Month of September 2004 - Page Number 18

Showing 171 - 180 of 364 from September 2004
Browse Prior Art Database
  1. 171.
    Method to allow a common image for a multitude of common desktop blades thereby savings significant storage space (only one copy vs. multiplies) and significantly reducing patch management as only one copy of the image needs to be updated. Each users unique delta's are merged with the common image on logon,...
    IPCOM000031321D | Original Publication Date: 2004-Sep-21
  2. 172.
    To indicate that a merchant has scanned an item purchased a border,patch near or around the barcode provides a visual indicator that the barcode has been read. This background color could be red, yellow or some other bright color that is easy to spot. As the item is scanned a means is provided to turn off the...
    IPCOM000031320D | Original Publication Date: 2004-Sep-21
  3. 173.
    Current memory tests typically rely on write-read-compare operation to verify the data integrity of both the memory and the cache subsystems. When testing strictly memory, there are various addressing algorithms which bypass the cache, but the basic mechanism of analyzing forced memory fetches at particular...
    IPCOM000031319D | Original Publication Date: 2004-Sep-21
  4. 174.
    PCI card to rear bulkhead EMI contact assurance with concave contact area on bulkhead
    IPCOM000031318D | Original Publication Date: 2004-Sep-21
  5. 175.
    A motherboard is slotted through around the Central Processor Unit (CPU) and the board thus acts like a spring member.
    IPCOM000031317D | Original Publication Date: 2004-Sep-21
  6. 176.
    Currently, the user's desktop space is usually restricted by the capabilities of the user's video card and/or display device. Some displays (such as many LCD displays) support setting a higher resolution than the display supports, thereby allowing the user the use of a larger desktop. However, since the display...
    IPCOM000031316D | Original Publication Date: 2004-Sep-21
  7. 177.
    Pervasive devices will define a new experience for retail shopping. However, the thin clients typically used for these pervasive devices are not typically well adapted for the demands of driving POS I/O devices. In addition, the more functionality encapsulated into a client (I/O drivers, enabling middleware, etc),...
    IPCOM000031315D | Original Publication Date: 2004-Sep-21
  8. 178.
    Improved method for device retention
    IPCOM000031314D | Original Publication Date: 2004-Sep-21
  9. 179.
    One of the most popular means of debugging a program is the trace. Presented herein is the TraceSkin,which keeps the view of the latest trace instances, so that each particular trace in the code is monitored and its last values, along with the associated timestamp, and the total count of the times that trace was...
    IPCOM000031312D | Original Publication Date: 2004-Sep-21
  10. 180.
    Coverage analysis, in general, is used for finding areas of a program that were not exercised by a set of test cases. This leads to creating additional test cases to increase coverage. Coverage analysis can help in monitoring the quality of testing, assist in creating tests for areas that have not been tested before,...
    IPCOM000031311D | Original Publication Date: 2004-Sep-21