Abstract:
Managed access to file system objects enables an application to request access to a file system object via a file system transformer driver, which may extend the capabilities of a file system. The file system transformer driver may be configured to convert a data file format for the file system object to a data format requested by the application. The file system transformer driver may store the file system object in an internal data format using a file system on a storage device. The file system transformer driver may receive requests from applications via an operating system instruction.
Abstract:
Managed access to file system objects enables an application to request access to a file system object via a file system transformer driver, which may extend the capabilities of a file system. The file system transformer driver may be configured to convert a data file format for the file system object to a data format requested by the application. The file system transformer driver may store the file system object in an internal data format using a file system on a storage device. The file system transformer driver may receive requests from applications via an operating system instruction.
Abstract:
Various devices for sterilizing a surface are disclosed. For example, a first device includes an ultraviolet light emitting unit, a processor and a computer-readable medium. The computer-readable medium stores instructions which, when executed by the processor, cause the processor to perform operations. The operations include detecting a proximity of a surface to the ultraviolet light emitting unit and activating the ultraviolet light emitting unit to sterilize the surface in response to the detecting. Another device includes an ultraviolet light emitting unit, a processor and a computer-readable medium. The computer-readable medium stores instructions which, when executed by the processor, cause the processor to perform operations. The operations include storing a location parameter, determining whether location information of the device satisfies the location parameter and activating the ultraviolet light emitting unit when it is determined that the location information of the device satisfies the location parameter.
Abstract:
Methods, systems, and products track equipment used during surgical procedures. An allowable zone associated with a surgical procedure is identified. The allowable zone determines where surgical items may be used during the procedure. A location of a surgical item is determined. When the location is outside the allowable zone, an alarm is triggered to indicate the surgical item is moving outside the allowable zone towards an area in which the surgical item may not be used.
Abstract:
Various devices for sterilizing a surface are disclosed. For example, a first device includes an ultraviolet light emitting unit, a processor and a computer-readable medium. The computer-readable medium stores instructions which, when executed by the processor, cause the processor to perform operations. The operations include detecting a proximity of a surface to the ultraviolet light emitting unit and activating the ultraviolet light emitting unit to sterilize the surface in response to the detecting. Another device includes an ultraviolet light emitting unit, a processor and a computer-readable medium. The computer-readable medium stores instructions which, when executed by the processor, cause the processor to perform operations. The operations include storing a location parameter, determining whether location information of the device satisfies the location parameter and activating the ultraviolet light emitting unit when it is determined that the location information of the device satisfies the location parameter.
Abstract:
Methods, computer program products and systems for providing video tracking. The method includes receiving a first signal from a radio frequency identification (RFID) tag. A location of the RFID tag is determined in response to the first signal. An image that includes the location of the RFID tag is recorded. The location of the RFID tag is marked on the image, resulting in a marked image.
Abstract:
Cable assemblies react to electrical power. A visual indicator in a cable assembly changes color in response to the electrical power. The visual indicator, for example, may respond to heat or electromagnetic field in the cable assembly. In smart cables, a controller may activate the visual indicator in response to the electrical power applied to the cable.
Abstract:
Methods, computer program products and systems for providing video tracking. The method includes receiving a first signal from a radio frequency identification (RFID) tag. A location of the RFID tag is determined in response to the first signal. An image that includes the location of the RFID tag is recorded. The location of the RFID tag is marked on the image, resulting in a marked image.
Abstract:
Devices and systems are provided for controlling electronic devices using a mobile remote control device. A mobile remote control device provides an interface to control a plurality of electronic devices. The mobile device has a unique identifier, and the electronic device transmits a presentation of a remote control to the mobile device. A user of the mobile device controls the electronic device by operating the “virtual” remote control displayed on the mobile device. The user may further define his or her custom remote control. The user may define batches of commands, or “macros” that transmit a specific series of commands to one or more electronic devices. Proximity and motion of a mobile device may be used as an input, such that the electronic devices are programmed to react in specific ways depending upon the position and movement of the user of the mobile device.
Abstract:
Private communication networks are facilitated. One method includes broadcasting, by a first device, to an access point device associated with a first network, a first signal comprising an identifier for a second network, wherein the access point device of the first network foregoes broadcast of a name of the first network, and wherein the first device is located at a first location and a second device is located at a second location remote from the first location. The first device and the second device are associated with the second network. The method also includes receiving a second signal indicative of a broadcast of the name of the second network based on an authentication of the identifier for the second network and key data representing a key for the second network; and connecting to a network device of the second network in response to the receiving the second signal.