Kellogg Company
Retired Engineering Vice President
Education:
Michigan State University 1969 - 1972
Bachelors, Bachelor of Science, Agricultural Engineering
Skills:
Public Speaking Budgets Strategic Planning Technical Leadership Product Development Process Engineering Process Improvement Food Engineering Cross Functional Team Leadership Continuous Improvement Management Lean Manufacturing
Cray Inc. Mar 2018 - May 2019
Custom R and D Program Director
Epiq Solutions Mar 2018 - May 2019
Director of Rf Sensing Solutions
Murus Cybersecurity, Llc Oct 2017 - May 2019
Managing Director
Motorola Solutions Aug 2016 - Oct 2017
Senior Director, North America Software and Cyber Service Delivery
Motorola Solutions Apr 2015 - Aug 2016
Mssi Vice President, Us Federal Solutions and Services
Education:
Michigan State University 1992 - 1995
Bachelors, Bachelor of Science, Electrical Engineering
Lakeview High School 1988 - 1992
Skills:
Product Management Telecommunications Wireless Mobile Devices Cellular Communications Product Development Mobile Communications Rf Integration Computer Security Lte Embedded Systems Engineering Management Engineering System Design System Architecture Systems Engineering Mobile Technology Bluetooth Embedded Software Software Development Software Engineering Wifi Clearcase Gsm Cdma Wireless Technologies Radio Frequency Tcp/Ip Ip Internet Protocol Suite Internet Protocol
Certifications:
Certified Information Systems Security Professional (Cissp)
Kenneth C. Fuchs - Winfield IL, US Brian W. Pruss - Streamwood IL, US Gary W. Schluckbier - Schaumburg IL, US
Assignee:
Motorola Solutions, Inc. - Schaumburg IL
International Classification:
G06F 7/04
US Classification:
726 26
Abstract:
Systems and methods for vetting data include receiving a notification at a second processor that a first processor has written first output data to an output data buffer in an output device. A hardware-implemented buffer access flag controls a permission for the first processor to write data to the output data buffer. The second processor sets the hardware-implemented buffer access flag to a first setting that prevents the first processor from writing additional output data to the output data buffer while the first output data in the output data buffer is being inspected. The second processor has a read-write permission to the hardware-implemented buffer access flag. The first processor has a read-only permission to the hardware-implemented buffer access flag.
Brian W. Pruss - Streamwood IL, US Gary W. Schluckbier - Schaumburg IL, US
Assignee:
Motorola Solutions, Inc. - Schaumburg IA
International Classification:
H04L 29/06
US Classification:
380 28
Abstract:
A key variable loader receives a set of Rijndael parameters that were verified using a simulation computer, wherein the set of Rijndael parameters provide an input for implementing at least one step of the Rijndael block cipher and when used with a secret key allow a conversion between plain text and cipher text using the Rijndael block cipher. The key variable loader further stores the set of Rijndael parameters and subsequently provides the set of Rijndael parameters to a device having a customizable Rijndael block cipher, like a subscriber unit or a key management facility.