US8316044(ORACLE INT CORP [US])
[0063] According to one embodiment, techniques are provided that allow a party to serve the role of an “Internet Database Service Provider” or IDSP. Like an ISP, the IDSP is a second party service provider which maintains the equipment necessary for a subscriber to use the Internet. Unlike the conventional ISP, the IDSP provides the subscriber with database services that are accessible over a network to which the subscriber has access. In certain embodiments, the database services may be part of a larger package that provides the subscriber with an Internet presence that includes automatically generated database components. The IDSP itself may be supported by a third party, such as a database software developer, operating a database community server on the Internet.
US9496971(QUALCOMM INC [US])
(Ab)
Techniques are provided that may be implemented in various methods, apparatuses and articles of manufacture for use by one or more electronic devices to support proximity services for a mobile device. In an example implementation, a computing device may determine whether a first mobile device and a second mobile device are each operatively provisioned to make use of a common proximity service, use a first procedure to determine whether a state of near proximity exists between at least two mobile devices, use a second procedure to determine whether a state of proximity exists between the at least two mobile devices, and initiate notification of a user and/or an application of at least one of the mobile devices in response to one or more of such determinations.
[0035] The inventors have recognized and appreciated various competing concerns in digital identity management. For instance, it may be desirable to restrict access to a user's personal data (e.g., by storing the personal data in a virtual container controlled by the user), thereby protecting the user's privacy. On the other hand, it may be desirable to use a transparent mechanism for recording attestations (e.g., by storing the attestations in a publicly available data structure that is replicated at multiple nodes in a network), so that an attacker cannot easily forge an attestation. Accordingly, in some embodiments, techniques are provided that allows a user to control how much personal data is shared, while maintaining transparency of attestations. In this manner, a trust structure may be implemented without oversharing of personal data.
(Ab)
Techniques are provided that involve employing artificial intelligence (AI) to facilitate reducing adverse outcomes associated with healthcare delivery. In one embodiment, a computer implemented method comprises monitoring live feedback received over a course of care of a patient, wherein the live feedback comprises physiological information regarding a physiological state of the patient. The method further comprises employing AI to identify, based on the live feedback information, an event or condition associated with the course of care of the patient that warrants clinical attention or a clinical response. The method further comprises generating a response, based on the identification of the event or condition, that facilitates reducing an adverse outcome of the course of care, wherein the response varies based on a type of the event or condition, and providing the response to a device associated with an entity involved with treating the patient in association with the course of care.
※コメント投稿者のブログIDはブログ作成者のみに通知されます