Techniques for determining an upper bound on visual quality over a completed streaming session

    公开(公告)号:US10911513B2

    公开(公告)日:2021-02-02

    申请号:US16036600

    申请日:2018-07-16

    Applicant: NETFLIX, INC.

    Abstract: In various embodiments, a hindsight application computes a hindsight metric value for evaluation of a video rate selection algorithm. The hindsight application determines a first encoding option associated with a source chunk of a media title based on a network throughput trace and a buffer trellis. The hindsight application determines that the first encoding option is associated with a buffered duration range. The buffered duration range is also associated with a second encoding option that is stored in the buffer trellis. After determining that the first encoding option is associated with a higher visual quality than the second encoding option, the hindsight application stores the first encoding option instead of the second encoding option in the buffer trellis to generate a modified buffer trellis. Finally, the hindsight application computes a hindsight metric value associated with a sequence of encoded chunks of the media title based on the modified buffer trellis.

    ATTACK MITIGATION IN A PACKET-SWITCHED NETWORK

    公开(公告)号:US20210006590A1

    公开(公告)日:2021-01-07

    申请号:US16576556

    申请日:2019-09-19

    Applicant: Netflix, Inc.

    Inventor: Randall Stewart

    Abstract: The disclosed computer-implemented method includes applying transport protocol heuristics to selective acknowledgement (SACK) messages received at a network adapter from a network node. The transport protocol heuristics identify threshold values for operational functions that are performed when processing the SACK messages. The method further includes determining, by applying the transport protocol heuristics to the SACK messages received from the network node, that the threshold values for the transport protocol heuristics have been reached. In response to determining that the threshold values have been reached, the method includes identifying the network node as a security threat and taking remedial actions to mitigate the security threat. Various other methods, systems, and computer-readable media are also disclosed.

    Techniques for robustly predicting perceptual video quality

    公开(公告)号:US10827185B2

    公开(公告)日:2020-11-03

    申请号:US15207468

    申请日:2016-07-11

    Applicant: NETFLIX, Inc.

    Abstract: In various embodiments, a quality trainer trains a model that computes a value for a perceptual video quality metric for encoded video content. During a pre-training phase, the quality trainer partitions baseline values for metrics that describe baseline encoded video content into partitions based on genre. The quality trainer then performs cross-validation operations on the partitions to optimize hyperparameters associated with the model. Subsequently, during a training phase, the quality trainer performs training operations on the model that includes the optimized hyperparameters based on the baseline values for the metrics to generate a trained model. The trained model accurately tracks the video quality for the baseline encoded video content. Further, because the cross-validation operations minimize any potential overfitting, the trained model accurately and consistently predicts perceived video quality for non-baseline encoded video content across a wide range of genres.

    TECHNIQUES FOR INCREASING THE ISOLATION OF WORKLOADS WITHIN A MULTIPROCESSOR INSTANCE

    公开(公告)号:US20200341811A1

    公开(公告)日:2020-10-29

    申请号:US16393922

    申请日:2019-04-24

    Applicant: NETFLIX, INC.

    Abstract: In various embodiments, an isolation application determines processor assignment(s) based on a performance cost estimate. The performance cost estimate is associated with an estimated level of cache interference arising from executing a set of workloads on a set of processors. Subsequently, the isolation application configures at least one processor included in the set of processors to execute at least a portion of a first workload that is included in the set of workloads based on the processor assignment(s). Advantageously, because the isolation application generates the processor assignment(s) based on the performance cost estimate, the isolation application can reduce interference in a non-uniform memory access (NUMA) microprocessor instance.

    Detecting errors in the timing between subtitles and shot changes

    公开(公告)号:US10798271B2

    公开(公告)日:2020-10-06

    申请号:US15863772

    申请日:2018-01-05

    Applicant: NETFLIX, INC.

    Abstract: In various embodiments, a subtitle timing application detects timing errors between subtitles and shot changes. In operation, the subtitle timing application determines that a temporal edge associated with a subtitle does not satisfy a timing guideline based on a shot change. The shot change occurs within a sequence of frames of an audiovisual program. The subtitle timing application then determines a new temporal edge that satisfies the timing guideline relative to the shot change. Subsequently, the subtitle timing application causes a modification to a temporal location of the subtitle within the sequence of frames based on the new temporal edge. Advantageously, the modification to the subtitle improves a quality of a viewing experience for a viewer. Notably, by automatically detecting timing errors, the subtitle timing application facilitates proper and efficient re-scheduling of subtitles that are not optimally timed with shot changes.

    Techniques for advancing playback of interactive media titles in response to user selections

    公开(公告)号:US10771865B2

    公开(公告)日:2020-09-08

    申请号:US16273082

    申请日:2019-02-11

    Applicant: NETFLIX, INC.

    Inventor: Mark Watson

    Abstract: A playback application seamlessly advances playback of and interactive media title in response to user selections in a manner that minimizes latency and preserves user immersion in a narrative. The playback application buffers an interstitial segment included in the interactive media title and feeds portions of the interstitial segment to a media player only when those portions are needed for display. When the user selects an option displayed during the interstitial segment, the playback application begins buffering a subsequent media segment and stops feeding portions of the interstitial segment to the media player. The playback application starts feeding blocks of the subsequent media segment to the media player and then seamlessly advances playback to the subsequent media segment.

    Dynamic security testing
    598.
    发明授权

    公开(公告)号:US10769282B2

    公开(公告)日:2020-09-08

    申请号:US15997623

    申请日:2018-06-04

    Applicant: NETFLIX, INC.

    Abstract: A method and system for discovering and testing security assets is provided. Based on source definition data describing sources to monitor on the one or more computer networks, an example system scans the sources to identify security assets. The system analyses the security assets to identify characteristics of the server-based applications. The system stores database records describing the security assets and the identified characteristics. The system queries the database records to select, based at least on the identified characteristics, one or more target assets, from the security assets, on which to conduct one or more security tests. Responsive to selecting the one or more target assets, the system conducts the one or more security tests on the one or more target assets. The system identifies one or more security vulnerabilities at the one or more target assets based on the conducted one or more security tests.

    Techniques for warming up a node in a distributed data store

    公开(公告)号:US10749921B2

    公开(公告)日:2020-08-18

    申请号:US15379299

    申请日:2016-12-14

    Applicant: NETFLIX Inc.

    Abstract: In various embodiments, a node manager configures a “new” node as a replacement for an “unavailable” node that was previously included in a distributed data store. First, the node manager identifies a source node that stores client data that was also stored in the unavailable node. Subsequently, the node manager configures the new node to operate as a slave of the source node and streams the client data from the source node to the new node. Finally, the node manager configures the new node to operate as one of multiple masters nodes in the distributed data store. Advantageously, by configuring the node to implement a hybrid of a master-slave replication scheme and a master-master replication scheme, the node manager enables the distributed data store to process client requests without interruption while automatically restoring the previous level of redundancy provided by the distributed data store.

Patent Agency Ranking