Kaza, US
Aditya K. Kaza, Salt Lake City, UT US
Patent application number | Description | Published |
---|---|---|
20150119708 | DEVICES AND SYSTEMS FOR FLUORESCENCE IMAGING OF TISSUE - A system and method for fluorescence imaging of tissue in vivo and in situ, e.g., for minimally invasive diagnosis of patients. A fluorescent imaging system is provided that has a dye carrier coupled to the distal end of a probe containing a fiber optics bundle, which allows for the introduction of at least one fluorescent dye therein the dye carrier into a portion of the tissue of interest of a subject or patient when the dye carrier is selectively brought into contact with the portion of the tissue of interest. The resulting fluorescence images permit the acquisition of diagnostic information on the progression of diseases at cellular/tissue level in patients. | 04-30-2015 |
Akhil Kaza, Sammamish, WA US
Patent application number | Description | Published |
---|---|---|
20120106930 | SHARED SURFACE HARDWARE-SENSITIVE COMPOSITED VIDEO - In a low-power device a runtime hands video capture and other markup language video objects to a video service, which renders them onto a shared surface. An application-specific compositor manipulates the shared surface, e.g., by texture wrapping or animation. A system compositor composites the manipulated shared surface with other data, such as rendered frames from other application-specific compositors and/or computer generated text. The device then displays the attendant rendered, manipulated, and composited video frames. In some cases, only a single copy of the shared surface is utilized. When the video object's shape, alignment, and opacity satisfy predetermined criteria, the video service renders the video object onto the shared surface using a hardware scaler; otherwise, rendering is done without using the hardware scaler. | 05-03-2012 |
Akhilesh Kaza, Sammamish, WA US
Patent application number | Description | Published |
---|---|---|
20090300597 | APPLICATION LOADING - Extensions or additional software programs that are requested by a computer application running on an application platform are handled in an efficient manner by, among other things, regulating and tracking extensions that are downloaded. This allows the size of the application platform upon which the application is running to remain relatively small so as to mitigate strain on resources when the platform is initially deployed over a network (e.g., the Internet), thus making it easier and more likely for a user to install the application platform (and/or updates thereto). Requested extensions are subsequently added to and/or removed from the (already deployed) application platform based on, among other things, download metrics. | 12-03-2009 |
20090328066 | UNTRUSTED COMPONENT HOSTING - In a computing environment, one may wish to have interoperability between trusted and untrusted controls/plug-ins allowing for richer expression of content and control within a platform. This can be accomplished by allowing an untrusted plug-in to communicate with a trusted plug-in, while having the trusted plug-in exercise control over the platform. This allows for the creation of a layered secure approach of communication with a platform, thus allowing for increased application richness in untrusted third party applications. | 12-31-2009 |
20100146379 | ISOLATING APPLICATIONS HOSTED BY PLUG-IN CODE - Described is a technology in which one application running in a browser can host another application (e.g., an advertisement) in an isolated manner that prevents the hosted application from accessing browser data, or data of any other hosted application (including the host). The host and/or hosted application may be a browser plug-in (e.g., Microsoft® Silverlight™) application. The host application privately instantiates a hidden plug-in, with that hidden plug-in's access to browser data disabled, and loads the hosted application in the hidden plug-in. A XAML tag element may be used to identify the hosted application, along with a rendering area for the hosted application. Content from the hosted application is composited with content from the host application when rendering. The host application may provide keywords to the hosted application, such as for selecting relevant advertisements, and/or may allow the hosted application to open a browser window to display associated website content. | 06-10-2010 |
20130132676 | ASYNCHRONOUS DATA BINDING - The present invention extends to methods, systems, and computer program products for asynchronously binding data from a data source to a data target. A user interface thread and a separate thread are used to enable the user interface thread to continue execution rather than blocking to obtain updated data, to which elements of a user interface that the user interface thread is managing, are bound. The separate thread obtains updated data from a data source, stores the updated data in a local cache, and notifies the user interface thread of the updated data's presence in the local cache. The user interface thread, upon detecting the notification, accesses the updated data in the local cache and populates the updated data into the user interface | 05-23-2013 |
20130139072 | EXECUTING A COMPOSITED APPLICATION - The present invention extends to methods, systems, and computer program products for enabling the development and execution of applications that employ a composited application model. A composited application includes components that are to be executed in different runtimes. Accordingly, an application developer can leverage different runtimes within a single application. A managing runtime is used to manage the various runtimes used by a composited application. The managing runtime performs input redirection to route user input to the appropriate runtime and output compositing to composite each runtime's user interface components into a single seamless scene. | 05-30-2013 |
20130145380 | CONTROL EXPOSURE - Control exposure techniques are described. In one or more implementations, a determination is made by a computing device as to which of a plurality of controls correspond to one or more inputs detected using one or more magnetometers, cameras, or microphones. A result of the determination is exposed by the computing device to one or more applications that are executed by the computing device. | 06-06-2013 |
20130290251 | ASYNCHRONOUS DATA BINDING - The present invention extends to methods, systems, and computer program products for asynchronously binding data from a data source to a data target. A user interface thread and a separate thread are used to enable the user interface thread to continue execution rather than blocking to obtain updated data, to which elements of a user interface that the user interface thread is managing, are bound. The separate thread obtains updated data from a data source, stores the updated data in a local cache, and notifies the user interface thread of the updated data's presence in the local cache. The user interface thread, upon detecting the notification, accesses the updated data in the local cache and populates the updated data into the user interface | 10-31-2013 |
20130343373 | VOICE-OVER-INTERNET PROTOCOL (VOIP) APPLICATION PLATFORM - A computer-implemented system is provided that facilitates implementation of a voice over IP (VOIP) application. The system includes a host system and a user interface (UI) host process residing on the host system. The system also includes an agent host process residing on the host system which is being configured to process a VOIP call received by one or more VOIP applications executable on the host system. The agent host process running as a foreground or background process for the duration of the VOIP call to (i) communicate with a VOIP server associated with the VOIP application, (ii) capture content from at least one input device associated with the host system and (iii) render content on an output device associated with the host system when an instance of the UI host process operates in the foreground. | 12-26-2013 |
20140002576 | Cross-Process Media Handling in a Voice-Over-Internet Protocol (VOIP) Application Platform | 01-02-2014 |
20140068624 | QUOTA-BASED RESOURCE MANAGEMENT - Innovations for quota-based resource management are described herein. For example, quota-based resource management is implemented as part of an application layer framework and/or operating system of a computing device. With the quota-based resource management, a budget is established at design time for the resources of the computing device. Each type of workload primarily draws from resources dedicated to that type of workload in the budget, as enforced by the operating system. This can help provide acceptable performance for those workloads that are permitted to run, while preventing resources of the mobile computing device from becoming spread too thin among workloads. It can also help maintain a good overall balance among different types of workloads. | 03-06-2014 |
20140250521 | RULE BASED ACCESS FOR REMOVABLE STORAGE - Various techniques and solutions are described for rule-based access to removable storage devices. For example, a request can be received to perform a file system operation using a removable storage device that is formatted with a file system that does not support access controls. A rules-based check of the received request can be performed by a service by checking the request against a plurality of rules. Based on results of the rules-based check, the request can be allowed or denied. | 09-04-2014 |
20150254108 | DYNAMIC RESOURCE MANAGEMENT FOR MULTI-PROCESS APPLICATIONS - Techniques are described that enable an application executing on a computing device to dynamically control how an allocated portion of a resource of the computing device is to be divided among multiple processes associated with the application. For example, an application executing on the computing device may interact with an operating system of the computing device to dynamically control how an allocated portion of a resource of the computing device is to be divided among a foreground process associated with the application and one or more background processes associated with the application. | 09-10-2015 |
20150254119 | APPLICATION DEHYDRATION AND REHYDRATION DURING APPLICATION-TO-APPLICATION CALLS - Methods, systems, and computer program products are provided that enable a first application (i.e., a caller application) to call a second application (i.e., a callee application) to perform a function in a manner such that the first application may be dehydrated during the call. In such case, the second application may be active while the first application is no longer present. The second application is enabled to respond to the call, causing the first application to be rehydrated. The first application continues execution at a location where the first application was dehydrated, and receives the response to the response to the call. | 09-10-2015 |
20150256476 | RESOURCE MANAGEMENT BASED ON DEVICE-SPECIFIC OR USER-SPECIFIC RESOURCE USAGE PROFILES - Resources used by a foreground process associated with an application as well as one or more background tasks associated with the application that are running as separate processes on the computing device are tracked. Historical data relating to resource usage by the application is utilized to predict a resource usage amount for the application which is then stored. A subsequent launch of the application can be conditioned upon whether the predicted resource usage amount is available. If the predicted resource usage amount is available, it can be allocated to the application and the application can be launched. If the application then exceeds the predicted resource usage amount, other processes executing concurrently therewith may be terminated to free up the resource. Regardless of how the application performs, new resource usage data is obtained for the application, which is then used to adjust the predicted resource usage amount. | 09-10-2015 |
20160072856 | Cross-Process Media Handling in a Voice-Over-Internet Protocol (VOIP) Application Platform - A computer-implemented system is provided that facilitates implementation of a voice-over-IP (VOIP) application. The system includes a host system and a user interface (UI) host process residing on the host system. The system also includes an agent host process residing on the host system which is being configured to process a VOIP call received by one or more VOIP applications executable on the host system. A moniker protocol is utilized for redirection of input and output between a media element which is utilized to render media on a display on the system. The redirection enables media processing to be allocated between the UI host process in the foreground and the agent host process in the background to thereby reduce latency perceived by a user during a VOIP experience. | 03-10-2016 |
20160092565 | Unified Search on a Personal Computing Device - A unified search leverages exposed search functions of one or more applications to supplement search results of a global search function. When a user initiates a global search, a local data store is searched to generate a first set of search results. The global search function calls exposed search functions associated with one or more applications, which provide additional search results. | 03-31-2016 |
Akhilesh Kaza, Redmond, WA US
Patent application number | Description | Published |
---|---|---|
20120139929 | CONTROLLING RUNTIME EXECUTION FROM A HOST TO CONSERVE RESOURCES - A runtime management system is described herein that allows a hosting layer to dynamically control an underlying runtime to selectively turn on and off various subsystems of the runtime to save power and extend battery life of devices on which the system operates. The hosting layer has information about usage of the runtime that is not available within the runtime, and can do a more effective job of disabling parts of the runtime that will not be needed without negatively affecting application performance or device responsiveness. The runtime management system includes a protocol of communication between arbitrary hosts and underlying platforms to expose a set of options to allow the host to selectively turn parts of a runtime on and off depending on varying environmental pressures. Thus, the runtime management system provides more effective use of potentially scarce power resources available on mobile platforms. | 06-07-2012 |
20120144333 | RENDER TRANSFORM BASED SCROLLING AND PANNING FOR SMOOTH EFFECTS - An information display system is described herein that separates rendering of information from receiving that information so that the rendering portion can be quickly displayed to the user and the data can arrive as it is available to provide further detail. The rendering portion creates a hardware surface measured to fill the area to be consumed by the list box or other control. Independently, the information retrieval portion queries information from a server or other source and processes the information as it is received. The system can then perform a transformation on the previously created hardware surface to insert the information in the rendered control without re-laying out the entire control or recreating user interface elements. Moving a surface is a cheaper operation for a CPU and can easily be accelerated using a GPU. | 06-07-2012 |
20140143700 | RENDER TRANSFORM BASED SCROLLING AND PANNING FOR SMOOTH EFFECTS - An information display system is described herein that separates rendering of information from receiving that information so that the rendering portion can be quickly displayed to the user and the data can arrive as it is available to provide further detail. The rendering portion creates a hardware surface measured to fill the area to be consumed by the list box or other control. Independently, the information retrieval portion queries information from a server or other source and processes the information as it is received. The system can then perform a transformation on the previously created hardware surface to insert the information in the rendered control without re-laying out the entire control or recreating user interface elements. Moving a surface is a cheaper operation for a CPU and can easily be accelerated using a GPU. | 05-22-2014 |
20150116339 | CONTROLLING RUNTIME EXECUTION FROM A HOST TO CONSERVE RESOURCES - A runtime management system is described herein that allows a hosting layer to dynamically control an underlying runtime to selectively turn on and off various subsystems of the runtime to save power and extend battery life of devices on which the system operates. The hosting layer has information about usage of the runtime that is not available within the runtime, and can do a more effective job of disabling parts of the runtime that will not be needed without negatively affecting application performance or device responsiveness. The runtime management system includes a protocol of communication between arbitrary hosts and underlying platforms to expose a set of options to allow the host to selectively turn parts of a runtime on and off depending on varying environmental pressures. Thus, the runtime management system provides more effective use of potentially scarce power resources available on mobile platforms. | 04-30-2015 |
Akhilesh (akhil) Kaza, Sammamish, WA US
Patent application number | Description | Published |
---|---|---|
20160080475 | Cross Device Application Discovery And Control - Systems and methods cross device application discovery and/or control. Cross device application discovery and/or control can provide for simple detection and activation of applications on remote devices. Cross device application discovery and/or control can provide for the control of remote applications in a master and slave configuration. Responsive to an activation message, an application can execute a task in an application, the task being displayed on a target device. Responsive to an activation message, an application can execute a task in an application on a target device, a task context data for the task being streamed to the source device for presentation on a display. Cross device application discovery and/or control can be enabled on a single operating system, or across a plurality of operating systems. | 03-17-2016 |
Anil Kaza, Hillsboro, OR US
Patent application number | Description | Published |
---|---|---|
20130269173 | APPARATUS AND METHOD FOR AUTOMATED SORT PROBE ASSEMBLY AND REPAIR - An apparatus comprising a robot; an end effector coupled to the robot and configured to grasp or transfer a probe of a size for use in a probe card; and instructions stored on a machine readable medium coupled to the robot, the instructions comprising to configure the robot to transfer a probe to a probe card substrate or, where the probe is attached to a probe card substrate, to move the probe. A method comprising automatically transferring a probe to a probe card substrate in an assembly process or, where the probe is attached to a probe card substrate, moving the probe in a repair process; and after transferring or moving the probe, heating the probe with a heat source. | 10-17-2013 |
Hemanth Kaza, Sammamish, WA US
Patent application number | Description | Published |
---|---|---|
20090006071 | Methods for Definition and Scalable Execution of Performance Models for Distributed Applications - A method and system for defining performance models of distributed applications such as distributed systems or network systems in a way that combines discrete and analytical models and simulating such performance models for analyzing software performance and impacts on devices of the distributed applications is described. Also described is a method for accelerating the simulation process by converting the discrete load into aggregate load dynamically based on the statistical analysis of the simulation results. | 01-01-2009 |
20120233605 | Application Compatibility Leveraging Successful Resolution of Issues - Application compatibility techniques are described. In one or more implementations, one or more computing devices of a service provider receive data from a plurality of client devices via a network, the data describing one or more attempts that were at least partially successful in resolving one or more incompatibilities in execution of one or more applications on respective computing devices. The data is mined based on one or more criteria to identify at least one of the applications and validated to confirm the at least partial success in the resolution of at least one of the incompatibilities for the identified application. Data is stored that describes validated successful resolution of the incompatibilities and an update is disseminated based at least on the stored data to resolve the incompatibilities. | 09-13-2012 |
20160026519 | Application Compatibility Leveraging Successful Resolution of Issues - Application compatibility techniques are described. In one or more implementations, one or more computing devices of a service provider receive data from a plurality of client devices via a network, the data describing one or more attempts that were at least partially successful in resolving one or more incompatibilities in execution of one or more applications on respective computing devices. The data is mined based on one or more criteria to identify at least one of the applications and validated to confirm the at least partial success in the resolution of at least one of the incompatibilities for the identified application. Data is stored that describes validated successful resolution of the incompatibilities and an update is disseminated based at least on the stored data to resolve the incompatibilities. | 01-28-2016 |
Krishna Kaza, Fremont, CA US
Patent application number | Description | Published |
---|---|---|
20150081783 | MEDIA SHARING TECHNIQUES - Improved techniques for media item sharing are described. In one embodiment, for example, an apparatus may comprise a classification module to assign a media item to a content category, a correlation module to determine context information for the media item, and an estimation module to determine a set of relevance values for a set of contacts based at least in part on a sharing history and to generate a set of suggested recipients for the media item based at least in part on the set of relevance values and the set of contacts. Other embodiments are described and claimed. | 03-19-2015 |
20160065934 | IMAGING ARCHITECTURE FOR DEPTH CAMERA MODE WITH MODE SWITCHING - An imaging architecture is described for a depth camera mode with mode switching. In one example, an imaging device has a primary camera to capture an image of a scene, a secondary camera to capture an image of the same scene, a third camera to capture an image of a second scene, a processor having a first port coupled to the primary camera to receive images from the primary camera and a second port to receive images, and a multiplexer coupled to the secondary camera and to the third camera to receive the captured images and to alternately couple the secondary camera or the third camera to the second port of the processor. | 03-03-2016 |
Ramesh Kumar Kaza, San Jose, CA US
Patent application number | Description | Published |
---|---|---|
20140089339 | UNIFIED COMMUNICATION AUDIT TOOL - Providing for dynamic auditing of components of a communication network is provided herein. By way of example, network components can be queried by way of dynamic and intelligent application programming interface (APIs) queries to extract data for the network components. Such data can then be compared with best practice rules to identify potential enhancements to efficiency or scalability of such components. In some aspects, an audit report can be output summarizing identified enhancements. In other aspects, data can be written to an updated component according to protocols suited to such component. Accordingly, an audit can provide feedback in light of best practices or can be utilized to dynamically upgrade a legacy system to newer system software and/or hardware components. | 03-27-2014 |
20150112974 | Unified Communication Audit Tool - Providing for dynamic auditing of components of a communication network is provided herein. By way of example, network components can be queried by way of dynamic and intelligent application programming interface (APIs) queries to extract data for the network components. Such data can then be compared with best practice rules to identify potential enhancements to efficiency or scalability of such components. In some aspects, an audit report can be output summarizing identified enhancements. In other aspects, data can be written to an updated component according to protocols suited to such component. Accordingly, an audit can provide feedback in light of best practices or can be utilized to dynamically upgrade a legacy system to newer system software and/or hardware components. | 04-23-2015 |
Sivapriya Kaza, Menlo Park, CA US
Patent application number | Description | Published |
---|---|---|
20160114488 | CUSTOMER SERVICE ROBOT AND RELATED SYSTEMS AND METHODS - A robot for providing customer service within a facility includes a locomotion platform, an upper sensor for detecting objects within an upper field of view of the robot, a lower sensor for detecting objects within a lower field of view of the robot, a display and a robot computer in communication with the locomotion platform, the upper sensor and the lower sensor. The robot computer is configured to detect the presence of a customer within the facility based on information received from at least one of the upper sensor and lower sensor, and the robot computer is further configured to access one or more databases storing information associated with products available to customers within the facility and to provide customer service to the customer based on the accessed information. | 04-28-2016 |
Srinivas Kaza, San Francisco, CA US
Patent application number | Description | Published |
---|---|---|
20080206705 | SYSTEM AND METHOD FOR DIGITAL TOOTH IMAGING - Method and system for managing multiple impressions of a patient's jaw for an orthodontic treatment is provided. The method includes scanning at least a first impression and a second impression of same jaw for the orthodontic treatment; determining if the first jaw impression and the second jaw impression have distortion in different areas; selecting the first jaw impression or the second jaw impression as a base impression; and replacing a distorted tooth data from the base impression with data for the same tooth from a non-base impression. The method also includes scanning at least a first jaw impression for the orthodontic treatment; scanning a bite impression for the orthodontic treatment; matching the scanned first jaw impression with the scanned bite impression; comparing bite information with a tooth occlusal surface; and determining if reconstruction is to be performed on the tooth occlusal surface. | 08-28-2008 |
20130216980 | DENTAL MODELS AND RELATED METHODS - A dental model and related systems and methods, including a first component representing a portion of a patient's jaw and a second component that is demountably attachable to the first component, and a second component representing a dental structure of interest, such as the remaining portion of a tooth or a dental implant. | 08-22-2013 |
20140087323 | SYSTEM AND METHOD FOR DIGITAL TOOTH IMAGING - Method and system for managing multiple impressions of a patient's jaw for an orthodontic treatment is provided. The method includes scanning at least a first impression and a second impression of same jaw for the orthodontic treatment; determining if the first jaw impression and the second jaw impression have distortion in different areas; selecting the first jaw impression or the second jaw impression as a base impression; and replacing a distorted tooth data from the base impression with data for the same tooth from a non-base impression. The method also includes scanning at least a first jaw impression for the orthodontic treatment; scanning a bite impression for the orthodontic treatment; matching the scanned first jaw impression with the scanned bite impression; comparing bite information with a tooth occlusal surface; and determining if reconstruction is to be performed on the tooth occlusal surface. | 03-27-2014 |
20150202025 | SYSTEM AND METHOD FOR DIGITAL TOOTH IMAGING - Method and system for managing multiple impressions of a patient's jaw for an orthodontic treatment is provided. The method includes scanning at least a first impression and a second impression of same jaw for the orthodontic treatment; determining if the first jaw impression and the second jaw impression have distortion in different areas; selecting the first jaw impression or the second jaw impression as a base impression; and replacing a distorted tooth data from the base impression with data for the same tooth from a non-base impression. The method also includes scanning at least a first jaw impression for the orthodontic treatment; scanning a bite impression for the orthodontic treatment; matching the scanned first jaw impression with the scanned bite impression; comparing bite information with a tooth occlusal surface; and determining if reconstruction is to be performed on the tooth occlusal surface. | 07-23-2015 |
Srinivas Kaza, Santa Clara, CA US
Patent application number | Description | Published |
---|---|---|
20080206702 | Manipulable dental model system for fabrication of a dental appliance - Fabricating polymeric shell appliances for moving a patient's teeth. A first tooth arrangement model is formed by placing models of individual teeth representing the patient's teeth onto a plurality of platforms of a frame approximating a shape and size of a jaw of the patient, wherein each model tooth comprises a coupling member for coupling the model tooth with a platform of the plurality of platforms. A first polymeric shell appliance is formed over the first tooth arrangement model or a copy thereof. At least a second tooth arrangement model is formed by rearranging at least some of the individual teeth relative to the frame. At least a second polymeric shell appliance is formed over the second tooth arrangement model or a copy thereof. | 08-28-2008 |
Swaroop Kaza, Campbell, CA US
Patent application number | Description | Published |
---|---|---|
20140301146 | MODIFIED LOCAL SEGMENTED SELF-BOOSTING OF MEMORY CELL CHANNELS - A method of programming a memory system by selectively applying a program voltage to a selected wordline connected to a memory transistor to be programmed. A first bias voltage is applied to a first wordline adjacent to the source side of the selected wordline. The first bias voltage is also applied to a second wordline adjacent to the drain side of the selected wordline. A second bias voltage is applied to a third wordline adjacent to the drain side of the second wordline. A third bias voltage is applied to a fourth wordline adjacent to the source side of the first wordline. A pass voltage is also applied to the remaining wordlines that do not have one of a bias voltage and a program voltage applied, the pass voltage a selected voltage level. | 10-09-2014 |
Swaroop Kaza, Sunnyvale, CA US
Patent application number | Description | Published |
---|---|---|
20090109598 | Metal-insulator-metal (MIM) device and method of formation thereof - In a method of fabricating a metal-insulator-metal (MIM) device, initially, a first electrode is provided. An oxide layer is provided on the first electrode, and a protective layer is provided on the oxide layer. An opening through the protective layer is provided to expose a portion of the oxide layer, and a portion of the first electrode underlying the exposed portion of the oxide layer is oxidized. A second electrode is provided in contact with the exposed portion of the oxide layer. In alternative embodiments, the initially provided oxide layer may be eliminated, and spacers of insulating material may be provided in the opening. | 04-30-2009 |
20090109727 | Erase, programming and leakage characteristics of a resistive memory device - The present method provides annealing of a resistive memory device so as to provide that the device in its erased state has a greatly increased resistance as compared to a prior art approach. The annealing also provides that the device may be erased by application of any of a plurality of electrical potentials within an increased range of electrical potentials as compared to the prior art. | 04-30-2009 |
20120081983 | METHOD OF PROGRAMMING, ERASING AND REPAIRING A MEMORY DEVICE - A method of programming and erasing a memory device is provided. The memory device includes first and second electrodes and a switching layer therebetween. A first on-state resistance characteristic of the memory device is provided in programming the memory device by application of a first voltage to the gate of a transistor in series with the memory device. Other on-state resistance characteristics of the memory device, different from the first on-state resistance characteristic, may be provided by application of other voltages, different from the first voltage, to the gate of the transistor. | 04-05-2012 |
20130237030 | METAL-INSULATOR-METAL (MIM) DEVICE AND METHOD OF FORMATION THEREOF - In a method of fabricating a metal-insulator-metal (MIM) device, initially, a first electrode is provided. An oxide layer is provided on the first electrode, and a protective layer is provided on the oxide layer. An opening through the protective layer is provided to expose a portion of the oxide layer, and a portion of the first electrode underlying the exposed portion of the oxide layer is oxidized. A second electrode is provided in contact with the exposed portion of the oxide layer. In alternative embodiments, the initially provided oxide layer may be eliminated, and spacers of insulating material may be provided in the opening. | 09-12-2013 |
20140357044 | METAL-INSUALTOR-METAL (MIM) DEVICE AND METHOD OF FORMATION THEREROF - In a method of fabricating a metal-insulator-metal (MIM) device, initially, a first electrode is provided. An oxide layer is provided on the first electrode, and a protective layer is provided on the oxide layer. An opening through the protective layer is provided to expose a portion of the oxide layer, and a portion of the first electrode underlying the exposed portion of the oxide layer is oxidized. A second electrode is provided in contact with the exposed portion of the oxide layer. in alternative embodiments, the initially provided oxide layer may be eliminated, and spacers of insulating material may be provided in the opening. | 12-04-2014 |
Vijaya Bharathi Kaza, Santa Clara, CA US
Patent application number | Description | Published |
---|---|---|
20120272058 | TRANSPARENT PROXY OF ENCRYPTED SESSIONS - In one embodiment, a proxy device located between a first device and a second device intercepts a security session request for a security session between the first device and the second device. The proxy device obtains security information from the first device that includes at least a subject name of the first device. The proxy device creates a dynamic certificate using the subject name of the first device and a trusted proxy certificate of the proxy device. The proxy device establishes a security session between the proxy device and the second device using the dynamic certificate. Further, the proxy device establishes a security session between the first device and the proxy device using the trusted proxy certificate of the proxy device. The two security sessions collectively operate as a security session between the first device and the second device. | 10-25-2012 |