Month of January 2006 - Page Number 6

Showing 51 - 60 of 395 from January 2006
Browse Prior Art Database
  1. 51.
    Disclosed is a method that uses a functionally graded, symmetric core material with through-the-thickness modulus and CTE variations. Benefits include redistributing stresses to achieve lower peak plastic strains.
    IPCOM000133501D | 2006-Jan-27
  2. 52.
    Disclosed is a method for board-flex reduction using a system-level stiffener for improved solder-joint reliability (SJR). Benefits include improved reliability.
    IPCOM000133500D | 2006-Jan-27
  3. 53.
    Disclosed is a method for integrated heat spreader (IHS) anchoring. Benefits include improved functionality, improved thermal performance, improved reliability, improved yield, improved ease of manufacturing, and improved cost effectiveness.
    IPCOM000133499D | 2006-Jan-27
  4. 54.
    Disclosed is a method for ultraviolet (UV) radiation-activated titanium dioxide (TiO2) wetting layers to enhance the capillary underfill process for electronic packages. Benefits include improved functionality, improved performance, improved reliability, and improved throughput.
    IPCOM000133498D | 2006-Jan-26
  5. 55.
    Disclosed is a method that uses piezo-resistive sensors to directly measure the stress-strain on packages, using electrical connectivity monitoring. Benefits include reducing noise and improving data analysis and interpretations.
    IPCOM000133497D | 2006-Jan-26
  6. 56.
    Disclosed is a method for a new architecture for multi-dimensional packaging. Benefits include better signal integrity, reduced via discontinuity, and reduced manufacturing and design costs.
    IPCOM000133496D | 2006-Jan-26
  7. 57.
    Disclosed is a method for making imprinted substrates that are bonded to a host rigid core material by a semi-permanent thin film adhesive. Benefits include enabling finer feature formations and ease of removal of the sacrificial core from the functional substrate build-up layers.
    IPCOM000133495D | 2006-Jan-26
  8. 58.
    Buffer overflows are predicted first by identifying buffer-overflow prone APIs, next by estimating the maximum input buffer size of the identified APIs, and then by validating the estimated maximum input buffer size against the size of the input buffer that is declared by the input parameters that are passed to the...
    IPCOM000133490D | Original Publication Date: 2006-Jan-26
  9. 59.
    A programmable keyboard, video, mouse (KVM) switch with a cut-and-paste buffer can enforce a multi-level security policy. The KVM switch ports are configured with labels that properly indicate the security level that is assigned to each computer, and each of the ports is connected to a computer that matches the...
    IPCOM000133489D | Original Publication Date: 2006-Jan-26
  10. 60.
    During normal working activity, a lot of people need to share with others desktop contents (for instance a power point presentation, movies and so on) without having an external projector available. This need is particular felt during business travels where due to de weight and size of external projection devices,...
    IPCOM000133468D | Original Publication Date: 2006-Jan-26