Patents by Inventor Scott Isaacson
Scott Isaacson has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20110010335Abstract: A swarm can develop around a piece of content. The swarm can include the original content, changes to the original content, the persons contributing the changes, and metadata, such as comments contributed by members of the swarm. A swarm can also include statistics generated about the content, such as the size of the swarm, the growth and/or death rates of the swarm, the longevity of the swarm, the intensity of the swarm, the persistence of the swarm, and the direction of the swarm. Swarms and their behaviors can be used to validate or invalidate content.Type: ApplicationFiled: January 19, 2010Publication date: January 13, 2011Applicant: NOVELL, INC.Inventors: Andrew Fox, David Marshall LaPalomento, Ian Edward Roughley, Scott A. Isaacson
-
Publication number: 20110010640Abstract: A leader of a group can specify how content is to be displayed to a group of users. One of these users can specify different instructions regarding the display of the content. The system can then display the content to the user, using either (or both) of the leader's instructions and the user's specific instructions. Using these various independent instructions, the system can automatically change the way the content is displayed to a group of users.Type: ApplicationFiled: January 19, 2010Publication date: January 13, 2011Applicant: NOVELL, INC.Inventors: Andrew Fox, David Marshall LaPalomento, Ian Edward Roughley, Scott A. Isaacson
-
Publication number: 20110010447Abstract: A system can include multiple individual status identifiers that correspond to multiple users and a group status identifier that corresponds to a group with which the users are associated. A status identifier update module can update the group status identifier based on a change to at least one of the individual status identifiers.Type: ApplicationFiled: January 19, 2010Publication date: January 13, 2011Applicant: NOVELL, INC.Inventors: Andrew Fox, David Marshall LaPalomento, Ian Edward Roughley, Scott A. Isaacson
-
System and method for creating a pattern installation by cloning software installed another computer
Patent number: 7730480Abstract: A customized installation is created by allowing a user to select a pattern of software. Then software that is installed on another user's computer is identified. If the identified software belongs to the selected pattern, then an installation of the software is obtained from a database and built into a custom built installation. The identification of the software and selection of a corresponding installation includes identification of a version of the software. A requested pattern can describe the category of use of the software, or the pattern can describe a usage history. After building the customized installation, the customized installation can be installed on a new machine.Type: GrantFiled: August 22, 2006Date of Patent: June 1, 2010Assignee: Novell, Inc.Inventor: Scott A. Isaacson -
Patent number: 7702912Abstract: To effect a change to the system, a user process makes a request. An interface receives the request, and attempts to authenticate the user. Assuming the user is authenticated, the interface determines the user's UID. The interface determines a provider process that can make the requested change, and forwards the request to the provider process. The interface also assigns the user's UID to the provider process's eUID. The provider process then attempts to make the change, provided the change can be made given the eUID assignment. The provider process then attempts to run under the new eUID, enabling the system to prohibit it from doing something that is not authorized for that user. This protects the system from inadvertently executing management operations by one provider process that is not expected or intended by the user of another provider process.Type: GrantFiled: May 19, 2005Date of Patent: April 20, 2010Assignee: Novell, Inc.Inventors: Jon Michael Carey, James Bart Whiteley, Alexander Y. Danoyan, Scott A. Isaacson, Eric W. B. Anderson
-
Publication number: 20100083249Abstract: Methods and apparatus involve managing a plurality of hardware platforms with common tools despite actual or potential non-uniformity of vendor items. Representatively, hardware platforms include a minimalist operating system upon which a management agent and vendor-specific providers are deployed. From a console common to the platforms, local or remote management occurs. In a paradigm shift when initially deploying or redeploying platforms, for example, a “just enough” operating system exists to configure the hardware of different vendors so virtual machines can be thereafter deployed without needing pre-configured operating systems, bundled management packages, etc. A common embedded hypervisor on the platform is but one technique to achieve a minimalist operating system as is a common CIMOM or SNMP agent but one technique to achieve a management agent. Other features include computing systems and computer program products, to name a few.Type: ApplicationFiled: September 29, 2008Publication date: April 1, 2010Inventors: Ranjan K. Gupta, Kattiganehalli Y. Srinivasan, Scott A. Isaacson
-
Patent number: 7672952Abstract: Content of interest to a user is identified. A first semantic abstract is generated for the content of interest using a state vector representation of the content of interest. The first semantic abstract is compared to a second semantic abstract representing another prospective content. If the first semantic abstract is within a threshold distance of the second semantic abstract, then the prospective content is recommended to the user.Type: GrantFiled: December 26, 2006Date of Patent: March 2, 2010Assignee: Novell, Inc.Inventors: Scott Isaacson, Stephen R. Carter
-
Publication number: 20090281859Abstract: Method and system for presenting a view of a calendar on an electronic display. In one embodiment, the method comprises presenting on the display an entry corresponding to a scheduled meeting having at least two participants; presenting on the display a first timeline associated with a first one of the participants, the first timeline comprising an incremental listing of time of day in accordance with a first time zone associated with the first one of the participants; presenting on the display a second timeline adjacent the first timeline, the second timeline associated with a second one of the participants and comprising an incremental listing of time of day in accordance with a second time zone associated with the second one of the participants; and wherein the entry is presented on the display relative to the first and second timelines so as to accurately reflect start and end times of the scheduled meeting relative to each of the first and second time zones.Type: ApplicationFiled: May 7, 2008Publication date: November 12, 2009Applicant: NOVELL, INC.Inventor: Scott Isaacson
-
Publication number: 20090259592Abstract: Method and system for implementing a virtual automated teller machine (“VATM”) system are described. In one embodiment, the system includes a VATM host connectable to each of a plurality of registered disbursement entities (“DEs”) via a secure connection, such as an SSL connection. The system further includes an accessing computer connectable to the VATM host via a secure connection, such as an SSL connection, the accessing computer comprising a card reader for reading user information from an ATM card and having installed thereon VATM client software executable by the accessing computer to interact with the VATM host to validate user information read from the ATM card and an associated PIN entered by a user and, responsive to the validation, present the user with a list of DEs comprising at least one of the registered DEs, prompt the user to select one DE from the list of DEs from which funds are to be disbursed to the user, and specify an amount of funds to be disbursed.Type: ApplicationFiled: April 15, 2008Publication date: October 15, 2009Applicant: NOVELL, INC.Inventor: Scott Isaacson
-
Publication number: 20090193245Abstract: A system and method are presented for converting a multi-boot computer to a virtual machine. Existing boot images on a multi-boot computer are identified and converted into virtual machine instances. Each virtual machine instance represents an operating system and is capable of running at the same time. Finally, a new hosting operating system is installed. The new hosting operating system launches and manages the converted virtual machine instances.Type: ApplicationFiled: April 1, 2009Publication date: July 30, 2009Applicant: NOVELL, INC.Inventor: Scott A. Isaacson
-
Patent number: 7536541Abstract: A system and method are presented for converting a multi-boot computer to a virtual machine. Existing boot images on a multi-boot computer are identified and converted into virtual machine instances. Each virtual machine instance represents an operating system and is capable of running at the same time. Finally, a new hosting operating system is installed. The new hosting operating system launches and manages the converted virtual machine instances.Type: GrantFiled: March 7, 2006Date of Patent: May 19, 2009Assignee: Novell Inc.Inventor: Scott A. Isaacson
-
Patent number: 7487535Abstract: A computer receives an authentication request from a client. The computer creates a temporary user object and populates it with identification information from the authentication request. The computer then forwards the authentication request to an authentication source. Once the authentication source has validated the authentication request, the computer queries the authentication source for identification information, populates the temporary user object with the identification information, and makes the user object permanent.Type: GrantFiled: February 1, 2002Date of Patent: February 3, 2009Assignee: Novell, Inc.Inventors: Scott A. Isaacson, Daniel G. Fritch, Larry Hal Henderson, Lynn W. Crabb, James D. Nyland, Jr.
-
Publication number: 20080313540Abstract: A system and method is provided for rendering visual effects, or other types of effects, in response to an occurrence of one or more events. The visual effects may be rendered on a user desktop in order to alert or otherwise notify a user that the one or more events have occurred. The events may reflect incoming messages (e.g., e-mails, instant messages, etc.), application and/or system problems, downloads, appointments, alarms, updates, network status, or other software and/or hardware related events. The visual effects may be rendered on the desktop to subtly notify the user when an event of interest occurs.Type: ApplicationFiled: June 18, 2007Publication date: December 18, 2008Inventors: Anna Dirks, David Reveman, Stephen R. Carter, Scott Isaacson
-
Publication number: 20080060037Abstract: A television (TV) broadcast signal is received and routed to a TV display. An audio data stream or ancillary data stream in the TV broadcast, (such as closed-captioning), is scanned to determine if a uniform resource locator (URL) is included in the TV broadcast. If a URL is identified in the TV broadcast, then the URL can be loaded in a web browser on a computer for a user to refer to when convenient.Type: ApplicationFiled: August 30, 2006Publication date: March 6, 2008Applicant: NOVELL, INC.Inventor: Scott A. Isaacson
-
SYSTEM AND METHOD FOR CREATING A PATTERN INSTALLATION BY CLONING SOFTWARE INSTALLED ANOTHER COMPUTER
Publication number: 20080052706Abstract: A customized installation is created by allowing a user to select a pattern of software. Then software that is installed on another user's computer is identified. If the identified software belongs to the selected pattern, then an installation of the software is obtained from a database and built into a custom built installation. The identification of the software and selection of a corresponding installation includes identification of a version of the software. A requested pattern can describe the category of use of the software, or the pattern can describe a usage history. After building the customized installation, the customized installation can be installed on a new machine.Type: ApplicationFiled: August 22, 2006Publication date: February 28, 2008Applicant: NOVELL, INC.Inventor: Scott A. Isaacson -
Patent number: 7321972Abstract: A computer receives a user authentication request from a client. The computer accesses a password associated with the user name, stored locally on the computer, and attempts to authenticate the password using an authentication server. If the password authentication succeeds, the computer hashes the password and compares the hashes. If the hashes match, the user authentication succeeds.Type: GrantFiled: March 23, 2004Date of Patent: January 22, 2008Assignee: Novell, Inc.Inventors: Scott A. Isaacson, Alexander Y. Danoyan
-
Patent number: 7287083Abstract: A computer system accesses a list of connections. The list of connections identifies computers, protocols, and/or types of connections that can be used. The computer system attempts to establish a connection to a server. While establishing the connection, the computer system can store a user's credential. If the connection to the server fails, the computer system attempts to access a connection from the list, and uses the stored user credential (if it exists) to authenticate the user on the new connection without requesting the credential anew from the user.Type: GrantFiled: March 20, 2003Date of Patent: October 23, 2007Assignee: Novell, Inc.Inventors: Kyrt V. Nay, Thomas J. Brough, Scott A. Isaacson, Robert Wipfel
-
Publication number: 20070214350Abstract: A system and method are presented for converting a multi-boot computer to a virtual machine. Existing boot images on a multi-boot computer are identified and converted into virtual machine instances. Each virtual machine instance represents an operating system and is capable of running at the same time. Finally, a new hosting operating system is installed. The new hosting operating system launches and manages the converted virtual machine instances.Type: ApplicationFiled: March 7, 2006Publication date: September 13, 2007Applicant: Novell, Inc.Inventor: Scott Isaacson
-
Publication number: 20070214272Abstract: A multi-user web browser is stored on a computer. The multi-user web browser permits more than one user to create and use a browser user account without requiring different users to log into different operating system user accounts. Instead, a browser user can log into the multi-user browser by providing a browser user name and browser password associated with the browser user name. This enables the multi-user web browser to support multiple users from within a single operating system user account.Type: ApplicationFiled: March 7, 2006Publication date: September 13, 2007Applicant: Novell, Inc.Inventor: Scott Isaacson
-
Publication number: 20070106651Abstract: Content of interest to a user is identified. A first semantic abstract is generated for the content of interest using a state vector representation of the content of interest. The first semantic abstract is compared to a second semantic abstract representing another prospective content. If the first semantic abstract is within a threshold distance of the second semantic abstract, then the prospective content is recommended to the user.Type: ApplicationFiled: December 26, 2006Publication date: May 10, 2007Applicant: NOVELL, INC.Inventors: Scott Isaacson, Steve Carter