摘要:
Methods of forming transistors and transistors are disclosed, such as a transistor having a gate dielectric over a semiconductor having a first conductivity type, a control gate over the gate dielectric, source and drain regions having a second conductivity type in the semiconductor having the first conductivity type, and strips having the second conductivity type within the semiconductor having the first conductivity type and interposed between the control gate and at least one of the source and drain regions.
摘要:
A set of virtual local area networks (VLANs) are defined from a set of nodes that comprise a data center network. A set of possible paths are determined for routing data packets from a root node to one or more other nodes of the set of nodes. A set of probabilistic values are identified for determining a path in the set of possible paths that individual data packets are to take as between the root node and a destination node specified by the individual data packet. The data packets are routed to the destination node specified by that data packet, along a path that is determined by use of the set of probabilistic values. The path may be provided by one or more VLANs.
摘要:
An integrated circuit including a degradation monitoring circuit. The degradation monitoring circuit includes a comparison circuit having a programmable delay element including an input coupled to a data node of a timing path and having an output to provide a delayed signal of a data signal of the data node that is delayed by a programmable amount. The comparison circuit includes a logic comparator that provides a logic comparison between a data signal of the data node and the output of the delay element. The monitoring circuit includes a sampling circuit that provides a sampled signal of the output of the logic comparator that is a sampled with respect to a clock signal of the clock signal line. The monitoring circuit includes a hold circuit that provides a signal indicative of a data signal of the data node transitioning within a predetermined time of an edge transition of a clock signal of the clock signal line.
摘要:
A disclosed method for evaluating placement context sensitivity in the design of an integrated circuit includes accessing a standard cell library comprising a database of standard cells and determining generating boundary data for each of the standard cells. The boundary data for a standard cell indicates the layout of features located within boundary regions of the standard cell. The method includes merging or consolidating boundary data for any two standard cells if their boundary data is the same to determine a canonical or minimal set of boundary regions. The disclosed method further includes enumerating and evaluating all combinations of pairs of the canonical boundary regions and, responsive to identifying of a proximity-based sensitivity or exception, modifying, notating, or otherwise remediating the applicable one or more standard cells that correspond to the boundary region combination that raised the exception.
摘要:
An integrated circuit having differently-sized features wherein the smaller features have a pitch multiplied relationship with the larger features, which are of such size as to be formed by conventional lithography.
摘要:
The present teachings provide for a method and system for facilitating content download to one or more remote devices via an insecure communication channel. The method comprises the steps of receiving at least one shared secret from a device via an insecure communications channel, each shared secret encoded and functioning as an identifier for the device, transmitting an encrypted file, from a file server, to the device associated with the encoded shared secret, receiving the shared secret in a plaintext forma via a secure communications channel, receiving a confirmation authorizing the release of a decryption key, and sending a decryption key corresponding to the transmitted file, for which the authorization for the release of the decryption key has been received. The decryption key is encrypted using the shared secret if transmission is via the insecure channel.
摘要:
A heterogeneous network switch system includes heterogeneous network switches having a first network switch having a first functionality and a second network switch having a second functionality, where the first functionality differs from the second functionality. In addition, the first network switch and the second network switch are configured to forward data to at least one common server. The system also includes a controller configured to receive data from at least one client and to select one of the first network switch and the second network switch to employ in forwarding the data from the at least one client to the at least one common network equipment.
摘要:
A method includes sending signals from two nodes to a landmark, identifying common milestones along the routes, and determining distance information from the nodes to at least one of the common milestones. A system includes a program configured to send signals from two nodes to a landmark, identify common milestones along the routes, and provide distance information from each node to at least one of the common milestones, and a program configured to receive the distance information and provide a latency estimate based on the distance information.
摘要:
A switch (100) connected to a network is configured to have one or more components that can be placed in a deep sleep mode. The switch (100) includes a management circuit (150) that is configured to wake up the components in deep sleep mode. The management circuit (150) includes a port (151) that receives packets and a wake-up circuit (152) that determines whether a packet received via the port (151) is a magic packet including a unique ID for the port (151) or the switch (100). If the packet is the magic packet including the unique ID for the port (151) or the switch (100), the wake-up circuit (151) is configured to send a wake-up signal to components in the switch (100) to wake up from the deep sleep mode.
摘要:
Systems of the invention employ peer-to-peer and centralized server networking to enable POTS/PSTN/PBX phone lines to be shared with other users of the system over the Internet. An example application of the invention is to allow a person, having access to an Internet connection, to receive calls and make calls using his/her home or office telephone, or using the phones of other parties that he/she is authorized to access. In preferred embodiments, the invention can exploit availability of an existing voice modem port on the user's home or office computer, and can require only the installation of software on the home or office computer, and on whatever device (laptop, PDA, computer, mobile phones, etc.) is employed by the user in the remote location. Variant realizations of the invention may also provide any combination of features typically available to phone users, including, for example, the following features: authentication, verification, directory services, directory search, access rights, call forwarding, call answering, voice, mail, missed-call information, call screening, and caller identification.