Abstract:
Method, system and program product are disclosed for determining productivity for a tool including a plurality of processing modules. The invention provides an understanding of a relationship between measured variables and overall tool speed by calculating computational components for any empty module, any module speed diversity and any idle tool event, i.e., the potential productivity detractors for the tool. An overall productivity based on each of the computational components may also be determined.
Abstract:
A self-service checkout terminal includes an input device for receiving a user reported identity code associated with a user of the checkout terminal and a biometric sensing device for detecting a biometric characteristic of the user. The self-service checkout terminal also includes a processing unit electrically coupled to both the input device and the biometric sensing device. Moreover, the self-service checkout terminal includes a memory device electrically coupled to the processing unit. The memory device has stored therein a plurality of instructions which, when executed by the processing unit, causes the processing unit to (i) retrieve a user biometric profile which corresponds to the user reported identity code, (ii) detect if the user enters a restricted item into the checkout terminal and generate a restricted-item control signal in response thereto, and (iii) compare the user biometric profile with the biometric characteristic and generate an identity-verified control signal if the user biometric profile matches the biometric characteristic. A method of operating a self-service checkout terminal is also disclosed.
Abstract:
A method of operating a self-service checkout system which includes a base having a scanner secured thereto includes the step of securing an itemization-only retail terminal to the base. The method also includes the step of coupling the itemization-only retail terminal to the scanner. The method further includes the step of operating the itemization-only retail terminal and the scanner so as to allow a first user to enter a first number of items for purchase into the self-service checkout system for a first time period while (i) the itemization-only retail terminal is secured to the base, and (ii) the itemization-only retail terminal is coupled to the scanner. Moreover, the method includes the step of detaching the itemization-only retail terminal from the base. Yet further, the method includes the step of decoupling the itemization-only retail terminal from the scanner. The method further includes the step of securing a full-tendering retail terminal to the base. The method also includes the step of coupling the full-tendering retail terminal to the scanner. Finally, the method includes the step of operating the full-tendering retail terminal and the scanner so as to allow a second user to enter a second number of items for purchase into the self-service checkout system for a second time period while (i) the full-tendering retail terminal is secured to the base, and (ii) the full-tendering retail terminal is coupled to the scanner. A self-service checkout system is also disclosed.
Abstract:
A method of providing security during operation of a checkout terminal, with the terminal having a first scale, includes the step of storing a first identification code associated with an input item in a memory in response to entry of the input item into the terminal. The method also includes the step of detecting the weight of the input item with the first scale and storing an input weight value associated with the weight of the input item in the memory in response thereto. The method further includes the step of retrieving a second identification code associated with a removal item from the memory in response to a user voiding entry of the removal item. Moreover, the method includes the step of detecting the weight of the removal item with the first scale and generating a removal weight value associated with the weight of the removal item in response thereto. The method yet further includes the step of generating a wrong-item-removed control signal if (1) the first identification code is the same as the second identification code, and (2) the input weight value does not match the removal weight value.
Abstract:
A connector system for use with an apparatus that delivers a supply of pressurized breathable air to a patient includes an air delivery conduit including an auxiliary conduit. The air delivery conduit and auxiliary conduit have a first end and a second end. A connector is provided to at least one of the first and second ends. The connector includes an inner tubular wall and an outer tubular wall surrounding the inner tubular wall and being concentric with the inner tubular wall. The inner and outer tubular walls define first and second passages that are isolated from one another. One of the first and second passages is configured to communicate with the air delivery conduit and the other of the first and second passages is configured to communicate with the auxiliary conduit.
Abstract:
An air delivery conduit includes a tube including a plurality of corrugations. The corrugations vary along a length of the tube to change flexibility and/or stretch characteristics of the tube in one or more specific zones.
Abstract:
A method and system to monitor steps in a business process or complex tasks are described. The method may include displaying a graphical step monitor in a graphical user interface of an application, using a plurality of graphical elements indicating statuses of a plurality of steps in a sequence of steps in a process. The method may include receiving update information related to one or more steps of the plurality of steps. The method may also include updating the statuses of the steps for which the update information was received and as indicated by the plurality of graphical elements. Furthermore, the method may include displaying a description region including a further plurality of graphical elements and texts, the texts describing the steps, the statuses of which are indicated by the graphical elements.
Abstract:
A system for providing a mobile application includes a Mobile Subscriber Detection Authorization and Verification System (MSDAVS), to request and receive confidential information from a confidential information owner relating to a user who opted-in to a mobile service application, and to communicate the received confidential information to a mobile application service provider. The MSDAVS can include an opt-in database, to store opt-in or registration data of the opted-in users of the mobile service application and a service policy database. The mobile application service can be a mobile traffic alerting service, the confidential information owner a telephone number database of one of a wireless carrier or a telephone number database operator, and the requested confidential information a list telephone numbers of opted-in users in an alert area, defined by the mobile traffic alerting service.
Abstract:
A pluggable security device for protecting an electronic device, such as a laptop, is disclosed. The pluggable security device has a battery, a siren, and an optional accelerometer. The security device is triggered by unplugging from the electronic device, or by sensing acceleration, or by disconnecting the electronic device from AC power or from a network. Once the security device is triggered and its internal siren is activated, it can only be deactivated by reinserting the pluggable security device into the electronic device it has been disconnected from and by entering a password in the electronic device.