Search

William Tremayne Horne

age ~50

from Suwanee, GA

Also known as:
  • William T Horne
  • William Thorne

William Horne Phones & Addresses

  • Suwanee, GA
  • Carlsbad, CA
  • San Diego, CA
  • Oxnard, CA
  • Ventura, CA
  • Athens, GA
  • Honolulu, HI
  • Kailua, HI
  • Middle River, MD

Lawyers & Attorneys

William Horne Photo 1

William Horne - Lawyer

view source
Office:
William A. Horne
Specialties:
Litigation
ISLN:
906373413
Admitted:
1973
University:
Brown University, 1964; Brown University, 1964
Law School:
Georgetown University Law Center, J.D., 1972

Wikipedia References

William Horne Photo 2

William Horne (American Politician)

Name / Title
Company / Classification
Phones & Addresses
William Horne
CFO
Charis Corp
Computer Peripheral Equipment
43460 Ridge Park Dr Ste 140, Temecula, CA 92590
William Horne
Director-client Services And Chief Compliance Officer
Caldwell & Orkin Inc
Investment Advice
5185 Peachtree Pkwy, Norcross, GA 30092
William Horne
CFO
Charis Corp
Other Computer Peripheral Equipment Manufacturing
43460 Rdg Park Dr STE 140, Temecula, CA 92590
(951)6951999
William Horne
Advertising Director
Caldwell & Orkin Funds Inc
Management Investment
5185 Peachtree Pkwy, Norcross, GA 30092
William Horne
Chairman, Director-client Services And Chief Compliance Officer
Caldwell & Orkin Inc
Investment Counselors
5185 Peachtree Pkwy, Norcross, GA 30092
(678)5337850, (678)7979725
William Horne
Manager
Laser Spine Institute, LLC
Medical Doctor's Office
(813)2899613
William Horne
City Manager
City of Clearwater
Executive Office · City Government Parks and Recreation Department · Library Executive Office · Administrative Social/Manpower Programs · Refuse System · Water Supply Service Executive Office · Legislative Body · Economic Development of Housing
(727)5624040, (727)5624538, (727)5624970, (727)5624060
William G. Horne
Facilities Manager
San Francisco Design Center, LLC
Manage/Invest Real Estate · Ret Furniture Nonresidential Building Operator · Furniture Stores
2 Henry Adams St, San Francisco, CA 94103
101 Henry Adams St #450, San Francisco, CA 94103
(415)4905800, (415)4905885, (800)8778522, (415)8641500

Us Patents

  • Software Self-Defense Systems And Methods

    view source
  • US Patent:
    7430670, Sep 30, 2008
  • Filed:
    Jul 31, 2000
  • Appl. No.:
    09/629546
  • Inventors:
    James J. Horning - Palo Alto CA, US
    W. Olin Sibert - Lexington MA, US
    Robert E. Tarjan - Princeton NJ, US
    Umesh Maheshwari - San Jose CA, US
    William G. Horne - Lawrenceville NJ, US
    Andrew K. Wright - Monroe Township NJ, US
    Lesley R. Matheson - Campbell CA, US
    Susan K. Owicki - Palo Alto CA, US
  • Assignee:
    Intertrust Technologies Corp. - Sunnyvale CA
  • International Classification:
    G06F 12/14
  • US Classification:
    713190, 713194
  • Abstract:
    Systems and methods are disclosed for protecting a computer program from unauthorized analysis and modification. Obfuscation transformations can be applied to the computer program's local structure, control graph, and/or data structure to render the program more difficult to understand and/or modify. Tamper-resistance mechanisms can be incorporated into the computer program to detect attempts to tamper with the program's operation. Once an attempt to tamper with the computer program is detected, the computer program reports it to an external agent, ceases normal operation, and/or reverses any modifications made by the attempted tampering. The computer program can also be watermarked to facilitate identification of its owner. The obfuscation, tamper-resistance, and watermarking transformations can be applied to the computer program's source code, object code, or executable image.
  • Software Self-Defense Systems And Methods

    view source
  • US Patent:
    7779270, Aug 17, 2010
  • Filed:
    May 13, 2005
  • Appl. No.:
    11/129106
  • Inventors:
    James J. Horning - Palo Alto CA, US
    W. Olin Sibert - Lexington MA, US
    Robert E. Tarjan - Princeton NJ, US
    Umesh Maheshwari - San Jose CA, US
    William G. Horne - Lawrenceville NJ, US
    Andrew K. Wright - Monroe Township NJ, US
    Lesley R. Matheson - Campbell CA, US
    Susan Owicki - Palo Alto CA, US
  • Assignee:
    Intertrust Technologies Corporation - Sunnyvale CA
  • International Classification:
    G06F 11/30
  • US Classification:
    713187, 713189
  • Abstract:
    Systems and methods are disclosed for protecting a computer program from unauthorized analysis and modification. Obfuscation transformations can be applied to the computer program's local structure, control graph, and/or data structure to render the program more difficult to understand and/or modify. Tamper-resistance mechanisms can be incorporated into the computer program to detect attempts to tamper with the program's operation. Once an attempt to tamper with the computer program is detected, the computer program reports it to an external agent, ceases normal operation, and/or reverses any modifications made by the attempted tampering. The computer program can also be watermarked to facilitate identification of its owner. The obfuscation, tamper-resistance, and watermarking transformations can be applied to the computer program's source code, object code, or executable image.
  • Concise Β-Amino Acid Synthesis Via Organocatalytic Aminomethylation

    view source
  • US Patent:
    7820858, Oct 26, 2010
  • Filed:
    Mar 26, 2007
  • Appl. No.:
    11/691249
  • Inventors:
    Yonggui Chi - Berkeley CA, US
    Samuel H. Gellman - Madison WI, US
    William C. Pomerantz - Madison WI, US
    William S. Horne - Madison WI, US
    Li Guo - Madison WI, US
    Emily P. English - Madison WI, US
  • Assignee:
    Wisconsin Alumni Research Foundation - Madison WI
  • International Classification:
    C07C 213/00
    C07C 215/28
    C07C 271/22
    C07C 269/06
    C07C 217/64
    C07D 209/14
    C07D 209/26
  • US Classification:
    562553, 562531
  • Abstract:
    The present invention provides a method for the synthesis of β-amino acids. The method also provides methods yielding α-substituted β-amino aldehydes and β-substituted γ-amino alcohols. The present method according to this invention allows for increased yield and easier purification using minimal chromatography or crystallization. The methods described herein are based on an aldehyde aminomethylation which involves a Mannich reaction between an aldehyde and a formaldehyde-derived N,O-acetal (iminium precursor) and a catalyst, such as, for example, L-proline or a pyrrolidine. The invention allows for large scale, commercial preparation of β-amino acids.
  • Software Self-Defense Systems And Methods

    view source
  • US Patent:
    7823135, Oct 26, 2010
  • Filed:
    Apr 7, 2005
  • Appl. No.:
    11/102306
  • Inventors:
    James J. Horning - Palo Alto CA, US
    W. Olin Sibert - Lexington MA, US
    Robert E. Tarjan - Princeton NJ, US
    Umesh Maheshwari - San Jose CA, US
    William G. Horne - Lawrenceville NJ, US
    Andrew K. Wright - Monroe Township NJ, US
    Lesley R. Matheson - Campbell CA, US
    Susan Owicki - Palo Alto CA, US
  • Assignee:
    Intertrust Technologies Corporation - Sunnyvale CA
  • International Classification:
    G06F 9/44
  • US Classification:
    717127, 717126, 713187, 713188, 713189, 713190
  • Abstract:
    Systems and methods are disclosed for protecting a computer program from unauthorized analysis and modification. Obfuscation transformations can be applied to the computer program's local structure, control graph, and/or data structure to render the program more difficult to understand and/or modify. Tamper-resistance mechanisms can be incorporated into the computer program to detect attempts to tamper with the program's operation. Once an attempt to tamper with the computer program is detected, the computer program reports it to an external agent, ceases normal operation, and/or reverses any modifications made by the attempted tampering. The computer program can also be watermarked to facilitate identification of its owner. The obfuscation, tamper-resistance, and watermarking transformations can be applied to the computer program's source code, object code, or executable image.
  • System And Method For Time And Attendance Record Keeping

    view source
  • US Patent:
    20030191700, Oct 9, 2003
  • Filed:
    Apr 9, 2002
  • Appl. No.:
    10/118310
  • Inventors:
    William Horne - Marietta GA, US
    Dale Humphries - Suwanee GA, US
  • International Classification:
    G06F017/60
  • US Classification:
    705/032000
  • Abstract:
    A system and method for time and attendance record keeping includes receiving identifying information from an employee at a point-of-sale terminal; recording clock in data for the employee; recording clock out data for the employee; using the clock in data and the clock out data to produce a time record for the employee; and transmitting the time record to a host system via a communication network. The host system is accessible by a manager via the Internet or other similar platform so that the manager can print report and other manipulate the time and attendance records remotely through a personal computer or other Web enabled portable device. Moreover, the manager can access the time and attendance records at the POS device.
  • System And Method For Time And Attendance Record Keeping

    view source
  • US Patent:
    20040122752, Jun 24, 2004
  • Filed:
    Dec 11, 2003
  • Appl. No.:
    10/732358
  • Inventors:
    William Horne - Marietta GA, US
    Dale Humphries - Suwanee GA, US
  • International Classification:
    G06F017/60
  • US Classification:
    705/032000
  • Abstract:
    A system and method for time and attendance record keeping includes receiving identifying information from an employee at a point-of-sale terminal; recording clock in data for the employee; recording clock out data for the employee; using the clock in data and the clock out data to produce a time record for the employee; and transmitting the time record to a host system via a communication network. The host system is accessible by a manager via the Internet or other similar platform so that the manager can print report and other manipulate the time and attendance records remotely through a personal computer or other Web enabled portable device. Moreover, the manager can access the time and attendance records at the POS device.
  • Software Self-Defense Systems And Methods

    view source
  • US Patent:
    20070234070, Oct 4, 2007
  • Filed:
    Aug 17, 2006
  • Appl. No.:
    11/506321
  • Inventors:
    James Horning - Palo Alto CA, US
    W. Sibert - Lexington MA, US
    Robert Tarjan - Princeton NJ, US
    Urnesh Maheshwari - San Jose CA, US
    William Horne - Lawrenceville NJ, US
    Andrew Wright - Monroe Township NJ, US
    Lesley Matheson - Campbell CA, US
    Susan Owicki - Palo Alto CA, US
  • Assignee:
    Intertrust Technologies Corp. - Sunnyvale CA
  • International Classification:
    H04N 7/16
    G06F 12/14
    H04L 9/32
    G06F 11/30
    G06F 17/30
    G06F 7/04
    G06K 9/00
    H03M 1/68
    H04K 1/00
    H04L 9/00
  • US Classification:
    713190000, 713187000, 726026000
  • Abstract:
    Systems and methods are disclosed for protecting a computer program from unauthorized analysis and modification. Obfuscation transformations can be applied to the computer program's local structure, control graph, and/or data structure to render the program more difficult to understand and/or modify. Tamper-resistance mechanisms can be incorporated into the computer program to detect attempts to tamper with the program's operation. Once an attempt to tamper with the computer program is detected, the computer program reports it to an external agent, ceases normal operation, and/or reverses any modifications made by the attempted tampering. The computer program can also be watermarked to facilitate identification of its owner. The obfuscation, tamper-resistance, and watermarking transformations can be applied to the computer program's source code, object code, or executable image.
  • Computer-Implemented Method For Role Discovery And Simplification In Access Control Systems\

    view source
  • US Patent:
    20090144803, Jun 4, 2009
  • Filed:
    Jan 5, 2009
  • Appl. No.:
    12/348832
  • Inventors:
    Robert S. Schreiber - Palo Alto CA, US
    William G. Horne - Lawrenceville NJ, US
  • Assignee:
    HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P. - Houston TX
  • International Classification:
    H04L 9/32
  • US Classification:
    726 1
  • Abstract:
    A method includes selecting a first biclique role in a plurality of roles and finding all roles in the plurality that have a set of vertices of a second type that is a subset of a set of vertices of the second type in the first role; removing each of the subsets from the set of vertices of the second type corresponding to the first role; and reassigning the vertices of the first type to the roles such that original associations between the vertices of the first type and the vertices of the second type are maintained.

Medicine Doctors

William Horne Photo 3

William Tucker Horne

view source
Specialties:
Psychiatry
Education:
Baylor College of Medicine (1965)

Resumes

William Horne Photo 4

William Horne

view source
William Horne Photo 5

William Horne

view source
William Horne Photo 6

Master Carpenter

view source
Work:

Master Carpenter
William Horne Photo 7

William Horne

view source
Skills:
Scribe
William Horne Photo 8

William Horne

view source
William Horne Photo 9

William Horne

view source
William Horne Photo 10

William Horne San Diego, CA

view source
Work:
PATIENT POINT

Aug 2014 to 2000
Healthcare Media Specialist
AUTO CLUB OF SOUTHERN CALIFORNIA

Jun 2011 to May 2014
Field Sales Agent
Enterprise Rent-A-Car
San Diego, CA
Mar 2005 to May 2011
Assistant Manager
Education:
Long Island University
Brookville, NY
Nov 2004
MBA in Business Marketing
Quinnipiac University
Hamden, CT
May 2003
Bachelors of science in Marketing
Skills:
SalesForce
William Horne Photo 11

William Horne Tempe, AZ

view source
Work:
Desert Botanical Garden

2014 to 2000
Volunteer
Banner Desert, Emergency Department & PACU
Mesa, AZ
2012 to 2013
Volunteer
Sky Harbor Squadron

2007 to 2009
Member, Civil Air Patrol Cadet Program
Aircraft Restoration Section, Commemorative Air Force Museum
Mesa, AZ
2006 to 2007
Volunteer
Maricopa County Parks Clean-Up

2004 to 2004
Volunteer
Tempe Town Lake Clean-Up

2003 to 2003
Volunteer
Arizona Historical Society Museum

Jun 2002 to Aug 2002
Archeology Camp, Mesa Southwest Museum

Jun 2000 to Mar 2002
TEMPE CARES

2002 to 2002
Volunteer
Zoo Camp, Phoenix Zoo
San Diego, CA
Jun 2000 to Jun 2001
Special Presenter

Facebook

William Horne Photo 12

Jas William Van Horne

view source
Friends:
Rich Appiah, Sook-Yin Lee, Shay Donovan, Kayla Ann, Jewly Wrott
Jason William Van Horne
William Horne Photo 13

Bill van Horne

view source
Friends:
Jeff Whittington, William F. Moore, William Neil Farfour, Gregory Less
William Horne Photo 14

William Van Horne

view source

Classmates

William Horne Photo 15

Sir William Van horne hig...

view source
William Horne Photo 16

Highlands Middle School, ...

view source
Graduates:
Michael Sible (1968-1976),
Van Kniebes (1977-1981),
William Campbell (1967-1976),
William van Horne (1963-1964)

Flickr

Googleplus

William Horne Photo 25

William Horne

Lived:
Berkeley, CA
Work:
Weather Underground - Customer Care
Education:
Sierra College
William Horne Photo 26

William Horne

Work:
Dell - Account Executive (4)
Education:
University of Oklahoma - Criminal Justice
William Horne Photo 27

William Horne

William Horne Photo 28

William Horne

William Horne Photo 29

William Horne

William Horne Photo 30

William Horne

William Horne Photo 31

William Horne

William Horne Photo 32

William Horne

Youtube

Weve Been Here Before: Insurrections and Whit...

As we remember and assess the damage of the January 6th Insurrection o...

  • Duration:
    3m 52s

William Horne - Sextet: I. Moderato

Chamber Music Michigan Recorded Live October 12, 2017 Merryl Neille, f...

  • Duration:
    8m 48s

William Horne - Sextet: III. Quick

Chamber Music Michigan Recorded Live October 12, 2017 Merryl Neille, f...

  • Duration:
    7m 28s

William Horne - Sextet: II. Sprightly

Chamber Music Michigan Recorded Live October 12, 2017 Merryl Neille, f...

  • Duration:
    6m 26s

William B. Horne II Memorial Service - August...

Comments are not monitored on this platform.

  • Duration:
    2h 18m 31s

In Loving Memory Of William B. Horne II

Comments are not monitored on this platform.

  • Duration:
    30m 34s

Myspace

William Horne Photo 33

William Van Horne

view source
Locality:
WOODBRIDGE, Virginia
Birthday:
1948

Get Report for William Tremayne Horne from Suwanee, GA, age ~50
Control profile