Search

William G Horne

age ~61

from Savannah, GA

Also known as:
  • William George Horne
  • William J Horne
  • Bill J Horne
  • William Home
  • Bill G Horn

William Horne Phones & Addresses

  • Savannah, GA
  • Ridgewood, NJ
  • Coram, NY
  • Bronxville, NY
  • Lumberton, NC
  • Islip, NY
  • New York, NY
  • Berlin, NJ
  • San Francisco, CA
  • 954 Skyline Dr, Coram, NY 11727 • (631)6807026

Work

  • Position:
    Transportation and Material Moving Occupations

Education

  • Degree:
    Bachelor's degree or higher

Lawyers & Attorneys

William Horne Photo 1

William Horne - Lawyer

view source
Office:
William A. Horne
Specialties:
Litigation
ISLN:
906373413
Admitted:
1973
University:
Brown University, 1964; Brown University, 1964
Law School:
Georgetown University Law Center, J.D., 1972

Wikipedia References

William Horne Photo 2

William Horne (American Politician)

Name / Title
Company / Classification
Phones & Addresses
William Horne
President
H H Mack Sales
Motor Vehicle Parts and Accessories
80 Green Pond Rd # 80, Rockaway, NJ 07866
Website: hhmack.com
William Horne
President
H & H Mack Sales, Inc
Automobiles and Other Motor Vehicles
80 Green Pond Rd, Rockaway, NJ 07866
William Horne
Owner
Sterling Toggle CO
Manufacturing Industries
99 Mahan St, Babylon, NY 11704
Website: sterlingtoggle.com
William C. Horne
PRESIDENT
PLEASANT POINT ASSOCIATION, INCORPORATED, THE
245 Pleasant Pt Rd, Branford, CT 06405
Yale University School Of Medicine, New Haven, CT 06519
236 Pleasant Pt Rd, Branford, CT 06405
William Horne
President
Pleasant Point Association
Water Supply Service
246 Pleasant Pt Rd, Branford, CT 06405
William Horne
Owner
Sterling Toggle Inc
Mechanical or Industrial Engineering · All Other Misc Mfg
99 Mahan St, West Babylon, NY 11704
(631)4910500, (631)4913401
William Horne
President
Horne Carpentry Inc
Single-Family Home Remodeling Multi-Family Dwelling Remodeling and Industrial Building Remodeling · Woodworking · Decks · Bathroom & Kitchen Remodeling · Replacement Windows
36 E 39 St, Bergen Point, NJ 07002
195 Broadway, Bayonne, NJ 07002
(201)8588787
William Horne
President
H H MACK SALES
Car Accessories · All Other Motor Vehicle Parts Mfg
80 Grn Pond Rd, Rockaway, NJ 07866
(973)6253330, (973)7844811, (973)6254178

Us Patents

  • Systems And Methods For Conducting Transactions And Communications Using A Trusted Third Party

    view source
  • US Patent:
    7136840, Nov 14, 2006
  • Filed:
    Apr 22, 2002
  • Appl. No.:
    10/128182
  • Inventors:
    Binyamin Pinkas - Jersey City NJ, US
    Tomas Sander - New York NY, US
    William G. Horne - Lawrenceville NJ, US
  • Assignee:
    Intertrust Technologies Corp. - Sunnyvale CA
  • International Classification:
    H04L 9/00
  • US Classification:
    705 75, 713168, 380277
  • Abstract:
    Systems and methods are provided for managing the transfer of electronic files. In one embodiment, a sender transfers an encrypted version of a file (such as a digitally encoded audio track, movie, document, or the like) to someone who wishes to receive it. The receiver computes a hash of the encrypted file, and sends it to a trusted third party. The trusted third party compares the hash that was computed by the receiver with another hash computed by the sender. If the two hashes match, the third party sends the file decryption key to the receiver. In some embodiments, the receiver may also send the third party payment information so that the sender, the content owner, and/or the third party can be paid for their role in the transaction. In a preferred embodiment, the payment information is only sent to, and/or used by, the third party once the third party has confirmed to the satisfaction of the receiver that the encrypted file in the receiver's possession will decrypt correctly. In some embodiments, the sender computes a hash of the encrypted version of the file and sends it directly to the third party.
  • Systems And Methods For Conducting Transactions And Communications Using A Trusted Third Party

    view source
  • US Patent:
    7827114, Nov 2, 2010
  • Filed:
    Oct 30, 2006
  • Appl. No.:
    11/590319
  • Inventors:
    Binyamin Pinkas - Jersey City NJ, US
    Tomas Sander - New York NY, US
    William G. Horne - Lawrenceville NJ, US
  • Assignee:
    Intertrust Technologies Corporation - Sunnyvale CA
  • International Classification:
    G06Q 40/00
  • US Classification:
    705 75, 707747, 713168, 380277
  • Abstract:
    Systems and methods are provided for managing the transfer of electronic files. In one embodiment, a sender transfers an encrypted version of a file (such as a digitally encoded audio track, movie, document, or the like) to someone who wishes to receive it. The receiver computes a hash of the encrypted file, and sends it to a trusted third party. The trusted third party compares the hash that was computed by the receiver with another hash computed by the sender. If the two hashes match, the third party sends the file decryption key to the receiver. In some embodiments, the receiver may also send the third party payment information so that the sender, the content owner, and/or the third party can be paid for their role in the transaction. In a preferred embodiment, the payment information is only sent to, and/or used by, the third party once the third party has confirmed to the satisfaction of the receiver that the encrypted file in the receiver's possession will decrypt correctly. In some embodiments, the sender computes a hash of the encrypted version of the file and sends it directly to the third party.
  • Integrity Verification Of Pseudonymized Documents

    view source
  • US Patent:
    8266439, Sep 11, 2012
  • Filed:
    Sep 12, 2007
  • Appl. No.:
    11/854413
  • Inventors:
    Stuart Haber - New York NY, US
    William G. Horne - Lawrenceville NJ, US
    Tomas Sander - New York NY, US
    Danfeng Yao - West Lafayette IN, US
  • Assignee:
    Hewlett-Packard Development Company, L.P. - Houston TX
  • International Classification:
    H04L 9/32
    H04L 29/06
  • US Classification:
    713176, 713150, 713168, 713175, 713177
  • Abstract:
    One or more methods of generating a pseudonymizable document are described. A method comprises receiving a set of subdocuments and generating a first set of random values wherein each subdocument in the document corresponds to a first set random value. A second set of values is generated based on a subdocument and a corresponding value of the first set random value. A set of pseudonyms is generated wherein each subdocument in the document corresponds to at least one pseudonym of the pseudonym set. A third set of values is generated based on the second set of values and the pseudonym set and a summary value is generated based on the third set of values.
  • Systems And Methods For Conducting Transactions And Communications Using A Trusted Third Party

    view source
  • US Patent:
    8577812, Nov 5, 2013
  • Filed:
    May 22, 2012
  • Appl. No.:
    13/478042
  • Inventors:
    Binyamin Pinkas - Jersey City NJ, US
    Tomas Sander - New York NY, US
    William G. Horne - Lawrenceville NJ, US
  • Assignee:
    Intertrust Technologies Corporation - Sunnyvale CA
  • International Classification:
    G06Q 40/00
  • US Classification:
    705 75, 707747, 713168, 380277
  • Abstract:
    Systems and methods are provided for performing transactions and managing communications using a trusted third party. In one embodiment, a sender transfers an encrypted version of a file (such as a digitally encoded audio track, movie, document, or the like) to someone who wishes to receive it. The receiver computes a first hash of at least a portion of the encrypted data content, and sends the first hash to a third party configured to compare at least a portion of the first hash to at least a portion of a second hash. The receiver receives a file decryption key from the third party, and decrypts at least the portion of the received encrypted data content with the decryption key. In some cases, multiple hashes of the encrypted data content may be computed, each using a different portion of the encrypted data content.
  • Enterprise Environment Analysis

    view source
  • US Patent:
    20070061125, Mar 15, 2007
  • Filed:
    Oct 31, 2005
  • Appl. No.:
    11/263014
  • Inventors:
    Sandeep Bhatt - Madison NJ, US
    William Horne - Lawrenceville NJ, US
    Joseph Pato - Lexington MA, US
    Siva Rajagopalan - Morris Plans NJ, US
    Prasad Rao - Edison NJ, US
  • International Classification:
    G06F 9/44
  • US Classification:
    703020000, 703023000
  • Abstract:
    Embodiments of the present disclosure provide systems and methods for analyzing an enterprise environment. Briefly described, one embodiment of the system for analyzing an enterprise environment comprises a modeling module that determines possible accesses to enterprise network services from a plurality of entities; and a validation module that determines whether a possible access to an enterprise service by a particular entity violates an enterprise policy, the enterprise policy governing which entities are authorized to access one or more enterprise services.
  • Method For Analyzing Risk

    view source
  • US Patent:
    20110252479, Oct 13, 2011
  • Filed:
    Apr 8, 2010
  • Appl. No.:
    12/756217
  • Inventors:
    Yolanta Beresnevichiene - Bristol, GB
    Sandeep N. Bhatt - Madison NJ, US
    William G. Horne - Lawrenceville NJ, US
    Tari Schreider - Duluth GA, US
  • International Classification:
    G06F 11/00
  • US Classification:
    726 25
  • Abstract:
    A method for analyzing risk to a system, the method being carried out by a computer having a processor and system memory, includes the steps of inputting data representing multiple threat objectives that comprise the risk, calculating a residual risk for each threat objective in view of a plurality of control mechanisms, and generating output representing an overall residual risk to the system that is a combination of the residual risks.
  • Systems And Methods For Conducting Transactions And Communications Using A Trusted Third Party

    view source
  • US Patent:
    20140058952, Feb 27, 2014
  • Filed:
    Nov 4, 2013
  • Appl. No.:
    14/071574
  • Inventors:
    Tomas SANDER - New York NY, US
    William G. HORNE - Lawrenceville NJ, US
  • Assignee:
    Intertrust Technologies Corporation - Sunnyvale CA
  • International Classification:
    G06Q 20/38
    G06Q 20/02
  • US Classification:
    705 71
  • Abstract:
    Systems and methods are provided for performing transactions and managing communications using a trusted third party. In one embodiment, a sender transfers an encrypted version of a file (such as a digitally encoded audio track, movie, document, or the like) to someone who wishes to receive it. The receiver computes a first hash of at least a portion of the encrypted data content, and sends the first hash to a third party configured to compare at least a portion of the first hash to at least a portion of a second hash. The receiver receives a file decryption key from the third party, and decrypts at least the portion of the received encrypted data content with the decryption key. In some cases, multiple hashes of the encrypted data content may be computed, each using a different portion of the encrypted data content.
  • Systems And Methods For Conducting Transactions And Communications Using A Trusted Third Party

    view source
  • US Patent:
    20160155119, Jun 2, 2016
  • Filed:
    Aug 28, 2015
  • Appl. No.:
    14/839125
  • Inventors:
    - Sunnyvale CA, US
    Tomas SANDER - New York NY, US
    William G. HORNE - Lawrenceville NJ, US
  • International Classification:
    G06Q 20/38
    G06Q 20/02
  • Abstract:
    Systems and methods are provided for performing transactions and managing communications using a trusted third party. In one embodiment, a sender transfers an encrypted version of a file (such as a digitally encoded audio track, movie, document, or the like) to someone who wishes to receive it. The receiver computes a first hash of at least a portion of the encrypted data content, and sends the first hash to a third party configured to compare at least a portion of the first hash to at least a portion of a second hash. The receiver receives a file decryption key from the third party, and decrypts at least the portion of the received encrypted data content with the decryption key. In some cases, multiple hashes of the encrypted data content may be computed, each using a different portion of the encrypted data content.

Medicine Doctors

William Horne Photo 3

William Tucker Horne

view source
Specialties:
Psychiatry
Education:
Baylor College of Medicine (1965)

Resumes

William Horne Photo 4

Construction Superintendent

view source
Location:
171 Stoney Xing, Bluffton, SC 29910
Industry:
Construction
Work:
Richard Best Custom Homes
Construction Superintendent

Tmx Finance Jul 2013 - Jul 2014
Design and Planning Project Manager Ii

Efacec Feb 2009 - Jul 2013
Core Design Team Leader - Cad Engineer and Mechanical Designer

Best Custom Homes 2008 - 2009
Construction Superintendent

Maxwell - Reddick and Associates, Inc. 2007 - 2008
Construction Administrator
Education:
Georgia Southern University 1995 - 2003
Bachelors, Bachelor of Science, Construction
Statesboro High School 1991 - 1994
Ogeechee Technical College 1905 - 1906
Skills:
Autocad
Construction
Cad
Project Management
Engineering
Construction Management
Electricians
Project Engineering
Microsoft Office
Manufacturing
Contract Management
Microsoft Excel
Inspection
Microsoft Word
Energy
Electrical Engineering
Procurement
Automation
Power Generation
Ms Project
Materials
Purchasing
Engineering Management
Powerpoint
Transformer
Inventor
Lean Manufacturing
Power Distribution
Power Systems
Solidworks
Electronics
High Voltage
Substation
Architecture
Photoshop
Drawing
Switchgear
Power Plants
Excel
Windows
Word
Six Sigma
Plc
Architectures
Microsoft Project
Electrical
Interests:
Self Defense and Firearms Training
Spending Time With My Family
Gardening
Languages:
Spanish
Portuguese
Certifications:
Residential/Commercial Building Inspector
Emergency First Responder
Confined Space Rescue
30 Hour Osha Safety Training - Construction Safety & Health
Certified Level 2 Defensive Options Trainer
Residential Builder License
License 53155958 -B1,B2
Certified Level 1 Krav Maga Trainer
International Code Council, License 53155958 -B1,B2
Osha
Fit To Fight®
William Horne Photo 5

Financial Advisor

view source
Location:
115 west Century Rd, Paramus, NJ 07652
Industry:
Financial Services
Work:
Northwestern Mutual since 2009
Financial Representative

Virtus Hospitality 2007 - 2009
Consultant

CBRE Hotels Mar 2005 - Sep 2006
Vice President

The Carlyle Hotel 1999 - 2001
Director of Food and Beverage

The Paramount Hotel, Ian Schrager 1998 - 1999
Director of Food and Beverage
Education:
London Business School 2002 - 2003
MSc, Sloan Masters in Advanced Business Management
Dowling College 1986 - 1988
Skills:
Business Development
Strategic Planning
Investments
Finance
Strategy
Management
Leadership
Financial Planning
Financial Analysis
Financial Services
Interests:
Outdoor Activities Including Golf
Wine
Cycling
Tennis
Cinema
William Horne Photo 6

William Horne

view source
William Horne Photo 7

William Horne

view source
William Horne Photo 8

Master Carpenter

view source
Work:

Master Carpenter
William Horne Photo 9

William Horne

view source
Skills:
Scribe
William Horne Photo 10

William Horne

view source
William Horne Photo 11

William Horne

view source

Facebook

William Horne Photo 12

Jas William Van Horne

view source
Friends:
Rich Appiah, Sook-Yin Lee, Shay Donovan, Kayla Ann, Jewly Wrott
Jason William Van Horne
William Horne Photo 13

Bill van Horne

view source
Friends:
Jeff Whittington, William F. Moore, William Neil Farfour, Gregory Less
William Horne Photo 14

William Van Horne

view source

Classmates

William Horne Photo 15

Sir William Van horne hig...

view source
William Horne Photo 16

Highlands Middle School, ...

view source
Graduates:
Michael Sible (1968-1976),
Van Kniebes (1977-1981),
William Campbell (1967-1976),
William van Horne (1963-1964)

Flickr

Googleplus

William Horne Photo 25

William Horne

Work:
Dell - Account Executive (4)
Education:
University of Oklahoma - Criminal Justice
William Horne Photo 26

William Horne

William Horne Photo 27

William Horne

William Horne Photo 28

William Horne

William Horne Photo 29

William Horne

William Horne Photo 30

William Horne

William Horne Photo 31

William Horne

William Horne Photo 32

William Horne

Youtube

Weve Been Here Before: Insurrections and Whit...

As we remember and assess the damage of the January 6th Insurrection o...

  • Duration:
    3m 52s

William Horne - Sextet: I. Moderato

Chamber Music Michigan Recorded Live October 12, 2017 Merryl Neille, f...

  • Duration:
    8m 48s

William Horne - Sextet: III. Quick

Chamber Music Michigan Recorded Live October 12, 2017 Merryl Neille, f...

  • Duration:
    7m 28s

William Horne - Sextet: II. Sprightly

Chamber Music Michigan Recorded Live October 12, 2017 Merryl Neille, f...

  • Duration:
    6m 26s

William B. Horne II Memorial Service - August...

Comments are not monitored on this platform.

  • Duration:
    2h 18m 31s

In Loving Memory Of William B. Horne II

Comments are not monitored on this platform.

  • Duration:
    30m 34s

Myspace

William Horne Photo 33

William Van Horne

view source
Locality:
WOODBRIDGE, Virginia
Birthday:
1948

Get Report for William G Horne from Savannah, GA, age ~61
Control profile