Patent application number | Description | Published |
20130006666 | SYSTEMS AND METHODS FOR INTELLIGENT PATIENT INTERFACE DEVICE - A system for use with one or more sources of patient-affiliated data corresponding with a group of patients. The system may contain a plurality of patient interface devices for interfacing with the group of patients. Each patient interface device may store a database that includes information related to each patient of the group of patients. Each patient interface device may be operable to generate a patient-specific guidance data set that may be used by the patient interface device to interface with a patient of the group of patients. The plurality of patient interface devices may be communicatively coupled to patient-affiliated data and a therapy database via a patient interface device gateway. The patient-specific guidance data sets may be automatically updated. | 01-03-2013 |
20150019138 | SYSTEMS AND METHODS FOR DETERMINING INGREDIENT AMOUNTS FOR PREPARATIONS FOR ADMINISTRATION TO PATIENTS - Computer systems and non-transitory computer readable media for determining an amount of an ingredient for a preparation for a requested therapy (e.g., an order or a prescription) includes an identifier, volume, and amounts of first and second compounds in each of a plurality of premix solutions. A predefined formulary comprising a formulary concentration of each of a plurality of additions is provided. A premix solution is selected. An amount of a first additions to be added to the premix solution may be selected. A number of bags of the premix solution, needed to satisfy a volume associated with the selected premix solution, are optionally reserved. An additive volume is determined at least by the specified first amounts of the first addition and a corresponding formulary concentration. | 01-15-2015 |
20150286799 | MANAGEMENT OF MEDICATION DOSE ORDERS - A system for preparing and managing patient-specific dose orders includes an order processing server configured to receive the patient-specific dose orders, define a queue of dose orders and distribute the dose orders to at least one dose preparation station. The dose preparation station is in bi-directional communication with the order processing server and has an interface for providing an operator with a protocol associated with each received drug order and specifying a set of steps to fill the drug order. Steps to fill the drug order are captured at the station and a display, positionable independent of the station outputs the dose order queue and metrics concerning activity at the dose preparation station. Systems for preparing patient-specific doses and a method for telepharmacy in which data captured while following the protocol are provided to a remote site for review and approval by a pharmacist. | 10-08-2015 |
20150363573 | PATIENT CARE DEVICE-SPECIFIC CONFIGURATION OUTPUT - Patient-care device specific configuration output for use in configuring a patient care device for administration of a therapy to a patient. The configuration output may be generated based on an order for a therapy and an identified patient care device to be used to administer the therapy to a patient. The generation of the configuration output may include modification of information received with the order to correspond to a corresponding configuration protocol of the patient care device to be used to administer the therapy to a patient. | 12-17-2015 |
20160045876 | SYSTEMS AND METHODS FOR COMPOUNDING A PREPARATION USING A PREMIX SOLUTION - Computer systems and non-transitory computer readable media for determining an amount of an ingredient for a preparation for a requested therapy (e.g., an order or a prescription) includes an identifier, volume, and amounts of first and second compounds in each of a plurality of premix solutions. A predefined formulary comprising a formulary concentration of each of a plurality of additions is provided. A premix solution is selected. An amount of a first additions to be added to the premix solution may be selected. A number of bags of the premix solution, needed to satisfy a volume associated with the selected premix solution, are optionally reserved. An additive volume is determined at least by the specified first amounts of the first addition and a corresponding formulary concentration. | 02-18-2016 |
Patent application number | Description | Published |
20080222659 | ABSTRACTING OPERATING ENVIRONMENT FROM OPERATING SYSTEM - The present invention extends to methods, systems, and computer program products for abstracting an operating environment from an operating system running in the operating environment. Within an operating environment, an operating environment abstraction layer abstracts and exposes operating environment resources to an operating system. Accordingly, appropriately configured operating environment abstraction layers provide the operating system with a uniform interface to available resources across a variety of different operating environments. Each operating environment abstraction layer and the operating system include adjustable algorithms that can be adjusted to appropriately provide services to requesting applications based on exposed resources of the operating environment. Abstraction layers can be configured to analyze and become fully aware of their operating environment, including identifying the presence of other abstraction layers. An operating system and corresponding abstraction layer can be run in flexible combinations of privileged and unprivileged processor modes. | 09-11-2008 |
20080320275 | Concurrent exception handling - Various technologies and techniques are disclosed for providing concurrent exception handling. Exceptions that occur in concurrent workers are caught. The caught exceptions are then forwarded from the concurrent workers to a coordination worker. The caught exceptions are finally aggregated into an aggregation structure, such as an aggregate exception object. This aggregation structure is rethrown and the individual caught exceptions may then be handled at a proper time. | 12-25-2008 |
20080320291 | Concurrent exception handling - Various technologies and techniques are disclosed for providing concurrent exception handling. When one or more exceptions are received from concurrent workers, one or more exception handler functions are supplied. For each respective exception in the exception results, determine if the respective exception is one of a kind of exceptions handled by the one or more exception handler functions. If the respective exception is one of a kind handled by the exception handler functions, then run a particular handler of the exception handler functions and mark the respective exception as handled. Any unhandled exceptions are then processed appropriately. In one implementation, a collection of input data is processed to produce a collection of output results, with the exceptions being interleaved with other output results. In another implementation, a particular exception is selected that represents the multiple exceptions. The selected one particular exception is then thrown. | 12-25-2008 |
20090100435 | HIERARCHICAL RESERVATION RESOURCE SCHEDULING INFRASTRUCTURE - Scheduling system resources. A system resource scheduling policy for scheduling operations within a workload is accessed. The policy is specified on a workload basis such that the policy is specific to the workload. System resources are reserved for the workload as specified by the policy. Reservations may be hierarchical in nature where workloads are also hierarchically arranged. Further, dispatching mechanisms for dispatching workloads to system resources may be implemented independent from policies. Feedback regarding system resource use may be used to determine policy selection for controlling dispatch mechanisms. | 04-16-2009 |
20090187893 | COORDINATING CHORES IN A MULTIPROCESSING ENVIRONMENT - The coordination and execution of chores in a multiprocessing environment. The coordination of chores is accomplished utilizing a compiler generated correlation that relates blocks of code that execute chores and blocks of code in which the chore can be realized. By tracking the execution of the program and using the compiler-generated correlation, chores can be identified for the currently executing code. | 07-23-2009 |
20110066834 | CONCURRENT EXCEPTION HANDLING - Various technologies and techniques are disclosed for providing concurrent exception handling. When one or more exceptions are received from concurrent workers, one or more exception handler functions are supplied. For each respective exception in the exception results, determine if the respective exception is one of a kind of exceptions handled by the one or more exception handler functions. If the respective exception is one of a kind handled by the exception handler functions, then run a particular handler of the exception handler functions and mark the respective exception as handled. Any unhandled exceptions are then processed appropriately. In one implementation, a collection of input data is processed to produce a collection of output results, with the exceptions being interleaved with other output results. In another implementation, a particular exception is selected that represents the multiple exceptions. The selected one particular exception is then thrown. | 03-17-2011 |
Patent application number | Description | Published |
20100278345 | METHOD AND APPARATUS FOR PROXIMITY BASED PAIRING OF MOBILE DEVICES - A method and an apparatus that establish a first communication channel or pair with a target device in proximity to a source device are described. A pairing message is sent to the target device in proximity to the source device over the first communication channel from the source device. A secret and an identifier associated with an application are included in the pairing message. In response to receiving the secret back from the target device for a second communication channel, pairing data of the application are sent to the target device over the second communication channel. | 11-04-2010 |
20110125650 | METHOD AND SYSTEM FOR SECURE NETWORK-BASED DISTRIBUTION OF CONTENT - A method and system for network-based distribution of content are disclosed. The distribution of content is not only secure but also controlled. The security restricts access to content within media files during downloads as well as while stored at a server or client. In one embodiment, each media file is encrypted with a different, randomly generated key. The control over the distribution of the media file can serve to limit the subsequent distribution of media files from clients to other clients. In another embodiment, the control can permit media files to be shared on a limited number of different clients affiliated with the same user. The clients can vary with application but generally are computing devices that have memory storage. Often, the clients are personal computers or other computing devices that are capable of storing and presenting content to their users. | 05-26-2011 |
20110126006 | METHOD AND SYSTEM FOR SECURE NETWORK-BASED DISTRIBUTION OF CONTENT - A method and system for network-based distribution of content are disclosed. The distribution of content is not only secure but also controlled. The security restricts access to content within media files during downloads as well as while stored at a server or client. In one embodiment, each media file is encrypted with a different, randomly generated key. The control over the distribution of the media file can serve to limit the subsequent distribution of media files from clients to other clients. In another embodiment, the control can permit media files to be shared on a limited number of different clients affiliated with the same user. The clients can vary with application but generally are computing devices that have memory storage. Often, the clients are personal computers or other computing devices that are capable of storing and presenting content to their users. | 05-26-2011 |
20110242138 | Device, Method, and Graphical User Interface with Concurrent Virtual Keyboards - A multifunction device with a touch-sensitive display concurrently displays a first virtual keyboard at a first location on the touch-sensitive display and a second virtual keyboard at a second location, distinct from the first location, on the touch-sensitive display. In response to detecting a first finger gesture on a first key in the first virtual keyboard, an action corresponding to the first key in the first virtual keyboard is performed. In response to detecting a second finger gesture on a second key in the second virtual keyboard, an action corresponding to the second key in the second virtual keyboard is performed. | 10-06-2011 |
20120278808 | PEER TO PEER COMPONENT DISTRIBUTION - A method, apparatus, and system are provided for assigning tasks and/or providing resources in a distributed system. An indication of a task being available for processing is provided to one or more remote systems in a distributed system based on a distribution list. At least one response from one of the remote systems capable of performing the task is received in response to the indication. The response includes a request for a resource for performing the task. The resource for performing the task is provided to the remote systems. | 11-01-2012 |
20140237219 | MICROSTACKSHOTS - A method and apparatus of a device that captures a stackshot of an executing process is described. In an exemplary embodiment, the device detects an interrupt of the process occurring during the execution of the process, where the process execution can be in a kernel space and user space, and the interrupt occurs during the user space. The device further determines whether to capture a stackshot during the interrupt using a penalty function. If the stackshot is to be captured, the device captures the stackshot and saves the stackshot. | 08-21-2014 |
20150031397 | Address Point Data Mining - Techniques for address point data mining are described. An address point data mining method, system, or program product can determine geographic coordinates of an address based on geographic locations of one or more user devices. Each user device can be a mobile device operable to determine a location using a global navigation system (e.g., GPS), wireless signal triangulation, or other techniques. During the course of a time period (e.g., a day or week), the user device can stay at a location for a significant amount of time. The system can crosscheck this location with a geocoded geographic coordinates of a registered address (e.g., a billing address) that is associated with the mobile device. The system can determine whether the geocoded geographic coordinates are accurate based on result of the crosscheck. | 01-29-2015 |
20150347684 | MANAGING USER INFORMATION - DATA TYPE EXTENSION - Systems, methods, and computer-readable medium are provided for managing user information. For example, instructions for implementing a background process configured to manage a first set of data types may be received from a service provider. A data download that includes information about the new data type may also be received from the service provider. A request to access data corresponding to the new data type may be received from an application. Additionally, in some examples, the data corresponding to the new data type may be provided to the application based at least in part on interpreting the data download. | 12-03-2015 |
20150350823 | LOCATION SERVICE AUTHORIZATION AND INDICATION - An application can specify a location service authorization type to be enforced by a mobile device. After the user authorizes the location service through an authorization dialog, the application can receive location service according to the authorization type. A first authorization type allows the application to receive continuous location updates and location events from a location service on the mobile device only when the application is in use. A second authorization type allows the application to always receive continuous location updates and location events when the application is running in a foreground or background. The text of the authorization dialog can be customized by the application to provide more detail on how the location data will be used by the application. | 12-03-2015 |
Patent application number | Description | Published |
20120005747 | SYSTEM AND METHOD FOR STORING A PASSWORD RECOVERY SECRET - Disclosed herein are systems, methods, and non-transitory computer-readable storage media for storing a password recovery secret on a peripheral such as a power adapter by receiving a password recovery secret at the power adapter via an interface with the computing device, and storing the password recovery secret on a memory in the power adapter. The password recovery secret can be recovered by requesting the password recovery secret from the power adapter, wherein the password recovery secret is associated with a computing device, receiving the password recovery secret from the memory of the power adapter, and recovering a password based on the password recovery secret. The power adapter can include an electrical source interface, an electronic device interface, an intermediate module to adapt electricity between the interfaces, a memory, and a memory interface through which a password recovery secret is received for storage in the memory. | 01-05-2012 |
20130219489 | SYSTEM AND METHOD FOR STORING A PASSWORD RECOVERY SECRET - Disclosed herein are systems, methods, and non-transitory computer-readable storage media for storing a password recovery secret on a peripheral such as a power adapter by receiving a password recovery secret at the power adapter via an interface with the computing device, and storing the password recovery secret on a memory in the power adapter. The password recovery secret can be recovered by requesting the password recovery secret from the power adapter, wherein the password recovery secret is associated with a computing device, receiving the password recovery secret from the memory of the power adapter, and recovering a password based on the password recovery secret. The power adapter can include an electrical source interface, an electronic device interface, an intermediate module to adapt electricity between the interfaces, a memory, and a memory interface through which a password recovery secret is received for storage in the memory. | 08-22-2013 |