Abstract:
The subject disclosure is directed towards establishing communication between a client computer and a network resource on a computer network when DNS resolution has failed because of a DNS proxy solution. A user may request that the client use a tool as an alternative to DNS resolution. The client may monitor the network for a broadcast from the network resource, which contains information needed for the client to access the network resource. The network resource may broadcast the information from time to time, or it may broadcast it in response to a specific request from the client.
Abstract:
A computerized method for identifying, ranking, and auditing configurable providers is described. The method receives and stores information about plural providers including provider name, provider icon, provider contact information, landing URL, configurables offered, geographical locations, and descriptions of configurables. The method receives a request from a computer that includes a geographic location. The method searches the stored information about providers in order to identify a list of provider servers that auto-configure configurables in the geographic location. The method sends information and the list of provider servers to the computer, and the sent information includes provider names, provider rank, provider landing URL, and descriptions of configurables. The method receives auditing information from the computer including a provider server selected from the list, a transaction for a selected configurable, and an indication that the selected configurable is operational. The method ranks provider servers based upon ranking factors including audit information received from plural computers.
Abstract:
A system that allows senders to manage electronic messaging content at the point of origin integrates with the client application being used to prepare the message for sending. A send request is intercepted inside the client and a series of message analysis steps is performed that analyze the sender, recipient, message, any attachments to the message, and/or related content and information. The output of the message analysis steps is made available for use with rules that specify the performance of a number of actions. The content analysis steps and the actions taken may be determined by the sender or may be centrally managed and determined by an organization.
Abstract:
A computerized method for identifying, ranking, and auditing configurable providers is described. The method receives and stores information about plural providers including provider name, provider icon, provider contact information, landing URL, configurables offered, geographical locations, and descriptions of configurables. The method receives a request from a computer that includes a geographic location. The method searches the stored information about providers in order to identify a list of provider servers that auto-configure configurables in the geographic location. The method sends information and the list of provider servers to the computer, and the sent information includes provider names, provider rank, provider landing URL, and descriptions of configurables. The method receives auditing information from the computer including a provider server selected from the list, a transaction for a selected configurable, and an indication that the selected configurable is operational. The method ranks provider servers based upon ranking factors including audit information received from plural computers.
Abstract:
A method may include steps of providing a tissue cutting device having a shaft and a cutting element. The cutting element may be movable from a collapsed position to an expanded position. The tissue cutting device may be introduced into the patient's breast through a first incision with the cutting element in the collapsed position. The cutting element may then be expanded. The cutting element may then be moved through breast tissue to cut around the tissue to be removed, and the breast tissue may be removed through a second incision that is different from the first incision.
Abstract:
A suction sleeve is configured to couple to the shaft of an RF device to evacuate hot gasses, fluids and/or other aspirates. The suction sleeve may be configured to be disposed coaxially around the shaft between the first end of the shaft and the work element (e.g., an RF cutting element) thereof. The suction sleeve defines a suction port and a plurality of openings near the work element, and is configured to enable suction in through the plurality of openings and out through the suction port.
Abstract:
A system for adding value to a host device via a mobile communication device is described. The system includes: a host device configured for providing additional value to be utilized, wherein the additional value includes at least one printing device function and is provided in response to receiving an authentication code; a central system configured for providing the authentication code for inputting into the host device to authorize the at least one printing device function to be utilized; and a mobile communication device configured for negotiating the additional value to be applied to the host device.
Abstract:
Systems and methods may determine prescribing physician activity levels. Information associated with a plurality of healthcare transaction requests that are received during a designated time period from at least one healthcare provider computer for communication to one or more claims processor computers may be collected. A respective prescribing physician for each of the plurality of received healthcare transaction requests may be identified. For each identified physician, a respective activity measure for the designated time period may be calculated based upon a respective number of the healthcare transaction requests identifying the physician.
Abstract:
Described is a technology by which machines of a (typically small) network have associated public key-based certificates for use in authentication with a server and validation of other machines in the network. This provides an inexpensive and straightforward mechanism to control, manage and maintain client machines, as well as to allow valid client machines to securely communicate with one another and recognize machines that are not valid on the network. Certificates are maintained on the server and checked for validity as needed.
Abstract:
A system for categorizing electronic messages is based on analysis of images within them. Information is extracted about potential text areas in an image and represented as a series of bounding polygons that circumscribe the text-containing regions of the image. Descriptive information and statistics are extracted from the set of bounding polygons and a set of textual representations suitable for pattern matching or Bayesian analysis is produced. The derived categorization may be used to drive classification-based engines. In an electronic message classifier, the classifier derives information from at least one textual token for use in making a probabilistic classification of the electronic message.