摘要:
One aspect of the present invention is a method of monitoring processes, optimizing processes, and diagnosing problems in the performance of a process tool for processing a workpiece. Another aspect of the present invention is a system configured for monitoring processes, optimizing processes, and diagnosing problems in the performance of a process tool for processing a workpiece. One embodiment of the present invention includes a software program that can be implemented in a computer for optimizing the performance of a process tool for processing a workpiece.
摘要:
Methods and systems for detecting undesirable computer files based on scanning and analysis of information contained within an associated digital certificate chain are provided. According to one embodiment, a determination is made regarding whether there exists a certificate chain associated with a computer file. If the certificate chain is determined to exist, then the certificate chain is evaluated by extracting information from the certificate chain and analyzing the extracted information. The computer file is then classified into one of multiple categories based on the evaluation. Finally, the computer file is handled in accordance with a policy associated with the category to which it was assigned. For example, a confirmed or suspected undesired file may be quarantined and/or an end user or an administrator may be notified regarding the confirmed or suspected undesired file.
摘要:
Disclosed is a system. The system includes a mold-moving assembly that is cooperative with an insert-forming station to form an insert at least in part. The mold-moving assembly is also cooperative with an overmolding station to overmold another insert previously formed by the insert-forming station in cooperation with the mold-moving assembly. The mold-moving assembly, when so actuated, moves inserts between the insert-forming station and the overmolding station. Operation of the insert-forming station and operation of the overmolding station overlap one another at least in part.
摘要:
Processes for the removal of a layer or region from a workpiece material by contact with a process gas in the manufacture of a microstructure are enhanced by the ability to accurately determine the endpoint of the removal step. A vapor phase etchant is used to remove a material that has been deposited on a substrate, with or without other deposited structure thereon. By creating an impedance at the exit of an etching chamber (or downstream thereof), as the vapor phase etchant passes from the etching chamber, a gaseous product of the etching reaction is monitored; and the endpoint of the removal process can be determined. The vapor phase etching process can be flow through, a combination of flow through and pulse, or recirculated back to the etching chamber
摘要:
Described is a configuration module useful for configuring modules of a modular application platform during run-time of the modular application platform. The configuration module produces a graphical dialog that displays a sequence of one or more configuration pages to a user to obtain from the user configuration information for each displayed configuration page. The configuration module defines an abstraction of a configuration page, and other modules of the modular application platform provide implementations of the configuration page abstraction to include at least one configuration page in the graphical dialog produced by the configuration module.
摘要:
Certain compounds and pharmaceutically acceptable salts are provided herein. Also provided are pharmaceutical compositions comprising at least one compound or pharmaceutically acceptable salt therein and one or more pharmaceutically acceptable vehicle. Methods of treating patients suffering from certain disease states responsive to the inhibition of transglutaminase TG2 activity are described. These disease states include neurodegenerative disorders such as Huntington's disease. Also described are methods of treatment include administering at least one compound or pharmaceutically acceptable salt thereof as a single active agent or administering at least one compound or pharmaceutically acceptable salt thereof in combination with one or more other therapeutic agents.
摘要:
A sensor apparatus for measuring a plasma process parameter for processing a workpiece. The sensor apparatus includes a base, an information processor supported on or in the base, and at least one sensor supported on or in the base. The at least one sensor includes at least one sensing element configured for measuring an electrical property of a plasma and may include a transducer coupled to the at least one sensing element. The transducer can be configured to receive a signal from the sensing element and convert the signal into a second signal for input to the information processor.
摘要:
Interactive systems can include various components that are packaged together and easily assemblable. An interactive system can comprise a mount, a display device, a projector, an input device, and a processing device. The display device, the projector, the input device, and the processing device can together provide an electronic display system, while the mount can carry these other various components and assist in connecting them to one another. The mount and the other components of the interactive system can be conveniently packaged and sold as group for convenient installation by one or two persons.
摘要:
Systems and methods for content filtering are provided. According to one embodiment, a self-extracting archive is received with an electronic mail (email) message. Prior to delivery of the email message, a determination is made regarding whether a file contained in the archive may be malicious or undesired. A type of archive and associated structure of the archive are determined by examining identification bytes stored within a header portion of the archive that identify the type of archive. Based on the type and associated structure, for each contained file, descriptive information, including a checksum of the file in uncompressed form, a size of the file in uncompressed form and/or a size of the file in the compressed form, is extracted from the header portion. A file is identified as potentially malicious or undesired when the descriptive information matches a detection signature of a known malicious or undesired file.