FEATURE GENERATION FOR ONLINE/OFFLINE MACHINE LEARNING

    公开(公告)号:US20190394252A1

    公开(公告)日:2019-12-26

    申请号:US16557558

    申请日:2019-08-30

    Applicant: Netflix, Inc.

    Abstract: A system for utilizing models derived from offline historical data in online applications is provided. The system includes a processor and a memory storing machine-readable instructions for determining a set of contexts of the usage data, and for each of the contexts within the set of contexts, collecting service data from services supporting the media service and storing that service data in a database. The system performing an offline testing process by fetching service data for a defined context from the database, generating a first set of feature vectors based on the fetched service data, and providing the first set to a machine-learning module. The system performs an online testing process by fetching active service data from the services supporting the media streaming service, generating a second set of feature vectors based on the fetched active service data, and providing the second set to the machine-learning module.

    Network security system with remediation based on value of attacked assets

    公开(公告)号:US10511623B2

    公开(公告)日:2019-12-17

    申请号:US15146813

    申请日:2016-05-04

    Applicant: Netflix, Inc.

    Abstract: A data processing method comprising obtaining a plurality of computer network security threat feeds from two or more computer threat detection systems; based upon computer network attack information in the computer network security threat feeds, determining a threat score that represents a severity of an actual or suspected attack on a particular host in a computer network; obtaining an asset value for the particular host that indicates a worth of the particular host, and updating the threat score based upon the asset value; mapping the updated threat score to one of a plurality of remediation actions, wherein a first remediation action is mapped when the updated threat score is low and a second, different remediation action is mapped when the updated threat score is high; based upon the updated threat score and the mapping, selecting and automatically performing one of the plurality of remediation actions on the particular host; wherein the method is performed by one or more special-purpose computing devices.

    Techniques for efficiently accessing values spanning slabs of memory

    公开(公告)号:US10387077B2

    公开(公告)日:2019-08-20

    申请号:US15820407

    申请日:2017-11-21

    Applicant: NETFLIX, INC.

    Abstract: In various embodiments, a memory pool application implements composite arrays via a memory pool that includes a first slab and a second slab. First, the memory pool application assigns the first slab and the second slab to a composite array. The memory pool application then modifies a final data word included in the first slab to store a first portion of a specified value and a leading data word included in the second slab to store a second portion of the specified value. The memory pool application copies the second data word to a duplicate data word included in the first slab. Subsequently, the memory pool application performs an unaligned read operation on the first slab based on a specified offset to retrieve a first word stored in memory and extracts the specified value from the first word based on the specified offset and a specified number of bits.

    Automatic detection of preferences for subtitles and dubbing

    公开(公告)号:US10321174B1

    公开(公告)日:2019-06-11

    申请号:US15432311

    申请日:2017-02-14

    Applicant: NETFLIX, INC.

    Abstract: In an approach, a server computer receives a request from a client computer specifying particular content for a particular user, wherein the particular content is associated with an original audio language. In response to receiving the request, the server computer selects a preferred audio language and a preferred subtitle language for the particular content based on a particular record of a preference database. The server computer returns asset identifying data that the client computer uses to obtain a stream of the particular content using the preferred audio language and the preferred subtitle language from a content delivery network (CDN) or other asset location. The server computer receives a message from the client computer that identifies an presented audio language and a presented subtitle language that were presented to the particular user while the particular content streamed. In response to a determination that the presented audio language differs from the preferred audio language or that the presented subtitle language differs from the preferred subtitle language, the server computer updates the particular record in the preference database.

    Pre-buffering audio streams
    616.
    发明授权

    公开(公告)号:US10305947B2

    公开(公告)日:2019-05-28

    申请号:US15293738

    申请日:2016-10-14

    Applicant: Netflix Inc.

    Abstract: One embodiment of the present invention sets forth a technique for identifying and pre-buffering audio/video stream pairs. The method includes the steps of predictively identifying for pre-buffering at least one audio/video stream pair that may be selected for playback by a user subsequent to a currently playing audio/video stream pair, computing a first rate for pre-buffering an audio portion of the at least one audio/video stream pair and a second rate for pre-buffering a video portion of the at least one audio/video stream pair, downloading the audio portion at the first rate and downloading the video portion at the second rate, and storing the downloaded audio portion and the downloaded video portion in a content buffer.

    Efficient computer-implemented techniques for managing graphics memory

    公开(公告)号:US10268590B2

    公开(公告)日:2019-04-23

    申请号:US15049986

    申请日:2016-02-22

    Applicant: Netflix, Inc.

    Abstract: In an embodiment, a data processing method provides an improvement in efficient use of computer memory and comprises using a computer, creating in computer memory a glyph memory area that is configured to store a plurality of cached glyphs; using the computer, receiving a request from an application to use a particular glyph; in response to the request, determining whether the particular glyph is in the glyph memory area; in response to determining that the particular glyph is not in the glyph memory area: attempting to store a bitmap of the particular glyph to a next location in the glyph memory area; in response to determining that the next location is not available a first time, reclaiming space in the glyph memory area in an amount sufficient to store the bitmap; attempting a second time to store the bitmap in the next location in the glyph memory area; in response to determining that the next location is not available a second time, clearing the glyph memory area of all previously stored glyphs and storing the bitmap in the glyph memory area.

    Systems and methods for security and risk assessment and testing of applications

    公开(公告)号:US10262145B2

    公开(公告)日:2019-04-16

    申请号:US15706408

    申请日:2017-09-15

    Applicant: NetFlix, Inc.

    Abstract: Provided herein are systems and methods for monitoring and assessing the security and risk presented by applications deployed in a complex computing environment. An exemplary application security system an application security server having a processing device in communication with one or more storage systems and includes a security testing system with a plurality of security test modules. The test modules include a first module associated with a first application associated with one or more application instances configured to receive and transmit over a network. The processing device calculates a security risk score for the first application based on information about the first application, determines a security priority level associated with first application, the security priority level of the first application being based on the security risk score for the first application, and associates the security priority level of the first application with the first application in a database of application security information.

Patent Agency Ranking