Search

Amol Mahajani Phones & Addresses

  • 19389 Kerwin Ranch Ct, Saratoga, CA 95070 (408) 867-4940
  • Campbell, CA
  • Seattle, WA
  • San Jose, CA
  • Henderson, NV
  • Sunnyvale, CA
  • Sioux Falls, SD
  • Santa Clara, CA

Work

Company: Oracle Aug 2018 Position: Oracle cloud infrastructure

Education

Degree: Bachelors, Bachelor of Technology School / High School: Indian Institute of Technology, Bombay 1981 to 1985 Specialities: Computer Science

Industries

Computer Software

Resumes

Resumes

Amol Mahajani Photo 1

Oracle Cloud Infrastructure

View page
Location:
19389 Kerwin Ranch Ct, Saratoga, CA 95070
Industry:
Computer Software
Work:
Oracle
Oracle Cloud Infrastructure

Amazon Aug 2017 - Aug 2018
Aws Networking

Enlighted Inc 2016 - 2017
Executive Vice President, Engineering

Hewlett-Packard 2013 - 2016
Vice President Engineering, Sdn Solutions, Hp Networking

Infineta Systems 2009 - 2013
Vice President, Engineering
Education:
Indian Institute of Technology, Bombay 1981 - 1985
Bachelors, Bachelor of Technology, Computer Science

Business Records

Name / Title
Company / Classification
Phones & Addresses
Amol Mahajani
Managing
Nikaya Ventures, LLC
Investment
951 Corte Del Sol, Fremont, CA 94539

Publications

Wikipedia

Infineta Systems

View page

Area served, Worldwide. Key people. Raj Kanaya, CEO K.V.S. Ramarao, CTO Ainslie Mayberry, CFO Haseeb S. Budhani, Chief Product Officer. Amol Mahajani ...

Us Patents

Method And System To Control Access To A Secure Asset Via An Electronic Communications Network

View page
US Patent:
20080072280, Mar 20, 2008
Filed:
Jul 16, 2007
Appl. No.:
11/879224
Inventors:
Joseph Tardo - Palo Alto CA, US
Amol Mahajani - Saratoga CA, US
Michael Simonsen - Los Altos CA, US
Dominic Wilde - Morgan Hill CA, US
Sanjeev Dalal - Pune, IN
International Classification:
G06F 21/00
US Classification:
726001000
Abstract:
A method and system for enabling a secure electronic network communications asset is provided. A computational engine networked with an electronic communications is configured to comprise a network endpoint. One, two or a group of particular applications or network services enabled by that endpoint are identified as an addressable secure asset. Policies are established and implemented to limit interactivity between the secure asset and any communications interface to which the asset is connected. The endpoint is configured to be accessible by one or more specific user groups under possibly unique sets policies assigned to each user group. Any network endpoint must be a member of one at least user group in order to access the secure asset and must abide by the policies imposed by the secure asset onto the including user group.

Method And System For Transparent In-Line Protection Of An Electronic Communications Network

View page
US Patent:
20060190997, Aug 24, 2006
Filed:
Feb 22, 2005
Appl. No.:
11/064429
Inventors:
Amol Mahajani - Saratoga CA, US
Tanuj Mohan - San Jose CA, US
Joseph Tardo - Palo Alto CA, US
Dominic Wilde - Morgan Hill CA, US
International Classification:
H04L 9/32
US Classification:
726010000
Abstract:
The invention provides a method and system for enabling in-line communications channels between a plurality of computational systems and a switch, and/or a plurality of switches and a router. In a first version of the invention an in-line system receives uplinks of aggregated data from a plurality of switches and applies policies to the each aggregated data stream prior to transmission of the aggregated data streams from the in-line system to the router. At least one computational system provides a user identification associated with a user profile to the in-line system. The user profile informs indicates to the in-line system of the constraints imposed upon and activities permitted to the computational system originating the user identification. The constraints may include (a) one or more customized policies, (b) policies applicable to a group associated with the user identification, (c) virus/worm detection & protection, (d) a firewall, (e) virtual private network rules, and/or (f) encryption/decryption. In a second version the in-line system is configured to communicate directly with one or more computational systems as well as one or more switches.
Amol Vijay Mahajani from Saratoga, CA, age ~61 Get Report