Remove Benchmarking Remove Design Remove Games Remove Traffic
article thumbnail

Netflix at AWS re:Invent 2019

The Netflix TechBlog

Netflix delivers shows like Sacred Games, Stranger Things, Money Heist, and many more to more than 150 million subscribers across 190+ countries around the world. In this talk, we share how Netflix deploys systems to meet its demands, Ceph’s design for high availability, and results from our benchmarking.

AWS 100
article thumbnail

Netflix at AWS re:Invent 2019

The Netflix TechBlog

Netflix delivers shows like Sacred Games, Stranger Things, Money Heist, and many more to more than 150 million subscribers across 190+ countries around the world. In this talk, we share how Netflix deploys systems to meet its demands, Ceph’s design for high availability, and results from our benchmarking.

AWS 100
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

5.5 mm in 1.25 nanoseconds

Randon ASCII

That meant I started having regular meetings with the hardware engineers who were working with IBM on the CPU which gave me even more expertise on this CPU, which was critical in helping me discover a design flaw in one of its instructions , and in helping game developers master this finicky beast. I wrote a lot of benchmarks.

Cache 126
article thumbnail

Comparisons of Proxies for MySQL

Percona

When designing an architecture, many components need to be considered before deciding on the best solution. Brief summary This test highlights that HAProxy and ProxySQL can reach a level of connection higher than the slowest runner in the game (MySQL Router). MySQL Router was never in the game.

Games 123
article thumbnail

From Heavy Metal to Irrational Exuberance

ACM Sigarch

To be clear, these languages were not designed to be fast or space-efficient, but for ease of use. Unfortunately, languages like Python have proven resistant to efficient implementation, partly because of their design, and partly because of limitations imposed by the need to interop with C code. As Leiserson et al.

C++ 108
article thumbnail

CDN Web Application Firewall (WAF): Your Shield Against Online Threats

IO River

In technical terms, network-level firewalls regulate access by blocking or permitting traffic based on predefined rules. ‍At its core, WAF operates by adhering to a rulebook—a comprehensive list of conditions that dictate how to handle incoming web traffic. You've put new rules in place.

Traffic 52
article thumbnail

CDN Web Application Firewall (WAF): Your Shield Against Online Threats

IO River

In technical terms, network-level firewalls regulate access by blocking or permitting traffic based on predefined rules. At its core, WAF operates by adhering to a rulebook—a comprehensive list of conditions that dictate how to handle incoming web traffic. You've put new rules in place.

Traffic 40