Techniques are described for providing users with access to computer networks, such as to enable users to interact with a remote configurable network service to create and configure computer networks that are provided by the configurable network service for use by the users. Secure private access between a computer network provided for a user by the configurable network service and one or more other remote computing systems of the user (e.g., a remote private network) may be enabled in various ways. ... Amazon Technologies Inc
Policies are used to control access to resources. Requests to change a set of policies may be fulfillable, at least in some circumstances, only if the requests are submitted such that the requested changes would become effective at a time in the future that is in compliance with a requirement for delayed enforcement. ... Amazon Technologies Inc
Methods and apparatus for token-sharing mechanisms for burst-mode operations are disclosed. A first and a second token bucket are respectively configured for admission control at a first and a second work target. ... Amazon Technologies Inc
Methods and apparatus for burst-mode admission control using token buckets are disclosed. A work request (such as a read or a write) directed to a work target is received. ... Amazon Technologies Inc
A remote browsing process is directed to the generation and management of a remote browse session at a network computing and storage provider. A client computing device requests a remote browse session instance at a network computing and storage provider. ... Amazon Technologies Inc
Disclosed are various embodiments relating to generating portions of network pages associated with a network site, where the portions of the network pages are generated by page generation code that uses a subset of aggregated data provided to it. A request for a network page is received from a first party. ... Amazon Technologies Inc
Data is encrypted such that multiple keys are needed to decrypt the data. The keys are accessible to different entities so that no single entity has access to all the keys. ... Amazon Technologies Inc
Methods and apparatus for equitable distribution of excess shared-resource throughput capacity are disclosed. A first and a second work target are configured to access a shared resource to implement accepted work requests. ... Amazon Technologies Inc
Methods and apparatus for resource silos at network-accessible services are disclosed. A subset of resources used for a database service, including at least one resource from each of a plurality of data centers, is selected for membership in a resource silo based on grouping criteria. ... Amazon Technologies Inc
Techniques are described for providing clients with access to functionality for creating, configuring and executing defined workflows that manipulate source data in defined manners, such as under the control of a configurable workflow service that is available to multiple remote clients over one or more public networks. A defined workflow for a client may, for example, include multiple interconnected workflow components that are specified by the client and that each are configured to perform one or more types of data manipulation operations on a specified type of input data. ... Amazon Technologies Inc
A remote browsing process is directed to the generation and management of a remote browse session at a network computing and storage provider. A client computing device loads a local browser process and obtains network content from content providers. ... Amazon Technologies Inc
Disclosed are various embodiments for automated service interface optimization. In one embodiment, a service client and/or a service provider is reconfigured to use an optimized version of a data transfer interface, where the optimized version transfers fewer data items from the service provider to the service client. ... Amazon Technologies Inc
Increasing diversity of search results is described. In one embodiment, a computing device obtains initial search results based on a search query. ... Amazon Technologies Inc
Closed-loop stored value payment instruments may be issued, sold and managed on behalf of a merchant through a third party electronic commerce system. Upon purchase of a closed-loop stored value payment instrument through the third party electronic commerce system, a payment aggregator may be notified of the purchase and the closed-loop stored-value payment instrument may be activated. ... Amazon Technologies Inc
Methods and apparatus for token-based pricing policies for burst-mode operations are disclosed. A pricing policy to be applied to token population changes at a token bucket used for admission control during burst-mode operations at a work target is determined. ... Amazon Technologies Inc
An advertiser submitting a sponsored ad to a provider can determine aspects of the ad, such as creative elements and bid price, based on a dynamic categorization of an item and/or landing page associated with the ad. An algorithm can be used that utilizes a browse tree for each item to be displayed to a user following a sponsored link, for example, and attempts to find a node in the browse tree that appears at the lowest level in the tree and with a sufficient appearance frequency. ... Amazon Technologies Inc
An adaptive navigation system anticipates a user's interactions with a device, modifying the device in the future based on past user movements and interactions. The system records a user's movement patterns and correlates movement patterns with how the user interacts with the device. ... Amazon Technologies Inc
A method for analyzing displays is described. A processing device receives a first scanned image of a first display and determines a first characteristic of the first display by analyzing the first scanned image. ... Amazon Technologies Inc
Methods and apparatus for compound token buckets usable for burst-mode admission control are disclosed. A peak burst rate and a sustained burst rate of work requests that are to be supported at a work target are determined. ... Amazon Technologies Inc
A system is disclosed that improves the ability for users to select links and/or other display elements via a touch screen, such as the touch screen of a smartphone, tablet, or other mobile device. The system achieves this effect by adjusting the sizes and/or shapes of the touch targets associated with particular display elements. ... Amazon Technologies Inc
Selective content presentation for the purpose of self-imposed censoring of content is implemented on an electronic device. The selective content presentation involves acquiring a content suppression preference for suppressing content presentation at an electronic device. ... Amazon Technologies Inc
Methods, apparatus, and computer-accessible storage media for restoring data from a snapshot to a data volume. The blocks in the volume may be treated as an implicit tree structure, for example a binary tree; each local block corresponds to a block on the snapshot. ... Amazon Technologies Inc
A method of providing fixed computer-displayable content in response to a consumer request for content is presented. Upon obtaining a digital image corresponding to the requested content, an advertisement is selected. ... Amazon Technologies Inc
Approaches to enable a computing device, such as a phone or tablet computer, to use sensor information obtained from sensors of the computing device to interpret one or more gestures and/or other input provided by the user. In particular, the computing device may use information about the movement of the device gathered from an accelerometer or gyroscope in combination with input data detected by the touch screen or cameras of the device in order to disambiguate between several different types of gestures for the device.. ... Amazon Technologies Inc
Approaches in accordance with various embodiments attempt to provide a user with less disruptive event notifications by being aware of a user's context. Before a notification is sent to multiple computing devices associated with the notifying account, contextual information for each device is determined. ... Amazon Technologies Inc
Delivering bags, for example, for delivering items and products purchased bye-commerce in so-called “grocery” tote bags to the respective purchasing customers is described. In one embodiment, a system includes a box and a plurality of bag protectors, each made of material having sufficient rigidity to protect a bag contained therein. ... Amazon Technologies Inc