Remove tag design-patterns-data-managment
article thumbnail

Machine Learning for Fraud Detection in Streaming Services

The Netflix TechBlog

Data analysis and machine learning techniques are great candidates to help secure large-scale streaming platforms. We present a systematic overview of the unexpected streaming behaviors together with a set of model-based and data-driven anomaly detection strategies to identify them.

C++ 312
article thumbnail

Timestone: Netflix’s High-Throughput, Low-Latency Priority Queueing System with Built-in Support…

The Netflix TechBlog

years, its usage has increased, and Timestone is now also the priority queueing engine backing Conductor , our general-purpose workflow orchestration engine, and BDP Scheduler , the scheduler for large-scale data pipelines. We then codify this prefix as a Redis hash tag. Over the past 2.5

Latency 212
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Global vs. Local Styling In Next.js

Smashing Magazine

to manage complex front-end projects. After working within the framework, I have found a series of organizational patterns that I believe both conform to the guiding philosophies of Next.js together to demonstrate these patterns. Design Tokens. CSS setup will be storing all site-wide values as design tokens.

Website 142
article thumbnail

Designing Better Links For Websites And Emails: A Guideline

Smashing Magazine

Designing Better Links For Websites And Emails: A Guideline. Designing Better Links For Websites And Emails: A Guideline. Besides embedding it into a meaningful phrase, you should also inform users about the file format and size: The format gives clues to what you can do with this data (e.g. Slava Shestopalov. Large preview ).

Website 141
article thumbnail

Are Imposter Domains Re-Publishing Your Website?

Smashing Magazine

Web scraping can be used to harvest marketing data, such as identifying good keywords for advertising campaigns, identifying trending topics for blog posts, or identifying influencers in important blogs and news sites. How can you identify, track, and manage this risk to your business? How To Track Suspicious Activity. More after jump!

Website 89
article thumbnail

Implementing A Reset Password Feature With Next.js Dynamic Routes

Smashing Magazine

We’re only picking a specific pattern of the authentication process: the “reset password” flow and how it can be implemented on the client-side — frontend — of a web application. With detailed code walkthroughs , hands-on examples and common gotchas — all broken down into short, manageable lessons. and the useRouter hook.

article thumbnail

Using JSONB in PostgreSQL: How to Effectively Store & Index JSON Data in PostgreSQL

Scalegrid

It is an open standard format which organizes data into key/value pairs and arrays detailed in RFC 7159. JSON is the most common format used by web services to exchange data, store documents, unstructured data, etc. You can also check out our Working with JSON Data in PostgreSQL vs. JSONB Patterns & Antipatterns.

Storage 321