Patent application number | Description | Published |
20100077515 | Microchannel forming method and nanotipped dispensing device having a microchannel - A method of forming a microchannel as well as a thin film structure including same is made by forming a first thin film on a side of a substrate, forming a fugitive second thin film on the first thin film such that the second thin film defines a precursor of the elongated microchannel and a plurality of extensions connected to and extending transversely relative to the precursor along a length thereof A third thin film is formed on the first thin film and the fugitive second thin film such that the second thin film resides between the first thin film and the third thin film. A respective access site is formed in a region of the third thin film residing on a respective extension and penetrating to the fugitive second thin film. The fugitive second thin film forming the precursor is selectively removed from between the first thin film and the third thin film using an etching medium introduced through the access sites, thereby forming the microchannel between the first thin film and the third thin film. The method preferably further includes forming a sealing layer on the third thin film in a manner to close off open access sites remaining after selective removal of the second thin film. | 03-25-2010 |
20110036809 | Microchannel forming method and nanotipped dispensing device having a microchannel - A method of forming a microchannel as well as a thin film structure including same is made by forming a first thin film on a side of a substrate, forming a fugitive second thin film on the first thin film such that the second thin film defines a precursor of the elongated microchannel and a plurality of extensions connected to and extending transversely relative to the precursor along a length thereof A third thin film is formed on the first thin film and the fugitive second thin film such that the second thin film resides between the first thin film and the third thin film. A respective access site is formed in a region of the third thin film residing on a respective extension and penetrating to the fugitive second thin film. The fugitive second thin film forming the precursor is selectively removed from between the first thin film and the third thin film using an etching medium introduced through the access sites, thereby forming the microchannel between the first thin film and the third thin film. The method preferably further includes forming a sealing layer on the third thin film in a manner to close off open access sites remaining after selective removal of the second thin film. | 02-17-2011 |
20110317325 | Electrodes to improve reliability of nanoelectromechanical systems - The present invention provides for replacement of conventionally-used metal electrodes in NEMS devices with electrodes that include non-metallic materials comprised of diamond-like carbon or a dielectric coated metallic film having greater electrical contact resistance and lower adhesion with a contacting nanostructure. This reduces Joule heating and stiction, improving device reliability. | 12-29-2011 |
20120027947 | Nanotipped device and method - A dispensing device has a cantilever comprising a plurality of thin films arranged relative to one another to define a microchannel in the cantilever and to define at least portions of a dispensing microtip proximate an end of the cantilever and communicated to the microchannel to receive material therefrom. The microchannel is communicated to a reservoir that supplies material to the microchannel. One or more reservoir-fed cantilevers may be formed on a semiconductor chip substrate. A sealing layer preferably is disposed on one of the first and second thin films and overlies outermost edges of the first and second thin films to seal the outermost edges against material leakage. Each cantilever includes an actuator, such as for example a piezoelectric actuator, to impart bending motion thereto. The microtip includes a pointed pyramidal or conical shaped microtip body and an annular shell spaced about the pointed microtip body to define a material-dispensing annulus thereabout. The working microtip may be used to dispense material onto a substrate, to probe a surface in scanning probe microscopy, to apply an electrical stimulus or record an electrical response on a surface in the presence of a local environment created around the tip by the material dispensed from the tip or to achieve other functions. | 02-02-2012 |
Patent application number | Description | Published |
20090319247 | Systems and Methods for A Simulated Network Environment and Operation Thereof - Methods and Systems for simulating a network environment includes simulating network components and network architecture of a user network, simulating real-world network traffic on the simulated user network, simulating network events within the simulated real-world traffic on the simulated user network, monitoring the simulated network, the simulated traffic including the simulated network events, and receiving input from a user, such inputs manually controlling/managing the simulated network components of the simulated user network responsive to the monitoring. | 12-24-2009 |
20090319248 | SYSTEMS AND METHODS FOR A SIMULATED NETWORK TRAFFIC GENERATOR - System and methods for generating network traffic in a simulated network environment including creating one or more network traffic pattern within the simulated network environment that replicate actual traffic patterns within a users operating network environment, creating a traffic profile utilizing one or more of the network traffic patterns, creating a traffic scenario that includes a group of created traffic profiles and traffic scenario metadata wherein creating includes traffic pattern metadata, traffic profile metadata, and traffic scenario metadata. | 12-24-2009 |
20090319249 | SYSTEMS AND METHODS FOR NETWORK MONITORING AND ANALYSIS OF A SIMULATED NETWORK - Systems and methods for monitoring and analyzing components and operation of a simulated network environment including a module configured for storing a predetermined baseline for the simulated network environment, monitoring the simulated network environment during one or more operations, analyzing the monitored operations and the impact of the operations on one or more components of the simulated network environment, and comparing at least one of the monitored operations and impacts of the operations against the predetermined baseline. | 12-24-2009 |
20090319647 | SYSTEMS AND METHODS FOR AUTOMATED BUILDING OF A SIMULATED NETWORK ENVIRONMENT - Systems and methods for a system for automatically building a simulated network environment creating device profiles with device level metadata, segment profiles that utilize one or more of the created device profiles and that includes segment metadata, and a network environment profile that is created from segment profiles and that includes network environment metadata and a hierarchy based on dependencies with other segments within the network environment profile. | 12-24-2009 |
20090319906 | SYSTEMS AND METHODS FOR RECONSTITUTION OF NETWORK ELEMENTS IN A SIMULATED NETWORK - Systems and methods for automatically restoring any network device in a simulated network environment to a predefined configuration including module is configured for creating one or more network device images for one or more network devices within a user's operating network environment, creating an image set utilizing one or more of the created network device images, and initiating the restoring of the network devices within the simulated network environment utilizing at least one of the created network device images and image sets. | 12-24-2009 |
20090320137 | SYSTEMS AND METHODS FOR A SIMULATED NETWORK ATTACK GENERATOR - Systems and methods for generating a network attack within a simulated network environment including a module configured for creating one or more attack events against network devices within the simulated network environment wherein the attack events include exploitations of published and unpublished vulnerabilities and failures of hardware and software network systems, devices, or applications within the simulated network environment and for executing the created attack event on the simulated network environment and having an interface configured for receiving metadata regarding each attack event and adding the received attack event metadata to each associated attack event. | 12-24-2009 |
20140046644 | SYSTEMS AND METHODS FOR NETWORK MONITORING AND ANALYSIS OF A SIMULATED NETWORK - Systems and methods for monitoring and analyzing components and operation of a simulated network environment including a module configured for storing a predetermined baseline for the simulated network environment, monitoring the simulated network environment during one or more operations, analyzing the monitored operations and the impact of the operations on one or more components of the simulated network environment, and comparing at least one of the monitored operations and impacts of the operations against the predetermined baseline. | 02-13-2014 |
20140046645 | SYSTEMS AND METHODS FOR NETWORK MONITORING AND ANALYSIS OF A SIMULATED NETWORK - Systems and methods for monitoring and analyzing components and operation of a simulated network environment including a module configured for storing a predetermined baseline for the simulated network environment, monitoring the simulated network environment during one or more operations, analyzing the monitored operations and the impact of the operations on one or more components of the simulated network environment, and comparing at least one of the monitored operations and impacts of the operations against the predetermined baseline. | 02-13-2014 |
20150051893 | SYSTEMS AND METHODS FOR NETWORK MONITORING AND ANALYSIS OF A SIMULATED NETWORK - Systems and methods for monitoring and analyzing components and operation of a simulated network environment including a module configured for storing a predetermined baseline for the simulated network environment, monitoring the simulated network environment during one or more operations, analyzing the monitored operations and the impact of the operations on one or more components of the simulated network environment, and comparing at least one of the monitored operations and impacts of the operations against the predetermined baseline. | 02-19-2015 |