Abstract:
The disclosure describes an on-demand web-based software and hardware platform that has been developed, on a custom hardware (server) architecture, in an abstracted fashion to enable the administrative users (admins) to create and deploy their experience that can manage asynchronous communication and decision-oriented workflows, in a secure fashion, within a healthcare system. The experience created by the admin can be used for almost any use-case (within care delivery, care coordination and care management) where asynchronous and decision-based workflows and video-centric asynchronous communication proves to derive value resulting in increased productivity, reduction in cost, improved revenue production. Additionally, from an asynchronous communication perspective, the platform empowers the delivery of "capture, store and forward" video-based one-way, two-way and multi-way user interactivity. And, the admin can use the platform's tool sets to create membership models, product types, page designs and media/content libraries that surround the overall experience being delivered for patients and providers.
Abstract:
System and method for managing devices comprising a memory store having memory locations, wherein each memory location stores one or more attributes associated with one or more devices. Device manager arranged to execute commands to take an action on the one or more attributes stored in the memory locations, and to receive from the one or more devices values of the corresponding one or more attributes. Synchroniser configured to maintain synchronisation between the attributes stored in the memory store and the attributes associated with the devices.
Abstract:
Method and system for securely communicating with a machine to machine, M2M, device comprising sharing a secret or data derived from the secret between the M2M device and a server. Establishing a connection between the M2M device and the server. Using the shared secret or data derived from the shared secret to establish cryptographic material on both the M2M device and the server. Securing communication between the M2M device and the server with a cryptographic protocol using the established cryptographic material. The cryptographic material is unrecoverable from the shared secret or data derived from the shared secret alone.
Abstract:
The present disclosure provides methods and apparatus for administering an interface between a machine-to-machine, M2M, device and a network application function, NAF, for secure communication between the M2M device and the NAF. In one method, the M2M device administers the interface by transmitting administration data to the NAF, wherein the administration data comprises a name for the M2M device, and wherein the name for the M2M device is equal to, or derived at least in part from, or otherwise linked to, at least part of data that are shared between the M2M device and a bootstrapping server.
Abstract:
The present disclosure provides methods and apparatus for administering an interface between a machine-to-machine, M2M, device and a network application function, NAF, for secure communication between the M2M device and the NAF. In one method, the M2M device comprises security information for enabling secure communication via the interface, and administers the interface by: setting a secure interface lifetime parameter based on a lifetime of at least part of the security information; and transmitting administration data to the NAF, wherein the administration data comprises the secure interface lifetime parameter.
Abstract:
The present disclosure provides a bootstrapping server, a network application function (NAF), a system and methods for establishing secure communication between a machine to machine (M2M) device and a NAF. A method for establishing secure communication between the NAF and M2M device comprises receiving a first data object, tunnelling the first data object to the M2M device, via an interface between the NAF and the M2M device, for enabling the M2M device to derive first information to establish said secure communication, receiving a second data object and deriving second information for use in establishing said secure communication with the M2M device.
Abstract:
An improved technique involves embedding a pen selection within a selected color. When a user selects a color for a new stroke by moving a cursor over a color icon, a pen palette appears within the selected color icon. In some arrangements, the improved techniques further involve automatically selecting a pen by default as the previous pen used for that color, so that only a single color selection need be made rather than separate pen and color selections. In this way, the user may then quickly and fluidly select both a color, then a pen for a drawing stroke. Such a color and pen selection process may be seen to simulate the actions in drawing on a whiteboard.
Abstract:
A method of distributing data in a hybrid cloud environment is provided. The method includes receiving a request to execute a service from a client, analyzing service use pattern information of the client based on the received request to execute the service, estimating a work load of the service by using the analyzed service use pattern information, and distributing data related to the service based on the estimated work load.
Abstract:
A network device (300) has a housing (310), a magnetic induction charger (320), a wireless data link (330) and a processor (340). The housing has one or more sides (311 - 316). The induction charger is housed by the housing and is arranged to wirelessly charge a rechargeable battery (220) of a portable electronic device (200). The electronic device is adjacent to or in contact with the housing. The wireless data link communicates with the portable electronic device. The processor communicates with the magnetic induction charger and the wireless data link. In addition, the processor recognizes the portable electronic device and associates a profile (352) with the portable electronic device. The processor delivers content to an associated media device (120) based on the profile.
Abstract:
A cloud service stores and aggregates content that is obtained from different content sources using different protocols. For example, the content may include electronic messages, calendar information, contacts, social network content, feed data, search results, and the like. The cloud service aggregates content for each user based on the user's configuration settings. The cloud service may perform processing on the aggregated content before it is delivered and displayed to the user on the client device. For example, one or more views may be generated and stored by the cloud service before the view is requested from the client. Changes made to the aggregated content on the client may be synchronized with the content source. Searches may be made across all or a portion of the different content sources that are aggregated for a user.