Abstract:
Methods and systems for prioritizing patient data from a plurality of patients for review by a healthcare professional are provided. Embodiments of the subject methods include determining a priority score for each patient based on patient data data, and presenting the data to a healthcare professional for review in an order based on the determined priority scores. Systems for use in performing the subject methods are also provided.
Abstract:
A service is disclosed that discovers information about the logical networks to which a computer is connected and provides that information to applications. The information is keyed to names constructed by the service. There is a mapping between the names and the logical networks. Applications may rely on the names when selecting a configuration to use with a given logical network. The network name may be correlated with other information, such as physical network interface(s) on the computer through which the logical network is accessible, application programming interfaces of the transport protocols supported by the logical network, and the connectivity type of the logical network. Applications are notified when network information provided to them changes or when new information becomes available.
Abstract:
A service is disclosed that discovers information about the logical networks to which a computer is connected and provides that information to applications. The information is keyed to names constructed by the service. There is a mapping between the names and the logical networks. Applications may rely on the names when selecting a configuration to use with a given logical network. The network name may be correlated with other information, such as physical network interface(s) on the computer through which the logical network is accessible, application programming interfaces of the transport protocols supported by the logical network, and the connectivity type of the logical network. Applications are notified when network information provided to them changes or when new information becomes available.
Abstract:
A system and method for ensuring that machines having invalid or corrupt states are restricted from accessing network resources are provided. A quarantine server located on a trusted machine in a network provides a bill of health to a quarantine agent located on a client computer that wishes to gain access to network resources administered by an organization. The quarantine agent requests bill of health from the quarantine server, and receives a manifest of checks that the client computer must perform. The quarantine agent then sends a status report on the checks back to the quarantine server. If the client computer is in a valid security state, the bill of health is issued to the client. If the client computer is in an invalid state, the client is directed to install the appropriate software/patches to achieve a valid state. When a client requests the use of network resources from a network administrator, the network administrator requests the client's bill of health. If the bill of health is valid, the client is admitted to the network. If the bill of health is invalid, or if the client does not have a quarantine agent, the client is placed in quarantine, in which the only network resources accessible to the client are those necessary to install the quarantine agent and requisite software/patches to achieve a valid state.
Abstract:
The invention makes possible remote control of devices in a piconet by remote users communicating over the Internet and the like by providing a proxy-bridge device. The proxy-bridge device is a bridge for sending packets to and from between an external device and a device in the piconet. Moreover, the proxy-bridge device also serves as a proxy for the external device to devices in the piconet and as a proxy for devices in the piconet accessing an external device. The proxy-bridge wireless device's protocol stack allows communications with the piconet devices within the piconet. In addition, the protocol stack allows an application to communicate with a remote device e.g., via the Internet Protocol. Thus, the proxy-bridge device, using two protocols, enables remote users discover the presence of a service offered by a device in a piconet as a logical embedded device within the proxy-bridge device and vice-versa.
Abstract:
A LED panel wherein a plurality thereof are employed to construct a LED volume for filing simulated virtual environments wherein the LED panel of the present invention provides tracking of objects in the vicinity thereof such as but not limited to a camera wherein the tracking elements do not require post production removal. The LED panel includes a housing having a perimeter frame that has a transparent LED display mounted thereto. On the rear surface of the LED display or proximate thereto are a plurality of retroreflectors. The retroreflectors function to provide inside-out tracking of a camera disposed within the LED volume. The present invention further includes a plurality of lidar sensors and optical sensors mounted to the perimeter frame. The lidar sensors and optical sensors provide data for outside-in tracking of a camera within the LED volume. The retroreflectors can be provided in multiple alternate embodiments.
Abstract:
A risk relationship data store may contain electronic records representing a plurality of risk relationships with an enterprise and, for each risk relationship, an electronic record identifier and a set of attribute values. An automated risk relationship attribute value review platform may receive an indication of a selected risk relationship from a remote administrator device and access the information in the risk relationship data store associated with the selected risk relationship. An automated risk relationship attribute value review may be performed on the accessed information to generate detailed risk relationship attribute review data. An automated summary system computer server may then receive the detailed risk relationship attribute review data and automatically create summarized risk relationship attribute review information based at least in part on the detailed risk relationship attribute review data. The summarized risk relationship attribute review information may then be transmitted to the remote administrator device.
Abstract:
A video conference cross-links at least a portion of the clients for point to point communication while still using a video conference server. The video conference server continues to manage some aspects of the video conference for the cross-linked clients and may be configured to perform audio/video processing for some of the clients in a video conference. For example, the video conference server may perform audio/video processing and routing of streams for clients that do not have the capabilities to perform the processing directly. Clients that are able to process their audio/video needs may directly connect to other clients through cross-links while still using the video conference server for management.
Abstract:
A method and system for processing contextual information relating to an exchange of a conversation over a communication channel is provided. Several users, and/or service providers are allowed to specify a set of rules relating to a conversation channel. Contextual information, including information relating to the specified set of rules and conditions of the users, is exchanged among the users and/or several service providers when one user requests to initiate a communication channel. The received contextual information is processed to extract a set of rules and the current conditions of users. If the current conditions of the users satisfy the set of rules, a corresponding communication channel is established among the users. However, additional contextual information may be received and processed whenever there is a change in the contextual information during the conversation. Appropriate actions to the existing communication channel may be determined based on the changes.