摘要:
In one embodiment, a transistor fabricated on a semiconductor die is arranged into sections of elongated transistor segments. The sections are arranged in rows and columns substantially across the semiconductor die. Adjacent sections in a row or a column are oriented such that the length of the transistor segments in a first one of the adjacent sections extends in a first direction, and the length of the transistor segments in a second one of the adjacent sections extends in a second direction, the first direction being substantially orthogonal to the second direction. It is emphasized that this abstract is provided to comply with the rules requiring an abstract that will allow a searcher or other reader to quickly ascertain the subject matter of the technical disclosure.
摘要:
A mechanism that provides congruent forwarding paths for unicast and multicast data traffic over a service provider core network includes issuing, by a receiver edge node, a request to join a multicast tree structure. A unicast path from the receiver edge node to a source node of the provider network is then established using a special message that contains an identifier. The identifier allows the unicast path through the core network to be aligned with the multicast tree structure. It is emphasized that this abstract is provided to comply with the rules requiring an abstract that will allow a searcher or other reader to quickly ascertain the subject matter of the technical disclosure. It is submitted with the understanding that it will not be used to interpret or limit the scope or meaning of the claims.
摘要:
An intrusion detection system and method for a computer network includes a processor and one or more programs that run on the processor for application inspection of data packets traversing the computer network. The one or more programs also obtaining attribute information from the packets specific to a particular application and comparing the attribute information against a knowledge database that provides a baseline of normal network behavior. The processor raises an alarm whenever the attribute information exceeds a predetermined range of deviation from the baseline of normal network behavior.
摘要:
Redundancy for Virtual Private Network (VPN) service with an Ethernet access network is provided by a full-mesh of dedicated pseudowires connected among the network-facing provider edge (n-PE) devices, each of which is associated with the same Ethernet access network. A provider Bridge Protocol Data Unit (BPDU) generated by a provider bridge node in the Ethernet access network and received at an input interface of one n-PE device is relayed (without being processed) to all other n-PEs associated with that access network over the full-mesh of dedicated pseudowires. It is emphasized that this abstract is provided to comply with the rules requiring an abstract that will allow a searcher or other reader to quickly ascertain the subject matter of the technical disclosure. It is submitted with the understanding that it will not be used to interpret or limit the scope or meaning of the claims.
摘要:
Apparatus for automatically alerting a user of a handheld communications device of an incoming transmission includes a plurality of sensors each of which produces a signal indicative of a physical parameter of a surrounding environment of the handheld communications device. Also included is a processor that executes a programmed set of instructions to determine an optimal alert mode setting based on a combination of the sensor signals. A plurality of output units produces one or more sensory alert outputs In response to the optimal alert mode setting. It is emphasized that this abstract is provided to comply with the rules requiring an abstract that will allow a searcher or other reader to quickly ascertain the subject matter of the technical disclosure. It is submitted with the understanding that it will not be used to interpret or limit the scope or meaning of the claims. 37 CFR 1.72(b).
摘要:
A node for routing of calls in a network has an interface coupled to the network and at least one processor operable to route a packet-based call to a telephony destination in accordance with a protocol that includes a set of attributes that describe packet-network routing characteristics of one or more Internet Protocol (IP)-IP gateway devices in the network. The attributes are used by the at least one processor to specify a call route through an IP-IP gateway device for the packet-based call. The set of attributes include a first attribute that identifies a total administratively provisioned bandwidth capacity available on a given call route to accommodate application traffic, and a second attribute that identifies a current bandwidth that is available on the given call route to accommodate the application traffic at a given point in time. It is emphasized that this abstract is provided to comply with the rules requiring an abstract that will allow a searcher or other reader to quickly ascertain the subject matter of the technical disclosure. It is submitted with the understanding that it will not be used to interpret or limit the scope or meaning of the claims. 37 CFR 1.72 (b).
摘要:
A Schottky diode includes an upper region having a first doping concentration of a first conductivity type, the upper region disposed above the SiC substrate and extending up to a top planar surface. First and second layers of a second conductivity type are disposed in the upper region adjoining the top planar surface and extending downward to a depth. Each of the first and second layers has a second doping concentration, the depth, first doping concentration, and second doping concentration being selected such that the first and second layers are depleted of carriers at a zero bias condition of the Schottky diode. A top metal layer disposed along the top planar surface in direct contact with the upper region and the first and second layers is the anode, and bottom metal layer disposed beneath the SiC substrate is the cathode, of the Schottky diode.
摘要:
A silicon carbide MOSFET includes a plurality of first and second trenches each of which extends a predetermined vertical distance from the top of a source down through a body region and into a current spreading layer (CSL). An insulated gate member is disposed in each first trench. The first trenches are each arranged in a wave-shaped pattern that extends in first and second lateral directions. Each of the second trenches is disposed between a pair of adjacent first trenches in the first lateral direction. A shielding region extends vertically from the bottom of each of the second trenches down into a drift region. A top metal layer fill each of the second trenches and electrically contacts the source region, the body region, the CSL, and the shielding region. A bottom metal layer electrically contacts the drain region.
摘要:
A silicon carbide MOSFET includes first and second source regions respectively disposed in the first and second well regions. Each of the first and second source regions extends up to a top surface of the substrate. First and second channel regions of the respective first and second well regions laterally separate the first and second source regions from a JFET region by a channel length. The first and second channel regions extend up to the top surface. The first and second channel regions are each arranged in a wave-shaped pattern at the top surface of the substrate. The wave-shaped pattern extends in first and second lateral directions. In an on-state, current flows laterally from the first and second source regions to the JFET region, and then in a vertical direction down through an extended drain region to the drain region.
摘要:
A computer-implemented method includes providing a graphical user interface (GUI) that allows a user working in a notebook computing system environment to generate a source notebook that includes a plurality of cells, each containing code, for the one or more visualizations each including a chart. The GUI allows the user to run the cells before creating the marketing analytic dashboard. The code used to generate the one or more visualizations into a custom dataframe is strung together into a custom dataframe, which is then paired with chart properties. Processing the pairs in an engine creates a preview of each visualization of the dashboard using campaign data of the customer. The marketing analytic dashboard is made available to the customer through a customer-facing marketing analytics application which performs the same processing as the engine to create visualizations on the dashboard using updated campaign data of the customer.