University Of Cincinnati Physicians Company 234 Goodman St, Cincinnati, OH 45219 513 558-5281 (phone), 513 558-5791 (fax)
University Emergency Physicians 231 Albert Sabin Way, Cincinnati, OH 45267 513 558-5281 (phone), 513 558-5791 (fax)
Education:
Medical School Medical University of South Carolina College of Medicine Graduated: 2004
Languages:
English
Description:
Dr. McMullan graduated from the Medical University of South Carolina College of Medicine in 2004. He works in Cincinnati, OH and 1 other location and specializes in Emergency Medicine. Dr. McMullan is affiliated with The Jewish Hospital, UC Medical Center and West Chester Hospital.
Name / Title
Company / Classification
Phones & Addresses
Jason Mcmullan Founder
Jason Mcmullan Offices and Clinics of Doctors of Medicine
Carnegie Mellon University 2017 - 2019
Bachelors, Bachelor of Science
Carnegie Mellon University 1992 - 1996
Bachelors, Bachelor of Science, Computer Science
Louisiana School For Math, Science, and the Arts
Skills:
Embedded Systems Linux Embedded Linux C Device Drivers Linux Kernel Software Design Unix Software Development Firmware Embedded Software Software Engineering Debugging Perl Verilog Operating Systems Open Source Virtualization Cloud Computing Vhdl System Architecture Agile Methodologies Distributed Systems Board Support Package Version Control System Administration Validation Mercurial Ddr Pcie Git
Lawrence Weidman - Pittsburgh PA, US Manas Saksena - Pittsburgh PA, US Jason McMullan - Pittsburgh PA, US
International Classification:
G06F 9/44
US Classification:
717172000
Abstract:
Systems and methods for generating a plurality of different software builds from a common base code and different combinations of other components are described in the context of a collaborative framework in which multiple parties maintain a shareable base of software used for generating such builds. Systems and methods for generating a plurality of different hardware build designs from a common collection of hardware elements and different combinations of other hardware components are also described.
Systems And Methods For Tamper Evident Electronic Detection
Systems and methods are directed to detecting tampering with a secured area of an autonomous vehicle. In one example, a computing system performs operations including generating a first key pair comprising a first private key and a first public key as part of a vehicle registration process; providing the first public key to one or more remote computing systems; determining whether a reset event occurred at a vehicle; in response to determining that the reset event occurred, discarding the first key pair and generating a second key pair comprising a second private key and a second public key; receiving a status query from one of the one or more remote computing systems; generating a response to the status query, the response being signed using either the first private key or the second private key; and providing the response to the one of the one or more remote computing systems.
ROELOF NICO DU TOIT - PORTERSVILLE PA, US NOAH ZEV ROBBIN - SWISSVALE PA, US JASON SCOTT MCMULLAN - PITTSBURGH PA, US
Assignee:
NETRONOME SYSTEMS, INC. - SANTA CLARA CA
International Classification:
G06F 9/445
US Classification:
717171, 717168
Abstract:
Software update information is communicated to a network appliance either across a network or from a local memory device. The software update information includes kernel data, application data, or indicator data. The network appliance includes a first storage device, a second storage device, an operating memory, a central processing unit (CPU), and a network adapter. First and second storage devices are persistent storage devices. In a first example, both kernel data and application data are updated in the network appliance in response to receiving the software update information. In a second example, only the kernel data is updated in the network appliance in response to receiving the software update information. In a third example, only the application data is updated in the network appliance in response to receiving the software update information. Indicator data included in the software update information determines the data to be updated in the network appliance.
Compartmentalization Of The User Network Interface To A Device
Jason Scott McMullan - Pittsburgh PA, US Trevor William Patrie - Pittsburgh PA, US Peter Liudmilov Djalaliev - Pittsburgh PA, US Roelof Nico du Toit - Portersville PA, US
Assignee:
Netronome Systems, Inc. - Santa Clara CA
International Classification:
G06F 9/455
US Classification:
718 1
Abstract:
A device has physical network interface port through which a user can monitor and configure the device. A backend process and a virtual machine (VM) execute on a host operating system (OS). A front end user interface process executes on the VM, and is therefore compartmentalized in the VM. There is no front end user interface executing on the host OS outside the VM. The only management access channel into the device is via a first communication path through the physical network interface port, to the VM, up the VM's stack, and to the front end process. If the backend process is to be instructed to take an action, then the front end process forwards an application layer instruction to the backend process via a second communication path. The instruction passes down the VM stack, across a virtual secure network link, up the host stack, and to the backend process.