Abstract:
Described herein is technology for, among other things, a graphical user interface. The graphical user interface is made up of multiple user interface components. The multiple user interface components are hosted by a host user interface, which encapsulates and exposes the user interface components together to present a unified view of the user interface components as a single user interface. Moreover, the host user interface presents the capabilities of the user interface components as a whole.
Abstract:
Described herein is technology for, among other things, facilitating transmissions of facsimiles by a computer. It involves various techniques for facilitating the preparation of a facsimile including storing the facsimiles in an editable format and initializing a fax application.
Abstract:
A system and method for securing and tracking an electronic device. The system includes hardware, software and firmware components that cooperate to allow tracking, disabling, and other interaction with the stolen electronic device. The system includes an application component, non-viewable component and Basic Input/Output Subsystem (BIOS) component that are present on the electronic device. The BIOS component maintains the secured environment of the application and non-viewable components. If only the application component was provided, a simple low level format of the hard disk drive would remove the application and bypass the security features. The system implements an “application and BIOS” based solution to electronic device security.
Abstract:
Post chemical mechanical polishing (CMP) cleaning methods are disclosed which reduce integrated circuit defects. A corrosion inhibitor is preferably applied during the post-CMP cleaning steps after application of a first chemistry. Subsequent to the application of the corrosion inhibitor a rinsing step using deionized water is employed. In this manner, the corrosion inhibitor applied during the post-CMP clean fills voids created in previous passivation layers by previous chemistries. Also, existing post-CMP equipment may be used to implement the preferred embodiments of the present invention. Preferably the corrosion inhibitor applied during the post-CMP clean is benzotriazole (BTA).
Abstract:
A method, system, and computer-accessible medium are provided for safely modifying a host user interface with one or more extension user interfaces. The system comprises command item and insert location data structures, and host and extension programming interfaces. The programming interfaces facilitate negotiating modifications to a host user interface (UI) with extension commands specified by the extension in the command item data structure at locations specified by the host in the insert location data structure. The command item and insert locations are uniquely identified with unique universal identifiers (UUID) that enable the host to control the modification of the host UI by multiple extensions. The command item data structure contains the command's UI. The host modifies the host UI to insert the extension's commands in accordance with the command's UI.
Abstract:
Stabilized collagen-based matrices are prepared by non-enzymatic glycosylation of native collagen to irreversibly cross-link collagen polypeptide chains. The sugar cross-linking agents, preferably is D-ribose, provide non-immunogenic, non-toxic cross-linked collagen matrices especially useful in clinical and veterinary applications.
Abstract:
A code review tool system includes a developer on a developer node, a reviewer on a reviewer node, and a server on a server node. The developer node and the reviewer node include an integrated code review tool. The integrated code review tool includes functionality for a developer to specify source code files to be reviewed and a list of reviewer identifiers. The integrated code review tool also includes functionality to associate the reviewer's comments and/or proposed code changes with context information identifying a location in the source code files. The reviewer's comments, proposed code changes, and associated context information is sent to the developer. The developer may then see the reviewer's comments and proposed code changes in context with the location in the source code to which the comments and code changes pertain.
Abstract:
A system and method for securing and tracking an electronic device. The system includes hardware, software and firmware components that cooperate to allow tracking, disabling, and other interaction with the stolen electronic device. The system includes an application component, non-viewable component and Basic Input/Output Subsystem (BIOS) component that are present on the electronic device. The BIOS component maintains the secured environment of the application and non-viewable components. If only the application component was provided, a simple low level format of the hard disk drive would remove the application and bypass the security features. The system implements an “application and BIOS” based solution to electronic device security.
Abstract:
A dual inlaid interconnect fabrication method using a temporary filler in a via during trench etch and removal of the filler after trench etch. This provides via bottom protection during trench etch.
Abstract:
A method is provided for authenticating the current user of a device to a service provider. The method comprises (a) capturing an initial set of credentials from the owner of the device; (b) storing the initial set of credentials in a memory provided in the device; (c) storing the owner's secrets corresponding to a plurality of service providers in the memory provided in the device; (d) receiving an authentication request from one of said plurality of service providers; (e) in response to the authentication request, capturing a set of credentials from the current user of the device; and (f) revealing the owner's secrets which correspond to the service provider requesting the authentication if and only if the current user's credentials match the owner's credentials.