Abstract:
Methods and systems for prioritizing patient data from a plurality of patients for review by a healthcare professional are provided. Embodiments of the subject methods include determining a priority score for each patient based on patient data data, and presenting the data to a healthcare professional for review in an order based on the determined priority scores. Systems for use in performing the subject methods are also provided.
Abstract:
A service is disclosed that discovers information about the logical networks to which a computer is connected and provides that information to applications. The information is keyed to names constructed by the service. There is a mapping between the names and the logical networks. Applications may rely on the names when selecting a configuration to use with a given logical network. The network name may be correlated with other information, such as physical network interface(s) on the computer through which the logical network is accessible, application programming interfaces of the transport protocols supported by the logical network, and the connectivity type of the logical network. Applications are notified when network information provided to them changes or when new information becomes available.
Abstract:
A service is disclosed that discovers information about the logical networks to which a computer is connected and provides that information to applications. The information is keyed to names constructed by the service. There is a mapping between the names and the logical networks. Applications may rely on the names when selecting a configuration to use with a given logical network. The network name may be correlated with other information, such as physical network interface(s) on the computer through which the logical network is accessible, application programming interfaces of the transport protocols supported by the logical network, and the connectivity type of the logical network. Applications are notified when network information provided to them changes or when new information becomes available.
Abstract:
A system and method for ensuring that machines having invalid or corrupt states are restricted from accessing network resources are provided. A quarantine server located on a trusted machine in a network provides a bill of health to a quarantine agent located on a client computer that wishes to gain access to network resources administered by an organization. The quarantine agent requests bill of health from the quarantine server, and receives a manifest of checks that the client computer must perform. The quarantine agent then sends a status report on the checks back to the quarantine server. If the client computer is in a valid security state, the bill of health is issued to the client. If the client computer is in an invalid state, the client is directed to install the appropriate software/patches to achieve a valid state. When a client requests the use of network resources from a network administrator, the network administrator requests the client's bill of health. If the bill of health is valid, the client is admitted to the network. If the bill of health is invalid, or if the client does not have a quarantine agent, the client is placed in quarantine, in which the only network resources accessible to the client are those necessary to install the quarantine agent and requisite software/patches to achieve a valid state.
Abstract:
The invention makes possible remote control of devices in a piconet by remote users communicating over the Internet and the like by providing a proxy-bridge device. The proxy-bridge device is a bridge for sending packets to and from between an external device and a device in the piconet. Moreover, the proxy-bridge device also serves as a proxy for the external device to devices in the piconet and as a proxy for devices in the piconet accessing an external device. The proxy-bridge wireless device's protocol stack allows communications with the piconet devices within the piconet. In addition, the protocol stack allows an application to communicate with a remote device e.g., via the Internet Protocol. Thus, the proxy-bridge device, using two protocols, enables remote users discover the presence of a service offered by a device in a piconet as a logical embedded device within the proxy-bridge device and vice-versa.
Abstract:
A LED panel wherein a plurality thereof are employed to construct a LED volume for filing simulated virtual environments wherein the LED panel of the present invention provides tracking of objects in the vicinity thereof such as but not limited to a camera wherein the tracking elements do not require post production removal. The LED panel includes a housing having a perimeter frame that has a transparent LED display mounted thereto. On the rear surface of the LED display or proximate thereto are a plurality of retroreflectors. The retroreflectors function to provide inside-out tracking of a camera disposed within the LED volume. The present invention further includes a plurality of lidar sensors and optical sensors mounted to the perimeter frame. The lidar sensors and optical sensors provide data for outside-in tracking of a camera within the LED volume. The retroreflectors can be provided in multiple alternate embodiments.
Abstract:
A video conference cross-links at least a portion of the clients for point to point communication while still using a video conference server. The video conference server continues to manage some aspects of the video conference for the cross-linked clients and may be configured to perform audio/video processing for some of the clients in a video conference. For example, the video conference server may perform audio/video processing and routing of streams for clients that do not have the capabilities to perform the processing directly. Clients that are able to process their audio/video needs may directly connect to other clients through cross-links while still using the video conference server for management.
Abstract:
A method and system for processing contextual information relating to an exchange of a conversation over a communication channel is provided. Several users, and/or service providers are allowed to specify a set of rules relating to a conversation channel. Contextual information, including information relating to the specified set of rules and conditions of the users, is exchanged among the users and/or several service providers when one user requests to initiate a communication channel. The received contextual information is processed to extract a set of rules and the current conditions of users. If the current conditions of the users satisfy the set of rules, a corresponding communication channel is established among the users. However, additional contextual information may be received and processed whenever there is a change in the contextual information during the conversation. Appropriate actions to the existing communication channel may be determined based on the changes.
Abstract:
A wireless access point may be configured to advertise, to mobile user devices, multiple wireless networks available through the wireless access point. For example, service set identifiers (SSIDs) may be specified within an information element (IE) of a communication such as, for example, an 802.11 beacon, broadcasted to mobile user devices. Such an IE may utilize the capability provided by IEEE 802.11 itself to use additional and flexible numbers of information elements within a beacon. Accordingly, networks that would otherwise remain hidden due to limitations of known wireless access points are made visible to mobile user devices. Configuring a wireless access point to advertise multiple available wireless networks, for example, by firmware upgrades, may serve as a viable and cost-effective interim solution and/or alternative to replacing a wireless access point with a wireless access point configured to implement virtual wireless access points.