The application is a co-pending application of U.S. patent application Nos. 12/940,331 and 12/940,346 entitled “SYSTEM AND METHOD FOR REMOVING CUSTOMER PERSONAL INFORMATION FROM AN ELECTRONIC DEVICE”and “SYSTEM AND METHOD FOR AUDITING REMOVAL OF CUSTOMER PERSONAL INFORMATION ON ELECTRONIC DEVICES”which are being filed concurrently herewith. The teachings and disclosures of which are each hereby incorporated in their entireties by reference thereto.
Usage of mobile, wireless, and electronic devices has grown nearly exponentially in recent years. The expanded use of such products and devices has been fostered by improvements in communications standards, protocols, signaling, hardware, software, and other advances. Under various circumstances, users may return electronic devices to an original equipment manufacturer (OEM), retailer, repair facility, service provider or other entity. Electronic devices are often returned for repairs, exchanges, warranty issues, or any number of other justified or arbitrary reasons. It is imperative that any electronic device that has been returned be cleared of all personal information, sensitive data, or other information linked to a previous user. If the personal information is not removed, applicable laws, industry standards, and common business practices may be violated. For example, the personal information may be used by another party to perpetrate an act of identity theft. Similarly, a previous user's privacy may be otherwise violated.
One embodiment provides a system and method for flashing wireless devices. One or more wireless devices may be received. The testing device may be operable to receive the one or more wireless devices simultaneously. A selection of one or more original equipment manufactures (OEMs) may be received. Models of wireless devices associated with the one or more OEMS may be visually displayed for in response to receiving the selection of the one or more OEMS associated with the one or more wireless devices. A selection of one or more models associated with the one or more wireless devices may be received on the test device. Instructions associated with the one or more models may be displayed for flashing the one or more wireless devices. The one or more wireless devices may be flashed in response to a user selection to flash each of the one or more wireless devices.
Another embodiment provides a system for flashing wireless devices. The system may include a number of test clients. The system may also include a managing device for updating an application utilized by each of the number of test clients to remove personal information from one or more wireless devices. Each of the number of test clients may be operable to receive a number of wireless devices for simultaneous or concurrent flashing the number of wireless devices, receive a selection of an OEM associated with a wireless device included within the number of wireless devices connected to the test client, visually display models of each of a number of wireless devices associated with the OEM for receiving a user selection of a wireless device in response to receiving the selection of the OEM associated with the wireless device, receive a selection of a model associated with the wireless device, display instructions associated with the model for flashing the wireless device, and flash the wireless device in response to a user selection to flash the wireless device.
Yet another embodiment provides a test device for testing electronic devices. The test device may include a processor for executing a flashing application and a memory for storing the application. The memory may include a number of partitions for testing a number of electronic devices from a number of OEMs. The application may be operable to receive a selection of an OEM associated with a electronic device from the plurality of OEMs, visually display models of electronic devices associated with the OEM in response to receiving the selection of the OEM associated with the electronic device, receive a selection of a model associated with the electronic device; on the test device, display instructions associated with the model for flashing the electronic device, and concurrently flash the one or more of the plurality of electronic devices in response to a user selection to flash each of the plurality of electronic devices. The testing device may also include a number of adapters for connecting the number of electronic devices to the test device simultaneously. The testing device may further include a communications interface for communicating with one or more managing devices to update the application and information utilized by the application.
Illustrative embodiments of the present invention are described in detail below with reference to the attached drawing figures, which are incorporated by reference herein and wherein:
The illustrative embodiments provide a system and method for detecting and removing customer private information (CPI) from electronic devices. CPI is removed from electronic devices in order to ensure the electronic devices may be repaired, exchanged, refurbished, returned, substituted, or otherwise recycled for usage. The detection of and removal of CPI allows service providers and other organizations or parties to comply with applicable laws, meeting industry standards, and maintain good relationships with consumers, retailers, service providers, and others that may utilize the electronic device or provider services for those electronic devices.
The illustrative embodiments may be implemented as a local client, networked system, or device for flashing electronic devices. Flashing electronic devices includes removing all personal information previously entered or utilized by a previous owner or user as well as ensuring the electronic device has the most updated versions of software, firmware, or other required or designated applications for utilizing the electronic device. The illustrative embodiments may allow multiple electronic devices, such as cell phones to be connected to a single flashing device (also referred to as a testing device or client) for flashing multiple electronic devices.
Electronic devices may include computing and telecommunications devices including cell phones, PDAs, smart phones, laptops, e-readers, mp3 players, and other forms of person or consumer electronic devices. CPI may include information, such as phone numbers, addresses, email addresses, IP addresses, social security numbers, bank accounts, contact lists, address books, passwords, usernames, and other sensitive information associated with the user or utilized by the user. Due to the prolific usage of wireless device, the process of flashing a wireless device is utilized as an ongoing example even though the process may be utilized for any number of electronic devices.
The process of flashing one or more electronic devices may take anywhere from a matter of seconds to a number of minutes. As a result, the technician or operator, herein referred to as a user, may initiate flashing for each of the electronic devices individually, as a group, or for an entire group which may represent electronic devices from multiple original equipment manufacturers (OEMs) or multiple devices of a single or different OEM's electronic device(s) at different times, concurrently or simultaneously, based on the preferences of the user.
The inability to properly remove CPI may result in identity theft, consumer bad will, contract or legal violations, and other undesirable effects or outcomes. In various embodiments, the CPI removal and detection process may be utilized or integrated into warehouse management operations, logistics services, and systems and devices that are utilized to process electronic devices. The electronic devices are processed by determining or detecting whether CPI is present on the electronic device, removing the CPI if necessary and reporting the removal or non-removal of CPI on devices that are being processed or have previously been processed to provide an audit trail as well as trend analysis information to interested parties. The embodiments as herein described may be automated or may require user interaction. In particular, the illustrative embodiments provide a system and method for tracking CPI that is detected on processed or unprocessed electronic devices and implementing CPI removal as well as tracking. The illustrative embodiments may be utilized to check for or check and clear CPI from electronic devices (also referred to as detect or detect and delete).
In one embodiment, the flashing device may include multiple partitions for implementing flashing for the electronic devices. A flashing application may be implemented or executed by the flashing device to flash the electronic devices by removing customer personal information (CPI) and updating the electronic device to include the most recent update or returning the electronic device back to a factory standard configuration. Updates or configurations of the electronic device are defined to include operating systems, firmware, applications and other software required to operate the electronic device,
In one embodiment the flashing system 100 may include flashing devices 102, 104, 106 and 108, a managing device 110 and networks 112 and 114. The flashing device 102 may further include the flashing application 116 displaying a graphical user interface 118 and may be utilized to test wireless devices 120, 122 and 124. As shown, the networks 112 and 114 represent public or private data or communication networks.
In one embodiment, network 112 may represent a private network utilized by a service provider to test numerous wireless devices returned to the service provider for repair, refurbishment, replacement, or for other circumstances. For example, the network 114 may represent an open or public network, such as the internet that is accessed by millions of users daily. The networks 112 and 114 may represent any number of private, virtual, or public networks.
The flashing devices 102, 104, 106 and 108 (102-108) represent communication devices each of which may be utilized to flash a number of wireless devices. Each of the flashing devices 102-108 may execute a version of the flashing application 116 in order to flash wireless devices, such as wireless devices 120, 122 and 124. Alternatively, the flashing devices 102-108 may access a flashing application stored and executed by the managing device 110 through the network 112. The managing device 110 is a computing device configured to manage the flashing systems, operations, applications and updates utilized by the flashing devices 102-108. In one embodiment, the managing device 110 may itself be a flashing device.
In one embodiment, the managing device 110 communicates with a network web portal during the initialization phase of the flashing system 100 or at a designated timeframe during off service hours to update the flashing application 116 or data including all applicable new software packages, utilized by the flashing applications 116 to flash the wireless devices 120, 122 and 124. The managing device 110 may control the flow of network information pertaining to updates so as to prevent the user from applying a flash request to an OEM or device which is in the process of updating. For example, during updates a visual blinking red light may indicate “Updates are in Progress . . . . Please wait” with the OEM selection process being locked out until update are completed and a status indicator light goes green to indicate the flashing device 102 is “ready.”
The managing device 110 may also receive or archive information and data regarding the flashing of wireless devices, such as wireless devices 120-124 performed by each of the flashing devices 102-108. As a result, the flashing activities of the service provider may be monitored, tracked, or archived for subsequent reference.
In one embodiment, the flashing system 100 may be utilized in a single building or complex of the service provider for flashing wireless devices. The flashing device 108 may represent a device at a remote facility, such as an annex building or retail store, that is also utilized for flashing wireless devices. The flashing application 116, as well as the graphical user interface 118, may allow a user to flash the wireless devices 120, 122 and 124. The flashing application 116 may also be executed by a standard computing or communications device to perform flashing by utilizing a number of adapters or hubs for connection to multiple wireless devices.
In one embodiment, the flashing application 116 may be executed on separate partitions of the flashing device 102 simultaneously in order to concurrently or simultaneously test the wireless devices 120, 122 and 124. The processes used by the flashing application 116 may not be compatible (inducing conflicts or errors) for all OEMs or wireless devices models requiring that separate instances of the flashing application 116 be executed so that user time and effort to flash the wireless devices 120-124, as well as computing resources are minimized.
In one embodiment, the partitioning is necessary to implement instances of the flashing application 116 (or separate flashing applications customized for specific OEMs or models) on separate partitions that would otherwise experience memory conflicts or errors if the flashing applications were running on the same partition. For example, wireless devices 120 and 124 might not be able to be tested concurrently because of conflicts within the flashing application 116. As a result, separate instances of the flashing application 116 may be executed on a first partition for flashing the wireless devices 120 and 122 that do not have conflicts and a separate instance of the flashing application 116 may be executed on a second partition for flashing the wireless device 124. As a result, the wireless devices 120-124 may be flashed concurrently or simultaneously despite potential conflicts or errors.
In one embodiment, the flashing device 200 may include a processor 202, a memory 204, a communications interface 206, adapter 1208, adapter 2210, adapter 3212, a memory 214, an application 216, partition 1218, partition 2220 and partition n 222. The respective partitions 218-222 may include OEM A 224, OEM B 226, OEM C 228, OEM D 230 and OEM E 232. The communications interface 206 is an interface for communicating with one or more networks or devices.
The processor 202 is circuitry or logic enabled to control execution of a set of instructions. The processor 202 may be microprocessors, digital signal processors, application-specific integrated circuits (ASIC), central processing units, or other devices suitable for controlling an electronic device including one or more hardware and software elements, executing software, instructions, programs, and applications, converting and processing signals and information, and performing other related tasks. The processor 202 may be a single chip or integrated with other computing or communications elements.
The memories 204 and 214 are hardware elements, devices, or recording medias configured to store data for subsequent retrieval or access at a later time. The memory 204 may be static or dynamic memory. The memory 204 may include a hard disk, random access memory, cache, removable media drive, mass storage, or configuration suitable as storage for data, instructions, and information. In one embodiment, the memory 204 and processor 202 may be integrated. The memory may use any type of volatile or non-volatile storage techniques and mediums.
In one embodiment, the communications interface 206 is an Ethernet network interface for communicating through an Ethernet network. The communications interface 206 may also represent other forms of network adapters for communicating with or through traditional or proprietary networks.
The adapters 208-212 represent adapters for communicating with a number of different wireless device types. For example, the adapters 208-212 may include mini or micro USB adapters or other similar adapters for communicating with wireless devices 234, 236 and 238. The adapters 208-212 are representative of interfaces that may communicate with wireless devices of all makes and models. Adapters 208-212 are shown as illustrative embodiments only. In one embodiment, the flashing device 200 includes enough adapters to fully occupy the time of the user in connecting and testing a number of wireless devices concurrently. For example, a user may connect the wireless devices 234 and 236 to adapter 1208, and adapter 2210, respectively, in order to initiate and complete the flashing process.
Once the flashing process has been initiated, the user may connect the wireless device 238 to the adapter 212 to begin testing for the wireless device 238. The flashing device 200 may also be connected to a number of other wireless devices thereby efficiently employing the user's time as well as the resources of the flashing device 200. The memory 214 may be configured to store data and information utilized by the flashing application 216 to perform the flashing as well as the result from the flashing and the flashing application 216 itself. The flashing application 216 may be configured to automatically flash the wireless devices 234-238 or to implement the flashing based on user input.
In one embodiment, once the wireless devices 234-238 are connected to the respective adapters 208-212, the application 216 may recognize the wireless devices 234-238 and implement the designated flashing process which may include removal of all CPI and reinstalling the updates corresponding to the wireless device.
In another embodiment, the application 216 may allow a user to specify an OEM model and other details associated with each of the wireless devices 234-238 so that the application 216 may guide the user through a complete flashing of the wireless devices 234-238. As a result, the partitions including partition 1218, partition 2220, and partition n 222 may execute separate instances of the application 216 to test the wireless devices 234-238. For example, partition 1 may execute an application for OEM A 224 and OEM B 226 because of their flashing compatibilities.
The application 216 may be separately implemented on partition 2220 for OEM C 228 based on a conflict OEM C 228 (or associated devices) may have with OEM B 226 and OEM D 230 (and their associated devices). Similarly, partition n 222 may execute an application for OEM D 230 and OEM E 232 to test specific wireless devices. Although not specifically shown herein, the flashing device 200 includes any number of partitions that allows for testing numerous wireless devices representing different OEMs and models. Partition 1218, partition 2220, and partition n 222, may represent partitions of the memory 214 that are divided into logical drives associated with data and application storage.
In one embodiment, the memory 214 may include a primary partition and may be further divided into other secondary logical drives and partitions that may be assigned names, letters, and identifiers for storing and accessing the related flashing applications.
The process of
Next, the flashing device receives selections of the OEM associated with the wireless device to be flashed (step 304). The selections or user input provider during the process of
Next, the flashing device visually displays models associated with the selected OEM (step 306). The information displayed during the process of
The flashing device receives selection of the model (step 308). Next, the flashing device displays instructions associated with the model for flashing the selected wireless device (step 310). In some cases, the steps required to remove all personal information, completely clear the memory, or perform updates for the wireless device may be complicated or may differ across OEMs or models. As a result, the instructions are particularly useful for the user in order to efficiently step through the process for flashing the wireless device for a number of devices. The instructions may be displayed textually and audibly for facilitating the user's progression to flashing the wireless device.
Next, the flashing device receives a connection to one or more wireless devices to the flashing device (step 312). In one embodiment, the user may connect an adapter such as a micro USB adapter to the micro USB port of the wireless device. The wireless device may also require that it be powered on or placed in a configuration mode in order to communicate with the flashing device. The flashing device may provide an index, help, or instructions for guiding the users.
Next, the flashing device accesses updates to flash the selected model (step 314). The updates may include applications, operating systems, versions, firmware and other elements for ensuring the wireless device has the most up-to-date operating software and instructions provided by the OEM service provider or other group with which the wireless device is associated. In one embodiment, the updates may have previously been downloaded to the flashing device and associated with the application. In another embodiment, the updates may be downloaded from a network resource or alternative or secondary resource in order to further proceed with flashing of the wireless device.
Next, the flashing device flashes the selected wireless device in response to a user selection (step 316). In one embodiment, all memory locations of the wireless device associated with CPI may be cleared and any applicable fields, text or memory may be deleted, written over or otherwise cleared. Similarly, the wireless device may have the operating system, most recent applications, or other updates installed or reinstalled on the wireless device. In some cases, reinstallation of the operating system and other updates may supersede clearing of CPI information as the CPI information is automatically deleted or written over during the reinstallation process.
The process of
In one embodiment, new OEMS may be added based on manual inputs or based on a search for other OEMs that are not displayed in the OEM selection 402. Interactions with the graphical user interface 400 may be implemented through a mouse, keyboard, touch screen, the wireless device itself, verbal commands or other forms of communication or signal with the flashing device. The OEM selection 402 may indicate whether the OEM information is ready or is being updated and the progress of any ongoing updates. Any of the graphical user interfaces of
In one embodiment, the graphical user interface 600 may include a button 604 or selection element for posting questions, requesting instruction clarifications, or otherwise providing dynamic feedback for improving the flashing application. For example, the user may add suggestions, remove redundant steps or otherwise configure the instructions 602 for preciseness or to be more efficient. In one embodiment, the editing features or adding features of
Once the user has all of the necessary information the user may be displayed selection elements 708 and 710 for selecting whether to implement a flash for the selected wireless device. At any time during the display of the graphical user interface 700, the user may be allowed to select one or more adapters for which the process is implemented. For example, the user may utilize selection element 711 to select one or more adapters associated with the selected wireless device. As a result, the flashing process is performed for the specified adapters.
In another embodiment, the user may have connected a number of identical models to the flashing device to be flashed. As a result, the process may be implemented simultaneously or concurrently (representing different initiation times) for each of those identical models as selected by the user utilizing a selection element such as selection element 711 that allows the user to specify the wireless devices and the adapters associated with each of those devices.
Indicators 712 and 714 may indicate whether the flash was successful or whether it failed. Other indicators may also allow the user to specify whether to archive or save tests associated with the flashing process. For example, the service provider may want to document a memory map of the wireless device showing that it has been properly flashed and that no CPI is available on the wireless device as shown by memory mapping, tests, or other data that verify the flashing process has occurred and has occurred correctly.
The previous detailed description is of a small number of embodiments for implementing the invention and is not intended to be limiting in scope. The following claims set forth a number of the embodiments of the invention disclosed with greater particularity.
| Number | Name | Date | Kind |
|---|---|---|---|
| 5666493 | Wojcik | Sep 1997 | A |
| 5909540 | Carter et al. | Jun 1999 | A |
| 5974312 | Hayes et al. | Oct 1999 | A |
| 6236593 | Hong et al. | May 2001 | B1 |
| 6342903 | Fado | Jan 2002 | B1 |
| 6539476 | Marianetti et al. | Mar 2003 | B1 |
| 6611780 | Lundell et al. | Aug 2003 | B2 |
| 6822422 | Sagawa | Nov 2004 | B2 |
| 7076449 | Tsunenari et al. | Jul 2006 | B2 |
| 7110751 | Overby | Sep 2006 | B1 |
| 7337310 | Cheston et al. | Feb 2008 | B2 |
| 7363567 | Rands | Apr 2008 | B2 |
| 7552482 | Redlich et al. | Jun 2009 | B2 |
| 8429409 | Wall et al. | Apr 2013 | B1 |
| 8788432 | Junger | Jul 2014 | B2 |
| 20020010784 | Clayton et al. | Jan 2002 | A1 |
| 20020019777 | Schwab et al. | Feb 2002 | A1 |
| 20020038265 | Mertz et al. | Mar 2002 | A1 |
| 20020040325 | Takae et al. | Apr 2002 | A1 |
| 20030004734 | Adler et al. | Jan 2003 | A1 |
| 20030009465 | Brown et al. | Jan 2003 | A1 |
| 20030103451 | Lutgen et al. | Jun 2003 | A1 |
| 20030182504 | Nielsen et al. | Sep 2003 | A1 |
| 20030233366 | Kesselman et al. | Dec 2003 | A1 |
| 20040123281 | Olrik et al. | Jun 2004 | A1 |
| 20040154014 | Bunger | Aug 2004 | A1 |
| 20040172284 | Sullivan et al. | Sep 2004 | A1 |
| 20040193610 | Alex et al. | Sep 2004 | A1 |
| 20040230558 | Tokunaka | Nov 2004 | A1 |
| 20050044015 | Bracken et al. | Feb 2005 | A1 |
| 20050071032 | Urabe | Mar 2005 | A1 |
| 20050266885 | Katayanagi | May 2005 | A1 |
| 20060009214 | Cardina et al. | Jan 2006 | A1 |
| 20060025177 | Tu | Feb 2006 | A1 |
| 20060031673 | Beck et al. | Feb 2006 | A1 |
| 20060075128 | Kotler et al. | Apr 2006 | A1 |
| 20060293081 | Overby | Dec 2006 | A1 |
| 20070015505 | Barrow et al. | Jan 2007 | A1 |
| 20070027699 | Golding et al. | Feb 2007 | A1 |
| 20070082705 | Jain et al. | Apr 2007 | A1 |
| 20070156439 | Fyda et al. | Jul 2007 | A1 |
| 20070173959 | Chandhoke | Jul 2007 | A1 |
| 20070174518 | Chandhoke | Jul 2007 | A1 |
| 20080005494 | Zimmer et al. | Jan 2008 | A1 |
| 20080013705 | Yoffie et al. | Jan 2008 | A1 |
| 20080027581 | Saether et al. | Jan 2008 | A1 |
| 20080059970 | Gonen | Mar 2008 | A1 |
| 20080160983 | Poplett et al. | Jul 2008 | A1 |
| 20080201277 | Ozdemir et al. | Aug 2008 | A1 |
| 20080281691 | Pearson et al. | Nov 2008 | A1 |
| 20080296374 | Gonen et al. | Dec 2008 | A1 |
| 20090014363 | Gonen et al. | Jan 2009 | A1 |
| 20090049207 | Reynolds et al. | Feb 2009 | A1 |
| 20090075630 | Mclean | Mar 2009 | A1 |
| 20090115600 | Lee et al. | May 2009 | A1 |
| 20090186603 | Usami et al. | Jul 2009 | A1 |
| 20090193215 | Rogers | Jul 2009 | A1 |
| 20090228511 | Atkin et al. | Sep 2009 | A1 |
| 20090279507 | Kanazawa et al. | Nov 2009 | A1 |
| 20100088192 | Bowles et al. | Apr 2010 | A1 |
| 20100088305 | Fournier | Apr 2010 | A1 |
| 20100161397 | Gauthier et al. | Jun 2010 | A1 |
| 20100169231 | Bowles et al. | Jul 2010 | A1 |
| 20100228676 | Librizzi et al. | Sep 2010 | A1 |
| 20110047621 | Brando et al. | Feb 2011 | A1 |
| 20120079596 | Thomas et al. | Mar 2012 | A1 |
| 20120116929 | Gventer et al. | May 2012 | A1 |
| 20130198144 | Bowles | Mar 2013 | A1 |
| 20150046343 | Martini | Feb 2015 | A1 |
| 20150066677 | Bowles et al. | Mar 2015 | A1 |
| Number | Date | Country |
|---|---|---|
| 1793573 | Jun 2007 | EP |
| 1705872 | Dec 2008 | EP |
| 2007035918 | Mar 2007 | WO |
| Entry |
|---|
| Webster's II new Riverside university dictionary, 1984, p. 633, Houghton Mifflin Company. |
| International Search Report and Written Opinion for PCT/US2011/058667; dated Apr. 17, 2012. |
| International Search Report and Written Opinion for PCT/US2011/058644; dated Feb. 21, 2012. |
| International Search Report and Written Opinion for PCT/US2011/058661; dated Apr. 25, 2012. |
| Brannon, C. (2006). Unique Reverse Logistics Challenges of IT Asset Disposition. Reverse Logistics Magazine. |
| Feick, D. (Jan. 2011 ). Cambridge company welcomes your ‘e-waste’. Going Green: A special advertising feature. |
| Zulhuda, S., “The state of e-government security in Malaysia: reassessing the legal and regulatory framework on the threat of information theft” Intemaional Islamic Univ. of Malaysia, 2012. |
| Van Der Vorst, et al., “Innovations in Logistics and ICT in Food Supply Chain Networks”, 2005. |
| Xiong, B. H., et al., “A practical web-based tracking and traceability information system for the pork products supply chain”, New Zealand Journal of Agricultural Research, 2007, 50:5, 725-733. |
| SDB Staff, “New Jersey Comptroller Finds State Agencies Failed to Remove Confidential Information From Computers”, Storage & Destruction Business, Mar. 24, 2011. |
| Coia, Anthony; “Thinking in reverse—Transportation series; electronics recycling”, Recycling Today, Oct. 2003. |
| Hastings, H. and Sande, S., “White Paper: Considerations for developing an IT disposal policy”, Dec. 2009. |
| ATC Logistics & Electronics, “Improving the Consumer Experience: Protecting brand integrity with advanced 3PL services”, White Paper, www.atcle.com, (Jul. 23, 2010). |
| Cairns, C. N., “E-Waste and the Consumer: Improving Options to Reduce, Reuse and Recycle”, IEEE, 2005, pp. 237-242. |
| ATC Logistics & Electronics, “Asset Recovery, Green Logistics: Sustainable 3PL Practices for reverse logistics and asset management”, White Paper, www.atcle.com, Dec. 8, 2009. |
| The examiner defines “quarantine” as “A period of isolation or detention”. See World English Dictionary, Collins English Dictionary, Complete Unabridged 10th Edition (2009). |
| www.n-gage.com (latest date of Feb 14, 2012), Get Apps for your Nokia device, retrieved on Feb. 7, 2013 from www.n-gage.com. |
| How to Remote Wipe an iPhone or iPad (Jun. 5, 2012). |
| The examiner defines “server” as “A computer or program that supplies data or resources to other machines on a network.” (emphasis added). See definition at https://web.archive.org/web/20120321215316/http://www.collinsdictionary.com/dictionary/english/server, archived back to Mar. 21, 2012. |
| White, P., “Understanding and Using Parallelism in Sqp Server”, Simple Talk (2011). |
| Legal Ombudsman, “Information retention and disposal policy” (Sep. 24, 2010). |
| APQC, “Reverse Logistics; Bakcwards Practices that Matter”, GENCO Distribution System, Inc., Case Study, Jan. 12, 2007. |
| “Cell Phones Recycled Through County Program Are Safe From ID Theft”, US Fed News Service, Including US State News, Dec. 15, 2006) Retrieved from http://search.proquest.com/docview/469551645?accountid=14753. |
| Aquino, G., “Dialed in: Cell phone recycling”, PC WorldCom, (2004), 1. Retrieved from hffp:/Isearch .proquest.com/docview/200685558 ?accou ntid= 14 753. |
| “Secure solutions for erasing personal cell phone data; cell phone data eraser tool offers more than 480 cell phone user guides to erase personal information”, (Aug. 31, 2006). PR Newswire Retrieved from http://search.proquest.com/docview/451123304 ?accountid=14753. |
| Number | Date | Country | |
|---|---|---|---|
| 20120117477 A1 | May 2012 | US |