Search

William D Horne

age ~76

from Fountainville, PA

Also known as:
  • William D Norve
  • William D Stewart
  • William D Hornet
  • William D Horney
  • William Dhorne

William Horne Phones & Addresses

  • Fountainville, PA
  • Stockton, NJ
  • Ringoes, NJ
  • Ann Arbor, MI
  • Bayonne, NJ
  • New London, NC
  • Viola, KS

Lawyers & Attorneys

William Horne Photo 1

William Horne - Lawyer

view source
Office:
William A. Horne
Specialties:
Litigation
ISLN:
906373413
Admitted:
1973
University:
Brown University, 1964; Brown University, 1964
Law School:
Georgetown University Law Center, J.D., 1972

Wikipedia References

William Horne Photo 2

William Horne (American Politician)

Name / Title
Company / Classification
Phones & Addresses
William Horne
President
H H Mack Sales
Motor Vehicle Parts and Accessories
80 Green Pond Rd # 80, Rockaway, NJ 07866
Website: hhmack.com
William Horne
President
H & H Mack Sales, Inc
Automobiles and Other Motor Vehicles
80 Green Pond Rd, Rockaway, NJ 07866
William T Horne Jr
Manager
Harbor City Real Estate Adviso
Real Estate Agents and Managers
P.o. Box 207, Kimberton, PA 19442
William Horne
President
Horne Carpentry Inc
Single-Family Home Remodeling Multi-Family Dwelling Remodeling and Industrial Building Remodeling · Woodworking · Decks · Bathroom & Kitchen Remodeling · Replacement Windows
36 E 39 St, Bergen Point, NJ 07002
195 Broadway, Bayonne, NJ 07002
(201)8588787
William Horne
President
H H MACK SALES
Car Accessories · All Other Motor Vehicle Parts Mfg
80 Grn Pond Rd, Rockaway, NJ 07866
(973)6253330, (973)7844811, (973)6254178
William Horne
Principal
Home Clamon
Business Services
9 Tennyson St, Edison, NJ 08820
William T. Horne
A C M P Foundation Inc
Personal Interest Organzation
1123 Broadway, New York, NY 10010
William Horne
President
H & H Mack Sales, Inc
Whol Auto/Motor Vehicles Ret Auto/Home Supplies General Auto Repair
80 Grn Pond Rd, Rockaway, NJ 07866
PO Box 693, Rockaway, NJ 07866
(973)6253330, (973)6254178

Us Patents

  • Methods Of Inhibiting Osteoclastogenesis

    view source
  • US Patent:
    6682739, Jan 27, 2004
  • Filed:
    Jul 28, 2000
  • Appl. No.:
    09/627775
  • Inventors:
    Mark I. Greene - Penn Valley PA
    Ramachandran Murali - Drexel Hill PA
    Kazuhiro Aoki - Narashino, JP
    William Carle Horne - Branford CT
    Roland Baron - Guilford CT
  • Assignee:
    The Trustees of the University of Pennsylvania - Philadelphia PA
  • International Classification:
    A61K 3900
  • US Classification:
    4241851, 424 851, 4241841, 4241921, 4241781, 514 12, 514 2, 514 8, 514885, 530350, 530351
  • Abstract:
    Methods of inhibiting osteoclastogenesis and the activity of osteoclasts are disclosed. Methods of treating patients who have diseases characterized bone loss are disclosed. The present invention also provides peptides and peptide analogues designed from a binding loop of a member of the tumor necrosis factor receptor (TNF-R) superfamily. According to the methods, an amount of an inhibitor effective to inhibit osteoclastogenesis is administered to the patient. Methods of modulating dendritic cell maturation, T cell proliferation, and/or CD40 receptor systems in an individual are disclosed. The methods comprise the step of administering to the individual an amount of an inhibitor effective to modulating dendritic cell maturation, T cell proliferation, and/or CD40 receptor systems.
  • Systems And Methods For Conducting Transactions And Communications Using A Trusted Third Party

    view source
  • US Patent:
    7136840, Nov 14, 2006
  • Filed:
    Apr 22, 2002
  • Appl. No.:
    10/128182
  • Inventors:
    Binyamin Pinkas - Jersey City NJ, US
    Tomas Sander - New York NY, US
    William G. Horne - Lawrenceville NJ, US
  • Assignee:
    Intertrust Technologies Corp. - Sunnyvale CA
  • International Classification:
    H04L 9/00
  • US Classification:
    705 75, 713168, 380277
  • Abstract:
    Systems and methods are provided for managing the transfer of electronic files. In one embodiment, a sender transfers an encrypted version of a file (such as a digitally encoded audio track, movie, document, or the like) to someone who wishes to receive it. The receiver computes a hash of the encrypted file, and sends it to a trusted third party. The trusted third party compares the hash that was computed by the receiver with another hash computed by the sender. If the two hashes match, the third party sends the file decryption key to the receiver. In some embodiments, the receiver may also send the third party payment information so that the sender, the content owner, and/or the third party can be paid for their role in the transaction. In a preferred embodiment, the payment information is only sent to, and/or used by, the third party once the third party has confirmed to the satisfaction of the receiver that the encrypted file in the receiver's possession will decrypt correctly. In some embodiments, the sender computes a hash of the encrypted version of the file and sends it directly to the third party.
  • Systems And Methods For Watermarking Software And Other Media

    view source
  • US Patent:
    7739511, Jun 15, 2010
  • Filed:
    Oct 29, 2007
  • Appl. No.:
    11/927220
  • Inventors:
    William G. Horne - Lawrenceville NJ, US
    Umesh Maheshwari - San Jose CA, US
    Robert E. Tarjan - Princeton NJ, US
    James J. Horning - Palo Alto CA, US
    W. Olin Sibert - Lexington MA, US
    Lesley R. Matheson - Campbell CA, US
    Andrew K. Wright - Monroe Township NJ, US
    Susan S. Owicki - Palo Alto CA, US
  • Assignee:
    Intertrust Technologies Corp. - Sunnyvale CA
  • International Classification:
    H04L 9/32
    B42D 15/00
    H04N 1/40
  • US Classification:
    713176, 283113, 358 328
  • Abstract:
    Systems and methods are disclosed for embedding information in software and/or other electronic content such that the information is difficult for an unauthorized party to detect, remove, insert, forge, and/or corrupt. The embedded information can be used to protect electronic content by identifying the content's source, thus enabling unauthorized copies or derivatives to be reliably traced, and thus facilitating effective legal recourse by the content owner. Systems and methods are also disclosed for protecting, detecting, removing, and decoding information embedded in electronic content, and for using the embedded information to protect software or other media from unauthorized analysis, attack, and/or modification.
  • Systems And Methods For Watermarking Software And Other Media

    view source
  • US Patent:
    7770016, Aug 3, 2010
  • Filed:
    Apr 19, 2007
  • Appl. No.:
    11/737428
  • Inventors:
    William G. Horne - Lawrenceville NJ, US
    Umesh Maheshwari - San Jose CA, US
    Robert E. Tarjan - Princeton NJ, US
    James J. Horning - Palo Alto CA, US
    W. Olin Sibert - Lexington MA, US
    Lesley R. Matheson - Campbell CA, US
    Andrew K. Wright - Monroe Township NJ, US
    Susan S. Owicki - Palo Alto CA, US
  • Assignee:
    Intertrust Technologies Corporation - Sunnyvale CA
  • International Classification:
    H04L 9/32
    G06F 11/30
    G06F 12/14
  • US Classification:
    713176, 713189
  • Abstract:
    Systems and methods are disclosed for embedding information in software and/or other electronic content such that the information is difficult for an unauthorized party to detect, remove, insert, forge, and/or corrupt. The embedded information can be used to protect electronic content by identifying the content's source, thus enabling unauthorized copies or derivatives to be reliably traced, and thus facilitating effective legal recourse by the content owner. Systems and methods are also disclosed for protecting, detecting, removing, and decoding information embedded in electronic content, and for using the embedded information to protect software or other media from unauthorized analysis, attack, and/or modification.
  • Systems And Methods For Conducting Transactions And Communications Using A Trusted Third Party

    view source
  • US Patent:
    7827114, Nov 2, 2010
  • Filed:
    Oct 30, 2006
  • Appl. No.:
    11/590319
  • Inventors:
    Binyamin Pinkas - Jersey City NJ, US
    Tomas Sander - New York NY, US
    William G. Horne - Lawrenceville NJ, US
  • Assignee:
    Intertrust Technologies Corporation - Sunnyvale CA
  • International Classification:
    G06Q 40/00
  • US Classification:
    705 75, 707747, 713168, 380277
  • Abstract:
    Systems and methods are provided for managing the transfer of electronic files. In one embodiment, a sender transfers an encrypted version of a file (such as a digitally encoded audio track, movie, document, or the like) to someone who wishes to receive it. The receiver computes a hash of the encrypted file, and sends it to a trusted third party. The trusted third party compares the hash that was computed by the receiver with another hash computed by the sender. If the two hashes match, the third party sends the file decryption key to the receiver. In some embodiments, the receiver may also send the third party payment information so that the sender, the content owner, and/or the third party can be paid for their role in the transaction. In a preferred embodiment, the payment information is only sent to, and/or used by, the third party once the third party has confirmed to the satisfaction of the receiver that the encrypted file in the receiver's possession will decrypt correctly. In some embodiments, the sender computes a hash of the encrypted version of the file and sends it directly to the third party.
  • Systems And Methods For Watermarking Software And Other Media

    view source
  • US Patent:
    8140850, Mar 20, 2012
  • Filed:
    Dec 8, 2008
  • Appl. No.:
    12/330482
  • Inventors:
    William G. Horne - Lawrenceville NJ, US
    Umesh Maheshwari - San Jose CA, US
    Robert E. Tarjan - Princeton NJ, US
    James J. Horning - Palo Alto CA, US
    W. Olin Sibert - Lexington MA, US
    Lesley R. Matheson - Campbell CA, US
    Andrew K. Wright - Monroe Township NJ, US
    Susan S. Owicki - Palo Alto CA, US
  • Assignee:
    Intertrust Technologies Corporation - Sunnyvale CA
  • International Classification:
    H04L 9/32
    G06F 9/44
    H04N 1/40
    B42D 15/00
  • US Classification:
    713176, 717114, 358 328, 283113
  • Abstract:
    Systems and methods are disclosed for embedding information in software and/or other electronic content such that the information is difficult for an unauthorized party to detect, remove, insert, forge, and/or corrupt. The embedded information can be used to protect electronic content by identifying the content's source, thus enabling unauthorized copies or derivatives to be reliably traced, and thus facilitating effective legal recourse by the content owner. Systems and methods are also disclosed for protecting, detecting, removing, and decoding information embedded in electronic content, and for using the embedded information to protect software or other media from unauthorized analysis, attack, and/or modification.
  • Integrity Verification Of Pseudonymized Documents

    view source
  • US Patent:
    8266439, Sep 11, 2012
  • Filed:
    Sep 12, 2007
  • Appl. No.:
    11/854413
  • Inventors:
    Stuart Haber - New York NY, US
    William G. Horne - Lawrenceville NJ, US
    Tomas Sander - New York NY, US
    Danfeng Yao - West Lafayette IN, US
  • Assignee:
    Hewlett-Packard Development Company, L.P. - Houston TX
  • International Classification:
    H04L 9/32
    H04L 29/06
  • US Classification:
    713176, 713150, 713168, 713175, 713177
  • Abstract:
    One or more methods of generating a pseudonymizable document are described. A method comprises receiving a set of subdocuments and generating a first set of random values wherein each subdocument in the document corresponds to a first set random value. A second set of values is generated based on a subdocument and a corresponding value of the first set random value. A set of pseudonyms is generated wherein each subdocument in the document corresponds to at least one pseudonym of the pseudonym set. A third set of values is generated based on the second set of values and the pseudonym set and a summary value is generated based on the third set of values.
  • Software Self-Checking Systems And Methods

    view source
  • US Patent:
    8352747, Jan 8, 2013
  • Filed:
    Aug 12, 2011
  • Appl. No.:
    13/208768
  • Inventors:
    William G. Horne - Lawrenceville NJ, US
    Lesley R. Matheson - Discovery Bay CA, US
    Casey Sheehan - Hollister CA, US
    Robert E. Tarjan - Princeton NJ, US
  • Assignee:
    Intertrust Technologies Corporation - Sunnyvale CA
  • International Classification:
    H04L 9/32
  • US Classification:
    713187, 713176, 726 26
  • Abstract:
    Software self-checking mechanisms are described for improving software tamper resistance and/or reliability. Redundant tests are performed to detect modifications to a program while it is running. Modifications are recorded or reported. Embodiments of the software self-checking mechanisms can be implemented such that they are relatively stealthy and robust, and so that they are compatible with copy-specific static watermarking and other tamper-resistance techniques.

Medicine Doctors

William Horne Photo 3

William Tucker Horne

view source
Specialties:
Psychiatry
Education:
Baylor College of Medicine (1965)

Resumes

William Horne Photo 4

William Horne

view source
William Horne Photo 5

William Horne

view source
William Horne Photo 6

Master Carpenter

view source
Work:

Master Carpenter
William Horne Photo 7

William Horne

view source
Skills:
Scribe
William Horne Photo 8

William Horne

view source
William Horne Photo 9

William Horne

view source
William Horne Photo 10

William Horne Calera, AL

view source
Work:
1st Source Servall
Birmingham, AL
Apr 2011 to Jul 2011
Distribution Center Manager
USA Security
Birmingham, AL
Feb 2011 to Apr 2011
Security Supervisor
Walmart
Calera, AL
Apr 2010 to Feb 2011
Part Time Photo Center/Wireless Connect Center Sales Associate
Eastman Kodak Company
Rochester, NY
2002 to 2007
Logistics Supervisor
Transportation Supervisor
1993 to 2002
Education:
Commerce High School
Yonkers, NY
Jan 1966 to Jan 1969
High School in Bookkeeping
Monroe Community College
Rochester, NY
N/A in Inc
Military:
Rank: Corporal (Non-Commissoned Officer) Jul 1970 to Jul 1972
Branch: United States Marine Corps
L.i.location.original
William Horne Photo 11

William Horne Snohomish, WA

view source
Work:
Internal Drive

Jun 2013 to 2000
iD Tech Camps instructor
Mobius Productions

May 2011 to 2000
Digital Entrepreneurial Project
Home Depot
Everett, WA
Jul 2012 to Nov 2012
Seasonal position as a Sales Associate
University of Idaho
Philadelphia, PA
Aug 2011 to May 2012
Senior Capstone Project
Safeway

Sep 2007 to Jul 2009
Courtesy Clerk
Education:
University of Idaho
2009 to 2012
Bachelor of Science in Technology and Design
Edmonds Community College
2007 to 2009
Associate of Arts
Skills:
Game Design, unique interpretation, digital modeling, concept, storyboard, programing, visual communications.

Facebook

William Horne Photo 12

Jas William Van Horne

view source
Friends:
Rich Appiah, Sook-Yin Lee, Shay Donovan, Kayla Ann, Jewly Wrott
Jason William Van Horne
William Horne Photo 13

Bill van Horne

view source
Friends:
Jeff Whittington, William F. Moore, William Neil Farfour, Gregory Less
William Horne Photo 14

William Van Horne

view source

Classmates

William Horne Photo 15

Sir William Van horne hig...

view source
William Horne Photo 16

Highlands Middle School, ...

view source
Graduates:
Michael Sible (1968-1976),
Van Kniebes (1977-1981),
William Campbell (1967-1976),
William van Horne (1963-1964)

Flickr

Googleplus

William Horne Photo 25

William Horne

Work:
Dell - Account Executive (4)
Education:
University of Oklahoma - Criminal Justice
William Horne Photo 26

William Horne

William Horne Photo 27

William Horne

William Horne Photo 28

William Horne

William Horne Photo 29

William Horne

William Horne Photo 30

William Horne

William Horne Photo 31

William Horne

William Horne Photo 32

William Horne

Youtube

Weve Been Here Before: Insurrections and Whit...

As we remember and assess the damage of the January 6th Insurrection o...

  • Duration:
    3m 52s

William Horne - Sextet: I. Moderato

Chamber Music Michigan Recorded Live October 12, 2017 Merryl Neille, f...

  • Duration:
    8m 48s

William Horne - Sextet: III. Quick

Chamber Music Michigan Recorded Live October 12, 2017 Merryl Neille, f...

  • Duration:
    7m 28s

William Horne - Sextet: II. Sprightly

Chamber Music Michigan Recorded Live October 12, 2017 Merryl Neille, f...

  • Duration:
    6m 26s

William B. Horne II Memorial Service - August...

Comments are not monitored on this platform.

  • Duration:
    2h 18m 31s

In Loving Memory Of William B. Horne II

Comments are not monitored on this platform.

  • Duration:
    30m 34s

Myspace

William Horne Photo 33

William Van Horne

view source
Locality:
WOODBRIDGE, Virginia
Birthday:
1948

Get Report for William D Horne from Fountainville, PA, age ~76
Control profile