Activity
-
🎉 AI/ML Festival Happening in Vienna! #ICML2024 Unfortunately, I’m not there this year. Crazy to think the last time I attended ICML was already 5…
🎉 AI/ML Festival Happening in Vienna! #ICML2024 Unfortunately, I’m not there this year. Crazy to think the last time I attended ICML was already 5…
Liked by Ed Banti
-
Couldn’t be more excited about the long-term agreement we just signed with the NBA. Starting in the 2025-26 season, Prime members will be able to…
Couldn’t be more excited about the long-term agreement we just signed with the NBA. Starting in the 2025-26 season, Prime members will be able to…
Liked by Ed Banti
-
Whoa: we're in the middle of what is likely the largest global software-inflicted outage: Airports, hospitals, pharmacy services, flight operators…
Whoa: we're in the middle of what is likely the largest global software-inflicted outage: Airports, hospitals, pharmacy services, flight operators…
Liked by Ed Banti
Experience & Education
Patents
-
Offline simulation system for optimizing content pages
Issued US 10,977,149
-
Selecting supplemental content for inclusion in a network page
Issued US 10,977,264
-
Connected phrase search queries and titles
Issued US 10,049,163
-
Protecting content from third party using client-side security protection
Issued US 10,044,763
-
Selecting supplemental content for inclusion in a search results page
Issued US 9,881,065
-
Performing operations on deleted items using deleted property information
Issued US 9,852,402
-
Restoring Deleted Items With Context
Issued US US9741019B2
Deleted property information relating to deleting an item, such as an electronic message, is used for restoring the deleted item. The deleted property information is stored in response to deleting the item. The stored deleted property information identifies a location of where the item was deleted from and may include other information. The location information may be a specific location such as a folder (e.g. inbox, sent, folder 1, . . . ), a calendar, a network location, and the like. In…
Deleted property information relating to deleting an item, such as an electronic message, is used for restoring the deleted item. The deleted property information is stored in response to deleting the item. The stored deleted property information identifies a location of where the item was deleted from and may include other information. The location information may be a specific location such as a folder (e.g. inbox, sent, folder 1, . . . ), a calendar, a network location, and the like. In response to a request to restore a deleted item, the deleted property information is used to restore the deleted item to the location where the item was when deleted. A graphical user interface may be used to assist a user in restoring deleted items. The user interface may display a user friendly name (e.g. "Inbox", "Folder 1", . . . ) of where the deleted item(s) will be/have been restored.
-
Separating Authorization Identity From Policy Enforcement Identity
Issued US 8,448,228
The present invention extends to methods, systems, and computer program products for separating authorization identity from policy enforcement identity. Embodiments of the invention extend the consumption phase for protected information. Two identities, an authorization identity and a policy enforcement identity, are used for acquiring, issuing and enforcing usage license instead of one identity certificate. The authorization identity is used to evaluate against usage policy. The authorization…
The present invention extends to methods, systems, and computer program products for separating authorization identity from policy enforcement identity. Embodiments of the invention extend the consumption phase for protected information. Two identities, an authorization identity and a policy enforcement identity, are used for acquiring, issuing and enforcing usage license instead of one identity certificate. The authorization identity is used to evaluate against usage policy. The authorization identity is similar to identification information in an identity certificate. The policy enforcement identity is used to ensure the confidentiality of granted permissions and content key. The policy enforcement identity enforces a usage license on an authorization principal's (e.g., recipient's) machine. The policy enforcement identity's enforcement of a usage license is similar use of a cryptographic key in an identity certificate.
-
Business To Business Secure Mail
Issued US 8,447,976
Business to business secure mail may be provided. Consistent with embodiments of the invention, a protected message may be received. The recipient may request a token from a trust broker, submit the token to an authorization server associated with the sender, receive a user license from the authorization server; and decrypt the protected message using the user license. The protected message may restrict actions that may be taken by the recipient, such as forwarding to other users.
-
Protecting Content From Third Party Using Client-Side Security Protection
Issued US 8,978,091
Architecture that employs encryption and storage of encryption keys to protect trusted client message content from an untrusted third-party hosted service. Each trusted user machine is configured to optionally apply security to messages. Rules determine when automatic protection is applied and the level of protection to apply. The trusted client automatically downloads the rules (or rules policies) from a trusted rules service and caches the rules locally. During composition, the rules analyze…
Architecture that employs encryption and storage of encryption keys to protect trusted client message content from an untrusted third-party hosted service. Each trusted user machine is configured to optionally apply security to messages. Rules determine when automatic protection is applied and the level of protection to apply. The trusted client automatically downloads the rules (or rules policies) from a trusted rules service and caches the rules locally. During composition, the rules analyze the message and automatically apply security template(s) to the message. The security template(s) encrypt the body of the message, but not the headers or subject. The untrusted message service processes the header and delivers the message to the correct recipient. The hosted service cannot view the contents of the message body, and only intended recipients of the protected message can view the message body. Offline protection is supported, and the user can override protection by the rules.
-
Stacks for Content Organization
Filed US 20130254710
Stacks that associate different electronic content are created using tags that are associated with electronic content. Stacks may be personal, organizational and/or shared. A tag may be associated with different types of electronic content (e.g. documents, people, contacts, meetings, emails, . . . ) that may be stored in different locations. The tag acts as an identifier that travels with the content as the electronic content is used. Content may be automatically/manually tagged. As the tagged…
Stacks that associate different electronic content are created using tags that are associated with electronic content. Stacks may be personal, organizational and/or shared. A tag may be associated with different types of electronic content (e.g. documents, people, contacts, meetings, emails, . . . ) that may be stored in different locations. The tag acts as an identifier that travels with the content as the electronic content is used. Content may be automatically/manually tagged. As the tagged content is used, the different applications that interact with the content (e.g. a messaging application, a content application) can use the tag to perform different actions. Changes to content with a tag may be aggregated such that users looking at the "consolidated" view can see all changes made to content or activity related to that content.
-
Techniques to Provide Proxies for Web Services
Filed US 20130191509
Techniques to provide proxies for web services are described. A technique may include providing proxies for web services that translate one format to a format native used, or understood, by the web service without having to rewrite existing APIs. In one embodiment, for example, an apparatus may comprise a processing unit and a network interface coupled to the processing unit. The apparatus may further include a web service executing web service requests on the processing unit using a native…
Techniques to provide proxies for web services are described. A technique may include providing proxies for web services that translate one format to a format native used, or understood, by the web service without having to rewrite existing APIs. In one embodiment, for example, an apparatus may comprise a processing unit and a network interface coupled to the processing unit. The apparatus may further include a web service executing web service requests on the processing unit using a native format. The apparatus may further include a proxy to receive a web service request in a first format via the network interface and to translate the web service request from the first format to the native format. Other embodiments are described and claimed.
-
Sharing and Transferring Message Content Between Users
Filed US 20130159429
Messaging content that is associated with a user is selected for sharing and transferring with one or more other recipients. A user may select all/portion of the messaging content to transfer. For example, a user may select a single folder from their mailbox, their entire mailbox, one or more conversation threads, one or more subjects, and the like. The selection may be made manually/automatically. For example, a user may use a graphical user interface to select messaging content to share…
Messaging content that is associated with a user is selected for sharing and transferring with one or more other recipients. A user may select all/portion of the messaging content to transfer. For example, a user may select a single folder from their mailbox, their entire mailbox, one or more conversation threads, one or more subjects, and the like. The selection may be made manually/automatically. For example, a user may use a graphical user interface to select messaging content to share and/or messaging content may be automatically selected based on a rule and/or some other condition. After selection, the selected messaging content is transferred to the other recipient(s) with which the user has selected for sharing/transferring. The recipient(s) of the selected messaging content may accept/decline the transfer of messaging content. Upon accepting the invitation, the messaging content is transferred and stored in the recipient's mailbox.
-
Stealth Mode for Interacting With Electronic Messages
Filed US 20130159877
A stealth mode may be used to interact with electronic messages. A user may enter the stealth mode to interact with electronic messages without making state changes to the messages. While operating in stealth mode, operations (e.g. implicit operations such as reading a message) do not change the state of the electronic messages. Upon exiting the stealth mode, the state of the electronic messages is the same as before entering the stealth mode. According to an embodiment, explicit operations…
A stealth mode may be used to interact with electronic messages. A user may enter the stealth mode to interact with electronic messages without making state changes to the messages. While operating in stealth mode, operations (e.g. implicit operations such as reading a message) do not change the state of the electronic messages. Upon exiting the stealth mode, the state of the electronic messages is the same as before entering the stealth mode. According to an embodiment, explicit operations performed during stealth mode (e.g. marking a message as "read", deleting/forwarding/replying a message, . . . ) may change the state of the message relating to the action.
-
Web-Based Client for Creating and Accessing Protected Content
Filed US 20100313276
A web-based client for creating and accessing protected content may be provided. Consistent with embodiments of the invention, a webmail client may be provided allowing a user to apply a restriction template to a document. The webmail client may be further operative to decrypt and display the document and enforce the restriction against a recipient.
More activity by Ed
-
Today marks my 18th anniversary with Amazon. The morning began with a thoughtful message from my manager. I deeply appreciate all the congratulations…
Today marks my 18th anniversary with Amazon. The morning began with a thoughtful message from my manager. I deeply appreciate all the congratulations…
Liked by Ed Banti
-
Prime Day has finally arrived! It's our biggest event of the year exclusively for Prime members. I chatted with Fast Company about some of our latest…
Prime Day has finally arrived! It's our biggest event of the year exclusively for Prime members. I chatted with Fast Company about some of our latest…
Liked by Ed Banti
-
Rufus, our generative AI-powered shopping assistant, is now available to all of Amazon's U.S. customers. Like any great assistant, Rufus can help…
Rufus, our generative AI-powered shopping assistant, is now available to all of Amazon's U.S. customers. Like any great assistant, Rufus can help…
Liked by Ed Banti
-
Big tech jobs are not what they were. Amazon made my career and "my life", but things have changed. Here is the good, the bad and the ugly of today’s…
Big tech jobs are not what they were. Amazon made my career and "my life", but things have changed. Here is the good, the bad and the ugly of today’s…
Liked by Ed Banti
-
Internship Day @ Hasso Plattner Institute 🤩🙌🤩 Our first #HPI Internship Day was all about celebrating #innovation 🎉 In the morning Mark…
Internship Day @ Hasso Plattner Institute 🤩🙌🤩 Our first #HPI Internship Day was all about celebrating #innovation 🎉 In the morning Mark…
Liked by Ed Banti
-
I am very happy to see our multilingual Generative AI listing and catalog enrichment capabilities are starting to help our selling partners and…
I am very happy to see our multilingual Generative AI listing and catalog enrichment capabilities are starting to help our selling partners and…
Liked by Ed Banti
-
Looking back at my GitHub contributions over the past year, it's been a busy year 😀. I contributed 1693 out of 1758 commits in the Mastertech GitHub…
Looking back at my GitHub contributions over the past year, it's been a busy year 😀. I contributed 1693 out of 1758 commits in the Mastertech GitHub…
Liked by Ed Banti
-
I'm not sure where the last year went, but I know that it was everything I needed and more. Last July, I stepped away from work to focus on 3 things:…
I'm not sure where the last year went, but I know that it was everything I needed and more. Last July, I stepped away from work to focus on 3 things:…
Liked by Ed Banti
-
Amazon today announced a major milestone in making our delivery packaging easier to recycle for our customers. We have replaced 95% of plastic air…
Amazon today announced a major milestone in making our delivery packaging easier to recycle for our customers. We have replaced 95% of plastic air…
Liked by Ed Banti
-
My first panel talk with Amazon to our many brand partners, some of which I had worked at and with in the past, some I knew from having worked in the…
My first panel talk with Amazon to our many brand partners, some of which I had worked at and with in the past, some I knew from having worked in the…
Liked by Ed Banti
-
Since I started on the #PowerBI team over 8(!) years ago, I have used the exact same planning process for the team. We can argue about what cadence…
Since I started on the #PowerBI team over 8(!) years ago, I have used the exact same planning process for the team. We can argue about what cadence…
Liked by Ed Banti
-
Tonight we announced the launch of Aéropostale on Amazon Fashion with a curated collection of the brand’s most valuable pieces since 1987, including…
Tonight we announced the launch of Aéropostale on Amazon Fashion with a curated collection of the brand’s most valuable pieces since 1987, including…
Liked by Ed Banti
-
🎉 And so it begins. If you are at CVPR in Seattle and interested in joining Amazon, please stop by the Amazon Science booth or DM me your email. We…
🎉 And so it begins. If you are at CVPR in Seattle and interested in joining Amazon, please stop by the Amazon Science booth or DM me your email. We…
Liked by Ed Banti
-
Thrilled to announce that I will be joining BNY as Chief Information Officer and Head of Engineering in September. BNY holds a unique position in…
Thrilled to announce that I will be joining BNY as Chief Information Officer and Head of Engineering in September. BNY holds a unique position in…
Liked by Ed Banti
-
Re-engaging with CVPR after 15 years. I wonder if there will be anything that isn't transformer based!
Re-engaging with CVPR after 15 years. I wonder if there will be anything that isn't transformer based!
Liked by Ed Banti
Other similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore More