Abstract:
A prescription management system is used by an orthodontic or dental lab and a plurality of prescribing users who send prescriptions for customized orthodontic or dental appliances to the lab. The prescriptions are stored in a database selectively accessible by the lab and plurality of prescribing users. A digital workspace is provided in the system in which the lab or prescribing users may create designs for the customized appliances. The designs of the appliances are stored in the database. A tracking record of fabrication of the appliances is stored in the database. A plurality of billings are simultaneously generated in response to the submissions and storage of the prescriptions, the designs of the customized appliances and the fabrication of the designed customized appliances.
Abstract:
In one aspect, methods for presenting an enhanced search result including, for at least one search result document link, the steps of 1) compiling a list of secondary document references appearing in the linked document, 2) identifying links to the secondary documents referenced in the list of secondary document references, and 3) constructing a list of search result document secondary links. The methods subsequently display the list of search result document secondary links as a nested display under an associated search result document link. In another aspect, methods for populating a search database where, for each document in a document collection, the methods a) compile a list of secondary document references appearing in the document, b) identify a link to each secondary document referenced in the list of secondary document references, and c) store at least the identified links as metadata associated with a search database copy of the document.
Abstract:
A curable aqueous composition that includes a first polymer that includes carboxyl groups, and a second component that includes a second water insoluble polymer and a stabilizer. The second component includes functional groups that react with the carboxyl groups of the first polymer during cure, is free from carboxylic acid groups, or a combination thereof. The composition, when dry, exhibits a first Tg of at least 10° C. and a second Tg of at least 50° C.
Abstract:
A method is provided in one example embodiment and includes receiving at a network element having a binding table a packet that is part of a flow, the binding table having an entry corresponding to the flow, the entry mapping the flow to a first one of a plurality of endpoints and recognizing that a state of the first one of the plurality of endpoints at the first network element is not active. The method further includes, determining that the state of the first one of the plurality of endpoints at a second network element mated with the first network element and having a binding table similar to the binding table of the first network element is active. The method still further includes, directing the flow to the first one of the plurality of endpoints via the second network element.
Abstract:
A locking system for a stop button employed in a mortise lock having a spindle for operating a latch utilizing a first spindle base and a second spindle base which are nested relative to one another. Each base includes an opening for the mortise lock spindle such that the spindle may enter the combined first and second bases from the left side or the right side. A locking hub overrides either the first or second base and is capable of selectively lying over either the first or second base. An abutment linked to the stop button interacts with the locking hub such that either the first or second base may not be turned by the spindle when this occurs. Locking hub selectively locks either the first or second base through its position relative to the same and allows the mortise lock to easily transform from a left-hand version to a right-hand version.
Abstract:
An apparatus and method for deploying vivid notice to a first responder, wherein the deploying event is triggered by the vehicle crash motion or by signal from the vehicle's own crash detection system, and the vivid notice is coded to the particular hazard present at the vehicle crash site and includes at least one visual notice, auditory notice, or olfactory notice, and may include a combination of any of the three notices, or all three at once.
Abstract:
The protection of data on a client mobile computing device by a server computer system such as within an enterprise network or on a separate mobile computing device is described. Security tools are described that provide different security policies to be enforced based on a location associated with a network environment in which a mobile device is operating. Methods for detecting the location of the mobile device are described. Additionally, the security tools may also provide for enforcing different policies based on security features. Examples of security features include the type of connection, wired or wireless, over which data is being transferred, the operation of anti-virus software, or the type of network adapter card. The different security policies provide enforcement mechanisms that may be tailored based upon the detected location and/or active security features associated with the mobile device. Examples of enforcement mechanisms are adaptive port blocking, file hiding and file encryption.
Abstract:
Techniques for routing a payload of a first network protocol, which includes header information for a second network protocol, include communicating a packet. In a circuit block, a first type for the first network protocol and a second type for the second network protocol are determined. The circuit block stores a classification that indicates a unique combination of the first type and the second type. A general purpose processor routes the packet based on the classification. Processor clock cycles are saved that would be consumed in determining the types. Furthermore, based on the classification, the processor can store an offset value for aligning the header relative to a cache line. The circuit block can store the packet shifted by the offset value. The processor can then retrieve from memory a single cache line to receive the header, thereby saving excess loading and ejecting of cache.
Abstract:
The administration of protection of data on a client mobile computing device by a server computer system such as within an enterprise network or on a separate mobile computing device is described. Security tools are described that provide different security policies to be enforced based on a location associated with a network environment in which a mobile device is operating. Methods for detecting the location of the mobile device are described. Additionally, the security tools may also provide for enforcing different policies based on security features. Examples of security features include the type of connection, wired or wireless, over which data is being transferred, the operation of anti-virus software, or the type of network adapter card. The different security policies provide enforcement mechanisms that may be tailored based upon the detected location and/or active security features associated with the mobile device. Examples of enforcement mechanisms are adaptive port blocking, file hiding and file encryption.
Abstract:
Techniques for dynamically distributing short messages include storing action data and parameter data. Action data indicates actions for forwarding a short message and includes an action to bypass a short message service center (SMSC). Parameter data indicates parameters in network protocol headers for a short message. Provider input data is received that indicates a special value set and a special action set. The special value set includes a value for a corresponding special parameter set that includes a parameter from the parameter data. The special action set includes an action to be performed if an actual value set matches the special value set. When a particular short message is received, it is determined whether an actual value set based on the particular short message matches the special value set. If so, then the short message is processed according to the special action set.