Patents by Inventor Scott Isaacson

Scott Isaacson has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20110010335
    Abstract: A swarm can develop around a piece of content. The swarm can include the original content, changes to the original content, the persons contributing the changes, and metadata, such as comments contributed by members of the swarm. A swarm can also include statistics generated about the content, such as the size of the swarm, the growth and/or death rates of the swarm, the longevity of the swarm, the intensity of the swarm, the persistence of the swarm, and the direction of the swarm. Swarms and their behaviors can be used to validate or invalidate content.
    Type: Application
    Filed: January 19, 2010
    Publication date: January 13, 2011
    Applicant: NOVELL, INC.
    Inventors: Andrew Fox, David Marshall LaPalomento, Ian Edward Roughley, Scott A. Isaacson
  • Publication number: 20110010640
    Abstract: A leader of a group can specify how content is to be displayed to a group of users. One of these users can specify different instructions regarding the display of the content. The system can then display the content to the user, using either (or both) of the leader's instructions and the user's specific instructions. Using these various independent instructions, the system can automatically change the way the content is displayed to a group of users.
    Type: Application
    Filed: January 19, 2010
    Publication date: January 13, 2011
    Applicant: NOVELL, INC.
    Inventors: Andrew Fox, David Marshall LaPalomento, Ian Edward Roughley, Scott A. Isaacson
  • Publication number: 20110010447
    Abstract: A system can include multiple individual status identifiers that correspond to multiple users and a group status identifier that corresponds to a group with which the users are associated. A status identifier update module can update the group status identifier based on a change to at least one of the individual status identifiers.
    Type: Application
    Filed: January 19, 2010
    Publication date: January 13, 2011
    Applicant: NOVELL, INC.
    Inventors: Andrew Fox, David Marshall LaPalomento, Ian Edward Roughley, Scott A. Isaacson
  • Patent number: 7730480
    Abstract: A customized installation is created by allowing a user to select a pattern of software. Then software that is installed on another user's computer is identified. If the identified software belongs to the selected pattern, then an installation of the software is obtained from a database and built into a custom built installation. The identification of the software and selection of a corresponding installation includes identification of a version of the software. A requested pattern can describe the category of use of the software, or the pattern can describe a usage history. After building the customized installation, the customized installation can be installed on a new machine.
    Type: Grant
    Filed: August 22, 2006
    Date of Patent: June 1, 2010
    Assignee: Novell, Inc.
    Inventor: Scott A. Isaacson
  • Patent number: 7702912
    Abstract: To effect a change to the system, a user process makes a request. An interface receives the request, and attempts to authenticate the user. Assuming the user is authenticated, the interface determines the user's UID. The interface determines a provider process that can make the requested change, and forwards the request to the provider process. The interface also assigns the user's UID to the provider process's eUID. The provider process then attempts to make the change, provided the change can be made given the eUID assignment. The provider process then attempts to run under the new eUID, enabling the system to prohibit it from doing something that is not authorized for that user. This protects the system from inadvertently executing management operations by one provider process that is not expected or intended by the user of another provider process.
    Type: Grant
    Filed: May 19, 2005
    Date of Patent: April 20, 2010
    Assignee: Novell, Inc.
    Inventors: Jon Michael Carey, James Bart Whiteley, Alexander Y. Danoyan, Scott A. Isaacson, Eric W. B. Anderson
  • Publication number: 20100083249
    Abstract: Methods and apparatus involve managing a plurality of hardware platforms with common tools despite actual or potential non-uniformity of vendor items. Representatively, hardware platforms include a minimalist operating system upon which a management agent and vendor-specific providers are deployed. From a console common to the platforms, local or remote management occurs. In a paradigm shift when initially deploying or redeploying platforms, for example, a “just enough” operating system exists to configure the hardware of different vendors so virtual machines can be thereafter deployed without needing pre-configured operating systems, bundled management packages, etc. A common embedded hypervisor on the platform is but one technique to achieve a minimalist operating system as is a common CIMOM or SNMP agent but one technique to achieve a management agent. Other features include computing systems and computer program products, to name a few.
    Type: Application
    Filed: September 29, 2008
    Publication date: April 1, 2010
    Inventors: Ranjan K. Gupta, Kattiganehalli Y. Srinivasan, Scott A. Isaacson
  • Patent number: 7672952
    Abstract: Content of interest to a user is identified. A first semantic abstract is generated for the content of interest using a state vector representation of the content of interest. The first semantic abstract is compared to a second semantic abstract representing another prospective content. If the first semantic abstract is within a threshold distance of the second semantic abstract, then the prospective content is recommended to the user.
    Type: Grant
    Filed: December 26, 2006
    Date of Patent: March 2, 2010
    Assignee: Novell, Inc.
    Inventors: Scott Isaacson, Stephen R. Carter
  • Publication number: 20090281859
    Abstract: Method and system for presenting a view of a calendar on an electronic display. In one embodiment, the method comprises presenting on the display an entry corresponding to a scheduled meeting having at least two participants; presenting on the display a first timeline associated with a first one of the participants, the first timeline comprising an incremental listing of time of day in accordance with a first time zone associated with the first one of the participants; presenting on the display a second timeline adjacent the first timeline, the second timeline associated with a second one of the participants and comprising an incremental listing of time of day in accordance with a second time zone associated with the second one of the participants; and wherein the entry is presented on the display relative to the first and second timelines so as to accurately reflect start and end times of the scheduled meeting relative to each of the first and second time zones.
    Type: Application
    Filed: May 7, 2008
    Publication date: November 12, 2009
    Applicant: NOVELL, INC.
    Inventor: Scott Isaacson
  • Publication number: 20090259592
    Abstract: Method and system for implementing a virtual automated teller machine (“VATM”) system are described. In one embodiment, the system includes a VATM host connectable to each of a plurality of registered disbursement entities (“DEs”) via a secure connection, such as an SSL connection. The system further includes an accessing computer connectable to the VATM host via a secure connection, such as an SSL connection, the accessing computer comprising a card reader for reading user information from an ATM card and having installed thereon VATM client software executable by the accessing computer to interact with the VATM host to validate user information read from the ATM card and an associated PIN entered by a user and, responsive to the validation, present the user with a list of DEs comprising at least one of the registered DEs, prompt the user to select one DE from the list of DEs from which funds are to be disbursed to the user, and specify an amount of funds to be disbursed.
    Type: Application
    Filed: April 15, 2008
    Publication date: October 15, 2009
    Applicant: NOVELL, INC.
    Inventor: Scott Isaacson
  • Publication number: 20090193245
    Abstract: A system and method are presented for converting a multi-boot computer to a virtual machine. Existing boot images on a multi-boot computer are identified and converted into virtual machine instances. Each virtual machine instance represents an operating system and is capable of running at the same time. Finally, a new hosting operating system is installed. The new hosting operating system launches and manages the converted virtual machine instances.
    Type: Application
    Filed: April 1, 2009
    Publication date: July 30, 2009
    Applicant: NOVELL, INC.
    Inventor: Scott A. Isaacson
  • Patent number: 7536541
    Abstract: A system and method are presented for converting a multi-boot computer to a virtual machine. Existing boot images on a multi-boot computer are identified and converted into virtual machine instances. Each virtual machine instance represents an operating system and is capable of running at the same time. Finally, a new hosting operating system is installed. The new hosting operating system launches and manages the converted virtual machine instances.
    Type: Grant
    Filed: March 7, 2006
    Date of Patent: May 19, 2009
    Assignee: Novell Inc.
    Inventor: Scott A. Isaacson
  • Patent number: 7487535
    Abstract: A computer receives an authentication request from a client. The computer creates a temporary user object and populates it with identification information from the authentication request. The computer then forwards the authentication request to an authentication source. Once the authentication source has validated the authentication request, the computer queries the authentication source for identification information, populates the temporary user object with the identification information, and makes the user object permanent.
    Type: Grant
    Filed: February 1, 2002
    Date of Patent: February 3, 2009
    Assignee: Novell, Inc.
    Inventors: Scott A. Isaacson, Daniel G. Fritch, Larry Hal Henderson, Lynn W. Crabb, James D. Nyland, Jr.
  • Publication number: 20080313540
    Abstract: A system and method is provided for rendering visual effects, or other types of effects, in response to an occurrence of one or more events. The visual effects may be rendered on a user desktop in order to alert or otherwise notify a user that the one or more events have occurred. The events may reflect incoming messages (e.g., e-mails, instant messages, etc.), application and/or system problems, downloads, appointments, alarms, updates, network status, or other software and/or hardware related events. The visual effects may be rendered on the desktop to subtly notify the user when an event of interest occurs.
    Type: Application
    Filed: June 18, 2007
    Publication date: December 18, 2008
    Inventors: Anna Dirks, David Reveman, Stephen R. Carter, Scott Isaacson
  • Publication number: 20080060037
    Abstract: A television (TV) broadcast signal is received and routed to a TV display. An audio data stream or ancillary data stream in the TV broadcast, (such as closed-captioning), is scanned to determine if a uniform resource locator (URL) is included in the TV broadcast. If a URL is identified in the TV broadcast, then the URL can be loaded in a web browser on a computer for a user to refer to when convenient.
    Type: Application
    Filed: August 30, 2006
    Publication date: March 6, 2008
    Applicant: NOVELL, INC.
    Inventor: Scott A. Isaacson
  • Publication number: 20080052706
    Abstract: A customized installation is created by allowing a user to select a pattern of software. Then software that is installed on another user's computer is identified. If the identified software belongs to the selected pattern, then an installation of the software is obtained from a database and built into a custom built installation. The identification of the software and selection of a corresponding installation includes identification of a version of the software. A requested pattern can describe the category of use of the software, or the pattern can describe a usage history. After building the customized installation, the customized installation can be installed on a new machine.
    Type: Application
    Filed: August 22, 2006
    Publication date: February 28, 2008
    Applicant: NOVELL, INC.
    Inventor: Scott A. Isaacson
  • Patent number: 7321972
    Abstract: A computer receives a user authentication request from a client. The computer accesses a password associated with the user name, stored locally on the computer, and attempts to authenticate the password using an authentication server. If the password authentication succeeds, the computer hashes the password and compares the hashes. If the hashes match, the user authentication succeeds.
    Type: Grant
    Filed: March 23, 2004
    Date of Patent: January 22, 2008
    Assignee: Novell, Inc.
    Inventors: Scott A. Isaacson, Alexander Y. Danoyan
  • Patent number: 7287083
    Abstract: A computer system accesses a list of connections. The list of connections identifies computers, protocols, and/or types of connections that can be used. The computer system attempts to establish a connection to a server. While establishing the connection, the computer system can store a user's credential. If the connection to the server fails, the computer system attempts to access a connection from the list, and uses the stored user credential (if it exists) to authenticate the user on the new connection without requesting the credential anew from the user.
    Type: Grant
    Filed: March 20, 2003
    Date of Patent: October 23, 2007
    Assignee: Novell, Inc.
    Inventors: Kyrt V. Nay, Thomas J. Brough, Scott A. Isaacson, Robert Wipfel
  • Publication number: 20070214350
    Abstract: A system and method are presented for converting a multi-boot computer to a virtual machine. Existing boot images on a multi-boot computer are identified and converted into virtual machine instances. Each virtual machine instance represents an operating system and is capable of running at the same time. Finally, a new hosting operating system is installed. The new hosting operating system launches and manages the converted virtual machine instances.
    Type: Application
    Filed: March 7, 2006
    Publication date: September 13, 2007
    Applicant: Novell, Inc.
    Inventor: Scott Isaacson
  • Publication number: 20070214272
    Abstract: A multi-user web browser is stored on a computer. The multi-user web browser permits more than one user to create and use a browser user account without requiring different users to log into different operating system user accounts. Instead, a browser user can log into the multi-user browser by providing a browser user name and browser password associated with the browser user name. This enables the multi-user web browser to support multiple users from within a single operating system user account.
    Type: Application
    Filed: March 7, 2006
    Publication date: September 13, 2007
    Applicant: Novell, Inc.
    Inventor: Scott Isaacson
  • Publication number: 20070106651
    Abstract: Content of interest to a user is identified. A first semantic abstract is generated for the content of interest using a state vector representation of the content of interest. The first semantic abstract is compared to a second semantic abstract representing another prospective content. If the first semantic abstract is within a threshold distance of the second semantic abstract, then the prospective content is recommended to the user.
    Type: Application
    Filed: December 26, 2006
    Publication date: May 10, 2007
    Applicant: NOVELL, INC.
    Inventors: Scott Isaacson, Steve Carter