Geoffrey G Baehr

age ~69

from Menlo Park, CA

Also known as:
  • George Geoffrey Baehr
  • George G Baehr
Phone and address:
1692 Altschul Ave, Menlo Park, CA 94025
6508543404

Geoffrey Baehr Phones & Addresses

  • 1692 Altschul Ave, Menlo Park, CA 94025 • 6508543404 • 6508543484
  • Burbank, CA
  • Palo Alto, CA
  • Stockton, CA
  • 25520 Mount Bache Rd, Los Gatos, CA 95033
  • Santa Monica, CA
  • Lomita, CA
  • Santa Cruz, CA
  • San Mateo, CA

Work

  • Company:
    Skolkovo foundation moscow/menlo park
    2009 to 2014
  • Position:
    Technical reviewer - computer engineering

Skills

Venture Capital • Mobile Devices • Strategic Partnerships • Strategy • Start Ups • Networking • Network Security • Entrepreneurship • Cloud Computing • Operating Systems • Saas • Distributed Systems • Semiconductors • Application Servers • Development Tools • Mergers

Industries

Venture Capital & Private Equity

Vehicle Records

  • Geoffrey Baehr

    view source
  • Address:
    1692 Altschul Ave, Menlo Park, CA 94025
  • Phone:
    6508543484
  • VIN:
    WBAVT73517FZ36954
  • Make:
    BMW
  • Model:
    328
  • Year:
    2007
Name / Title
Company / Classification
Phones & Addresses
Geoffrey Baehr
Venture Partner
US Venture Partners III LLC
Venture Capital Firm · Portfolio Management
2735 Sand Hl Rd, Menlo Park, CA 94025
6508549080
Geoffrey Baehr
Venture Partner
U.S. Venture Partners
Venture Capital & Private Equity · Security Brokers and Dealers, Nsk · Financial Management for Businesses · Portfolio Management · Open-End Investment Funds
2735 Sand Hl Rd, Menlo Park, CA 94025
2180 Sand Hl Rd, Menlo Park, CA 94025
6508549080, 6508543018, 6509267715
Geoffrey Baehr
Lavache, LLC
Aviation
1629 Altschul Ave, Menlo Park, CA 94025

Resumes

Geoffrey Baehr Photo 1

General Partner

view source
Location:
Menlo Park, CA
Industry:
Venture Capital & Private Equity
Work:
Skolkovo Foundation Moscow/Menlo Park 2009 - 2014
Technical Reviewer - Computer Engineering

Sentinel Mission - B612 Foundation 2000 - 2014
Director - Treasurer - Founder Circle

U.s. Venture Partners 2000 - 2011
General Partner - Then Partner

Almaz Capital 2000 - 2011
General Partner

Sun Microsystems Dec 1987 - Dec 2000
Chief Network Officer
Skills:
Venture Capital
Mobile Devices
Strategic Partnerships
Strategy
Start Ups
Networking
Network Security
Entrepreneurship
Cloud Computing
Operating Systems
Saas
Distributed Systems
Semiconductors
Application Servers
Development Tools
Mergers

Us Patents

  • Method And Apparatus For Local Advertising

    view source
  • US Patent:
    6487538, Nov 26, 2002
  • Filed:
    Nov 16, 1998
  • Appl. No.:
    09/192874
  • Inventors:
    Amit Gupta - Fremont CA
    Sriraman Venkataraman - London, GB
    Geoffrey Baehr - Menlo Park CA
  • Assignee:
    Sun Microsystems, Inc. - Santa Clara CA
  • International Classification:
    G06F 1760
  • US Classification:
    705 14, 709219
  • Abstract:
    A method and apparatus for local advertising. Internet Service Providers (ISPs) or proxies owned by an ISP insert advertisements transmitted from a web host to a client. The advertisement may be stored in the proxys cache or may be retrieved from a web server for an advertiser. By providing the ISP with the ability to insert the advertisement, advertisements appear on small web sites that do not normally attract advertisers. Additionally, due to the number of advertisements placed by an ISP, small advertisers may have their advertisement appear in connection with frequently used web sites. One or more embodiments of the invention provide for an ISP to collect and store demographic information such as the users age, residence, credit history, etc. Additionally, stored information may include web sites the user has accessed, time spent on each web site, and any searches performed by the user. The profile information may be utilized by the proxy to conduct targeted advertising and to associate a cost with certain demographic information.
  • Method And Apparatus For Dynamic Proxy Insertion In Network Traffic Flow

    view source
  • US Patent:
    6567857, May 20, 2003
  • Filed:
    Jul 29, 1999
  • Appl. No.:
    09/363472
  • Inventors:
    Amit Gupta - Fremont CA
    Geoffrey Baehr - Menlo Park CA
  • Assignee:
    Sun Microsystems, Inc. - Santa Clara CA
  • International Classification:
    G06F 1300
  • US Classification:
    709238, 709242, 370235
  • Abstract:
    In embodiments of the invention, a method and apparatus for dynamic proxy insertion in network traffic path is described. According to one or more embodiments of the invention, a request and/or response message may be modified to include one or more thru-proxy tags to identify a network (or traffic) node (e. g. , a proxy, server, or intermediary). For example, a request directed to a server or a response directed to a client may be altered to insert a plurality of intermediate or final destination designations. In so doing, a path of a request or response may be altered dynamically. A thru-proxy tag in a response may be inserted in a related request to identify a destination or node such that the request is sent to the destination in the thru-proxy tag before being sent to an origin server. Thru-proxy tags may be used to identify multiple and/or alternate destinations.
  • Client Controlled Pre-Fetching Of Resources

    view source
  • US Patent:
    6553461, Apr 22, 2003
  • Filed:
    Dec 10, 1999
  • Appl. No.:
    09/459320
  • Inventors:
    Amit Gupta - Fremont CA
    Geoffrey Baehr - Menlo Park CA
  • Assignee:
    Sun Microsystems, Inc. - Santa Clara CA
  • International Classification:
    G06F 1200
  • US Classification:
    711137, 711118, 711213
  • Abstract:
    A client is given control over the pre-fetching of resources. The client may be, for example, resident on an electronic device such as a computer system that caches resources. The resources may be, for instance, web pages. Identifying property values that are intrinsically tied to the contents of the resources are used to determine whether resources are already resident within the cache prior to pre-fetching the resources. In addition, the client may request information regarding a resource to assist the client in determining whether to pre-fetch the resource. Such information may include the size of the resource and other information.
  • Method And Apparatus For Providing Secure Communication With A Relay In A Network

    view source
  • US Patent:
    6643701, Nov 4, 2003
  • Filed:
    Nov 17, 1999
  • Appl. No.:
    09/441451
  • Inventors:
    Ashar Aziz - Freemont CA
    Geoffrey Baehr - Menlo Park CA
    Germano Caronni - Sunnyvale CA
    Amit Gupta - Fremont CA
    Vipul Gupta - Fremont CA
    Glenn C. Scott - Mountain View CA
  • Assignee:
    Sun Microsystems, Inc. - Santa Clara CA
  • International Classification:
    G06F 1516
  • US Classification:
    709227, 709203, 709217, 709219, 709228, 713150, 713155, 713201, 705 64, 705 65
  • Abstract:
    Methods and systems of the present invention include providing a connection between a first computer and a second computer by receiving, at a third computer, information regarding one of the first and second computers to facilitate establishment of a secure connection between the first computer and the second computer, creating a first end-to-end security link between the first computer and third computer, and creating a second end-to-end security link between the second computer and the third computer to establish the secure connection. The first and second computers could be a client and a server on the Internet, and these methods and systems can, for example, increase the possible number of new secure connections to the server. The third computer also permits processing of information transmitted between the client and server in the third computer. For example, the information could be reformatted or used in testing a process of one of the first and second computers.
  • Method And Apparatus For Dynamic Proxy Insertion In Network Traffic Flow

    view source
  • US Patent:
    6701374, Mar 2, 2004
  • Filed:
    Mar 25, 2003
  • Appl. No.:
    10/397158
  • Inventors:
    Amit Gupta - Fremont CA
    Geoffrey Baehr - Menlo Park CA
  • Assignee:
    Sun Microsystems, Inc. - Santa Clara CA
  • International Classification:
    G06F 1300
  • US Classification:
    709238, 709242, 709237, 370235, 370236
  • Abstract:
    In embodiments of the invention, a method and apparatus for dynamic proxy insertion in network traffic path is described. According to one or more embodiments of the invention, a request and/or response message may be modified to include one or more thru-proxy tags to identify a network (or traffic) node (e. g. , a proxy, server, or intermediary). For example, a request directed to a server or a response directed to a client may be altered to insert a plurality of intermediate or final destination designations. In so doing, a path of a request or response may be altered dynamically. A thru-proxy tag in a response may be inserted in a related request to identify a destination or node such that the request is sent to the destination in the thru-proxy tag before being sent to an origin server. Thru-proxy tags may be used to identify multiple and/or alternate destinations.
  • Method And Apparatus For Processing Client Information

    view source
  • US Patent:
    20010020242, Sep 6, 2001
  • Filed:
    Nov 16, 1998
  • Appl. No.:
    09/192806
  • Inventors:
    AMIT GUPTA - FREMONT CA, US
    SRIRAMAN VENKATRAMAN - LONDON, GB
    GEOFFREY BAEHR - MENLO PARK CA, US
  • International Classification:
    G06F015/00
  • US Classification:
    707/501100
  • Abstract:
    A method and apparatus for processing user information. Information collection is increasingly utilized by advertisers and others that desire to customize a user's display for the user's individual preferences. According to one ore more embodiments of the invention, Internet Service Providers (ISPs) or proxies owned by an ISP collect and store information regarding particular users in a user profile. The information may include demographic information such as the user's age, residence, credit history, etc. Additionally, the information may include the web sites that the user has accessed, the time spent on each web site, and any internet searches performed by the user. The profile information may be utilized by the proxy to conduct targeted advertising, the information may be provided to a web host so that the web host may conduct targeted advertising, or the information may be utilized to customize a user's display, for example. The profile information may also be utilized to associate a cost with certain demographic information. For example, if the profile information indicates that the user is interested in automobiles, a premium may be charged to an automobile advertiser. The profile information may be evaluated by the ISP for advertisement insertion or customized displays. Alternatively, the profile information may be sold to a third party such as an advertiser. Thus, the profile and demographic information can be utilized to individually customize information displayed to a client.
  • Method And Apparatus For Device Location Sensitive Data Routing

    view source
  • US Patent:
    20020164987, Nov 7, 2002
  • Filed:
    Dec 13, 2000
  • Appl. No.:
    09/737193
  • Inventors:
    Germano Caronni - Mountain View CA, US
    Geoffrey Baehr - Menlo Park CA, US
  • International Classification:
    H04Q007/20
  • US Classification:
    455/445000, 455/456000
  • Abstract:
    The present invention provides a method and apparatus for device location sensitive data routing. In one embodiment of the present invention, a signal from a portable, electronic device identifies a user. In this embodiment, a sensor detects the signal and relays the identification information along with information about electronic communications devices available at the location to a routing device. The routing device reroutes electronic communications to the physical location of the user. In one embodiment, the signal is a radio emanation. In another embodiment, the signal is an infrared emanation. In yet another embodiment, the signal is transmitted over a connection line which couples the portable, electronic device to the sensor. In one embodiment, phone calls are rerouted to a phone located near the portable, electronic device. In another embodiment, e-mail messages are rerouted to a general purpose computer located near the portable, electronic device. In one embodiment, a cellular phone is attached to a non-wireless phone line. In one embodiment, the user configures the routing device to perform an action when the user's location becomes known to the routing device. In another embodiment, the user configures the routing device to perform an action when the user's location becomes unknown to the routing device. In one embodiment, the user configures the routing device to send an e-mail. In another embodiment, the user configures the routing device to update a web page.
  • System For Packet Filtering Of Data Packets At A Computer Network Interface

    view source
  • US Patent:
    58023208, Sep 1, 1998
  • Filed:
    May 18, 1995
  • Appl. No.:
    8/444351
  • Inventors:
    Geoffrey G. Baehr - Menlo Park CA
    William Danielson - Mountain View CA
    Thomas L. Lyon - Palo Alto CA
    Geoffrey Mulligan - Fremont CA
    Martin Patterson - Grenoble, FR
    Glenn C. Scott - Tehachapi CA
    Carolyn Turbyfill - Los Gatos CA
  • Assignee:
    Sun Microsystems, Inc. - Palo Alto CA
  • International Classification:
    G06F 1300
    G06F 15163
  • US Classification:
    39520079
  • Abstract:
    A system for screening data packets transmitted between a network to be protected, such as a private network, and another network, such as a public network. The system includes a dedicated computer with multiple (specifically, three) types of network ports: one connected to each of the private and public networks, and one connected to a proxy network that contains a predetermined number of the hosts and services, some of which may mirror a subset of those found on the private network. The proxy network is isolated from the private network, so it cannot be used as a jumping off point for intruders. Packets received at the screen (either into or out of a host in the private network) are filtered based upon their contents, state information and other criteria, including their source and destination, and actions are taken by the screen depending upon the determination of the filtering phase. The packets may be allowed through, with or without alteration of their data, IP (internet protocol) address, etc. , or they may be dropped, with or without an error message generated to the sender of the packet.

Youtube

Fireside Chat with Whitfield Diffie Moderator...

Fireside Chat with Whitfield Diffie, Winner, 2015 A.M. Turing Award (E...

  • Duration:
    18m 31s

Geoffrey Baehr, Almaz Capital, about SVOD2017

Geoffrey Baehr, Almaz Capital, about Silicon Valley Open Doors Confere...

  • Duration:
    1m 21s

PHD-2015 - Geoffrey Baehr, General Partner, A...

A short story about the most interesting projects in fund portfolio. W...

  • Duration:
    2m 56s

How In-Memory Computing Changes Everything

Moderator: Geoffrey Baehr, General Partner, Almaz Capital Partners IT ...

  • Duration:
    18m 47s

Building Bridges Across Seas and Continents |...

... Managing Partner, Sunrise Securities Corp, Israel Moderator: Geoff...

  • Duration:
    46m 55s

Dr. Baehr Movieguide reviews Elizabeth: The G...

Dr. Baehr Movieguide reviews Elizabeth: The Golden Age.

  • Duration:
    2m 10s

Plaxo

Geoffrey Baehr Photo 2

Geoffrey Baehr

view source

Get Report for Geoffrey G Baehr from Menlo Park, CA, age ~69
Control profile