Los Gatos, CA, United States
Los Gatos, CA, United States

Netflix, Inc. is a provider of on-demand Internet streaming media available to viewers in all of North America , South America and parts of Europe , and of flat rate DVD-by-mail in the United States, where mailed DVDs are sent via Permit Reply Mail. The company was established in 1997 and is headquartered in Los Gatos, California. It started its subscription-based service in 1999. By 2009, Netflix was offering a collection of 100,000 titles on DVD and had surpassed 10 million subscribers.As of September 2014, Netflix has subscribers in over 40 countries, with intentions of expanding their services in unreached countries .On February 25, 2007, Netflix delivered its billionth DVD. In April 2011, Netflix had 23.6 million subscribers in the United States and over 26 million worldwide. By 2011, the total digital revenue for Netflix reached at least $1.5 billion. On October 23, 2012, however, Netflix reported an 88% decline in third-quarter profits. In January 2013, Netflix reported that it had added two million U.S. customers during the fourth quarter of 2012 with a total of 27.1 million U.S. streaming customers, and 29.4 million total streaming customers. In addition, revenue was up 8% to $945 million for the same period.As of mid-March 2013, Netflix had 33 million subscribers. That number increased to 36.3 million subscribers in April 2013. As of September 2013, for that year's third quarter report, Netflix reported its total of global streaming subscribers at 40.4 million . By the fourth quarter of 2013, Netflix reported 33.1 million U.S. subscribers. By the second quarter of 2014, there were more than 50 million subscribers globally.On January 16, 2014, the nomination of The Square for an Academy Award became the first ever nomination for a Netflix original production. Wikipedia.

Time filter
Source Type

Netflix | Date: 2017-03-28

Approaches, techniques, and mechanisms are disclosed for implementing a distributed firewall. In an embodiment, many different computer assets police incoming messages based on local policy data. This local policy data is synchronized with global policy data. The global policy data is generated by one or more separate analyzers. Each analyzer has access to message logs, or information derived therefrom, for groups of computer assets, and is thus able to generate policies based on intelligence from an entire group as opposed to an isolated asset. Among other effects, some of the approaches, techniques, and mechanisms may be effective even in computing environments with limited supervision over the attack surface, and/or computing environments in which assets may need to make independent decisions with respect to how incoming messages should be handled, on account of latency and/or unreliability in connections to other system components.

A method and system for building a point-in-time snapshot of an eventually-consistent data store. The data store includes key-value pairs stored on a plurality of storage nodes. In one embodiment, the data store is implemented as an Apache Cassandra database running in the cloud. The data store includes a journaling mechanism that stores journals (i.e., inconsistent snapshots) of the data store on each node at various intervals. In Cassandra, these snapshots are sorted string tables that may be copied to a back-up storage location. A cluster of processing nodes may retrieve and resolve the inconsistent snapshots to generate a point-in-time snapshot of the data store corresponding to a lagging consistency point. In addition, the point-in-time snapshot may be updated as any new inconsistent snapshots are generated by the data store such that the lagging consistency point associated with the updated point-in-time snapshot is more recent.

In one approach, a controller computer performs a pre-processing phase involves applying automatic facial recognition, audio recognition, and/or object recognition to frames or static images of a media item to identify actors, music, locations, vehicles, and props or other items that are depicted in the program. The recognized data is used as the basis of queries to one or more data sources to obtain descriptive metadata about people, items, and places that have been recognized in the program. The resulting metadata is stored in a database in association with time point values indicating when the recognized things appeared in the particular program. Thereafter, when an end user plays the same program using a first- screen device, the stored metadata is downloaded to a second-screen device of the end user. When playback reaches the same time point values on the first-screen device, one or more windows, panels or other displays are formed on the second- screen device to display the metadata associated with those time point values.

In an approach, a server computer receives a request from a client computer specifying content for a user, wherein the content is associated with an original language. In response to receiving the request, the server computer selects a preferred audio language and a preferred subtitle language for the content based on a record of a database. The server computer returns data that the client computer uses to obtain the content using the preferred audio language and the preferred subtitle language from a content delivery network (CDN). The server computer receives a message from the client computer that identifies a presented audio language and a presented subtitle language that were presented to the user. In response to a determination that the presented audio language differs from the preferred audio language or that the presented subtitle language differs from the preferred subtitle language, the server computer updates the particular record.

One embodiment of the present invention sets forth a technique for managing playback of digital content on two or more different playback devices. A playback device designated as a controller is associated with a playback device designated as a playback target. Association is implemented via a local network discovery protocol. The controller issues commands to the target, which then streams digital content directly from a content server. The controller is able to separately stream related digital content for independent, but synchronized playback. Server mediated operations, such as device activation and application installation, are advantageously enabled by explicit association between the controller and the target.

Techniques for adaptive metric collection, metric storage, and alert thresholds are described. In an approach, a metric collector computer processes metrics as a collection of key/value pairs. The key/value pairs represent the dimensionality of the metrics and allows for semantic queries on the metrics based on keys. In an approach, a storage controller computer maintains a storage system with multiple storage tiers ranked by speed of access. The storage computer stores policy data that specifies the rules by which metric records are stored across the multiple storage tiers. Periodically, the storage computer moves database records to higher or lower tiers based on the policy data. In an approach, a metric collector in response to receiving a new metric, generates a predicted metric value based on previously recorded metric values and measures the deviation from the new metric value to determine whether an alert is appropriate.

A security application manages security and reliability of networked applications executing collection of interacting computing elements within a distributed computing architecture. The security application monitors various classes of resources utilized by the collection of nodes within the distributed computing architecture and determine whether utilization of a class of resources is approaching a pre-determined maximum limit. The security application performs a vulnerability scan of a networked application to determine whether the networked application is prone to a risk of intentional or inadvertent breach by an external application. The security application scans a distributed computing architecture for the existence of access control lists (ACLs), and stores ACL configurations and configuration changes in a database. The security application scans a distributed computing architecture for the existence of security certificates, places newly discovered security certificates in a database, and deletes outdated security certificates. Advantageously, security and reliability are improved in a distributed computing architecture.

One embodiment of the present invention sets forth a technique for displaying scenes included in media assets. The technique includes selecting a first scene included in a first video asset based on one or more preferences and metadata associated with multiple scenes. The first video asset is one of multiple video assets, and each scene included in the multiple scenes is included in one of the video assets included in the multiple video assets. The technique further includes displaying the first scene within a first portion of a display area.

Techniques are disclosed for reclaiming resources within a distributed computing system. A reclamation application searches the distributed computing architecture for unused resources, classifies the unused resources, and determines an expiration period based on the classification. The reclamation application determines a candidate owner of the resource based on one or more characteristics of the resource. The reclamation application then notifies the candidate owner that the resource is to be reclaimed unless claimed by the candidate owner within the expiration period. If the candidate owner claims the resource within the expiration period, then the reclamation application terminates the reclamation of the resource. If the candidate owner does not claim the resource within the expiration period, then the reclamation application reclaims the resource after the duration of the expiration period. Advantageously, this approach to reclaiming resources results in more efficient utilization of resources, lower operation and maintenance costs, and improved system security.

Netflix | Date: 2017-04-12

Techniques for selecting and ordering groups of titles to present as recommendations. In one embodiment, for example, a method performed by one or more computing devices of an online services comprises selecting, for each of a plurality of row positions, a group of titles to fill the row position based at least in part on a relevance score computed for the group of titles. The relevance score is based at least in part on a personalized ranking for a particular user of titles in the groups in titles selected to fill the row positions. The groups of titles selected to fill to the row positions are presented as recommendations to the particular user as a sequence of rows in which each row in the sequence corresponds to one of the selected groups of titles.

Loading Netflix collaborators
Loading Netflix collaborators