Community Medical Associates 5176 William Sullivan Cir, Brooksville, FL 34604 (352)2932833 (phone), (352)2932834 (fax)
Education:
Medical School University of South Florida College of Medicine at Tampa Graduated: 1982
Languages:
English
Description:
Dr. Mcgrew graduated from the University of South Florida College of Medicine at Tampa in 1982. He works in Brooksville, FL and specializes in General Practice and Internal Medicine.
David L. McGrew - Villanova PA, US Jim Himler - Malvern PA, US Jeff Burr - Covington KY, US
International Classification:
B65G007/12 B62D053/06
US Classification:
294 26, 280433
Abstract:
The fifth wheel release tool is a device for applying the required force for releasing the latch mechanism of the fifth wheel hitch securing a semi-trailer to a truck tractor. The release tool has a hook which is removably secured to the hitch release handle, a non-resilient line extending from the hook, a treadle or stirrup secured to the opposite end of the line from the hook, and a saddle which is removably secured to a relatively fixed structure and over or through which the flexible line runs. This assembly transfers the tensile force applied to the release handle from the horizontal to the vertical as the flexible line passes over the saddle component. A person using the present release tool need only apply one's weight to the treadle or stirrup, in order to apply sufficient force to release even a relatively sticky hitch release.
A manual cranking apparatus for the landing gear of a semi-trailer. The cranking apparatus includes a rotatable mechanism that is permanently connected to the cross-shaft of the landing gear. The rotatable mechanism is adapted to be folded such that, in storage position, the mechanism is positioned beneath the trailer.
A tool adapted to tighten tie-down straps utilized to secure cargo transported on flatbed trailers or the like. The tool includes an elongate handle having a standard ratchet mechanism fixed at one end thereof. A cylindrical socket extends from one side of the ratchet mechanism. The cylindrical socket is designed to encompass a conventional winch drive shaft. Diametrically spaced openings are formed in the circumferential wall of the socket for receiving a locking pin therethrough. The cylindrical socket could be configured internally, at least, to match the winch drive shaft with which it will be used, e. g. , square, hexagonal, etc.
A manual cranking apparatus for THE landing gear of a semi-trailer. THE cranking apparatus includes a spoked wheel which is permanently connected via an articulating shaft to THE operating cross-shaft of THE landing gear. THE articulated shaft is arranged to allow THE apparatus to be folded such that, in storage position, THE wheel is positioned beneath THE trailer. In use, THE apparatus is unfolded so that THE diametric plane of THE wheel is parallel to THE side of THE trailer. When unfolded, THE wheel is positioned at a height which enables THE operator to assume an erect posture, thereby reducing THE potential for back strain and increasing the amount of torque generated by THE same amount of muscular force.
A manual cranking apparatus for the landing gear of a semi-trailer. The cranking apparatus includes a rotatable mechanism that is permanently connected to the cross-shaft of the landing gear. The rotatable mechanism is adapted to be folded such that, in storage position, the mechanism is positioned beneath the trailer.
Virtual Machine Memory Compartmentalization In Multi-Core Architectures
Techniques for memory compartmentalization for trusted execution of a virtual machine (VM) on a multi-core processing architecture are described. Memory compartmentalization may be achieved by encrypting layer 3 (L3) cache lines using a key under the control of a given VM within the trust boundaries of the processing core on which that VMs is executed. Further, embodiments described herein provide an efficient method for storing and processing encryption related metadata associated with each encrypt/decrypt operation performed for the L3 cache lines.
Secure Virtual Machine Bootstrap In Untrusted Cloud Infrastructures
FABIO R. MAINO - Palo Alto CA, US Pere Monclus - San Jose CA, US David A. McGrew - Poolesville MD, US Robert T. Bell - Bountiful UT, US Steven Joseph Rich - Maryville TN, US
International Classification:
G06F 12/14 G06F 9/24
US Classification:
713 2, 713189
Abstract:
Techniques are described for securely booting and executing a virtual machine (VM) image in an untrusted cloud infrastructure. A multi-core processor may be configured with additional hardware components—referred to as a trust anchor. The trust anchor may be provisioned with a private/public key pair, which allows the multi-core CPU to authenticate itself as being able to securely boot and execute a virtual machine (VM) image in an untrusted cloud infrastructure.
Techniques To Classify Virtual Private Network Traffic Based On Identity
Kunal Patel - Hayward CA, US Yixin Sun - San Ramon CA, US Puneet Gupta - Uttar Pradesh, IN Vinod Arjun - Mountain View CA, US David McGrew - Poolesville MD, US
Assignee:
CISCO TECHNOLOGY, INC. - San Jose CA
International Classification:
H04L 9/32 H04L 9/00
US Classification:
713156, 713175
Abstract:
Techniques are provided for obtaining first and second digital certificates from a certificate authority database for establishing a secure exchange between network devices. The first digital certificate contains identity information of a first network device, and the second digital certificate contains classification information of the first network device. In one embodiment, a secure key exchange is initiated with the second network device, and the first and second digital certificates are transmitted as a part of the secure key exchange to the second network device. In another embodiment, the first and second digital certificates are received by an intermediate network device. The first digital certificate is encrypted and is not evaluated by the intermediate network device. The second digital certificate is evaluated for classification information of the first network device. Source information associated with the first network device is stored, and encrypted traffic is processed between the network devices.