rely On Inadmissible Hearsay In Making Any Essential Finding Of Fact .........................................114 V. THE DISTRICT COURT PROPERLY ORDERED STRUCTURAL AND CONDUCT REMEDIES AND FOLLOWED APPROPRIATE PROCEDURES IN DOING SO ....119 A. The District Court Did Not Abuse Its Discretion In Ordering The Remedy.......119 1. Divestiture Of Microsoft Into “OpsCo” And “AppsCo” .................120 2. Conduct Restrictions .............................................128 B. The District Court Did Not Err By Entering Its Decree Without A Separate Evidentiary Hearing On Remedy.................................................135 VI. JUDGE JACKSON’S OUT-OF-COURT COMMENTS DO NOT MERIT VACATING THE JUDGMENT OR REMOVING HIM FROM FURTHER PROCEEDINGS ......145 CONCLUSION .............................................................150 ADDENDUM A Statutes And Regulations .................................... A-1 ADDENDUM B Index To The District Court’s Findings Of Fact ...................B-1 ADDENDUM C Witnesses, Deponents, And Others Named In This Brief ............C-1 -v- TABLE OF AUTHORITIES Cases A.H. Cox & Co. v. Star Mach. Co., 653 F.2d 1302 (9th Cir. 1981) .......................89 AD/SAT v. Associated Press, 181 F.3d 216 (2d Cir. 1999) .............................55 Adams v. Hinchman, 154 F.3d 420 (D.C. Cir. 1998) ..................................46 Advanced Computer Servs. of Mich., Inc. v. MAI Sys. Corp., 845 F. Supp. 356 (E.D. Va. 1994) .............................................73 Advanced Health-Care Servs. v. Radford Cmty. Hosp., 910 F.2d
Recommended publications
  • Open Thesis Final.Pdf
    The Pennsylvania State University The Graduate School College of Communications EVALUATIO OF FOSS VIDEO GAMES I COMPARISO TO THEIR COMMERCIAL COUTERPARTS A Thesis in Media Studies By Jesse A. Clark © 2008 Jesse A. Clark Submitted in Partial Fulfillment of the Requirements for the Degree of Master of Arts August 2008 ii The thesis of Jesse A. Clark was reviewed and approved* by the following:: John Nichols Professor of Communications Associate Dean for Graduate Studies and Research Matt Jackson Associate Professor of Communications Head of Department of Telecommunications Thesis Advisor Robert Frieden Professor; Pioneers Chair in Telecommunications Ronald Bettig Associate Professor of Communications *Signatures are on file in the Graduate School. iii Abstract The topic of copyrights and copyright law is a crucial component in understanding today's media landscape. The purpose for having a copyright system as outlined in the U.S. Constitution is to provide content creators with an incentive to create. The copyright system allows revenue to be generated through sales of copies of works; thus allowing for works to be created which otherwise would not be created. Yet it is entirely possible that not all large creative projects require the same legal framework as an incentive. The so called “copyleft” movement (which will be defined and explained in depth later) offers an alternative to the industrial mode of cultural production. Superficially, “copylefted” works can be divided into two broad categories: artistic/creative works (which are often protected by “Creative Commons” licenses), and Free/Open Source Software. This thesis evaluates how open source video games compare to their commercial counterparts and discusses the reasons for any difference in overall quality.
    [Show full text]
  • Markdown Markup Languages What Is Markdown? Symbol
    Markdown What is Markdown? ● Markdown is a lightweight markup language with plain text formatting syntax. Péter Jeszenszky – See: https://en.wikipedia.org/wiki/Markdown Faculty of Informatics, University of Debrecen [email protected] Last modified: October 4, 2019 3 Markup Languages Symbol ● Markup languages are computer languages for annotating ● Dustin Curtis. The Markdown Mark. text. https://dcurt.is/the-markdown-mark – They allow the association of metadata with parts of text in a https://github.com/dcurtis/markdown-mark clearly distinguishable way. ● Examples: – TeX, LaTeX https://www.latex-project.org/ – Markdown https://daringfireball.net/projects/markdown/ – troff (man pages) https://www.gnu.org/software/groff/ – XML https://www.w3.org/XML/ – Wikitext https://en.wikipedia.org/wiki/Help:Wikitext 2 4 Characteristics Usage (2) ● An easy-to-read and easy-to-write plain text ● Collaboration platforms and tools: format that. – GitHub https://github.com/ ● Can be converted to various output formats ● See: Writing on GitHub (e.g., HTML). https://help.github.com/en/categories/writing-on-github – Trello https://trello.com/ ● Specifically targeted at non-technical users. ● See: How To Format Your Text in Trello ● The syntax is mostly inspired by the format of https://help.trello.com/article/821-using-markdown-in-trell o plain text email. 5 7 Usage (1) Usage (3) ● Markdown is widely used on the web for ● Blogging platforms and content management entering text. systems: – ● The main application areas include: Ghost https://ghost.org/
    [Show full text]
  • New Single-Player DLC for Bioshock(R) 2, Protector Trials, to Test Players' Combat Prowess August 3, 2010
    New Single-Player DLC for BioShock(R) 2, Protector Trials, to Test Players' Combat Prowess August 3, 2010 July 1, 2010 8:02 AM ET NEW YORK, Jul 01, 2010 (BUSINESS WIRE) -- 2K Games announced today Protector Trials*, an all-new single-player focused downloadable game add-on for BioShock(R) 2 that puts players back into the boots of the Big Daddy as he defends his Little Sister against swarms of corrupt Splicers who are hell-bent on stealing the precious ADAM that she gathers from corpses. Available starting August 3, 2010, this exciting and action-packed addition will challenge players to use the full arsenal of the BioShock 2 tool set as they dispatch their foes and unleash their wrath on enemies across six different areas from the single-player experience. "The team at 2K Marin has been working hard ever since the launch of BioShock 2to develop ways for gamers to extend their time in the single-player world of Rapture," said Christoph Hartmann, president of 2K. "I'm proud to announce the first of these experiences, the Protector Trials, which takes players back to some of their favorite places from the original game and features some of the biggest challenges that fans of this series have ever experienced. This is just the beginning. More single-player content is on the way that will deliver more of the intense action and story-driven gameplay that fans have been craving." Protector Trials is being developed by the core team behind BioShock 2's single-player experience. It contains a series of challenges focused on frantic combat and fast-paced action that are designed to push players' mastery of weapons and Plasmids.
    [Show full text]
  • ••••It•• G981 &911651, Elateferyl
    DOC~D:j 4009J726 TOP SICRIT WaJUOl!JWaJl1 t?l!CBl!JrnVU~ £iJl]l!WIB~ (r(!JllJU ~(51]Uj~(5 ~" W15allDl5 f WaJUJ~l1wrnlD J / P . L . 86-36 . WHEN CENSORSHIP BACKFIRES ....... ; .. ;~ .... James Killough .. ,/. , 0 ••••• 1 IDESKPAD: A PROGRAMMER' s TOOL •••• _1:: :\ :: ,_,------!: <:; ·::::: ~ ,________ __, ,; .••••• 9 IN PRAISE OF SOLITS ..................... Louis C. Grant .... •...... 12 NOTES ON BLUE RUSSIAN .................. ~ f ...... 12 NATIONAL CRYPTOLOGIC SCHOOL OFFERS COURSE-EQUIVALENCY TESTS ..................................... 13 'f'lllS B00tiM~N'f eoN'FAtlNS CJOBIW9RB MAt'l'IRIAtL et J2 J t.1 BlltN8A/elle88 (N81'/e88M 111-1) ••••It•• G981 &911651, Elateferyl .TOP SECRET Bedawif) tfpou Nuliluiliw b1 tile 81 .... eclassified and Approved for Release by NSA on -10--1-1-20'1.2 pursuant to E.O. '13526. vlDR Case# 54778 DOCID: 4009726 TOP SECRET Published Monthly by Pl, Techniques and Standards, for the Personnel of Operations VOL . II , No • 11 NOVEMBER 1975 PUBLISHER WILLIAM LUTWINIAK BOARD OF EDITORS Editor in Chief ............ Arthur J. Salenune (5642s) Cryptanalysis ...•.......... .__ ______.ltlW25s} · · P.L. 86- 36 Language .•.....••.......... Emery W. Tetrault (5236s) Machine Support. ......... · I t33zl.~) Special Research ........... Vera R. Filby (7119s) Traffic Analysis .•.••..•••• Frederic 0. Mason, Jr. (4142s) For individual subscriptions send name and organizational designator to: CRYPTOLOG, Pl TOP SECRET DOCID: 4009726 'fOP SECRET t:rl'.4RRA Jiitt;J. GIZll!ll bww. 86-36 Theodore Shabad is one of the preeminent Ameri­ "director of a-plant," and another was a per­ can experts on Soviet physical and economic geogra­ son identified as First Secretary of "a City phy. He is the author of Geogruphy of the USSR Committee of the Communist Party." Both were (1951), Basia Industr>ial Resources of the USSR members of the Central Committee of the Tadzhik (1969), and China's Changing Map (1972).
    [Show full text]
  • Gamecard Seller Pricelist
    Gamecard Seller Pricelist Payment Methods: Contact: - PayPal regular (+3,4%) MSN: [email protected] - PayPal Mass Pay E-mail: [email protected] - Bank Transfer Phone: On request Xbox Live Gold Subscriptions: Xbox Gift Card (EU) 12+1 Months Xbox Live Gold: €5 Xbox Gift Card (EU): €50 Xbox Gift Card: 10-100 €29,50 10-100 €4,75 10-100 €39,00 101-200 €29,25 101-200 €4,65 101-200 €38,75 200+ €29,00 200+ €4,50 200+ €38,50 12 Months Xbox Live Gold: €10 Xbox Gift Card (EU): €75 Xbox Gift Card: 10-100 €28,00 10-100 €8,75 10-100 €61,75 101-200 €27,50 101-200 €8,50 101-200 €61,50 200+ €27,25 200+ €8,25 200+ €61,25 500+ €27,00 €15 Xbox Gift Card (EU): €100 Xbox Gift Card: 3 Months Xbox Live Gold: 10-100 €13,25 10-100 €77,00 10-100 €12,50 101-200 €13,00 101-200 €76,75 101-200 €12,00 200+ €12,75 200+ €76,50 200+ €11,75 €20 Xbox Gift Card (EU): Microsoft Points: 1 Month Xbox Live Gold: 10-100 €19,50 2100 Microsoft Points 10-100 €5,00 101-200 €19,00 101-200 €4,75 200+ €18,75 10-100 €19,50 200+ €4,50 101-200 €19,00 €25 Xbox Gift Card (EU): 200+ €18,75 10-100 €20,00 4200 Microsoft Points 101-200 €19,75 200+ €19,50 10-100 €38,00 101-200 €37,75 €30 Xbox Gift Card (EU): 200+ €37,50 10-100 €25,50 101-200 €25,25 200+ €25,00 PlayStation Network Cards: €20 PlayStation Network Card NL (Netherlands): €20 PlayStation Network Card DU (Germany): 10-100 €17,00 10-100 €17,00 101-200 €16,75 101-200 €16,75 200+ €16,50 200+ €16,50 €50 PlayStation Network Card NL (Netherlands): €50 PlayStation Network Card DU (Germany): 10-100 €40,00 10-100 €40,00 101-200
    [Show full text]
  • BSD UNIX Toolbox 1000+ Commands for Freebsd, Openbsd
    76034ffirs.qxd:Toolbox 4/2/08 12:50 PM Page iii BSD UNIX® TOOLBOX 1000+ Commands for FreeBSD®, OpenBSD, and NetBSD®Power Users Christopher Negus François Caen 76034ffirs.qxd:Toolbox 4/2/08 12:50 PM Page ii 76034ffirs.qxd:Toolbox 4/2/08 12:50 PM Page i BSD UNIX® TOOLBOX 76034ffirs.qxd:Toolbox 4/2/08 12:50 PM Page ii 76034ffirs.qxd:Toolbox 4/2/08 12:50 PM Page iii BSD UNIX® TOOLBOX 1000+ Commands for FreeBSD®, OpenBSD, and NetBSD®Power Users Christopher Negus François Caen 76034ffirs.qxd:Toolbox 4/2/08 12:50 PM Page iv BSD UNIX® Toolbox: 1000+ Commands for FreeBSD®, OpenBSD, and NetBSD® Power Users Published by Wiley Publishing, Inc. 10475 Crosspoint Boulevard Indianapolis, IN 46256 www.wiley.com Copyright © 2008 by Wiley Publishing, Inc., Indianapolis, Indiana Published simultaneously in Canada ISBN: 978-0-470-37603-4 Manufactured in the United States of America 10 9 8 7 6 5 4 3 2 1 Library of Congress Cataloging-in-Publication Data is available from the publisher. No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permis- sion should be addressed to the Legal Department, Wiley Publishing, Inc., 10475 Crosspoint Blvd., Indianapolis, IN 46256, (317) 572-3447, fax (317) 572-4355, or online at http://www.wiley.com/go/permissions.
    [Show full text]
  • Openstreetmap History for Intrinsic Quality Assessment: Is OSM Up-To-Date? Marco Minghini1,3* and Francesco Frassinelli2,3
    Minghini and Frassinelli Open Geospatial Data, Software and Standards (2019) 4:9 Open Geospatial Data, https://doi.org/10.1186/s40965-019-0067-x Software and Standards SOFTWARE Open Access OpenStreetMap history for intrinsic quality assessment: Is OSM up-to-date? Marco Minghini1,3* and Francesco Frassinelli2,3 Abstract OpenStreetMap (OSM) is a well-known crowdsourcing project which aims to create a geospatial database of the whole world. Intrinsic approaches based on the analysis of the history of data, i.e. its evolution over time, have become an established way to assess OSM quality. After a comprehensive review of scientific as well as software applications focused on the visualization, analysis and processing of OSM history, the paper presents “Is OSM up-to-date?”, an open source web application addressing the need of OSM contributors, community leaders and researchers to quickly assess OSM intrinsic quality based on the object history for any specific region. The software, mainly written in Python, can be also run in the command line or inside a Docker container. The technical architecture, sample applications and future developments of the software are also presented in the paper. Keywords: Crowdsourcing, Data history, Data quality, Open source, OpenStreetMap, up-to-dateness Introduction of software tools, services and applications allows a wide OpenStreetMap (OSM) is the most successful crowd- number of developers, humanitarian operators, industry sourced geographic information project to date [1]. It was and governmental actors to exploit OSM data on a daily initiated in 2004 in response to the mainstream pres- basis and for a variety of purposes [6].
    [Show full text]
  • 1. Introduction
    Network Operating Systems Partha Dasgupta Department of Computer Science and Engineering Arizona State University Tempe AZ 85287-5406 USA [email protected] [Note: Written in 1997, Appeared in Encyclopedia of Electrical Engineering] 1. Introduction Network Operating Systems extend the facilities and services provided by computer operating systems to support a set of computers, connected by a network. The environment managed by a network operating system consists of an interconnected group of machines that are loosely connected. By loosely connected, we mean that such computers possess no hardware connections at the CPU – memory bus level, but are connected by external interfaces that run under the control of software. Each computer in this group run an autonomous operating system, yet cooperate with each other to allow a variety of facilities including file sharing, data sharing, peripheral sharing, remote execution and cooperative computation. Network operating systems are autonomous operating systems that support such cooperation. The group of machines comprising the management domain of the network operating system is called a distributed system. A close cousin of the network operating system is the distributed operating system. A distributed operating system is an extension of the network operating system that supports even higher levels of cooperation and integration of the machines on the network (features include task migration, dynamic resource location, and so on) (1,2). An operating system is low-level software controlling the inner workings of a machine. Typical functions performed by an operating system include managing the CPU among many concurrently executing tasks, managing memory allocation to the tasks, handling of input and output and controlling all the peripherals.
    [Show full text]
  • NWG/RFC# 752 MRC 2-Jan-79 01:22 Nnnnn a Universal Host Table
    NWG/RFC# 752 MRC 2-Jan-79 01:22 nnnnn A Universal Host Table Network Working Group Mark Crispin Request for Comments 752 SU-AI NIC nnnnn 2 January 1979 A Universal Host Table ABSTRACT: The network host table in use at MIT and Stanford is described. This host table is superior to the NIC and Tenex host tables in several ways. A binary file, compiled from this host table, is also described. This file is used by subsystems on MIT's ITS and Stanford's WAITS timesharing systems for efficiency in host and network lookups. HISTORY: As with many other sites on the Arpanet, we found the NIC's host table unsuited to our needs. Part of the problem was because the NIC host table was often inaccurate and all too often failed to include several nicknames in common usage in our communities. In addition, the NIC host table's format was awkward for user programs to use, especially those which wanted to have the host table mapped into memory in some sort of structured binary form for efficient lookups. Finally, the NIC host table neglects to include some essential information. The ITS host table was originally designed to be compiled along with a network handling program (MIDAS, the PDP-10 assembler used, has a pseudo-op to insert a file into an assembly). In order to make the host table palatable to the assembler, every comment line began with a semicolon, and every actual data line began with the word HOST. Each program which used the host table defined HOST as an assembly macro before inserting the host table into the assembly.
    [Show full text]
  • Multics Extended I Mail System . User's Guide
    HONEYWELL MULTICS EXTENDED I MAIL SYSTEM . USER'S GUIDE SOFTWARE MULTICS EXTENDED MAIL SYSTEM USER'S GUIDE SUBJECT Tutorial Introduction to the Multics Extended Electronic Mail System SPECIAL INSTRUCTIONS Refer to the Preface for ttSignificant Changes". This document supersedes Order No. CH23, Revision 0, dated September 1981. The manual has been extensively revised. Change bars in the margins indicate technical changes and additions; asterisks denote deletions. This manual assumes basic knowledge of the Multics system provided by the 2-volume set, New Users' Introduction to Multics - Part I Order No. CH24 and Part II Order No. CH25. SOFTWARE SUPPORTED Multics Software Release 10.1 ORDER NUMBER CH23-01 February 1983 Honeywell PREFACE The purpose of this manual is to help you become familiar with the Multics extended electronic mail system. This manual provides you with an illustrated discussion of the print mail and read mail commands for receiving mail, the send mail command for creating and sending mail, and a large variety of useful requests and control arguments to aid you in utilizing the full capacity of the extended mail system. Readers are expected to know the Multics concepts and terms described in the 2-volume set, New Users' Introduction to Multics (Order Nos. CH24 and CH25). These two manuals are referred to throughout this manual as the New Users' Intro - Part I and Part II. Also very useful is the Qedx Text Editor Users' Guide (Order No. CG40) which is referred to as the Qedx Users' Guide. Section 1 of this manual introduces the Multics extended mail system. Section 2 reviews the print_mail command.
    [Show full text]
  • FC33U (Outdoor) Fullhd IP Type Pan Tilt Zoom CCTV Camera
    User’s Manual FC33E (Explosion-Proof) FC33U (Outdoor) Full HD IP type Pan Tilt Zoom CCTV Camera IM 85A7C03-16E IM 85A7C03-16E Yokogawa Electric Corporation 7th Edition i Safety Precautions The precautions herein are intended to ensure the safe use of the product and prevention of possible injury and damage to the user. The precautions are classified into “Warning” and “Caution,” depending on the results assumed to arise if neglected, to clarify the degree and urgency of the injury or damage. Both are important for safety. Thus be sure to observe them. Denotes a possible hazard that could result in death or WARNING serious injury to personnel Indique un danger potentiel pouvant entraîner la mort ou des blessures graves au personnel. Denotes a possible hazard that could result in human injury CAUTION or physical damage. Indique un danger potentiel pouvant entraîner des blessures ou des dommages physiques. Pictogram examples Pictogram indicates a hazard, warning, or caution. In the pictogram, a specific precaution is shown. (The pictogram on the left Shock hazard shows “shock hazard.”) Pictogram indicates a prohibited action. Disassembling In or near the pictogram, a specific precaution is shown. (The pictogram on the prohibited left shows “disassembling prohibited.”) Media No.IM 85A7C03-16E (CD) 7th Edition: JUL..2021 (KP) IM 85A7C03-16E All Rights Reserved. Copyright ©2014 Yokogawa Electric Corporation. ii • This product has been certified as an explosion-proof type device. Severe restrictions are imposed on the structure, installation location, external wiring, maintenance, repair, etc. of this device. Be careful as dangerous WARNING conditions may occur if these restrictions are infringed.
    [Show full text]
  • Langley Vedit for Nos/Ve Usage Manual
    NASA Technical Memorandum 100499 LANGLEY VEDIT FOR NOS/VE USAGE MANUAL M. A. HEANEY SEPTEMBER 1987 {NASil-T@-700499) LANGLEY VLDIT FOR NOS;/VE N87-38098 USAGE MANUAL [NASA) 40 p Avail: NTLS HC A03/MF A01 CSCL 1)gd Uncla s i;3/61 0103541 National Aeronautics and Space Administration LMlgleyResestchCecllW Hampton. Virginia 23665 RELATED MANUALS XEDIT Version 3 Reference Manual. Control Data Corporation Publication Number 60455730, 1984. Langley XEDIT Reference Manual. Central Scientific Computer Complex Documentation N-7a, 1984. SCL Language Definitionflsage. Control Data Corporation Publication Number 60464013, 1986. SCL System Interfaceflsage. Control Data Corporation Publication Number 60464014, 1986. SCL Quick Reference. Control Data Corporation Publication Number 60464018, 1986. SCL Advanced File Managementflsage. Control Data Corporation Publication Number 60486413, 1986. i CONTENTS INTRODUCTION ........................ 1 AUDIENCE ....................... 1 VEDITFEATURES .................... 1 REFERENCE MANUALS CONVENTIONS ............. 1 CALLINGVEDIT ....................... 3 INITIATING VEDIT ................... 3 INTERACTIVE USAGE OF VEDIT .............. 3 VED IT CONVENTI ONS ..................... 4 VEDIT COMMAND SYNTAX ................. 4 ENTERING EDITING DATA ................. 4 POSITIONING THE FILE POINTER ................ 5 LOCATING LINES VIA SPECIFIED STRINGS ......... 5 ADVANCING AND REVERSING THE POINTER .......... 5 POSITIONING POINTER AT TOP AND BOTTOM OF THE FILE ... 5 POSITIONING POINTER BY LISTING LINES ......... 6 STRINGEDITING
    [Show full text]