Patent application number | Description | Published |
20130054788 | MANAGING HOST COMPUTING DEVICES - Systems and methods are disclosed which facilitate the management of host computing devices through the utilization of a host computing device control component. The host computing device control component includes a state monitoring component that monitors operating states of the control component. Based on monitoring the operating of the control component, the state monitoring component causes the generation of one or more visual indicator indicative of the operating state of the control component. | 02-28-2013 |
20130152376 | Power And Airflow Configuration For Modular Server - A method of allocating resources in a rack system includes establishing a budgeted amount of a resource for a defined amount of rack space in a rack system. Electrical modules are deployed in a particular space in the rack system having the defined amount of rack space such that the amount of the resource used by the electrical modules in the particular rack space is maintained within the budgeted amount of the resource. | 06-20-2013 |
20140351893 | MANAGING HARDWARE REBOOT AND RESET IN SHARED ENVIRONMENTS - In an environment such as a cloud computing environment where various guests can be provisioned on a host machine or other hardware device, it can be desirable to prevent those users from rebooting or otherwise restarting the machine or other resources using unauthorized information or images that can be obtained from across the network. A cloud manager can cause one or more network switches or other routing or communication processing components to deny communication access between user-accessible ports on a machine or device and the provisioning systems, or other specific network resources, such that the user cannot cause the host machine to pull information from those resources upon a restart or reboot of the machine. Further, various actions can be taken upon a reboot or attempted reboot, such as to isolate the host machine or even power off the specific machine. | 11-27-2014 |
20150199519 | MANAGING FIRMWARE UPDATE ATTEMPTS - Attempts to update confirmation information or firmware for a hardware device can be monitored using a secure counter that is configured to monotonically adjust a current value of the secure counter for each update or update attempt. The value of the counter can be determined every time the validity of the firmware is confirmed, and this value can be stored to a secure location. At subsequent times, such as during a boot process, the actual value of the counter can be determined and compared with the expected value. If the values do not match, such that the firmware may be in an unexpected state, an action can be taken, such as to prevent access to, or isolate, the hardware until such time as the firmware can be validated or updated to an expected state. | 07-16-2015 |
Patent application number | Description | Published |
20130036061 | PRODUCT RECALL INFORMATION MANAGEMENT - An approach to providing relevant product safety information. Product recall information is aggregated from Internet sources into a database of product recall information. Product identification is gathered from products in the consumer's possession. The product identification may be gathered by having a computing device communicate with the products and store the product information in a data structure such as a table in a database. The product identification for the products is compared with the product recall information, and the consumer is notified of product recall information that is associated with one or more of the products. A computer implementing the system may cause the products themselves to notify the consumer. The consumer may also be notified by text message or email. The consumer may also set a sensitivity indicator that specifies conditions to be met before the consumer receives a notification. | 02-07-2013 |
20130275809 | Preserve Status Parameter for Testing in Computing System - A method for testing using a preserve status parameter in a computing system includes setting, by a calling process in the computing system, the preserve status parameter; issuing a call to a function under test by the calling process in the computing system; executing the function under test in the computing system, wherein data in a memory area accessed by the function under test during execution is preserved by the set preserve status parameter, such that the computing system does not reuse the memory area while the data in the memory area is being preserved; determining if an error occurred during execution of the function under test; in the event an error is determined to have occurred during execution of the function under test, making the data in the memory area available for inspection; and releasing the memory area for reuse by the computing system. | 10-17-2013 |
20140019854 | REVIEWER FEEDBACK FOR DOCUMENT DEVELOPMENT - A system, method and program product for receiving feedback about a document from one or more reviewers includes a step of a computer receives feedback about a document, responsive to input from the one or more reviewers into a user interface. The computer stores the feedback about the document. The computer transmits a notification to an owner of the document that the feedback has been received and stored. Responsive to receiving a request from the owner, the computer opens the document and displays the document with the feedback received. Responsive to input from the owner, the computer changes the document and saves a new version of the document. | 01-16-2014 |
20140208171 | MONITORING AND CAPTURING EARLY DIAGNOSTIC DATA - A deviance monitoring module is provided for examining various parameters of an operating system for deviance from a baseline behavior at specified intervals. A range of acceptable deviance values from a baseline behavior is set for parameters of an operating system. The parameters of the operating system are then monitored at specified intervals for deviance from the baseline behavior. In response to detecting that the deviance exceeds a predetermined threshold, the method triggers diagnostic data gathering on the parameters of the operating system according to an embodiment. | 07-24-2014 |
Patent application number | Description | Published |
20150247340 | RAIL SYSTEM AND METHOD FOR ASSEMBLY - A rail system that may be comprised of various components such as an upper rail, support rail, bottom rail, squash blocks, balusters, post covers, and ancillary components, such as post skirts and caps. In one exemplary embodiment, the rail system may be uniquely designed to accommodate perpendicular and angled installations (e.g., both in the horizontal and vertical planes). Furthermore, in another exemplary embodiment, the rail system may be easily assembled such that the support hardware is substantially hidden from view after installation, thereby enhancing the appearance of the railing. | 09-03-2015 |
20150247341 | RAIL SYSTEM AND METHOD FOR ASSEMBLY - A rail system that may be comprised of various components such as an upper rail, support rail, bottom rail, squash blocks, balusters, post covers, and ancillary components, such as post skirts and caps. In one exemplary embodiment, the rail system may be uniquely designed to accommodate perpendicular and angled installations (e.g., both in the horizontal and vertical planes). Furthermore, in another exemplary embodiment, the rail system may be easily assembled such that the support hardware is substantially hidden from view after installation, thereby enhancing the appearance of the railing. | 09-03-2015 |
Patent application number | Description | Published |
20080243091 | Process and System For Systematic Oxygenation and Renal Preservation During Retrograde Perfusion of the Ischemic Kidney - A delivery system to provide end organ oxygenation and even systematic oxygenation in the face of ischemic result. The deliver system including a retrograde oxygenation and perfusion stent. The stent employing at least two and possibly more channels to allow flow of the perfusate from the device to the renal pelvis then to a back out to a collection apparatus. The stent may include various vital sign monitors, such as a renal pressure monitor, temperature monitor, and even an oxygenation monitor. The stent may include an anchoring device to allow the stent to be anchored into the renal pelvis in a temporary way during the retrograde oxygenation process. | 10-02-2008 |
20110282144 | DIAGNOSTIC CAPSULES, DELIVERY/RETRIEVAL SYSTEMS, KITS AND METHODS - Diagnostic capsules, a variety of diagnostic capsule delivery systems for delivering a diagnostic capsule into an animal or human body cavity (e.g., into an animal or human bladder through a urethra), a variety of diagnostic capsule retrieval systems, a variety of kits that include diagnostic capsule delivery and retrieval systems and diagnostic capsules, and methods of using the same are described herein. | 11-17-2011 |
20130338681 | ADJUSTABLE FASTENING OR CONSTRICTING DEVICES - This document relates to methods and materials involved in fastening or constricting. For example, devices (e.g., adjustable vascular pedicle constricting devices) configured to allow a user (e.g., a surgeon) to apply a band element at least partially around a desired structure (e.g., tissue such as a vascular pedicle) in a manner that allows the degree of constriction to be adjustable are provided. | 12-19-2013 |
Patent application number | Description | Published |
20090282474 | METHOD FOR SAFELY EXECUTING AN UNTRUSTED NATIVE CODE MODULE ON A COMPUTING DEVICE - A system that safely executes a native code module on a computing device. During operation, the system receives the native code module, which is comprised of untrusted native program code expressed using native instructions in the instruction set architecture associated with the computing device. The system then loads the native code module into a secure runtime environment, and proceeds to execute a set of instructions from the native code module in the secure runtime environment. The secure runtime environment enforces code integrity, control-flow integrity, and data integrity for the native code module. Furthermore, the secure runtime environment moderates which resources can be accessed by the native code module on the computing device and/or how these resources can be accessed. By executing the native code module in the secure runtime environment, the system facilitates achieving native code performance for untrusted program code without a significant risk of unwanted side effects. | 11-12-2009 |
20090282477 | METHOD FOR VALIDATING AN UNTRUSTED NATIVE CODE MODULE - A system that validates a native code module. During operation, the system receives a native code module comprised of untrusted native program code. The system validates the native code module by: (1) determining that code in the native code module does not include any restricted instructions and/or does not access restricted features of a computing device; and (2) determining that the instructions in the native code module are aligned along byte boundaries such that a specified set of byte boundaries always contain a valid instruction and control flow instructions have valid targets. The system allows successfully-validated native code modules to execute, and rejects native code modules that fail validation. By validating the native code module, the system facilitates safely executing the native code module in the secure runtime environment on the computing device, thereby achieving native code performance for untrusted program binaries without significant risk of unwanted side effects. | 11-12-2009 |
20130185787 | Safely Executing an Untrusted Native Code Module on a Computing Device - A system that safely executes a native code module on a computing device. During operation, the system receives the native code module, which is comprised of untrusted native program code expressed using native instructions in the instruction set architecture associated with the computing device. The system then loads the native code module into a secure runtime environment, and proceeds to execute a set of instructions from the native code module in the secure runtime environment. The secure runtime environment enforces code integrity, control flow integrity, and data integrity for the native code module. Furthermore, the secure runtime environment moderates which resources can be accessed by the native code module on the computing device and/or how these resources can be accessed. By executing the native code module in the secure runtime environment, the system facilitates achieving native code performance for untrusted program code without a significant risk of unwanted side effects. | 07-18-2013 |
20140359765 | Method for Validating an Untrusted Native Code Module - A system that validates a native code module. During operation, the system receives a native code module comprised of untrusted native program code. The system validates the native code module by: (1) determining that code in the native code module does not include any restricted instructions and/or does not access restricted features of a computing device; and (2) determining that the instructions in the native code module are aligned along byte boundaries such that a specified set of byte boundaries always contain a valid instruction and control flow instructions have valid targets. The system allows successfully-validated native code modules to execute, and rejects native code modules that fail validation. By validating the native code module, the system facilitates safely executing the native code module in the secure runtime environment on the computing device, thereby achieving native code performance for untrusted program binaries without significant risk of unwanted side effects. | 12-04-2014 |
20150161383 | Method for Safely Executing an Untrusted Native Code Module on a Computing Device - A system that safely executes a native code module on a computing device. During operation, the system receives the native code module, which is comprised of untrusted native program code expressed using native instructions in the instruction set architecture associated with the computing device. The system then loads the native code module into a secure runtime environment, and proceeds to execute a set of instructions from the native code module in the secure runtime environment. The secure runtime environment enforces code integrity, control flow integrity, and data integrity for the native code module. Furthermore, the secure runtime environment moderates which resources can be accessed by the native code module on the computing device and/or how these resources can be accessed. By executing the native code module in the secure runtime environment, the system facilitates achieving native code performance for untrusted program code without a significant risk of unwanted side effects. | 06-11-2015 |
Patent application number | Description | Published |
20080213574 | Amphiphilic Fibers and Membranes and Processes for Preparing Them - The present invention relates to the fields of chemistry and biology and more particularly to the field of biomaterials. The present invention includes amphiphilic fibers and membranes, which can be used for biomembranes and biocompatible devices. The present invention also relates to processes for preparing amphiphilic fibers and membranes from solutions comprising amphiphilic molecules. More particularly, the present invention relates to processes for preparing fibers and membranes from electrospinning solutions comprising amphiphilic molecules. The present invention further provides fibers and nonwoven membranes comprising amphiphilic fibers chosen from anionic surfactants, cationic surfactants, nonionic surfactants, phospholipids, sulfobetaines, lyotropic liquid crystalline molecules, and/or block copolymers. Electrospun fibers offer the potential for direct fabrication of biologically based, high-surface-area membranes without the use of multiple synthetic steps, complicated electrospinning designs, or post-processing surface treatments. Polymeric phospholipids, for example, have been shown to be attractive candidates for blood purification membranes, artificial heart valves and organs, and other prosthetics, including other biocompatible devices. | 09-04-2008 |
Patent application number | Description | Published |
20090276529 | CONNECTING EXTERNAL DEVICES TO A GAMING VOICE CHAT SERVICE - Voice chat enhances the game playing experience by allowing gamers in different locations to have conversations within the gaming environment. Functionality can be implemented within a gaming system to send an external invitation a user who is logged out of the game system to participate in a voice chat and/or multiplayer game session. The user can choose to accept the invitation and participate in the voice chat session on a device such as a mobile phone. Automatically generating external requests improves convenience for players, especially when inviting several other players to a voice chat session, because they do not have to find external contact information for each player who is not logged in. | 11-05-2009 |
20110035258 | ADDING CURRENTLY-PREVIEWED MEDIA TITLE TO LIST FOR FUTURE USE - A user viewing a preview of a media title using a media player can elect to add that media title to a list for future use, such as a future rentals list maintained by a rental media provider. The media player communicates with the rental media provider for updating a list for the user which is stored at (or accessible to) the provider. Optionally, a filtering capability may be provided to suppress viewing of particular previews which are stored on media inserted into the media player (for example, because the user has already rented the previewed media title, because the preview does not match filtering criteria such as parental controls, etc.). The filtering may comprise preventing media titles from being added to the future rentals list. Optionally, substitute previews may be provided for the previews which are suppressed by the filtering. | 02-10-2011 |
20130159709 | SESSION COMPLETION THROUGH CO-BROWSING - A method, system and computer program product for session completion through co-browsing is claimed. The method can include establishing a content browsing session between a first computing device and a content server serving access to content to the first computing device and maintaining state data for the content browsing session. A co-browsing arrangement of the content can be created as between the first computing device and a second computing device and at least a subset of the state data can be cloned for use by the second computing device during co-browsing of the content. Thereafter, a modified form of the subset of the state data can be received from the second computing device resulting from the co-browsing of the content by the second computing device and the modified form of the subset of the state data can be provided to the first computing device for use during the content browsing session. | 06-20-2013 |
20140052868 | COBROWSING MACROS - Methods and systems of conducting co-browsing sessions may involve joining a co-browsing session with another peer device, receiving a plurality of web requests in a particular sequence from a macro, and transmitting the plurality of web requests in the particular sequence to a server associated with the co-browsing session. In one example, the particular sequence defines a navigation path to a requested resource. | 02-20-2014 |
20140289722 | PARALLEL PROGRAM INSTALLATION AND CONFIGURATION - A method, computer-readable storage medium, and computer system are provided. In an embodiment, begin installation of a first program product with an installation manager. Poll the first program product to determine whether an operation milestone has been reached during the installation of the first program product. Upon detecting an operation milestone, performing the parallel operation substantially concurrent with the installation. | 09-25-2014 |
20140289723 | PSEUDO PROGRAM USE DURING PROGRAM INSTALLATION - A method, computer-readable storage medium, and computer system are provided. In an embodiment, install a first program product with an installation manager. Run a pseudo first program product while the first program product is installing. Perform functions of the first program product with the pseudo first program product while the first program product is installing. | 09-25-2014 |
20150334195 | SESSION COMPLETION THROUGH CO-BROWSING - A method, system and computer program product for session completion through co-browsing is claimed. The method can include establishing a content browsing session between a first computing device and a content server serving access to content to the first computing device and maintaining state data for the content browsing session. A co-browsing arrangement of the content can be created as between the first computing device and a second computing device and at least a subset of the state data can be cloned for use by the second computing device during co-browsing of the content. Thereafter, a modified form of the subset of the state data can be received from the second computing device resulting from the co-browsing of the content by the second computing device and the modified form of the subset of the state data can be provided to the first computing device for use during the content browsing session. | 11-19-2015 |
Patent application number | Description | Published |
20110179345 | AUTOMATICALLY WRAPPING TEXT IN A DOCUMENT - The described embodiments provide a system for formatting a document in a word processor. The system starts by performing at least one operation on an object in a section of text in the document. Before the operation is performed on the object, the text in the section of text is placed around the object in accordance with a first wrapping behavior. After performing the operation on the object, the system determines a second wrapping behavior for the text in the section of text around the object based on a location of the object in the section of text and a size of the object. The system then places the text around the object in accordance with the second wrapping behavior. | 07-21-2011 |
20110179350 | AUTOMATICALLY PLACING AN ANCHOR FOR AN OBJECT IN A DOCUMENT - The described embodiments provide a system for formatting a document in a word processor. During operation, upon receiving a command to move an object in the document, the system moves the object in the document. When moving the object in the document, the system dynamically arranges other content in the document with respect to the object. Upon receiving a command to place the object in a specified location while moving the object, the system places the object at the specified location and leaves the other content arranged with respect to the object in accordance with a most recent dynamic arrangement. After placing the object at the specified location, the system determines an anchor location for an anchor for the object and places an anchor for the object in the anchor location. | 07-21-2011 |
20110179351 | AUTOMATICALLY CONFIGURING WHITE SPACE AROUND AN OBJECT IN A DOCUMENT - The described embodiments provide a word processor for formatting a document. During operation, the word processor places an object in a section of text in a document. When placing the object in the section of text, the word processor adds a specified amount of white space on a set of sides of the object. The word processor then places text from the section of text on at least a first side and a second side of the object. After placing the text, the word processor determines if the text on the first side of the object is located further from the object than the text on the second side of the object. If so, the word processor adjusts the white space on the first side of the object so that the text on the first side of the object is located closer to the object. | 07-21-2011 |
Patent application number | Description | Published |
20150287593 | HYDROGEN-FREE SILICON-BASED DEPOSITED DIELECTRIC FILMS FOR NANO DEVICE FABRICATION - Embodiments of the present invention provide hydrogen-free dielectric films and methods of fabrication. A hydrogen-free precursor, such as tetraisocyanatosilane, and hydrogen-free reactants, such as nitrogen, oxygen (O2/O3) and nitrous oxide are used with chemical vapor deposition processes (PECVD, thermal CVD, SACVD, HDP CVD, and PE and Thermal ALD) to create hydrogen-free dielectric films. In some embodiments, there are multilayer dielectric films with sublayers of various materials such as silicon oxide, silicon nitride, and silicon oxynitride. In embodiments, the hydrogen-free reactants may include Tetra Isocyanato Silane, along with a hydrogen-free gas including, but not limited to, N2, O2, O3, N2O, CO2, CO and a combination thereof of these H-Free gases. Plasma may be used to enhance the reaction between the TICS and the other H-free gasses. The plasma may be controlled during film deposition to achieve variable density within each sublayer of the films. | 10-08-2015 |
Patent application number | Description | Published |
20110119150 | OUTSOURCED GENERATION OF BEHAVIOR-BASED CONTENT - A service is disclosed for enabling web sites and other entities to provide item recommendations and other behavior-based content to end users. The service can be implemented as a web service that is remotely accessible over the Internet. Web sites use the web service's interface to report events descriptive of item-related actions performed by end users (e.g., item views, item purchases, searches for items, etc.). The web service analyzes the reported event data on an aggregated basis to detect various types of associations between particular items, and stores resulting datasets that map items to associated items. The web service's interface also provides various API calls for enabling the web sites to request item recommendations and other behavior-based content, including but not limited to personalized recommendations that are based on the event history of the target user. | 05-19-2011 |
20130013749 | SERVICES FOR PROVIDING ITEM ASSOCIATION DATA - A service is disclosed for enabling web sites and other entities to provide item recommendations and other behavior-based content to end users. The service can be implemented as a web service that is remotely accessible over the Internet. Web sites use the web service's interface to report events descriptive of item-related actions performed by end users (e.g., item views, item purchases, searches for items, etc.). The web service analyzes the reported event data on an aggregated basis to detect various types of associations between particular items, and stores resulting datasets that map items to associated items. The web service's interface also provides various API calls for enabling the web sites to request item recommendations and other behavior-based content, including but not limited to personalized recommendations that are based on the event history of the target user. Advantageously, the web sites need not host the infrastructure for providing such content. | 01-10-2013 |
Patent application number | Description | Published |
20080243631 | SERVICES FOR PROVIDING ITEM ASSOCIATION DATA - A service is disclosed for enabling web sites and other entities to provide item recommendations and other behavior-based content to end users. The service can be implemented as a web service that is remotely accessible over the Internet. Web sites use the web service's interface to report events descriptive of item-related actions performed by end users (e.g., item views, item purchases, searches for items, etc.). The web service analyzes the reported event data on an aggregated basis to detect various types of associations between particular items, and stores resulting datasets that map items to associated items. The web service's interface also provides various API calls for enabling the web sites to request item recommendations and other behavior-based content, including but not limited to personalized recommendations that are based on the event history of the target user. Advantageously, the web sites need not host the infrastructure for providing such content. | 10-02-2008 |
20080243632 | SERVICE FOR PROVIDING ITEM RECOMMENDATIONS - A service is disclosed for enabling web sites and other entities to provide item recommendations and other behavior-based content to end users. The service can be implemented as a web service that is remotely accessible over the Internet. Web sites use the web service's interface to report events descriptive of item-related actions performed by end users (e.g., item views, item purchases, searches for items, etc.). The web service analyzes the reported event data on an aggregated basis to detect various types of associations between particular items, and stores resulting datasets that map items to associated items. The web service's interface also provides various API calls for enabling the web sites to request item recommendations and other behavior-based content, including but not limited to personalized recommendations that are based on the event history of the target user. Advantageously, the web sites need not host the infrastructure for providing such content. | 10-02-2008 |
20100049663 | SERVICE FOR PROVIDING ITEM RECOMMENDATIONS - A service is disclosed for enabling web sites and other entities to provide item recommendations and other behavior-based content to end users. The service can be implemented as a web service that is remotely accessible over the Internet. Web sites use the web service's interface to report events descriptive of item-related actions performed by end users (e.g., item views, item purchases, searches for items, etc.). The web service analyzes the reported event data on an aggregated basis to detect various types of associations between particular items, and stores resulting datasets that map items to associated items. The web service's interface also provides various API calls for enabling the web sites to request item recommendations and other behavior-based content, including but not limited to personalized recommendations that are based on the event history of the target user. | 02-25-2010 |
20110167456 | Offering Items Identified in a Media Stream - Disclosed herein are techniques to enable users to purchase or receive information regarding items identified in a stream output by a content output device, regardless of whether the users are previously associated with the content output device or a device that monitors the stream. With these techniques, for instance, a user watching a video stream displayed on a television may see an advertisement for an item offered for purchase. In response, the user may choose to initiate a purchase of the item from an item offering service, to add the item to a shopping cart of the user at the item offering service, or to receive information regarding the item from the item offering service. | 07-07-2011 |
20110258085 | SERVICES FOR PROVIDING ITEM ASSOCIATION DATA - A service is disclosed for enabling web sites and other entities to provide item recommendations and other behavior-based content to end users. The service can be implemented as a web service that is remotely accessible over the Internet. Web sites use the web service's interface to report events descriptive of item-related actions performed by end users (e.g., item views, item purchases, searches for items, etc.). The web service analyzes the reported event data on an aggregated basis to detect various types of associations between particular items, and stores resulting datasets that map items to associated items. The web service's interface also provides various API calls for enabling the web sites to request item recommendations and other behavior-based content, including but not limited to personalized recommendations that are based on the event history of the target user. Advantageously, the web sites need not host the infrastructure for providing such content. | 10-20-2011 |
20140109118 | OFFERING ITEMS IDENTIFIED IN A MEDIA STREAM - Disclosed are techniques to enable users to perform transactions such as purchasing items or receiving information regarding items depicted within a content stream, where the content stream may be received from a content provider and provided to an output device. Transactions may be performed by a user that may or may not be associated with a content provider or associated with an item offering service. In one example, a content stream may be analyzed to detect a depiction of an item, and a user may operate a user interface overlaid onto the displayed content stream to perform transactions such as initiating a purchase or requesting more information on the detected items. | 04-17-2014 |
Patent application number | Description | Published |
20100248479 | CMP METHOD - The instant invention is a method of polishing a substrate including contacting a substrate having at least one metal layer including copper with a chemical-mechanical polishing composition. The CMP composition includes an abrasive, a surfactant, an oxidizer, an organic acid including polyacrylic acid or polymethacrylic acid, a corrosion inhibitor, and a liquid carrier. A portion of the copper in the metal layer is abraded to polish the substrate. A second CMP composition contacts the abraded substrate, the second acrylate free composition including an abrasive, a surfactant, an oxidizer, and a corrosion inhibitor, and a liquid carrier. Any dendrites that may have formed on the substrate are removed through abrasion. | 09-30-2010 |
20100327219 | SOLUTION FOR FORMING POLISHING SLURRY, POLISHING SLURRY AND RELATED METHODS - A solution for forming a polishing slurry, the polishing slurry and related methods are disclosed. The solution for forming a polishing slurry may include 1H-benzotriazole (BTA) dissolved in an ionic surfactant such as a sodium alkyl sulfate solution, and perhaps a polyacrylic acid (PAA) solution. The solution can be filtered and used in a polishing slurry. This approach to solubilizing BTA results in a high BTA concentration in a polishing slurry without addition of foreign components to the slurry or increased safety hazard. In addition, the solution is easier to ship because it is very stable (e.g., can be frozen and thawed) and has less volume compared to conventional approaches. Further, the polishing slurry performance is vastly improved due to the removal of particles that can cause scratching. | 12-30-2010 |
20110037489 | SILICON CHICKLET PEDESTAL - A silicon chicklet pedestal for use in a wafer-level test probe of a wafer is provided and includes a main body, first and second opposing faces, and an array of vias formed through the main body to extend between the first and second faces, through which pairs of leads, respectively associated with each via at the first and second faces, are electrically connectable to one another. | 02-17-2011 |
20110199108 | SILICON CHICKLET PEDESTAL - A silicon chicklet pedestal for use in a wafer-level test probe of a wafer is provided and includes a main body, first and second opposing faces, and an array of vias formed through the main body to extend between the first and second faces, through which pairs of leads, respectively associated with each via at the first and second faces, are electrically connectable to one another. | 08-18-2011 |
20110199109 | SILICON CHICKLET PEDESTAL - A silicon chicklet pedestal for use in a wafer-level test probe of a wafer is provided and includes a main body, first and second opposing faces, and an array of vias formed through the main body to extend between the first and second faces, through which pairs of leads, respectively associated with each via at the first and second faces, are electrically connectable to one another. | 08-18-2011 |
20130078811 | SLURRY FOR CHEMICAL-MECHANICAL POLISHING OF METALS AND USE THEREOF - A composition and a method for chemical mechanical polishing. The composition includes a surfactant anion an alkyl alcohol and a diluent. The composition further includes abrasive particles and an oxidizer. The method includes providing the composition on a surface to be polished and polishing the surface by contacting the surface with a polishing pad. | 03-28-2013 |
20150267084 | SLURRY FOR CHEMICAL-MECHANICAL POLISHING OF METALS AND USE THEREOF - A composition and a method for chemical mechanical polishing. The composition includes a surfactant anion an alkyl alcohol and a diluent. The composition further includes abrasive particles and an oxidizer. The method includes providing the composition on a surface to be polished and polishing the surface by contacting the surface with a polishing pad. | 09-24-2015 |
Patent application number | Description | Published |
20090100811 | Inertial Gas-Liquid Separator with Constrictable and Expansible Nozzle Valve Sidewall - An inertial gas-liquid separator has one or more nozzle valves having a sidewall and a downstream exit axial end radially constrictable and expansible to vary axial flow of a gas-liquid stream therethrough to an inertial impactor collector. | 04-23-2009 |
20090193770 | Gas-Liquid Separator with Expansion Transition Flow - A gas-liquid separator assembly has a flow passage providing expansion of and reduced flow velocity of the post-separation gas stream, and in some embodiments provides pre-escape regions facilitating partial pre-transition of some of the flow. | 08-06-2009 |
20100024366 | Gas-Liquid Separator with Dual Flow Impaction and Coalescence - A gas-liquid separator assembly has dual flow first and second split partial paths. The first path is an impaction separation path effecting liquid particle separation from a gas-liquid stream by inertial impaction. The second path is a coalescence-separation path effecting liquid particle separation from the gas-liquid stream by coalescence. | 02-04-2010 |
20120159915 | Filter Element with Percussion Band - A filter element has a reinforcement band or ring along at least a portion of the perimeter thereof and performing a support function thereat preventing or minimizing damage upon attempted percussive cleaning of the filter element by service personnel striking the perimeter against an impact surface. Alternatively, a failure band or ring is provided along at least a portion of the perimeter and performs a designated failure function to a failure condition thereat upon attempted percussive cleaning, with the failure condition providing at least one of: a) an indication to service personnel that the filter element has been damaged and should not be re-installed; and b) a deformed condition preventing re-installation. | 06-28-2012 |
20120305471 | Filter Element with Percussion Band - A filter element has a reinforcement band or ring along at least a portion of the perimeter thereof and performing a support function thereat preventing or minimizing damage upon attempted percussive cleaning of the filter element by service personnel striking the perimeter against an impact surface. Alternatively, a failure band or ring is provided along at least a portion of the perimeter and performs a designated failure function to a failure condition thereat upon attempted percussive cleaning, with the failure condition providing at least one of: a) an indication to service personnel that the filter element has been damaged and should not be re-installed; and b) a deformed condition preventing re-installation. | 12-06-2012 |
20130126417 | Filter Element with Percussion Band - A filter element has a reinforcement band or ring along at least a portion of the perimeter thereof and performing a support function thereat preventing or minimizing damage upon attempted percussive cleaning of the filter element by service personnel striking the perimeter against an impact surface. Alternatively, a failure band or ring is provided along at least a portion of the perimeter and performs a designated failure function to a failure condition thereat upon attempted percussive cleaning, with the failure condition providing at least one of: a) an indication to service personnel that the filter element has been damaged and should not be re-installed; and b) a deformed condition preventing re-installation. | 05-23-2013 |
20130180223 | Filter Element with Percussion Band - A filter element has a reinforcement band or ring along at least a portion of the perimeter thereof and performing a support function thereat preventing or minimizing damage upon attempted percussive cleaning of the filter element by service personnel striking the perimeter against an impact surface. Alternatively, a failure band or ring is provided along at least a portion of the perimeter and performs a designated failure function to a failure condition thereat upon attempted percussive cleaning, with the failure condition providing at least one of: a) an indication to service personnel that the filter element has been damaged and should not be re-installed; and b) a deformed condition preventing re-installation. | 07-18-2013 |
20130219840 | Filter Element with Percussion Band - A filter element has a reinforcement band or ring along at least a portion of the perimeter thereof and performing a support function thereat preventing or minimizing damage upon attempted percussive cleaning of the filter element by service personnel striking the perimeter against an impact surface. Alternatively, a failure band or ring is provided along at least a portion of the perimeter and performs a designated failure function to a failure condition thereat upon attempted percussive cleaning, with the failure condition providing at least one of: a) an indication to service personnel that the filter element has been damaged and should not be re-installed; and b) a deformed condition preventing re-installation. | 08-29-2013 |