University Orthopaedics Center 590 S Wakara Way, Salt Lake City, UT 84108 8015877100 (phone), 8015877111 (fax)
Education:
Medical School University of Southern California Keck School of Medicine Graduated: 1988
Procedures:
Arthrocentesis Hip Replacement Knee Replacement Spinal Surgery Hip/Femur Fractures and Dislocations Joint Arthroscopy Knee Arthroscopy Wound Care
Conditions:
Osteoarthritis Ankylosing Spondylitis (AS) Fractures, Dislocations, Derangement, and Sprains Internal Derangement of Knee Internal Derangement of Knee Cartilage
Languages:
English Spanish
Description:
Dr. Peters graduated from the University of Southern California Keck School of Medicine in 1988. He works in Salt Lake City, UT and specializes in Orthopaedic Surgery. Dr. Peters is affiliated with Primary Childrens Hospital, Shriners Hospitals For Children Salt Lake City and University Of Utah Hospital.
Dr. Peters graduated from the University of Louisville School of Medicine in 1994. He works in Louisville, KY and specializes in Child & Adolescent Psychiatry. Dr. Peters is affiliated with Kosair Childrens Hospital and University Of Louisville Hospital.
Dr. Peters graduated from the Kansas City University of Medicine and Biosciences College of Osteopathic Medicine in 2011. He works in East Greenwich, RI and specializes in Internal Medicine. Dr. Peters is affiliated with Kent Memorial Hospital.
Northeast Radiation Oncology Center 1110 Meade St, Scranton, PA 18512 5705047200 (phone), 5705047217 (fax)
Education:
Medical School Case Western Reserve University School of Medicine Graduated: 2003
Conditions:
Malignant Neoplasm of Female Breast Melanoma Skin Cancer Thyroid Cancer
Languages:
Chinese English
Description:
Dr. Peters graduated from the Case Western Reserve University School of Medicine in 2003. He works in Dunmore, PA and specializes in Radiation Oncology and Medical Oncology. Dr. Peters is affiliated with Geisinger Community Medical Center, Moses Taylor Hospital and Regional Hospital Of Scranton.
Craig Lawton - Raleigh NC, US Jonathan Lewis - Morrisville NC, US Jesse Overby - Raleigh NC, US Christopher Peters - Pflugerville TX, US Lorin Ullmann - Austin TX, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 15/16
US Classification:
709227000
Abstract:
A method, apparatus, and computer instructions for distributing meeting minutes from an instant messaging session. Meeting minutes are generated using data from the instant messaging session, in response to receiving a user input to distribute text from the instant messaging session. The meeting minutes are then distributed by email to a list of recipients.
Adapting The Demonstration Of A Program Execution Without Modifying The Program Code By Providing Application Hooks In The Program To Display User Selected Images
David Cox - Raleigh NC, US Craig Lawton - Raleigh NC, US Jonathan Lewis - Morrisville NC, US Christopher Peters - Round Rock TX, US Lorin Ullmann - Austin TX, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 9/44
US Classification:
717124000, 717130000
Abstract:
A method, computer program product and system for displaying images during the execution of an application. A developer of an application inserts application hooks at particular locations in the code of the application to be executed. An application hook could be a call to a function in a utility code where the call includes the passing of a “key name”. The called function may retrieve an image located at an image file name in a configuration file associated with the key name if such an image file exists. Presentations that demonstrate the execution of the application may be easily modified by adding, deleting or replacing images at these file names. These modifications may be made without modifying the code of the application being executed. In this manner, different images used in different presentations may be displayed to different targeted audiences without modifying the code of the executed application.
Allowing Multiple Decisions To Be Made By Multiple Decision Makers During Software Installation
David Cox - Raleigh NC, US Craig Lawton - Raleigh NC, US Jonathan Lewis - Morrisville NC, US Christopher Peters - Round Rock TX, US Lorin Ullmann - Austin TX, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 9/445
US Classification:
717174000
Abstract:
A method, computer program product and system for allowing multiple decisions to be made by multiple decision makers during software installation. A developer of an installer program may select the decisions to be made during the installation process. The developer may further designate the decision makers to handle each of these decisions in a configuration file. The configuration file may be compiled into executable code where the executable code may be embedded in the installer program. By the developer designating multiple decision makers to handle multiple decisions, multiple decision makers may now be able to be involved during the software installation process.
Detecting Previously Installed Applications Using Previously Installed Detection Mechanisms Separate From Installer Program
David Cox - Raleigh NC, US Craig Lawton - Raleigh NC, US Jonathan Lewis - Morrisville NC, US Christopher Peters - Round Rock TX, US Lorin Ullmann - Austin TX, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 9/445
US Classification:
717174000
Abstract:
A method, computer program product and system for detecting previously installed applications on a system. An installer program may invoke an application programming interface to call a software component, referred to as a “manager”, to detect previously installed applications on the system. The manager may be configured to query detection mechanisms, referred to as “collectors”, to perform their own detection techniques to detect applications installed on the system. Since each collector may perform its own unique detection technique, the collectors may be used together to detect more applications installed on the system than if the installer program attempted to detect the applications installed on the system by itself.
Securing Location Of An Installed Middleware Application And Securing Location Of Containers Contained Within Installed Middleware Application
David Cox - Raleigh NC, US Craig Lawton - Raleigh NC, US Jonathan Lewis - Morrisville NC, US Christopher Peters - Round Rock TX, US Lorin Ullmann - Austin TX, US Douglas Wood - Raleigh NC, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 17/30 G06F 7/00
US Classification:
707009000, 707001000
Abstract:
A method, computer program product and system for protecting the location of an installed middleware application. An installer program may generate a private/public key pair at build time of a middleware application. Upon the installer program installing the middleware application, the installation location of the middleware application may be encrypted using the generated private key and then discarding the private key. The encrypted installation location of the middleware application may be decrypted by a subsequent installer program upon receiving a public key from the developer of the middleware application. Since the public key was not shipped with the middleware application, an illegitimate program, such as a Trojan horse, may not be able to decrypt the installation location of the middleware application. Since the public key may only be obtained from the developer of the middleware application, only legitimate programs may be able to decrypt the location of the installed middleware application.
Ownership Management Of Containers In An Application Server Environment
David Cox - Raleigh NC, US Craig Lawton - Raleigh NC, US Jonathan Lewis - Morrisville NC, US Christopher Peters - Round Rock TX, US Lorin Ullmann - Austin TX, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 7/00
US Classification:
707100000
Abstract:
A method, computer program product and system for determining ownership of containers. An installer program may edit stored information, such as ownership, about software component(s) it installed in a container. Upon a subsequent installer program planning to install a software component in that container, software, referred to as a “collector,” may identify the owners of the software components stored in that container. The collector may then search the rules in a rules database to determine the ownership of the container based on the ownership of the software components in the container. By mapping the software components stored in a container with their respective owners, the ownership of a container may be determined.
Creation Of Highly Available Pseudo-Clone Standby Servers For Rapid Failover Provisioning
- Armonk NY, US Craig Lawton - Raleigh NC, US Christopher Andrew Peters - Round Rock TX, US Lorin Evan Ullmann - Austin TX, US John Patrick Whitfield - Cary NC, US
International Classification:
G06F 11/20 H04L 12/24
Abstract:
Near clones for a set of targeted computing systems are provided by determining a highest common denominator set of components among the computing systems, producing a pseudo-clone configuration definition, and realizing one or more pseudo-clone computing systems as partially configured backups for the targeted computing systems. Upon a planned failover, actual failure, or quarantine action on a targeted computing system, a difference configuration is determined to complete the provisioning of the pseudo-clone system to serve as a replacement system for the failed or quarantined system. Failure predictions can be used to implement the pseudo-clone just prior to an expected first failure of any of the targeted systems. The system can also interface to an on-demand provisioning management system to effect automated workflows to realize pseudo-clones and replacement systems automatically, as needed.
System And Method For Industrial Process Automation Controller Farm With Flexible Redundancy Schema And Dynamic Resource Management Through Machine Learning
- Morris Plains NJ, US Avinash Rajan - Bangalore, IN Kalyanasundaram Govindaraj - Bangalore, IN Amol Kinage - Bangalore, IN Ravi Kumar Ramamurthy - Bangalore, IN James Schreder - Lansdale PA, US Christopher Peters - Chester VA, US
International Classification:
G05B 19/042 G06F 13/16 G06F 13/40
Abstract:
A system includes a high speed bus and a plurality of multi-function modules coupled to the high speed bus. The plurality of multi-function modules includes at least one controller configured to execute control logic for the system. The plurality of multi-function modules also includes at least one arbitrator configured to manage the at least one controller. The plurality of multi-function modules further includes at least one input/output (IO) manager configured to interface between the at least one controller and at least one field device.
News
Business Decisions By Health Insurers Can Catch Patients Off-Guard
Another unanticipated outcome of narrow networks is the possibility of an unexpected bill for health care services, says Christopher Peters, MD, president of Lackawanna County Medical Society located in Dunmore, Pa.
Date: Apr 13, 2016
Category: Business
Source: Google
Fashion Week begins with Kanye, BCBG, Creatures of the Wind
At Creatures of the Wind, design duo Shane Gabier and Christopher Peters went for an esoteric cultural theme: They called their show "an exploration of definitive moments in American psychedelic culture."
With a delicious clackety clack on the runway, Creatures of the Wind designers Christopher Peters and Shane Gabier on Thursday debuted their first in-house collection of shoes: comfy platform sandals, slides, low loafers and chunky heels.
Creatures of the Wind is the creation of Shane Gabier and Christopher Peters who started the label in Chicago in 2008. Their first collection was featured on the cover of WWD and this year they won the CFDA Swarovski Award for Womenswear (after being nominated for the second time). With a strong ey
Date: Sep 03, 2014
Category: Entertainment
Source: Google
Fashion Week: Slushy streets, boots on the runways
Asked in a backstage interview to define the overall mood of their new collection, the designers of the Creatures of the Wind label, Shane Gabier and Christopher Peters, came up with the words enveloping and warm.
Date: Feb 06, 2014
Category: Entertainment
Source: Google
Preview of spring styles at NY Fashion Week; BCBG among the first shows
The label helmed by Midwesterners Shane Gabier and Christopher Peters showed maturity after the mentorship and attention that comes with being a finalist in the Vogue Fashion Fund and an emerging-talent nominee at the Council of Fashion Designers of America awards. The show wasnt, well, showy. It h
Date: Sep 05, 2013
Category: Entertainment
Source: Google
Avalanche survivor stuck in snow for four hours - Aspen Business Journal
The victims previously identified as Christopher Peters, 32, of Lakewood; Joseph Timlin, 32, of Gypsum; Ryan Novack, 33, of Boulder; Ian Lamphere, 36, of Crested Butte; and Rick Gaukel, 33, of Estes Park were part of a larger gathering who were participating in the Rocky Mountain High Backcountr
The four snowboarders and a skier who died were all from Colorado. The Clear Creek County sheriff's office identified them as Christopher Peters, 32, of Lakewood; Joseph Timlin, 32, of Gypsum; Ryan Novack, 33, of Boulder; Ian Lamphere, 36, of Crested Butte; and Rick Gaukel, 33, of Estes Park.
Dondero Elementary School Portsmouth NH 1992-1994, Hollin Meadows Elementary School Alexandria VA 1994-1994, Spellman Elementary School Cheverly MD 1995-1995, Saint Ambrose School Cheverly MD 1996-1998, Temple University High School Philadelphia PA 2002-2004
Community:
Arleen Zubrick, Barbara Sperry, Robert Servin, Thelma Williams