John Randolph Farlow - Seattle WA, US Robert Marshall Grimm - Port Townsend WA, US Gerald Eugene Miller - Kirkland WA, US Diana Weyna Smith - Pacific WA, US Timothy Michael Stapleton - Renton WA, US David C. Warren - Sammamish WA, US Alec C. Wong - Bellevue WA, US Wayne K. Simons - Kent WA, US
Assignee:
PACCAR Inc - Bellevue WA
International Classification:
B60T001/16 B62D035/00
US Classification:
2961804, 2961801, 2961805
Abstract:
A cab extender assembly () for selectively manipulating an aerodynamic drag of a vehicle () is provided. The cab extender assembly includes a dynamic cab extender () and a control system () coupled to the dynamic cab extender. The control system is adapted to selectively position the dynamic cab extender between a stowed position, a deployed position in which the dynamic cab extender is substantially aligned with a side of the vehicle, and a braking position in which the dynamic cab extender is at least partially disposed into an airstream passing along the side of the vehicle to increase a drag coefficient of the vehicle. The cab extender assembly may also include a fixed cab extender () substantially aligned with the dynamic cab extender when the dynamic cab extender is in the deployed position. A method of operating a cab extender assembly is also disclosed.
Process For Transparently Enforcing Protection Domains And Access Control As Well As Auditing Operations In Software Components
Robert Grimm - Seattle WA Brian N. Bershad - Seattle WA
Assignee:
University of Washington - Seattle WA
International Classification:
G06F 944
US Classification:
717 2
Abstract:
An original software component is modified in accordance with a site's security policy provisions prior to being executed by a component system or computer at the site. The original software component is intercepted by an introspection service running on a server or on the component system prior to execution on the component system. The introspection service analyzes the software component by parsing it, and based on the information it determines, a security policy service instructs an interposition service how to modify the software component so that it conforms to the security policy service requirements. The interposition service thus produces a modified software component by inserting code for security initialization and for imposing security operations on the original component operations. When the modified software component is executed, an enforcement service follows the security operations that were injected into the software component, which instruct the enforcement service on associating component system objects with security identifiers. For example, a security identifier is associated with the software component.
Corriher Sand and Stone China Grove, NC Jul 2002 to Jul 2002 Shop ForemanBoone Parts & Service Charlotte, NC Nov 2001 to Jul 2002 Shop MechanicStraight Trucks
Nov 2001 to Nov 2001 Deisel MechanicAim National Lease Pittsburgh, PA Jul 1997 to Jul 1997 Shop Foreman/Fleet Mechanic
Education:
Community College of Allegheny County Pittsburgh, PA 1995 Certificate in Electrical & Computer Diagnostics
Whittier Elementary School Pittsburgh PA 1968-1971, Independence Middle School Bethel Park PA 1974-1978, Hillcrest Elementary School Bethel Park PA 1975-1976, South Park Middle School Library PA 1977-1979
Among the Pearl Harbor survivors who passed away in 2013 were Robert Grimm, 91, of Schenectady, a carpenter's mate first class on the destroyer USS Cummings; and A.J. Krenn, 91, of Bethlehem, a seaman first class on the West Virginia. Leonard "Len" Dooren, a chief warrant officer on the heavy cruise