Y10S707/949

Augmented reality method for repairing damage or replacing physical objects

A method of automatically detecting damage following a loss causing incident is disclosed. The method includes capturing image information about a group of physical objects in their initial states and comparing these with image information about the group of physical objects in their modified states following a loss causing incident. The method includes detecting discrepancies between the initial and modified states and automatically assesses the degree of damage and/or loss.

Augmented reality method for repairing damage or replacing physical objects

A method of automatically detecting damage following a loss causing incident is disclosed. The method includes capturing image information about a group of physical objects in their initial states and comparing these with image information about the group of physical objects in their modified states following a loss causing incident. The method includes detecting discrepancies between the initial and modified states and automatically assesses the degree of damage and/or loss.

Optimizing inventory in accordance with a constrained network
10311391 · 2019-06-04 · ·

In one embodiment, optimizing inventory includes accessing service level band sets. Each service level band set is associated with a policy group, and includes service level bands. Each service level band of a service level band set has a service level priority with respect to any other service level bands of the same service level band set. An inventory band set is determined for each service level band set. Each inventory band set includes inventory bands, where each inventory band satisfies a corresponding service level band assuming an unconstrained network. Each inventory band of an inventory band set has an inventory priority with respect to any other inventory bands of the same inventory band set. A feasible supply chain plan that satisfies the inventory band sets is generated in order of the inventory priorities until a constrained network is depleted.