Mark D. Ackerman - Eagle Mountain UT, US Hashem Mohammad Ebrahimi - Salt Lake City UT, US Baber Amin - Provo UT, US
Assignee:
Novell, Inc. - Provo UT
International Classification:
H04L 29/00
US Classification:
726 15, 713153
Abstract:
Techniques are provided for managing communications associated with Virtual Private Networks (VPNs). One or more local clients who attempt to communicate with one or more remote clients via a VPN are serviced by local and remote transparent VPN services. The services intercept VPN communications and, in some embodiments, satisfy the communications via local cache. In instances where the VPN communications cannot be satisfied from the cache, the services translate the intercepted communications and securely communicate with one another for purposes of interfacing the local clients with the remote clients via the VPN.
Mechanism For Supporting Indexed Tagged Content In A General Purpose Data Store
Mark D. Ackerman - Eagle Mountain UT, US Nadeem Ahmad Nazeer - Orem UT, US Stephen R. Carter - Spanish Fork UT, US
Assignee:
Novell, Inc. - Provo UT
International Classification:
G06F 17/00
US Classification:
707100, 715234
Abstract:
A schema identifies a field in a document as a key field. Using an XML schema, the key field can be identified by attaching a property to the element or attribute to be used as a key field (if the XML schema standard is modified to support properties). Otherwise, attributes can be used to identify the element or attribute that is to be a key field. Fields can be primary keys, secondary keys, or foreign keys, as supported by data stores. The data store can analyze the schema to determine which fields are key fields. The key fields can be duplicated in the native format of the data store for use in indexing, searching, and other data store functions on the documents. The documents themselves can be stored as objects, into which the data store cannot reach, or can be stored in the native format of the data store, as desired.
System And Method For Controlling Access To Licensed Computing Processes Via A Codified Electronic License
Mark D. Ackerman - Eagle Mountain UT, US Stephen R Carter - Spanish Fork UT, US
Assignee:
Novell, Inc. - Provo UT
International Classification:
G06Q 99/00
US Classification:
705 59, 713167, 717177, 717178
Abstract:
A system and method controls access to hardware and software functions by employing a codified electronic license that does not generally require application code modification. In response to customer purchases, highly configurable XML licenses containing lists of allowable CLI commands are generated, digitally signed, and transmitted to various customer systems over a network. The customer systems authenticate the licenses, extract the CLI command lists, and register the specified commands with a command processor internal to the customers' systems. Only registered commands are allowed to execute, preventing unlicensed hardware and software from operating on the system.
Hashem Mohammad Ebrahimi - Salt Lake City UT, US Mark D. Ackerman - Eagle Mountain UT, US Carolyn B. McClain - Springville UT, US
Assignee:
Novell, Inc. - Provo UT
International Classification:
G06F 7/04 G06F 15/16 G06F 9/00
US Classification:
726 4, 709229, 726 2, 726 11
Abstract:
Techniques are provided for proxy authentication. A proxy includes a first port, a second port, and a secure port; each port processing a different service. Requests received on the first and second ports which require authentication are redirected to the secure port. The secure port processes an authentication router service. The authentication router service forwards requests for authentication to selective authentication services. The authentication services authenticate the requests over the secure port.
Techniques For Securely Accelerating External Domains Locally
Hashem Mohammad Ebrahimi - Salt Lake City UT, US Baber Amin - Provo UT, US Mark D. Ackerman - Eagle Mountain UT, US
Assignee:
Novell, Inc. - Provo UT
International Classification:
H04L 9/00
US Classification:
726 12, 713153, 713156
Abstract:
Techniques are provided for securely accelerating external domains locally. Secure client requests directed to an external domain are forwarded to a local domain accelerator. The local domain accelerator communicates securely with the client as if it were the external domain. The local domain accelerator communicates securely with the external domain and acquires data to service the client requests within a local cache. The data is vended from the local cache via secure communications made to the client.
Mechanism For Supporting Indexed Tagged Content In A General Purpose Data Store
Mark D. Ackerman - Eagle Mountain UT, US Nadeem Ahmad Nazeer - Orem UT, US Stephen R. Carter - Spanish Fork UT, US
Assignee:
Novell, Inc. - Provo UT
International Classification:
G06F 17/30
US Classification:
707802, 707747, 715234
Abstract:
A schema identifies a field in a document as a key field. Using an XML schema, the key field can be identified by attaching a property to the element or attribute to be used as a key field (if the XML schema standard is modified to support properties). Otherwise, attributes can be used to identify the element or attribute that is to be a key field. Fields can be primary keys, secondary keys, or foreign keys, as supported by data stores. The data store can analyze the schema to determine which fields are key fields. The key fields can be duplicated in the native format of the data store for use in indexing, searching, and other data store functions on the documents. The documents themselves can be stored as objects, into which the data store cannot reach, or can be stored in the native format of the data store, as desired.
Techniques For Securely Managing And Accelerating Data Delivery
Hashem Mohammad Ebrahimi - Salt Lake City UT, US Mark D. Ackerman - Eagle Mountain UT, US Mel J Oyler - Pleasant Grove UT, US
Assignee:
Novell, Inc. - Provo UT
International Classification:
G06F 9/00 H04L 29/06
US Classification:
726 12, 713153, 713154
Abstract:
Techniques are provided for securely managing and accelerating the delivery of data associated with remote sites. A client desires to establish secure communications with a remote site. Requests made from the client to the remote site are intercepted or forwarded to a proxy, which locates a local managing service associated with handling the requests. The local managing service acts as an intermediary between the client and the remote site and communicates securely with the client. Data associated with the client's requests is at least partially cached by the local managing service for purposes of accelerating the delivery of that data to the client.
Techniques For Providing Services And Establishing Processing Environments
Mark D. Ackerman - Eagle Mountain UT, US Stephen R. Carter - Spanish Fork UT, US
Assignee:
Novell, Inc. - Provo UT
International Classification:
G06F 9/455
US Classification:
718 1
Abstract:
Techniques are provided for the delivery of client services and for the establishment of client processing environments. A client receives services within a processing environment which is defined by a processing container. The processing container includes one or more processing groups, and each processing group has a particular context that supports one or more applications or services which are processing within that context. The processing groups communicate with one another via connector interfaces included within the processing container. Services and processing containers can be dynamically added or removed from the processing container.
Youtube
DMX Dubai Motocross Club day race ft. Eugenio...
December 06, 2019 DMX Dubai Motocross Club Day race.
Duration:
5m 20s
Mark Ackerman, Area VP, MEA, ServiceNow & Ga...
Mark and Gavin as speaking about trend in digital transformation in th...
Duration:
30m 15s
Mark Ackerman 1944-1984
My dad was a kind man who loved his family and the outdoors. Although ...
Duration:
4m 50s
2015.11.03 Mark Ackerman: Reinvigorating CSCW...
Abstract: Many of the important themes that have sustained CSCW field-...
Duration:
53m 52s
Mark Ackerman: Three ways to describe the Int...
Mark Ackerman helps us understand what the Internet of Things is and w...
Duration:
1m
Quitting Smoking | Dr. Mark Ackerman, PhD
In an interview, Dr. Mark Ackerman, PhD, Health Psychologist at the At...