Time filter

Source Type

The system may provide for storage of liquid cleaning concentrate and connection with a water supply. The system may include a mixing container in which both fluids are accurately mixed, and that can empty into a cleaning solution storage container which may be connected to a faucet for dispensing the solution, and/or water. The system may include a control system to operate suitable valves, pumps to control the flow of fluids through connecting lines, and which is adaptable to numerous configurations and uses with the capability of dispensing cleaning solution at a wide range of flow rates, including low rates that may be desired for hand and produce washing. Dispensing is either programmed, activated by the user, or controlled by the user without system interruption until there is no more concentrate. The system eliminates the possibility of contamination of the water supply due to backflow of cleaner.


Patent
Willow Inc. | Date: 2016-05-26

Step adapters for a rung ladder to provide an increased support surface or area is described. In one embodiment, the step adapter includes a brace, a platform, a lock and a safety bar. The lock, safety bar and platform are provided to structurally engage or embrace a rung of a ladder, and the brace supports the adapter against the rails of a ladder so that in total the step adapter provides an extended step structure to ease standing on the ladder, especially for an extended period of time. In another embodiment, the step adapter includes brace, platform and lock sections, where the platform section side edges are configured to lock the step adapter in place on a rung of a ladder. A tray overlay is also described which when used in combination with the step adapter (which serves as a support) provides a service area for holding work-related items.


Patent
Willow Inc. | Date: 2014-10-03

Devices generate security vectors based on their own attributes. A devices security vectors compose its transformation matrix. The devices securely share copies of their transformation matrices with other devices. A transmitting device adds its unique MAC to packets, encrypts those packets using its own transformation matrix, and transmits those packets. A receiving device uses its copy of the transmitting devices transformation matrix to decrypt the data in a packet, determining whether a MAC extracted from that packet matches the transmitting devices MAC. The receiving device can permit or prevent further processing of the packets data depending on whether the MACs match. Each device can store a copy of a same program that can be used to derive derivative security vectors from existing security vectors. Each device in the network can derive the same set of derivative vectors for any selected other device in the network, thereby evolving the transformation matrices.


Patent
Willow Inc. | Date: 2014-03-13

Devices generate security vectors based on their own attributes. A devices security vectors compose its transformation matrix. The devices securely share copies of their transformation matrices with other devices. A transmitting device adds its unique MAC to packets, encrypts those packets using its own transformation matrix, and transmits those packets. A receiving device uses its copy of the transmitting devices transformation matrix to decrypt the data in a packet, determining whether a MAC extracted from that packet matches the transmitting devices MAC. The receiving device can permit or prevent further processing of the packets data depending on whether the MACs match. Each device can store a copy of a same program that can be used to derive derivative security vectors from existing security vectors. Each device in the network can derive the same set of derivative vectors for any selected other device in the network, thereby evolving the transformation matrices.


Trademark
Willow Inc. | Date: 2016-09-23

Prerecorded CDs and DVDs, all in the fields of Christianity, religion, theology, spirituality, Bible study, Christian discipleship, faith, evangelism, spiritual growth, ministry, prayer; downloadable publications, namely, downloadable booklets, pamphlets, reports, study guides, work books, newsletters, and magazines all in the fields of Christianity, religion, theology, spirituality, Bible study, Christian discipleship, faith, evangelism, spiritual growth, ministry, prayer; downloadable podcasts in the fields of Christianity, religion, theology, spirituality, Bible study, Christian discipleship, faith, evangelism, spiritual growth, ministry, prayer.


Trademark
Willow Inc. | Date: 2016-11-16

Natural plants and flowers.


Trademark
Willow Inc. | Date: 2016-11-01

Seasoning mixes and dessert mixes.


Trademark
Willow Inc. | Date: 2016-02-16

Living room, office and occasional furniture, namely, reading chairs, office chairs, ottomans; storage and organization products, non-metal storage cabinets, shelves for books.


Foukal P.,Willow Inc.
Solar Physics | Year: 2012

We compare total solar irradiance (TSI) and ultraviolet (Fuv) irradiance variation reconstructed using Ca K facular areas since 1915, with previous values based on less direct proxies. Our annual means for 1925 - 1945 reach values 30 - 50 % higher than those presently used in IPCC climate studies. A high facula/sunspot area ratio in spot cycles 16 and 17 seems to be responsible. New evidence from solar photometry increases the likelihood of greater seventeenth century solar dimming than expected from the disappearance of magnetic active regions alone. But the large additional brightening in the early twentieth century claimed from some recent models requires complete disappearance of the magnetic network. The network is clearly visible in Ca K spectroheliograms obtained since the 1890s, so these models cannot be correct. Changes in photospheric effective temperature invoked in other models would be powerfully damped by the thermal inertia of the convection zone. Thus, there is presently no support for twentieth century irradiance variation besides that arising from active regions. The mid-twentieth century irradiance peak arising from these active regions extends 20 years beyond the early 1940s peak in global temperature. This failure of correlation, together with the low amplitude of TSI variation and the relatively weak effect of Fuv driving on tropospheric temperature, limits the role of solar irradiance variation in twentieth century global warming. © 2012 Springer Science+Business Media B.V.


Loading Willow Inc. collaborators
Loading Willow Inc. collaborators