摘要:
Examples of the present disclosure may include methods, systems, and computer readable media with executable instructions. An example method for providing a patient information interface can include accessing patient health record (PHR) information for a particular patient, and referencing medical care guideline information. A medical process associated with the particular patient is determined based on the PHR information and medical care guideline information, and context information associated with the particular patient and/or a healthcare system is received in a medical process-aware manner to a context model implemented on a computing system, including clinical, logistical and operational information. Context aware information is presented, via an output device of the computing system based on the determined medical process and context information.
摘要:
Techniques for generating optimized surgery schedules are described in various implementations. In one example implementation, a method that implements the techniques includes receiving a plurality of surgery scheduling requests for surgical procedures to be performed at a surgical facility having a plurality of operating rooms. The method also includes identifying resource constraints associated with the surgery scheduling requests, and identifying an optimization goal for the surgical facility, the optimization goal being defined using weighted optimization parameters. The method also includes generating a proposed surgery schedule for the surgical facility that includes sequencing and operating room assignments for each of the surgical procedures to be performed, the proposed surgery schedule satisfying the resource constraints and being optimized based on the optimization goal for the surgical facility. The method also includes simulating the proposed surgery schedule to determine expected operational metrics associated with the proposed surgery schedule.
摘要:
A potential transaction between a first party and a second party involves multiple issues. A current offer made by the second party is received. A set of candidate counteroffers that satisfy a target utility value for the first party is identified. A counteroffer is selected from among the set of candidate counteroffers and presented to the second party.
摘要:
In one embodiment, a data set is received at a network service element of a network service, a location record for that data set is generated, and the location record is sent to a location registry within the network service to monitored locations of that data set within a network service. The network service element is operatively coupled to a communications link. The location record is generated based on a portion of the data set and a cryptographic key associated with the network service element. The location record uniquely identifies the presence of the data set at the network service element.
摘要:
Systems, methods, and machine-readable and executable instructions are provided for encryption key storage. Encryption key storage may include associating each of a plurality of identifiers with a different one of a plurality of key fragment stores, determining a plurality of indexes, where each of the plurality of indexes is based upon a handle provided by a customer, an authorization token provided by the customer, and a different one of the plurality of identifiers, partitioning an encryption key provided by the customer into a number of encryption key fragments, and distributing the plurality of indexes and the number of encryption key fragments to the plurality of key fragment stores.
摘要:
A method of generating a set of composite services is provided herein. The method includes receiving standardized service descriptions of a set of component services from service providers. The standardized description of a component service may be translated to an automaton-based description. A specified goal associated with the set of component services may be received. The set of composite services may be generated based on the automaton-based description and the specified goal. Each of the generated composite services may accomplish the specified goal.
摘要:
In one implementation, encrypted data and a virtual machine are stored together as a virtual machine-data image, wherein the virtual machine is configured to EXERT management control over the data based on policies set by an owner of the data. In another implementation, metadata defining or tagging policies for usage of data is associated with the data. Control capabilities of service providers are mapped to the policies, wherein those service provider environments that best satisfy the controls mapped to the policies are identified.
摘要:
A probability that an opposing party in a negotiation will accept the terms of a candidate offer within a given number of rounds of the negotiation may be computed, and the candidate offer may be identified as an offer to present to the opposing party based on the computed probability.
摘要:
A file-based data retention management system is provided. A data source can store data files. An online backup file system can make a backup copy of the data files from the data source and store the backup copy of the data files on a backup server. A policy database can be maintained by the system, the policy database including data retention policies for the data files for retention management of the data files. A key management system can assign and manage encryption keys for the data files. The key management system can store the encryption keys on a separate system from the data files stored on the backup server.
摘要:
To configure a system, models of corresponding components are provided, where the models contain constraints. The models specify that at least one of the components is composed of at least another one of the components. The models are input into a design tool. The design tool generates a configuration of the system that includes the components, wherein the generated configuration satisfies the constraints contained in the models.