Abstract:
The present invention relates to an IPTV System for provisioning IPTV services to a subscriber of said IPTV system. The IPTV-system comprises an application server for provisioning IPTV services to the subscriber via a first client device that is associated to the subscriber and the first client device. The application Server is coupled to the first client device over a communications network.The IPTV system further comprises a location determination part that is adapted to determine an actual location of the subscriber and a service provisioning determination part that is adapted to determine alternative means for provisioning the IPTV services to the subscriber based on the location of the subscriber.
Abstract:
A data custodian and curation system may store data from a data supplier in encrypted form and may allow users to consume the data when the consumers obtain access to the data through an agreement. The curation system may manage access to the data, even allowing a consumer to use the data as if it were their own, but may track each usage of the data to implement a payment scheme or various usage restrictions. The curation system may encrypt downstream uses of the data and operate as a digital rights management system for the data. The custodian and curation system may operate as a cloud service that may contain encrypted data from many data providers but where the data providers may individually control access to their data in a managed system at any granular level.
Abstract:
Described herein are techniques for distributed key management (DKM) in cooperation with Trusted Platform Modules (TPMs). The use of TPMs strengthens the storage and processing security surrounding management of distributed keys. DKM-managed secret keys are not persistently stored in clear form. In effect, the TPMs of participating DKM nodes provide security for DKM keys, and a DKM key, once decrypted with a TPM, is available to be used from memory for ordinary cryptographic operations to encrypt and decrypt user data. TPM public keys can be used to determine the set of trusted nodes to which TPM-encrypted secret keys can be distributed.
Abstract:
A system, method, and optical communication device are disclosed. The system can include a plurality of optically coupled nodes forming an optical communication network. Each node may include an array of pixel elements, each pixel element having an optical detector and an active optical source. The pixel array may be disposed in a backplane of a lens that is configured to map incoming optical signals to pixel locations in the backplane according to their respective angles of incidence and to minimize a deviation at each pixel location between incoming optical signals arriving at the optical detector and emissions from the optical source. The node may include a processor and memory. The processor can register senders in the optical network at locations in the pixel array and can generate routing information by which to route communications from the registered senders to other pixel elements for transmission to their respective destinations.
Abstract:
A container, comprising: a body; and, a closure; wherein the closure has a lid hinged to a ring mounted on the body, the lid moveable from an open position to a closed position; wherein the lid has a tab hinged thereto for: inserting into and engaging a slot formed in the ring as the lid is moved to the closed position from the open position to thereby lock the lid in the closed position; or, receiving and engaging a pin head of a pin mounted on the ring in a hole formed in the tab to thereby hold the lid in the closed position, the pin configured to detach from the ring when the tab and lid are returned to the opened position.
Abstract:
Disclosed is a processor-implemented method for processing image data using an image processing apparatus. The processor is configured to receive a PDL file of image data and raster image process (RIP) the PDL file to determine at least pixels representing text of a predetermined colorant. The ripped file is then segmented to determine at least any text pixels of the predetermined colorant not initially indicated by the ripped file. The results are combined to determine text pixels of the predetermined colorant for marking onto a substrate using marking material (e.g., ink). In some instances, pixels of the predetermined colorant can be tagged during segmenting using a tag plane to determine text pixels for marking by the output device.
Abstract:
The subject disclosure is directed towards enriching database query responses using data from external data sources. When processing a database query seeking enriched data from an external data source, a request is communicated to the external data source based on the database query. An enriched database query response is generated based on data provided by the external data source. The enriched database query response may be combined with data returned via an internal database query operation, and/or inserted into a local database table.
Abstract:
A dispenser for sachets comprising a container for sachets, having a slot opening communicating with an internal cavity such that a sachet may be inserted into the slot into the cavity, with an abutment surface within the cavity to limit the distance the sachet may extend into the cavity, and a cutter located within the cavity to cut the sachet, preferably on a withdrawal movement so the sachet is in tension. In another embodiment the dispenser dispenses sachets along a dispensing path and a cutter is located in the dispensing path to intercept and cut the sachet.
Abstract:
Systems and methods are provided for detecting failure in clamping of a material and/or firing of a staple into a clamped material and indicating such failure to a user on a user interface. The system and methods are particularly suited for use with end effectors having closing and/or firing mechanisms coupled to an actuator. By monitoring a driving parameter of an actuator that effects the clamping and/or firing, the systems and methods provide an indication of failure in response to the monitored drive parameter. In some embodiments, an indication of failure is output when the monitored drive parameter is outside an acceptable range of desired driving parameters during clamping and/or firing. The disclosed systems and methods are particularly beneficial when used for minimally invasive surgery.