Sierra Orthopedics 1780 E Florence Blvd STE 106, Casa Grande, AZ 85122 5208368988 (phone), 5208367930 (fax)
Education:
Medical School University of Illinois, Chicago College of Medicine Graduated: 1979
Procedures:
Arthrocentesis Carpal Tunnel Decompression Hip Replacement Knee Arthroscopy Knee Replacement Shoulder Arthroscopy Hip/Femur Fractures and Dislocations Lower Arm/Elbow/Wrist Fractures and Dislocations Lower Leg/Ankle Fractures and Dislocations Shoulder Surgery
Conditions:
Fractures, Dislocations, Derangement, and Sprains Internal Derangement of Knee Internal Derangement of Knee Cartilage Internal Derangement of Knee Ligaments Intervertebral Disc Degeneration
Languages:
English Spanish
Description:
Dr. Erickson graduated from the University of Illinois, Chicago College of Medicine in 1979. He works in Casa Grande, AZ and specializes in Orthopaedic Surgery and Orthopedic Sports Medicine. Dr. Erickson is affiliated with Banner Casa Grande Medical Center.
Us Patents
Dynamic Behavior-Based Access Control System And Method
Thomas D. Erickson - Minneapolis MN Wendy A. Kellogg - Yorktown Heights NY Peter K. Malkin - Arsdley NY John T. Richards - Chappaqua NY Philip S. Yu - Chappaqua NY
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 1730
US Classification:
707 9, 707 5, 713200
Abstract:
The present invention provides a method for controlling an entitys access to a resource based on observed behavior of the entity. The method assigns the entity a default authorization meta-tag. The method monitors the entitys behavior and updates the entitys meta-tag based upon the observed behavior. Accordingly, dynamic behavior-based access control is achieved.
Thomas D. Erickson - Minneapolis MN, US Peter K. Malkin - Arsdley NY, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 15/16 G06F 15/177
US Classification:
709226, 709229, 705 36, 705 37, 345418
Abstract:
The present invention relates to a method for providing an electronic environment for facilitating user interaction with a business. The method displays an abstract graphical proxy for the environment, displays an abstract graphical proxy for at least one consumer within the environment, and provides the consumer with interactive business facilities. The environment is a marketplace structured by the business. The environment includes a chat application. The chat application includes one of private chat and public chat. The environment comprises interactive applets. Each consumer proxy is individualized according to consumer input or each consumer proxy is individualized according to consumer activity.
A computer-implemented method is provided for representing an environment having at least one aspect. The method includes representing the aspects in an activity map comprising at least two perspectives, and representing a state of a user within the environment as a tangible link between each perspective. The state of the user includes user activity within the environment. The method further includes the step of dynamically incorporating the state of the user in the activity map. The tangible link is a tangible cue which associates perspectives represented by the activity map.
Thomas Erickson - Minneapolis MN, US Wendy Kellogg - Yorktown Heights NY, US Peter Malkin - Ardsley NY, US Tracee Wolf - Irvington NY, US
Assignee:
INTERNATIONAL BUSINESS MACHINES CORPORATION - Armonk NY
International Classification:
G06F015/16 H04Q011/00 H04L012/16
US Classification:
709204000, 370260000
Abstract:
An Agenda-Driven Meeting (ADM) allows a distributed set of users to have an online, not necessarily synchronous meeting including an agenda which specifies both the topics or goals of the meeting's phases, as well as the interrelationship between the phases, including the order of execution. The system provides a graphical representation, which shows the status of each phase—including indicators of user participation—as well as the relationship between the phases. Input can include text comments; queries, potentially directed to one or more users; responses to these queries; task assignments, also potentially directed to one or more users; summaries of phases; and indicators of users interest in a given query or response. The ADM graphic representation reflects each of the elements including the particular phase to which a given element is related. The system allows a given user to replay a given ADM instance, even after the meeting has been completed. A service is also provided enabling a service organization to facilitate the use of Agenda-Driven Meetings by a customer organization.
Behavior-Based Resource Capacity Adjustment Method For Business Processes
Thomas Erickson - Minneapolis MN, US Brent Hailpern - Katonah NY, US Wendy Kellogg - Yorktown Heights NY, US Peter Malkin - Ardsley NY, US
International Classification:
G06F 9/46
US Classification:
718104000
Abstract:
According to an embodiment of the invention, a method includes steps of deriving a process-based resource adjustment model for the process; monitoring the process for the number of users using each of steps of the process at time t; calculating the number of users that will using each of the process steps at time t, which is later than time t; determining the resources required to serve the process at time t; and adjusting the resources as appropriate to ensure adequate capacity, this adjustment completed by time t. Other embodiments include a computer program product and an information processing system configure for performing the process.
Managing The Progressive Legible Obfuscation And De-Obfuscation Of Public And Quasi-Public Broadcast Messages
Thomas D. Erickson - Minneapolis MN, US David W. Levine - New York NY, US
Assignee:
INTERNATIONAL BUSINESS MACHINES CORPORATION - Armonk NY
International Classification:
H04L 9/32 G06F 21/24
US Classification:
726 6, 726 28, 726 3, 726 5
Abstract:
Obfuscating a message, in one aspect, may include detecting sensitive information in a message to be broadcast into public or quasi-public computer network environment; replacing the sensitive information in the message with a representation that preserves general aspects of the sensitive information and a user interface element, the user interface element for enabling a viewer of the message to request access to details of the sensitive information; and transmitting the replaced message for broadcasting into the public or quasi-public computer network environment. De-obfuscating the message, in one aspect, may include authenticating one or more viewers or receivers of the message and based on the authentication, presenting details associated with the sensitive information.
Distributed Software Framework For Defining And Managing Geo-Task Campaigns
Thomas D. Erickson - Minneapolis MN, US Loren Terveen - Minneapolis MN, US
Assignee:
INTERNATIONAL BUSINESS MACHINES CORPORATION - Armonk NY
International Classification:
G06Q 10/06
US Classification:
705 713
Abstract:
Defining and managing geo-task campaigns, in one aspect, may include enabling a creator of a campaign to define a collective data-gathering activity to be carried out by a plurality of participating respondents, the collective data-gathering activity defined at least by geographic location, time period and activity. One or more response values may be received from the plurality of participating respondents, the response values including data that conforms to the defined collective data-gathering activity including a description of the geographic location, a description of the time period, a description of one or more objects at the location associated with the activity. Response values are coordinated according to the defined geographic location, time period and activity.
- Armonk NY, US Thomas D. Erickson - Minneapolis MN, US Brian P. Gaucher - Brookfield CT, US Wendy A. Kellogg - Solana Beach CA, US
International Classification:
G06Q 50/00 G06Q 10/10
Abstract:
For a given time period, for each pair of a plurality of participants in a meeting, it is determined whether a connection exists between members of the pair. For the given time period, for each pair of the participants for which a connection exists, a valence of the connection is determined; a social network is created, depicting the connections and their valences; and, based on the social network, at least one faction is identified within the plurality of participants in the meeting. The steps of determining the connections, determining the valences, creating the network, and identifying the at least one faction, are repeated for a plurality of additional time periods, to assess faction dynamics of the plurality of participants in the meeting.