Shepherdstown, WV, United States of America

Howard Bruce Low


Average Co-Inventor Count = 5.0

ph-index = 1

Forward Citations = 7(Granted Patents)


Company Filing History:


Years Active: 2011

Loading Chart...
1 patent (USPTO):Explore Patents

Title: Howard Bruce Low: Innovator in Program Protection Engineering

Introduction

Howard Bruce Low is a notable inventor based in Shepherdstown, West Virginia. He has made significant contributions to the field of program protection engineering, particularly through his innovative patent that addresses security management for sensitive projects.

Latest Patents

Howard Bruce Low holds a patent for an "Apparatus and method for providing program protection engineering, security management, and report preparation for sensitive and classified projects." This invention utilizes a program protection engineering (P2E) toolkit designed to enhance security management and report preparation for various acquisition programs. The P2E toolkit is essential for protecting sensitive information from foreign intelligence threats and corporate espionage, ensuring that program managers can make informed decisions throughout the program lifecycle.

Career Highlights

Low's career is marked by his work at Tasc, Inc., where he has applied his expertise in program protection engineering. His innovative approach integrates security policies and methodologies that are crucial for both government and corporate acquisition programs. His contributions have significantly improved the traditional concerns of technical performance, schedule, and cost by incorporating lifecycle protection as a fundamental component.

Collaborations

Some of Howard Bruce Low's notable coworkers include Kenneth Leroy Brumbaugh and Gregory Chase Hamilton. Their collaborative efforts have further advanced the field of program protection engineering.

Conclusion

Howard Bruce Low's innovative work in program protection engineering has established him as a key figure in the field. His patent and contributions continue to play a vital role in safeguarding sensitive projects from potential threats.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…