Abstract:
A method of temperature control in a cryogenic temperature control apparatus. The method includes operating the cryogenic temperature control apparatus in a first mode, and delivering a first flow rate of cryogen from a storage tank to an evaporator coil in the first mode. The cryogenic temperature control apparatus is operated in a second mode after operating the cryogenic temperature control apparatus in the first mode for a predetermined time duration. A second flow rate of cryogen that is lower than the first flow rate is delivered to the evaporator coil in the second mode.
Abstract:
Techniques are described for facilitating access of computing system users to restricted functionality, such as internal functionality of a business or other organization (e.g., internal systems and/or confidential information available to some or all business employees or other organization members). The restricted functionality access may in some situations be provided in conjunction with publicly available information from the organization, such as to use that publicly available information as part of a user interface that allows an authorized subset of users to access the restricted functionality. In some situations, the restricted functionality access may be facilitated by an access provider system that executes on a client computing system of an authorized user, such as a program operating in conjunction with another presentation program that presents publicly available information (e.g., as an extension program for the presentation program), and that modifies the interactions available to the user when using the presentation program.
Abstract:
A method and system for managing inventory by expected profitability. In one embodiment, a method may include individually evaluating a respective expected profitability for each of a number of inventory items, and individually determining a disposition of each of the number of items dependent upon its respective expected profitability. In one particular implementation of the method, individually evaluating the respective expected profitability of a given item may include forecasting an estimated date of transaction corresponding to the given item, forecasting an estimated revenue corresponding to the given item as of the estimated date of transaction, estimating accrued costs of holding the given item until the estimated date of transaction, and comparing a total cost of the given item against the estimated revenue, where the total cost may include the accrued costs of holding the given item until the estimated date of transaction.
Abstract:
Systems and methods for automating an invoice approval process are described herein. Rules are created which are evaluated against a set of attributes. A rules engine is automatically invoked upon receipt of a document in an electronic invoice presentment and payment system. The rules engine determines which rules are applicable to documents received and processed in the system, and applies those applicable rules in a pre-defined sequence.
Abstract:
The presently described embodiments relate to a method for handling data sessions performed using tethered user devices in a network. The presently described embodiments are directed to network functionality to receive a tethered device indicator by a network element. The tethered device indicator, in at least one form, originates from a request from a user device. The indicator is then detected by the network and, based on the indicator, a variety of functions may be performed. For example, a network element may determine that a data session is not proper and, therefore, reject the data session that is requested by the user device. Alternatively, the network element may determine that the data session request is proper. In this case, the data session will be managed based on the indicator.
Abstract:
An electronic catalog system includes automated processes for detecting and handling specific types of browsing events, such as non-conversion events in which users browse but fail to purchase specific items. In one embodiment, when a user engages in a threshold level of browsing activity with respect to an item without making a purchase of that item or a substitute item, and a favorable change in the item's state thereafter occurs (e.g., the price is reduced or the item becomes available), the user is automatically notified of the state change. In another embodiment, when a user transitions away from an item or item category after engaging in a threshold level of browsing activity, a determination is made whether to present to the user a time-limited purchase incentive that is tied to that item or item category.
Abstract:
A system and method permits a network management agent executing on a customer premise equipment (CPE) component to determine whether a router is coupled between the CPE component and the cable modem through which the CPE component communicates with a data-over-cable network. The network management agent executing on the CPE component encapsulates the MAC address of the CPE component in a network management message that is sent to a server at the head end of the data-over-cable network. The head end compares the encapsulated MAC address with the MAC address of the device coupled to the cable modem that sent the network management message. If the MAC addresses are not the same, the server at the head end sets a router status element in the network management message response and sends it to the agent executing on the CPE component. The agent may then interrogate the router status element and determine whether a router is coupled between the CPE component on which it is executing and the cable modem through which it is coupled to the data-over-cable network.
Abstract:
A facility for projecting future purchasing activity for a selected item being offered for sale by a merchant is described. The facility retrieves data indicating, during each plurality of past times, an observed level of browsing activity performed at the merchant with respect to the selected item. The facility transforms the retrieved data into a projection of future purchasing activity at the merchant for the selected item.
Abstract:
A method of keyless encryption of messages allows secure transmission of data where data security is not available for some technical or legal reason. The method of data transfer uses a challenge response in which a correct response to a challenge is used to transmit the value “1”, while a deliberately false response is made to transmit the value “0”. Any message can be transmitted as a binary string using successive applications of this method.
Abstract:
The present invention relates to an inertial latch mechanism of an actuator of a thin disk drive device. An inertial latch mechanism comprises a latch lever rotatable on a pivot from a release position to a latch position, and an inertial lever which is rotatable on a pivot and has a moment of inertia larger than that of the latch lever. The inertial lever rotates counterclockwise when a counterclockwise shock is given to the actuator, and pulls the latch lever at a first latch part by a first latch projection to move the latch lever to the latch position. The inertial lever also rotates clockwise when a clockwise shock is given to the actuator, and pushes the latch lever at a second latch part by a second latch projection to latch the actuator which has bumped against a crash stop and is reversely rotating.