William J. Raduchel
Great Falls, Virginia, United States
3K followers
500+ connections
About
WILLIAM J. RADUCHEL has over 60 years of experience with systems, software and networks…
Articles by William J.
Activity
-
Thank you to Midwest Business Group on Health (MBGH) for the opprotunity to share our thoughts on the importance of supporting our employees with…
Thank you to Midwest Business Group on Health (MBGH) for the opprotunity to share our thoughts on the importance of supporting our employees with…
Liked by William J. Raduchel
-
🚀 Sales kickoff season is here, but once the planning ends, the real challenge begins: tracking deals, uncovering risks, and making sense of…
🚀 Sales kickoff season is here, but once the planning ends, the real challenge begins: tracking deals, uncovering risks, and making sense of…
Liked by William J. Raduchel
Experience
Education
-
Michigan Technological University
-
Activities and Societies: Treasurer, Engineering Show
Majored in chemical engineering. Worked at the Institute for Mineral Research. Published paper on the zeta potential. Treasurer of the Michigan Tech Engineering Show.
-
-
Activities and Societies: Fellow of the Harvard Computing Center on the IBM Donation
Member of the Student-Faculty Advisory Council during the 1969 strike.
-
-
-
-
-
-
-
-
-
-
Publications
-
The Bleeding Edge
Amplify Publishing Group
A career memoir of over sixty years at the intersection of technology and media. A mixture of management lessons, history and anecdotes. Evolved from my class at the McDonough School of Business at Georgetown University.
-
The New Technology State
Amplify Publishing Group
A Galbraithian view on how technology has left us fragile, divided and unequal and to do about it. Started with Rt Hon Tom Tugendhat, MP.
-
Copyright in the Digital Era: Building Evidence for Policy
The National Academies Press
-
The Economics of Siftware
National Academy of Sciences
Part of the new Economy project led by Dale Jorgensen
Patents
-
Electronic document notarization
Issued US 9,686,079
A server receives a package of data including: a document designated for notarization, identification information including a photograph, photograph of a user, and a signature of the user. The server compares the photograph of the user to the photograph included with the identification information. Next, the server verifies an identity of the user based on the identification information and the photograph by comparing the photograph of the signer to the photograph included with the…
A server receives a package of data including: a document designated for notarization, identification information including a photograph, photograph of a user, and a signature of the user. The server compares the photograph of the user to the photograph included with the identification information. Next, the server verifies an identity of the user based on the identification information and the photograph by comparing the photograph of the signer to the photograph included with the identification information. The server then applies the signature and an indication of notarization to the document designated for notarization to create a notarized version of the document. The server stores the notarized version of the document, the photograph, and the identification document in a secure data package, and provides the notarized version of the document to the user.
-
Records access and management
Issued US 9,619,616
An electronic device for aggregating electronic medical records, in which electronic medical records are aggregated from multiple electronic repositories and displayed as a single set of records. The multiple electronic repositories may store records for a particular patient using varying identifying/access information to facilitate anonymous access to the electronic medical records. Emergency medical services providers may be able to access medical records for a patient using the electronic…
An electronic device for aggregating electronic medical records, in which electronic medical records are aggregated from multiple electronic repositories and displayed as a single set of records. The multiple electronic repositories may store records for a particular patient using varying identifying/access information to facilitate anonymous access to the electronic medical records. Emergency medical services providers may be able to access medical records for a patient using the electronic device after being authenticated as a valid/licensed medical services provider
-
Records access and management
Issued US 9,489,486
An electronic device for aggregating electronic medical records, in which electronic medical records are aggregated from multiple electronic repositories and displayed as a single set of records. The multiple electronic repositories may store records for a particular patient using varying identifying/access information to facilitate anonymous access to the electronic medical records. Emergency medical services providers may be able to access medical records for a patient using the electronic…
An electronic device for aggregating electronic medical records, in which electronic medical records are aggregated from multiple electronic repositories and displayed as a single set of records. The multiple electronic repositories may store records for a particular patient using varying identifying/access information to facilitate anonymous access to the electronic medical records. Emergency medical services providers may be able to access medical records for a patient using the electronic device after being authenticated as a valid/licensed medical services provider.
-
Out-of-band tokens for rights access
Issued US 9,231,950
Access to content may be administered by storing content, the content comprising one or more selections, accessing a passive optical out-of-band token associated with the content, determining an access right for the content based on the passive optical out-of-band token, and enabling access to the content in accordance with the access right.
-
Zero-knowledge environment based social networking engine
Issued US 9,686,356
Methods, systems, and apparatus are described providing social networking engines. Specifically, the present specification relates to a method for implementing software containers implementing social network engines that may be configured to act in a zero-knowledge environment. In such implementations, all information pertaining to the social network engine associated with a user that is stored in the container is solely that of a user unless explicitly shared by the user. In some…
Methods, systems, and apparatus are described providing social networking engines. Specifically, the present specification relates to a method for implementing software containers implementing social network engines that may be configured to act in a zero-knowledge environment. In such implementations, all information pertaining to the social network engine associated with a user that is stored in the container is solely that of a user unless explicitly shared by the user. In some implementations, the containers may be configured to participate in a publish-and-subscribe network in order to share information. In addition, the containers may be provisioned with controls so that global operators may comply with local privacy rules.
-
Time-shifting streaming data
Issued US 8,904,026
Assigned to Facebook. Streaming to a terminal by using a duplicating switch to receive a stream of data units, using the duplicating switch to store content from the stream, using the duplicating switch to generate a second stream that incorporates the content that was stored and address information corresponding to more than one terminal whose addressing information was not part of the first stream, and using the duplicating switch to make the second stream of data units available to two or…
Assigned to Facebook. Streaming to a terminal by using a duplicating switch to receive a stream of data units, using the duplicating switch to store content from the stream, using the duplicating switch to generate a second stream that incorporates the content that was stored and address information corresponding to more than one terminal whose addressing information was not part of the first stream, and using the duplicating switch to make the second stream of data units available to two or more terminals.
-
Methods and apparatus for transmitting data relating to mobile device
Issued US 8,395,495
A location mechanism for a mobile device, in which an electronic communication including a code is received at the mobile device and the code is parsed from within the received electronic communication. The code parsed from within the electronic communication is used to determine whether to classify the received electronic communication as a coded electronic communication, and the received electronic communication is classified as a coded electronic communication based on results of the…
A location mechanism for a mobile device, in which an electronic communication including a code is received at the mobile device and the code is parsed from within the received electronic communication. The code parsed from within the electronic communication is used to determine whether to classify the received electronic communication as a coded electronic communication, and the received electronic communication is classified as a coded electronic communication based on results of the determination. In response to classification of the electronic communication as a coded electronic communication, a process is initiated that facilitates location of the mobile device. For instance, volume control settings at the mobile device may be overridden and an audible alert at the device may be invoked, and/or a response electronic communication that includes location information indicative of a current location of the communication device may be generated and sent.
-
Methods and apparatus for automatically causing a mobile device to download a file
Issued US 8,648,714
Disclosed methods and apparatus automatically cause a mobile communication device to download a file using a designated remote device. A user interface enables selection of the designated remote device and of a designated code corresponding to downloading the file to the mobile communication device from the designated remote device. A processor: receives a coded electronic communication (CEC), identifies origination of the CEC, determines whether the identified originator of the CEC is the…
Disclosed methods and apparatus automatically cause a mobile communication device to download a file using a designated remote device. A user interface enables selection of the designated remote device and of a designated code corresponding to downloading the file to the mobile communication device from the designated remote device. A processor: receives a coded electronic communication (CEC), identifies origination of the CEC, determines whether the identified originator of the CEC is the designated remote device, identifies a code included in the CEC, upon determining that the identified originator of the CEC is the designated remote device, determines whether the identified code included in the CEC is the designated code, and provides an instruction to cause the mobile communication device to download the file, upon determining that the identified code included in the CEC is the designated code.
-
Generating multiple data streams from a single data source
Issued US 8,446,272
Methods and apparatus remotely determine mobile communication device location using a remote device. A predetermined designated user interface is configured to enable selection of a predesignated code corresponding to an operation for determining mobile communication device location using the remote device. A processor is configured to: participate in an authorization operation to determine whether the remote device and the predetermined designated user interface are authorized to select the…
Methods and apparatus remotely determine mobile communication device location using a remote device. A predetermined designated user interface is configured to enable selection of a predesignated code corresponding to an operation for determining mobile communication device location using the remote device. A processor is configured to: participate in an authorization operation to determine whether the remote device and the predetermined designated user interface are authorized to select the predesignated code corresponding to the operation for determining mobile communication device location; generate a request including the selected predesignated code, upon determining that the remote device and the predetermined designated user interface are authorized to select the predesignated code; and transmit the request to the mobile communication device to enable the operation for determining mobile communication device location to be performed once the mobile communication device receives the request.
-
Location method for a mobile device
Issued US 8,049,611
A location mechanism for a mobile device, in which an electronic communication including a code is received at the mobile device and the code is parsed from within the received electronic communication. The code parsed from within the electronic communication is used to determine whether to classify the received electronic communication as a coded electronic communication, and the received electronic communication is classified as a coded electronic communication based on results of the…
A location mechanism for a mobile device, in which an electronic communication including a code is received at the mobile device and the code is parsed from within the received electronic communication. The code parsed from within the electronic communication is used to determine whether to classify the received electronic communication as a coded electronic communication, and the received electronic communication is classified as a coded electronic communication based on results of the determination. In response to classification of the electronic communication as a coded electronic communication, a process is initiated that facilitates location of the mobile device. For instance, volume control settings at the mobile device may be overridden and an audible alert at the device may be invoked, and/or a response electronic communication that includes location information indicative of a current location of the communication device may be generated and sent.
-
Location mechanism for mobile device
Issued US 8,354,923
A location mechanism for a mobile device, in which an electronic communication including a code is received at the mobile device and the code is parsed from within the received electronic communication. The code parsed from within the electronic communication is used to determine whether to classify the received electronic communication as a coded electronic communication, and the received electronic communication is classified as a coded electronic communication based on results of the…
A location mechanism for a mobile device, in which an electronic communication including a code is received at the mobile device and the code is parsed from within the received electronic communication. The code parsed from within the electronic communication is used to determine whether to classify the received electronic communication as a coded electronic communication, and the received electronic communication is classified as a coded electronic communication based on results of the determination. In response to classification of the electronic communication as a coded electronic communication, a process is initiated that facilitates location of the mobile device. For instance, volume control settings at the mobile device may be overridden and an audible alert at the device may be invoked, and/or a response electronic communication that includes location information indicative of a current location of the communication device may be generated and sent.
-
Out-of-band tokens for rights access
Issued US 8,584,253
Access to content may be administered by storing content, the content comprising one or more selections, accessing a passive optical out-of-band token associated with the content, determining an access right for the content based on the passive optical out-of-band token, and enabling access to the content in accordance with the access right.
-
Duplicating switch for streaming data units to a terminal using different communication protocols
Issued US 8,224,991
Streaming to a terminal by using a duplicating switch to receive a stream of data units, using the duplicating switch to store content from the stream, using the duplicating switch to generate a second stream that incorporates the content that was stored and address information corresponding to more than one terminal whose addressing information was not part of the first stream, and using the duplicating switch to make the second stream of data units available to two or more terminals.
Other inventors -
-
Duplicating switch for streaming data units to a terminal
Issued US 7,694,013
Streaming to a terminal by using a duplicating switch to receive a stream of data units, using the duplicating switch to store content from the stream, using the duplicating switch to generate a second stream that incorporates the content that was stored and address information corresponding to more than one terminal whose addressing information was not part of the first stream, and using the duplicating switch to make the second stream of data units available to two or more terminals.
Other inventors -
-
Duplicating switch for streaming data units to a terminal using different communication protocols
Issued US 7,991,911
Streaming to a terminal by using a duplicating switch to receive a stream of data units, using the duplicating switch to store content from the stream, using the duplicating switch to generate a second stream that incorporates the content that was stored and address information corresponding to more than one terminal whose addressing information was not part of the first stream, and using the duplicating switch to make the second stream of data units available to two or more terminals.
Other inventors -
-
Records access and management
Issued US 8,600,776
An electronic device for aggregating electronic medical records, in which electronic medical records are aggregated from multiple electronic repositories and displayed as a single set of records. The multiple electronic repositories may store records for a particular patient using varying identifying/access information to facilitate anonymous access to the electronic medical records. Emergency medical services providers may be able to access medical records for a patient using the electronic…
An electronic device for aggregating electronic medical records, in which electronic medical records are aggregated from multiple electronic repositories and displayed as a single set of records. The multiple electronic repositories may store records for a particular patient using varying identifying/access information to facilitate anonymous access to the electronic medical records. Emergency medical services providers may be able to access medical records for a patient using the electronic device after being authenticated as a valid/licensed medical services provider.
-
Out-of-band tokens for rights access
Issued US 7,315,946
Access to content may be administered by storing content, the content comprising one or more selections, accessing a passive optical out-of-band token associated with the content, determining an access right for the content based on the passive optical out-of-band token, and enabling access to the content in accordance with the access right.
Other inventors -
-
Out-of-band tokens for rights acess
Issued US 8,011,007
Access to content may be administered by storing content, the content comprising one or more selections, accessing a passive optical out-of-band token associated with the content, determining an access right for the content based on the passive optical out-of-band token, and enabling access to the content in accordance with the access right.
Other inventors -
-
Generating multiple data streams from a single data source
Issued US 7,266,609
A switch having a first communications interface to receive a stream of data units, a buffer to store the payload portion of the data unit, a replicator to duplicate at least the payload portion of the data unit, and a second communications interface to enable access to the stream of data units by two or more terminals.
Other inventors -
-
Generating multiple data streams from a single data source
Issued US 8,572,278
A switch having a first communications interface to receive a stream of data units, a buffer to store the payload portion of the data unit, a replicator to duplicate at least the payload portion of the data unit, and a second communications interface to enable access to the stream of data units by two or more terminals.
-
Regulating access to content using a multitiered rule base
Issued US 7,647,277
Access to a content selection may be regulated by accessing a medium associated with the content selection, identifying a profile associated with the medium, using the profile to analyze a content request with a multitiered rule base that includes two or more of a medium rule base, a media player rule base, and a host rule base, and enabling access to the content selection in accordance with one or more results of the analysis.
Other inventors -
-
Electronic loose-leaf remote control for enabling access to content from a media player
Issued US 7,373,658
Access to content is enabled by reading an out-of-band token. A handler relating to information in the out-of-band token may be identified. The handler may be exchanged with a remote media player to enable access to content related to the out-of-band token.
Other inventors -
-
Method and apparatus for selective execution of a computer program
Issued US 6,418,444
A method and apparatus for ensuring that code being executed by a data processing system conforms to a platform standard. As an example, one embodiment of the present invention validates Pure Java platform standard conformance of Java programs downloaded from a remote server to ensure that they conform to the "Pure Java" standard. This checking can be performed at the time that the program is downloaded across a network firewall and/or at one or more times during the loading and execution of…
A method and apparatus for ensuring that code being executed by a data processing system conforms to a platform standard. As an example, one embodiment of the present invention validates Pure Java platform standard conformance of Java programs downloaded from a remote server to ensure that they conform to the "Pure Java" standard. This checking can be performed at the time that the program is downloaded across a network firewall and/or at one or more times during the loading and execution of the program.
Other inventors -
-
Method and apparatus for selective execution of a computer program
Issued US 6,742,046
A method and apparatus for ensuring that code being executed by a data processing system conforms to a platform standard. As an example, one embodiment of the present invention validates Pure Java platform standard conformance of Java programs downloaded from a remote server to ensure that they conform to the "Pure Java" standard. This checking can be performed at the time that the program is downloaded across a network firewall and/or at one or more times during the loading and execution of…
A method and apparatus for ensuring that code being executed by a data processing system conforms to a platform standard. As an example, one embodiment of the present invention validates Pure Java platform standard conformance of Java programs downloaded from a remote server to ensure that they conform to the "Pure Java" standard. This checking can be performed at the time that the program is downloaded across a network firewall and/or at one or more times during the loading and execution of the program.
Other inventors -
-
Duplicating switch for streaming data units to a terminal
Issued US 7,237,033
A switch having a first communications interface to receive a stream of data units, a buffer to store the payload portion of the data unit, a replicator to duplicate at least the payload portion of the data unit, and a second communications interface to enable access to the stream of data units by two or more terminals.
Other inventors -
-
Network-based authentication of computer user
Issued US 6,338,138
A network-based authentication scheme is provided that performs authentication in a centralized manner for the stand-alone computers of a particular organization. Since authentication is centralized, the individual computers do not need to store authentication information, and control over all of the computers rests in a single location, enabling the system administrator to manage access and utilization of the computers from this location. The network-based authentication scheme includes an…
A network-based authentication scheme is provided that performs authentication in a centralized manner for the stand-alone computers of a particular organization. Since authentication is centralized, the individual computers do not need to store authentication information, and control over all of the computers rests in a single location, enabling the system administrator to manage access and utilization of the computers from this location. The network-based authentication scheme includes an authentication manager, remotely located with respect to a local computer, that performs authentication for the local computer. The authentication manager receives login information from the local computer, verifies this information against an authentication file, and returns indications of the services on the local computer that the user is able to utilize. The local computer receives these indications and displays icons representing the services available to that user. The user may then select an icon, causing an applet to be downloaded from the authentication manager onto the local computer to facilitate the user's utilization of the corresponding service.
Other inventors -
Organizations
-
Association for Computing Machinery
no
- Present
Recommendations received
1 person has recommended William J.
Join now to viewMore activity by William J.
-
TheReal made it to the TunneltoTowers 5K in Bridgeport, CT. FIrst year yet was the 4th largest in the country. Giving feels good. #THEREAL…
TheReal made it to the TunneltoTowers 5K in Bridgeport, CT. FIrst year yet was the 4th largest in the country. Giving feels good. #THEREAL…
Liked by William J. Raduchel
-
I’m not quite sure why this article was published now, but I appreciate the recognition from MyBroadband Thank you!
I’m not quite sure why this article was published now, but I appreciate the recognition from MyBroadband Thank you!
Liked by William J. Raduchel
-
Stay ahead of the curve with #SceneraMAIstro. Seamlessly connect diverse data sources from various video and #IoT devices and unlock the full…
Stay ahead of the curve with #SceneraMAIstro. Seamlessly connect diverse data sources from various video and #IoT devices and unlock the full…
Liked by William J. Raduchel
-
My thoughts on AI. The revolution will happen but more slowly and differently than many are saying.
My thoughts on AI. The revolution will happen but more slowly and differently than many are saying.
Shared by William J. Raduchel
-
Thank you Gartner for a fantastic week at your CSO conference! Here are some highlights: - Over 50% of our booth scans started with, "I was told I…
Thank you Gartner for a fantastic week at your CSO conference! Here are some highlights: - Over 50% of our booth scans started with, "I was told I…
Liked by William J. Raduchel
-
My book The New Technology State (but.ly/fornts) reflects views I had 30 years ago in https://lnkd.in/eun6DvTC
My book The New Technology State (but.ly/fornts) reflects views I had 30 years ago in https://lnkd.in/eun6DvTC
Shared by William J. Raduchel
-
In our New Faculty Profiles series we talk to faculty about their backgrounds, new responsibilities, and interests. We recently interviewed Sara…
In our New Faculty Profiles series we talk to faculty about their backgrounds, new responsibilities, and interests. We recently interviewed Sara…
Liked by William J. Raduchel
-
Thanks to the hosts of Bubble Trouble for a great conversation. https://lnkd.in/ezRMCKYU
Thanks to the hosts of Bubble Trouble for a great conversation. https://lnkd.in/ezRMCKYU
Shared by William J. Raduchel
-
As someone with ample experience in antitrust and Apple, I've recently shared my thoughts on the ongoing case. Check out my latest article here:…
As someone with ample experience in antitrust and Apple, I've recently shared my thoughts on the ongoing case. Check out my latest article here:…
Shared by William J. Raduchel
-
By assuming that technical talent is fungible and interchangeable, a previously-successful engineering company will be run into the ground. In the…
By assuming that technical talent is fungible and interchangeable, a previously-successful engineering company will be run into the ground. In the…
Liked by William J. Raduchel
Other similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore More