William Horne Director-client Services And Chief Compliance Officer
Caldwell & Orkin Inc Investment Advice
5185 Peachtree Pkwy, Norcross, GA 30092
William Horne CFO
Charis Corp Other Computer Peripheral Equipment Manufacturing
43460 Rdg Park Dr STE 140, Temecula, CA 92590 (951)6951999
William Horne Advertising Director
Caldwell & Orkin Funds Inc Management Investment
5185 Peachtree Pkwy, Norcross, GA 30092
William Horne Chairman, Director-client Services And Chief Compliance Officer
Caldwell & Orkin Inc Investment Counselors
5185 Peachtree Pkwy, Norcross, GA 30092 (678)5337850, (678)7979725
William Horne Manager
Laser Spine Institute, LLC Medical Doctor's Office
(813)2899613
William Horne City Manager
City of Clearwater Executive Office · City Government Parks and Recreation Department · Library Executive Office · Administrative Social/Manpower Programs · Refuse System · Water Supply Service Executive Office · Legislative Body · Economic Development of Housing
James J. Horning - Palo Alto CA, US W. Olin Sibert - Lexington MA, US Robert E. Tarjan - Princeton NJ, US Umesh Maheshwari - San Jose CA, US William G. Horne - Lawrenceville NJ, US Andrew K. Wright - Monroe Township NJ, US Lesley R. Matheson - Campbell CA, US Susan K. Owicki - Palo Alto CA, US
Assignee:
Intertrust Technologies Corp. - Sunnyvale CA
International Classification:
G06F 12/14
US Classification:
713190, 713194
Abstract:
Systems and methods are disclosed for protecting a computer program from unauthorized analysis and modification. Obfuscation transformations can be applied to the computer program's local structure, control graph, and/or data structure to render the program more difficult to understand and/or modify. Tamper-resistance mechanisms can be incorporated into the computer program to detect attempts to tamper with the program's operation. Once an attempt to tamper with the computer program is detected, the computer program reports it to an external agent, ceases normal operation, and/or reverses any modifications made by the attempted tampering. The computer program can also be watermarked to facilitate identification of its owner. The obfuscation, tamper-resistance, and watermarking transformations can be applied to the computer program's source code, object code, or executable image.
James J. Horning - Palo Alto CA, US W. Olin Sibert - Lexington MA, US Robert E. Tarjan - Princeton NJ, US Umesh Maheshwari - San Jose CA, US William G. Horne - Lawrenceville NJ, US Andrew K. Wright - Monroe Township NJ, US Lesley R. Matheson - Campbell CA, US Susan Owicki - Palo Alto CA, US
Assignee:
Intertrust Technologies Corporation - Sunnyvale CA
International Classification:
G06F 11/30
US Classification:
713187, 713189
Abstract:
Systems and methods are disclosed for protecting a computer program from unauthorized analysis and modification. Obfuscation transformations can be applied to the computer program's local structure, control graph, and/or data structure to render the program more difficult to understand and/or modify. Tamper-resistance mechanisms can be incorporated into the computer program to detect attempts to tamper with the program's operation. Once an attempt to tamper with the computer program is detected, the computer program reports it to an external agent, ceases normal operation, and/or reverses any modifications made by the attempted tampering. The computer program can also be watermarked to facilitate identification of its owner. The obfuscation, tamper-resistance, and watermarking transformations can be applied to the computer program's source code, object code, or executable image.
Concise Β-Amino Acid Synthesis Via Organocatalytic Aminomethylation
Yonggui Chi - Berkeley CA, US Samuel H. Gellman - Madison WI, US William C. Pomerantz - Madison WI, US William S. Horne - Madison WI, US Li Guo - Madison WI, US Emily P. English - Madison WI, US
The present invention provides a method for the synthesis of β-amino acids. The method also provides methods yielding α-substituted β-amino aldehydes and β-substituted γ-amino alcohols. The present method according to this invention allows for increased yield and easier purification using minimal chromatography or crystallization. The methods described herein are based on an aldehyde aminomethylation which involves a Mannich reaction between an aldehyde and a formaldehyde-derived N,O-acetal (iminium precursor) and a catalyst, such as, for example, L-proline or a pyrrolidine. The invention allows for large scale, commercial preparation of β-amino acids.
James J. Horning - Palo Alto CA, US W. Olin Sibert - Lexington MA, US Robert E. Tarjan - Princeton NJ, US Umesh Maheshwari - San Jose CA, US William G. Horne - Lawrenceville NJ, US Andrew K. Wright - Monroe Township NJ, US Lesley R. Matheson - Campbell CA, US Susan Owicki - Palo Alto CA, US
Assignee:
Intertrust Technologies Corporation - Sunnyvale CA
International Classification:
G06F 9/44
US Classification:
717127, 717126, 713187, 713188, 713189, 713190
Abstract:
Systems and methods are disclosed for protecting a computer program from unauthorized analysis and modification. Obfuscation transformations can be applied to the computer program's local structure, control graph, and/or data structure to render the program more difficult to understand and/or modify. Tamper-resistance mechanisms can be incorporated into the computer program to detect attempts to tamper with the program's operation. Once an attempt to tamper with the computer program is detected, the computer program reports it to an external agent, ceases normal operation, and/or reverses any modifications made by the attempted tampering. The computer program can also be watermarked to facilitate identification of its owner. The obfuscation, tamper-resistance, and watermarking transformations can be applied to the computer program's source code, object code, or executable image.
System And Method For Time And Attendance Record Keeping
William Horne - Marietta GA, US Dale Humphries - Suwanee GA, US
International Classification:
G06F017/60
US Classification:
705/032000
Abstract:
A system and method for time and attendance record keeping includes receiving identifying information from an employee at a point-of-sale terminal; recording clock in data for the employee; recording clock out data for the employee; using the clock in data and the clock out data to produce a time record for the employee; and transmitting the time record to a host system via a communication network. The host system is accessible by a manager via the Internet or other similar platform so that the manager can print report and other manipulate the time and attendance records remotely through a personal computer or other Web enabled portable device. Moreover, the manager can access the time and attendance records at the POS device.
System And Method For Time And Attendance Record Keeping
William Horne - Marietta GA, US Dale Humphries - Suwanee GA, US
International Classification:
G06F017/60
US Classification:
705/032000
Abstract:
A system and method for time and attendance record keeping includes receiving identifying information from an employee at a point-of-sale terminal; recording clock in data for the employee; recording clock out data for the employee; using the clock in data and the clock out data to produce a time record for the employee; and transmitting the time record to a host system via a communication network. The host system is accessible by a manager via the Internet or other similar platform so that the manager can print report and other manipulate the time and attendance records remotely through a personal computer or other Web enabled portable device. Moreover, the manager can access the time and attendance records at the POS device.
James Horning - Palo Alto CA, US W. Sibert - Lexington MA, US Robert Tarjan - Princeton NJ, US Urnesh Maheshwari - San Jose CA, US William Horne - Lawrenceville NJ, US Andrew Wright - Monroe Township NJ, US Lesley Matheson - Campbell CA, US Susan Owicki - Palo Alto CA, US
Systems and methods are disclosed for protecting a computer program from unauthorized analysis and modification. Obfuscation transformations can be applied to the computer program's local structure, control graph, and/or data structure to render the program more difficult to understand and/or modify. Tamper-resistance mechanisms can be incorporated into the computer program to detect attempts to tamper with the program's operation. Once an attempt to tamper with the computer program is detected, the computer program reports it to an external agent, ceases normal operation, and/or reverses any modifications made by the attempted tampering. The computer program can also be watermarked to facilitate identification of its owner. The obfuscation, tamper-resistance, and watermarking transformations can be applied to the computer program's source code, object code, or executable image.
Computer-Implemented Method For Role Discovery And Simplification In Access Control Systems\
Robert S. Schreiber - Palo Alto CA, US William G. Horne - Lawrenceville NJ, US
Assignee:
HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P. - Houston TX
International Classification:
H04L 9/32
US Classification:
726 1
Abstract:
A method includes selecting a first biclique role in a plurality of roles and finding all roles in the plurality that have a set of vertices of a second type that is a subset of a set of vertices of the second type in the first role; removing each of the subsets from the set of vertices of the second type corresponding to the first role; and reassigning the vertices of the first type to the roles such that original associations between the vertices of the first type and the vertices of the second type are maintained.
2014 to 2000 VolunteerBanner Desert, Emergency Department & PACU Mesa, AZ 2012 to 2013 VolunteerSky Harbor Squadron
2007 to 2009 Member, Civil Air Patrol Cadet ProgramAircraft Restoration Section, Commemorative Air Force Museum Mesa, AZ 2006 to 2007 VolunteerMaricopa County Parks Clean-Up
2004 to 2004 VolunteerTempe Town Lake Clean-Up
2003 to 2003 VolunteerArizona Historical Society Museum
Jun 2002 to Aug 2002Archeology Camp, Mesa Southwest Museum
Jun 2000 to Mar 2002TEMPE CARES
2002 to 2002 VolunteerZoo Camp, Phoenix Zoo San Diego, CA Jun 2000 to Jun 2001 Special Presenter