Thereby, when the system is suitably addressed on the network, a remote user may access the processor and transmit instructions, input data, or retrieve data, such as may be stored in a memory (not shown) associated with the processor, or on some other computer-readable medium that is in communication with the processor.