Activity
-
Our Q1 2026 financial results are out, and we achieved $181.5 billion in revenue, a 15% increase year-over-year. AWS revenue grew 28%, the fastest…
Our Q1 2026 financial results are out, and we achieved $181.5 billion in revenue, a 15% increase year-over-year. AWS revenue grew 28%, the fastest…
Liked by Ed Banti
-
Q1 showed strong momentum as customers continue to choose Amazon Web Services (AWS) to build and run AI. Some of what we saw, and other highlights,…
Q1 showed strong momentum as customers continue to choose Amazon Web Services (AWS) to build and run AI. Some of what we saw, and other highlights,…
Liked by Ed Banti
Experience
Education
Patents
-
Offline simulation system for optimizing content pages
Issued US 10,977,149
-
Selecting supplemental content for inclusion in a network page
Issued US 10,977,264
-
Connected phrase search queries and titles
Issued US 10,049,163
-
Protecting content from third party using client-side security protection
Issued US 10,044,763
-
Selecting supplemental content for inclusion in a search results page
Issued US 9,881,065
-
Performing operations on deleted items using deleted property information
Issued US 9,852,402
-
Restoring Deleted Items With Context
Issued US US9741019B2
See patentDeleted property information relating to deleting an item, such as an electronic message, is used for restoring the deleted item. The deleted property information is stored in response to deleting the item. The stored deleted property information identifies a location of where the item was deleted from and may include other information. The location information may be a specific location such as a folder (e.g. inbox, sent, folder 1, . . . ), a calendar, a network location, and the like. In…
Deleted property information relating to deleting an item, such as an electronic message, is used for restoring the deleted item. The deleted property information is stored in response to deleting the item. The stored deleted property information identifies a location of where the item was deleted from and may include other information. The location information may be a specific location such as a folder (e.g. inbox, sent, folder 1, . . . ), a calendar, a network location, and the like. In response to a request to restore a deleted item, the deleted property information is used to restore the deleted item to the location where the item was when deleted. A graphical user interface may be used to assist a user in restoring deleted items. The user interface may display a user friendly name (e.g. "Inbox", "Folder 1", . . . ) of where the deleted item(s) will be/have been restored.
-
Separating Authorization Identity From Policy Enforcement Identity
Issued US 8,448,228
See patentThe present invention extends to methods, systems, and computer program products for separating authorization identity from policy enforcement identity. Embodiments of the invention extend the consumption phase for protected information. Two identities, an authorization identity and a policy enforcement identity, are used for acquiring, issuing and enforcing usage license instead of one identity certificate. The authorization identity is used to evaluate against usage policy. The authorization…
The present invention extends to methods, systems, and computer program products for separating authorization identity from policy enforcement identity. Embodiments of the invention extend the consumption phase for protected information. Two identities, an authorization identity and a policy enforcement identity, are used for acquiring, issuing and enforcing usage license instead of one identity certificate. The authorization identity is used to evaluate against usage policy. The authorization identity is similar to identification information in an identity certificate. The policy enforcement identity is used to ensure the confidentiality of granted permissions and content key. The policy enforcement identity enforces a usage license on an authorization principal's (e.g., recipient's) machine. The policy enforcement identity's enforcement of a usage license is similar use of a cryptographic key in an identity certificate.
-
Business To Business Secure Mail
Issued US 8,447,976
See patentBusiness to business secure mail may be provided. Consistent with embodiments of the invention, a protected message may be received. The recipient may request a token from a trust broker, submit the token to an authorization server associated with the sender, receive a user license from the authorization server; and decrypt the protected message using the user license. The protected message may restrict actions that may be taken by the recipient, such as forwarding to other users.
-
Protecting Content From Third Party Using Client-Side Security Protection
Issued US 8,978,091
See patentArchitecture that employs encryption and storage of encryption keys to protect trusted client message content from an untrusted third-party hosted service. Each trusted user machine is configured to optionally apply security to messages. Rules determine when automatic protection is applied and the level of protection to apply. The trusted client automatically downloads the rules (or rules policies) from a trusted rules service and caches the rules locally. During composition, the rules analyze…
Architecture that employs encryption and storage of encryption keys to protect trusted client message content from an untrusted third-party hosted service. Each trusted user machine is configured to optionally apply security to messages. Rules determine when automatic protection is applied and the level of protection to apply. The trusted client automatically downloads the rules (or rules policies) from a trusted rules service and caches the rules locally. During composition, the rules analyze the message and automatically apply security template(s) to the message. The security template(s) encrypt the body of the message, but not the headers or subject. The untrusted message service processes the header and delivers the message to the correct recipient. The hosted service cannot view the contents of the message body, and only intended recipients of the protected message can view the message body. Offline protection is supported, and the user can override protection by the rules.
-
Stacks for Content Organization
Filed US 20130254710
See patentStacks that associate different electronic content are created using tags that are associated with electronic content. Stacks may be personal, organizational and/or shared. A tag may be associated with different types of electronic content (e.g. documents, people, contacts, meetings, emails, . . . ) that may be stored in different locations. The tag acts as an identifier that travels with the content as the electronic content is used. Content may be automatically/manually tagged. As the tagged…
Stacks that associate different electronic content are created using tags that are associated with electronic content. Stacks may be personal, organizational and/or shared. A tag may be associated with different types of electronic content (e.g. documents, people, contacts, meetings, emails, . . . ) that may be stored in different locations. The tag acts as an identifier that travels with the content as the electronic content is used. Content may be automatically/manually tagged. As the tagged content is used, the different applications that interact with the content (e.g. a messaging application, a content application) can use the tag to perform different actions. Changes to content with a tag may be aggregated such that users looking at the "consolidated" view can see all changes made to content or activity related to that content.
-
Techniques to Provide Proxies for Web Services
Filed US 20130191509
See patentTechniques to provide proxies for web services are described. A technique may include providing proxies for web services that translate one format to a format native used, or understood, by the web service without having to rewrite existing APIs. In one embodiment, for example, an apparatus may comprise a processing unit and a network interface coupled to the processing unit. The apparatus may further include a web service executing web service requests on the processing unit using a native…
Techniques to provide proxies for web services are described. A technique may include providing proxies for web services that translate one format to a format native used, or understood, by the web service without having to rewrite existing APIs. In one embodiment, for example, an apparatus may comprise a processing unit and a network interface coupled to the processing unit. The apparatus may further include a web service executing web service requests on the processing unit using a native format. The apparatus may further include a proxy to receive a web service request in a first format via the network interface and to translate the web service request from the first format to the native format. Other embodiments are described and claimed.
-
Sharing and Transferring Message Content Between Users
Filed US 20130159429
See patentMessaging content that is associated with a user is selected for sharing and transferring with one or more other recipients. A user may select all/portion of the messaging content to transfer. For example, a user may select a single folder from their mailbox, their entire mailbox, one or more conversation threads, one or more subjects, and the like. The selection may be made manually/automatically. For example, a user may use a graphical user interface to select messaging content to share…
Messaging content that is associated with a user is selected for sharing and transferring with one or more other recipients. A user may select all/portion of the messaging content to transfer. For example, a user may select a single folder from their mailbox, their entire mailbox, one or more conversation threads, one or more subjects, and the like. The selection may be made manually/automatically. For example, a user may use a graphical user interface to select messaging content to share and/or messaging content may be automatically selected based on a rule and/or some other condition. After selection, the selected messaging content is transferred to the other recipient(s) with which the user has selected for sharing/transferring. The recipient(s) of the selected messaging content may accept/decline the transfer of messaging content. Upon accepting the invitation, the messaging content is transferred and stored in the recipient's mailbox.
-
Stealth Mode for Interacting With Electronic Messages
Filed US 20130159877
See patentA stealth mode may be used to interact with electronic messages. A user may enter the stealth mode to interact with electronic messages without making state changes to the messages. While operating in stealth mode, operations (e.g. implicit operations such as reading a message) do not change the state of the electronic messages. Upon exiting the stealth mode, the state of the electronic messages is the same as before entering the stealth mode. According to an embodiment, explicit operations…
A stealth mode may be used to interact with electronic messages. A user may enter the stealth mode to interact with electronic messages without making state changes to the messages. While operating in stealth mode, operations (e.g. implicit operations such as reading a message) do not change the state of the electronic messages. Upon exiting the stealth mode, the state of the electronic messages is the same as before entering the stealth mode. According to an embodiment, explicit operations performed during stealth mode (e.g. marking a message as "read", deleting/forwarding/replying a message, . . . ) may change the state of the message relating to the action.
-
Web-Based Client for Creating and Accessing Protected Content
Filed US 20100313276
See patentA web-based client for creating and accessing protected content may be provided. Consistent with embodiments of the invention, a webmail client may be provided allowing a user to apply a restriction template to a document. The webmail client may be further operative to decrypt and display the document and enforce the restriction against a recipient.
More activity by Ed
-
We’re taking the stress out of airport travel - helping you easily find your Uber pickup spot with walklines, step-by-step directions, and detailed…
We’re taking the stress out of airport travel - helping you easily find your Uber pickup spot with walklines, step-by-step directions, and detailed…
Liked by Ed Banti
-
After a brilliant 15 years, I will be concluding my time at bp at the end of June. It has been a remarkable journey filled with amazing people…
After a brilliant 15 years, I will be concluding my time at bp at the end of June. It has been a remarkable journey filled with amazing people…
Liked by Ed Banti
-
Orgullosa de compartir que Amazon ha sido reconocida, por segundo año consecutivo, como la mejor empresa para trabajar en España según el ranking Top…
Orgullosa de compartir que Amazon ha sido reconocida, por segundo año consecutivo, como la mejor empresa para trabajar en España según el ranking Top…
Liked by Ed Banti
-
Hotels on Uber has arrived! Today, we announced the launch of Hotels on Uber at our premiere consumer event GO–GET. Our goal is to be ever more…
Hotels on Uber has arrived! Today, we announced the launch of Hotels on Uber at our premiere consumer event GO–GET. Our goal is to be ever more…
Liked by Ed Banti
-
I have decided to leave Amazon after 14 years, 9 months, 29 days tenure across two stints. My last day is May 1st. I am very grateful for the…
I have decided to leave Amazon after 14 years, 9 months, 29 days tenure across two stints. My last day is May 1st. I am very grateful for the…
Liked by Ed Banti
-
I am very grateful for the opportunity to speak with MIT operations graduate students this week about leadership. My talk presented a few case…
I am very grateful for the opportunity to speak with MIT operations graduate students this week about leadership. My talk presented a few case…
Liked by Ed Banti
-
Amazon has ranked among LinkedIn's Top Companies every year since the list launched in 2016. This recognition reflects the dedication of over one…
Amazon has ranked among LinkedIn's Top Companies every year since the list launched in 2016. This recognition reflects the dedication of over one…
Liked by Ed Banti
-
Summer is on the horizon, and with it comes a shift in how customers approach beauty. Warmer weather, more time outdoors, and changing routines…
Summer is on the horizon, and with it comes a shift in how customers approach beauty. Warmer weather, more time outdoors, and changing routines…
Liked by Ed Banti
-
a first for me last week...gulp...an art exhibition (woodblock prints).
a first for me last week...gulp...an art exhibition (woodblock prints).
Liked by Ed Banti
-
After nearly 13 years, today marks my last Day 1 at Amazon. I’ve had the opportunity to work across AWS, Search, Devices, and Advertising—launching…
After nearly 13 years, today marks my last Day 1 at Amazon. I’ve had the opportunity to work across AWS, Search, Devices, and Advertising—launching…
Liked by Ed Banti
-
Today is my last day at Uber. 8.5 years is a long time in tech, but the complexity of the Marketplace kept it interesting until the very end. We went…
Today is my last day at Uber. 8.5 years is a long time in tech, but the complexity of the Marketplace kept it interesting until the very end. We went…
Liked by Ed Banti
-
𝗧𝗼 𝗠𝘆 𝗙𝗶𝗿𝘀𝘁 𝗣𝗮𝗿𝘁𝗻𝗲𝗿 𝗜𝗻 𝗖𝗿𝗶𝗺𝗲 — 𝗔𝘁 𝟱𝟬 Last week, we celebrated your 50th. And as I look at this photo of us together from…
𝗧𝗼 𝗠𝘆 𝗙𝗶𝗿𝘀𝘁 𝗣𝗮𝗿𝘁𝗻𝗲𝗿 𝗜𝗻 𝗖𝗿𝗶𝗺𝗲 — 𝗔𝘁 𝟱𝟬 Last week, we celebrated your 50th. And as I look at this photo of us together from…
Liked by Ed Banti
-
Today we’re excited to extend the AllTrails experience to Claude As we head into peak season at AllTrails, our goal is simple: help more people get…
Today we’re excited to extend the AllTrails experience to Claude As we head into peak season at AllTrails, our goal is simple: help more people get…
Liked by Ed Banti
Other similar profiles
Explore top content on LinkedIn
Find curated posts and insights for relevant topics all in one place.
View top content