Remove Architecture Remove Presentation Remove Scalability Remove Tuning
article thumbnail

Why applying chaos engineering to data-intensive applications matters

Dynatrace

Stream processing One approach to such a challenging scenario is stream processing, a computing paradigm and software architectural style for data-intensive software systems that emerged to cope with requirements for near real-time processing of massive amounts of data. Flink is the best candidate when EOS guarantees are necessary.

article thumbnail

Growth Engineering at Netflix- Creating a Scalable Offers Platform

The Netflix TechBlog

In particular, we’ll define plans and offers, review the legacy architecture and some of its shortcomings, and dig into our new architecture and some of its advantages. When we merge these two concepts together and present them to the customer, we have the plan selection page (shown above).

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

AVA Discovery View: Surfacing Authentic Moments

The Netflix TechBlog

Watching every moment of content to find the best frames and select them manually takes a lot of time, and this approach is often not scalable. With the AVA Discovery View, all the prominent characters of the title and their best possible shots are presented to the creatives.

Media 169
article thumbnail

Rebuilding Netflix Video Processing Pipeline with Microservices

The Netflix TechBlog

This architecture shift greatly reduced the processing latency and increased system resiliency. Reloaded was well-architected, providing good stability, scalability, and a reasonable level of flexibility. Several promising ideas were abandoned owing to the outsized work needed to overcome architectural limitations.

article thumbnail

PostgreSQL Connection Pooling: Part 2 – PgBouncer

Scalegrid

It connects to PostgreSQL as a predefined user (whose password must be present in the userslist.txt file) and executes the auth-query to find the user’s password and matches it to the provided value. pgBouncer Architecture | Source. If it violates the max_client_connections restriction, it aborts the connection. And that is it!

Cache 246
article thumbnail

What is web application security? Everything you need to know.

Dynatrace

Before one can design an optimal security approach, it helps to understand what kinds of vulnerabilities are commonly present in web applications. Most common vulnerabilities commonly present in web applications. Positive filters are highly effective at blocking attacks but require constant tuning.

article thumbnail

Bulldozer: Batch Data Moving from Data Warehouse to Online Key-Value Stores

The Netflix TechBlog

At Netflix, we also heavily embrace a microservice architecture that emphasizes separation of concerns. For how our machine learning recommendation systems leverage our key-value stores, please see more details on this presentation. It leverages Netflix Scheduler for scheduling the Bulldozer Jobs. Moving data with Bulldozer at Netflix.

Latency 243