摘要:
A digital dictation workflow system and method employing a plurality of client devices and at least one server. Certain client devices are operable to record audio information dictated by a user for storing as a digital audio file in a file store, and others are operable to receive and reproduce the stored digital audio file as audio. The server is connected to the client devices via a network, and manages storage and retrieval of the digital audio file to and from the file store and the client devices. The system and method further employ at least one database for storing dictation data pertaining to the digital audio file stored in the file store, and can be configured in a three-tier arrangement with the client devices being present in a presentation layer, the server present in a business logic layer, and the file store and database present in a data access layer.
摘要:
An apparatus for routing data packets includes a network interface, a memory, a general purpose processor and a flow classifier. The memory stores a flow structure. Every packet in one flow has identical values for a set of data fields in the packet. The memory stores instruction that cause the processor to receive missing flow data and to add the missing flow to the flow structure. The apparatus forwards a packet based on the flow. The flow classifier determines a particular flow and whether it is already stored in the flow structure. If not, then the classifier determines whether that flow has already been sent to the processor as missing data. If not, then the classifier stores into a different data structure data that indicates the flow has been sent to the processor but is not yet included in the flow data structure, and sends missing data to the processor.
摘要:
Techniques for synchronizing use of buffer descriptors for data, such as packets transmitted over a network, include receiving private index data that indicates a particular buffer descriptor owned by a DMA controller, for moving data between a data port and a corresponding memory buffer. A write command is placed on a memory exchange queue to change the owner to a different processor and the private index data is incremented. A public index is determined, which indicates a different buffer descriptor in which the owner is most recently changed to the processor and is known to be visible to the processor. In response to receiving a request from the processor for the most recent buffer descriptor changed to processor ownership, the public index data is sent to the processor. Based on the public index data, the processor exchanges data with buffer descriptors guaranteed to be owned by the processor.
摘要:
Techniques for initializing an arbitrary portion of memory with an arbitrary pattern includes using a memory controller for performing sequenced read and write operations. The memory controller receives address data, length data and pattern data on a data bus connected to a processor. The address data indicates a location in memory. The length data indicates an amount of memory to be initialized. The pattern data indicates a particular series of bits that is much shorter than the amount of memory indicated by the length data. The memory controller performs multiple write operations on memory beginning at a first location based on the address data and ending at a second location based on the length data. Each write operation writes the pattern data to a current location in memory, thereby initializing the arbitrary portion of memory with an arbitrary pattern based on the pattern data.
摘要:
Bone cement mixing systems and related methods are disclosed. The bone cement mixing systems can include a first chamber, a second chamber, and a passage fluidly connecting the first and second chambers. A first piston can be disposed in the first chamber, and a second piston can be disposed in the second chamber.
摘要:
The present invention provides methods and systems for presenting financial and credit information to a customer. In one embodiment, the method includes receiving a credit worthiness report (CWR) for the customer, and providing the CWR to the customer. The method includes providing a list of selectable options to the customer, the options directed to at least one financial activity. A selected option is received from the customer, and a revised CWR is provided to the customer in response to the selected option. In this manner, the customer can examine how particular options or activities effect their credit worthiness.
摘要:
An injection device for use with a syringe (30) having a bore (32) extending from an end surface (34), a needle (36) communicating with the bore through the end surface and a dispensing piston (38) movable in said bore towards said end surface so as to expel the content of the syringe through the needle, the injection device including a housing (60) having an opening (64) at one end through which the needle may extend, a resilient member for biassing the syringe and needle inwardly of the housing, a drive element (66) movable towards said one end so as to move the needle of the syringe out of the opening against the bias of the resilient member and to move the dispensing piston of the syringe towards the end surface, a delatch mechanism (72) operable to release the syringe such that the needle moves inwardly of the housing, a drive coupling (40) for extending from said drive element to the dispensing piston of the syringe so as to transfer movement of said drive element to the dispensing piston, wherein the drive coupling gradually reduces in length such that, after the drive element has moved the dispensing piston to the end surface, the drive element continues to move to said predetermined piston to the end surface, the drive element continuous to move to said predetermined position at which said delatch mechanism releases the syringe.
摘要:
An apparatus for routing data packets includes a network interface, a memory, a general purpose processor and a flow classifier. The memory stores a flow structure. Every packet in one flow has identical values for a set of data fields in the packet. The memory stores instruction that cause the processor to receive missing flow data and to add the missing flow to the flow structure. The apparatus forwards a packet based on the flow. The flow classifier determines a particular flow and whether it is already stored in the flow structure. If not, then the classifier determines whether that flow has already been sent to the processor as missing data. If not, then the classifier stores into a different data structure data that indicates the flow has been sent to the processor but is not yet included in the flow data structure, and sends missing data to the processor.
摘要:
Techniques for routing a payload of a first network protocol, which includes header information for a second network protocol, include communicating a packet. In a circuit block, a first type for the first network protocol and a second type for the second network protocol are determined. The circuit block stores a classification that indicates a unique combination of the first type and the second type. A general purpose processor routes the packet based on the classification. Processor clock cycles are saved that would be consumed in determining the types. Furthermore, based on the classification, the processor can store an offset value for aligning the header relative to a cache line. The circuit block can store the packet shifted by the offset value. The processor can then retrieve from memory a single cache line to receive the header, thereby saving excess loading and ejecting of cache.
摘要:
A system and method is provided for automatically identifying and removing malicious data packets, such as denial-of-service (DoS) packets, in an intermediate network node before the packets can be forwarded to a central processing unit (CPU) in the node. The CPU's processing bandwidth is therefore not consumed identifying and removing the malicious packets from the system memory. As such, processing of the malicious packets is essentially “off-loaded” from the CPU, thereby enabling the CPU to process non-malicious packets in a more efficient manner. Unlike prior implementations, the invention identifies malicious packets having complex encapsulations that can not be identified using traditional techniques, such as ternary content addressable memories (TCAM) or lookup tables.