Abstract:
The invention relates to a method of establishing communication between one or more users and one or more professional service providers. The professional service provides include, but are not limited to legal professionals, medical professionals, doctors, taxation professionals, accounting professionals, and financial professionals. Information corresponding to one or more professional service requirements of the user is obtained. The information includes basic information and confidential information. The basic information is transmitted to the one or more professional service providers based on the one or more professional service requirements of the user. Thereafter, communication is established between the user and the one or more professional service providers based on conflict of interest and an affirmative confirmation from the one or more professional service providers.
Abstract:
Various techniques are described hereafter for improving the efficiency of binary XML encoding and loading operations. In particular, techniques are described for incrementally encoding XML in response to amount-based requests. After encoding enough binary XML to satisfy an amount-based request, the encoder stops encoding the XML until a subsequent request is received. The incremental encoding may take place on the client-side or the server-side. Techniques are also described for reducing the character set conversion operations by having a parser convert tokens in text XML into one character set while converting non-token text in the text XML into another character set. Techniques are also described for generating self-contained binary XML documents, and for improving remap operations by providing a binary XML document on a chunk-by-chunk basis.
Abstract:
A network analysis system invokes an application specific, or source-destination specific, path discovery process. The application specific path discovery process determines the path(s) used by the application, collects performance data from the nodes along the path, and communicates this performance data to the network analysis system for subsequent performance analysis. The system may also maintain a database of prior network configurations to facilitate the identification of nodes that are off the path that may affect the current performance of the application. The system may also be specifically controlled so as to identify the path between any pair of specified nodes, and to optionally collect performance data associated with the path.
Abstract:
Virtual storage arrays consolidate branch data storage at data centers connected via wide area networks. Virtual storage arrays appear to storage clients as local data storage; however, virtual storage arrays actually store data at the data center. The virtual storage arrays overcomes bandwidth and latency limitations of the wide area network by predicting and prefetching storage blocks, which are then cached at the branch location. Virtual storage arrays leverage an understanding of the semantics and structure of high-level data structures associated with storage blocks to predict which storage blocks are likely to be requested by a storage client in the near future. Virtual storage arrays determine the association between requested storage blocks and corresponding high-level data structure entities to predict additional high-level data structure entities that are likely to be accessed. From this, the virtual storage array identifies the additional storage blocks for prefetching.
Abstract:
The invention encompasses (3R,4S)-4-((4-benzyloxy)phenyl)-1-(4-fluorophenyl)-3-(3-(4-fluorophenyl)-3-oxopropyl)-2-azetidinone (Compound 2a) having an enantiomeric purity of at least about 97.5%. The invention also encompasses Compound 2a having a chemical purity of at least about 97%. The invention further encompasses processes for preparing Compound 2a from Compound 1 having the following formula: The invention also encompasses processes for preparing a compound having the following formula: from a compound having the following formula: wherein R is selected from the group consisting of: H or a hydroxyl protecting group. The invention also encompasses processes for preparing Compound 2a, preferably to form Compound 2a-Form 01. Also included are processes for preparing ezetimibe from Compound 2a-Form 01 or Compound 2a prepared according to the invention, compositions containing such ezetimibe, and methods for reducing cholesterol using such compositions
Abstract:
In a system where transactions are accelerated with asynchronous writes that require acknowledgements, with pre-acknowledging writes at a source of the writes, a destination-side transaction accelerator includes a queue for queue writes to a destination, at least some of the writes being pre-acknowledged by a source-side transaction accelerator prior to the write completing at the destination, a memory for storing a status of a destination-side queue and possibly other determinants, and logic for signaling to the source-side transaction accelerator with instructions to alter pre-acknowledgement rules to hold off on and pursue pre-acknowledgements based on the destination-side queue status. The rules can take into account adjusting the flow of pre-acknowledged requests or pre-acknowledgements at the sender-side transaction accelerator based at least on the computed logical length.
Abstract:
The present invention organizes unsorted information into structured information and presents the structured information so that users are able to perform research efficiently and effectively. The present invention includes developing a parameterized template which is used to organize the unstructured data. Editors, with the help of a data analysis application, search through the unstructured information and organize the information using the parameterized template. After the information is properly organized, it is presented to users in a user-friendly format that enables users to quickly and easily search for specific elements in the information. Furthermore, the information is also presented to allow other tasks to be performed on the organized data such as comparisons.
Abstract:
A network stack includes a packet loss analyzer that distinguishes between packet losses due to congestion and due to lossyness of network connections. The loss analyzer observes the packet loss patterns for comparison with a packet loss model. The packet loss model may be based on a Forward Error Correction (FEC) system. The loss analyzer determines if lost packets could have been recovered by a receiving network device, if FEC had been used. If the lost packets could have been corrected by FEC, the loss analyzer assumes that no network congestion exists and that the packet loss comes from the lossy aspects of the network, such as radio interference for wireless networks. If the loss analyzer determines that some of the lost packet could not have been recovered by the receiving network device, the loss analyzer assumes that network congestion causes these packet losses and reduces the data rate.
Abstract:
Serial clustering uses two or more network devices connected in series via a local and/or wide-area network to provide additional capacity when network traffic exceeds the processing capabilities of a single network device. When a first network device reaches its capacity limit, any excess network traffic beyond that limit is passed through the first network device unchanged. A network device connected in series with the first network device intercepts and will process the excess network traffic provided that it has sufficient processing capacity. Additional network devices can process remaining network traffic in a similar manner until all of the excess network traffic has been processed or until there are no more additional network devices. Network devices may use rules to determine how to handle network traffic. Rules may be based on the attributes of received network packets, attributes of the network device, or attributes of the network.