Relationship-based search and recommendations

    公开(公告)号:US09817827B2

    公开(公告)日:2017-11-14

    申请号:US13644318

    申请日:2012-10-04

    Applicant: NETFLIX Inc.

    CPC classification number: G06F17/30029

    Abstract: Techniques are described for determining relationships between user activities and determining search results and content recommendations based on the relationships. A plays-related-to-searches application may determine a relationship score between plays of a media title and searches of a query by determining a distance between a projection of the search onto the space of the users and a projection of plays of the media title onto the space of the users. A plays-after-searches application may determine a score for plays of the streaming media title given the search by multiplying a number of times plays of the media title occur after the query is entered by the number of times any play occurs, and dividing by a product of the number of times plays of the media title occur after any query is entered and the number of times plays of any media title occur after the query is entered.

    Systems and methods for security and risk assessment and testing of applications

    公开(公告)号:US09767291B2

    公开(公告)日:2017-09-19

    申请号:US14876354

    申请日:2015-10-06

    Applicant: NETFLIX, INC.

    CPC classification number: G06F21/577 G06F11/3688 G06Q10/0635 G06Q10/10

    Abstract: Provided herein are systems and methods for monitoring and assessing the security and risk presented by applications deployed in a complex computing environment. An exemplary application security system includes a server having a processing device in communication with storage systems, computing devices executing application instances configured to receive and transmit information over a network, and a security testing system including a first test module that is associated with a first application, which is associated with one or more of the application instances. The processing device of the server retrieves information about the first application, including current dependency information of the first application, calculates a security risk score for the first application based on the information, determines a security priority level associated with first application, and associates the security priority level of the first application with the first application in a database of application security information.

    Upstream fault detection
    647.
    发明授权

    公开(公告)号:US09680906B2

    公开(公告)日:2017-06-13

    申请号:US14584174

    申请日:2014-12-29

    Applicant: NETFLIX, INC.

    CPC classification number: H04L65/80 H04H20/12 H04H60/33 H04H60/66 H04L67/42

    Abstract: Techniques are described for detecting faults in media content based on the behavior of users viewing the media content. Embodiments stream a first instance of media content to one or more users. The behavior of the one or more users is monitored while the users are viewing the streaming first instance of media content. Embodiments then determine whether the first instance of media content is faulty, based on the monitored behavior of the one or more users.

    METHOD AND SYSTEM FOR RECLAIMING UNUSED RESOURCES IN A NETWORKED APPLICATION ENVIRONMENT

    公开(公告)号:US20170163556A1

    公开(公告)日:2017-06-08

    申请号:US15437407

    申请日:2017-02-20

    Applicant: NETFLIX, INC.

    Abstract: Techniques are disclosed for reclaiming resources within a distributed computing system. A reclamation application searches the distributed computing architecture for unused resources, classifies the unused resources, and determines an expiration period based on the classification. The reclamation application determines a candidate owner of the resource based on one or more characteristics of the resource. The reclamation application then notifies the candidate owner that the resource is to be reclaimed unless claimed by the candidate owner within the expiration period. If the candidate owner claims the resource within the expiration period, then the reclamation application terminates the reclamation of the resource. If the candidate owner does not claim the resource within the expiration period, then the reclamation application reclaims the resource after the duration of the expiration period. Advantageously, this approach to reclaiming resources results in more efficient utilization of resources, lower operation and maintenance costs, and improved system security.

    TECHNIQUES FOR DETERMINING CLIENT-SIDE EFFECTS OF SERVER-SIDE BEHAVIOR USING CANARY ANALYSIS

    公开(公告)号:US20170118110A1

    公开(公告)日:2017-04-27

    申请号:US14922101

    申请日:2015-10-23

    Applicant: NETFLIX, INC.

    CPC classification number: H04L45/42 G06F8/65 G06F11/368 H04L67/42

    Abstract: In one embodiment of the present invention, a sticky canary router routes each request associated with a service to either a canary cluster of servers that implement a modification to the service or a baseline cluster of servers that do not implement the modification. The sticky canary router implements a mapping algorithm that determines the routing of each request based on a current time, a time window for the routing, and a characteristic of the request. Notably, the mapping algorithm may be implemented such that, for time segments with duration equal to the time window, the sticky canary router routes all requests received from a particular device in a consistent fashion—either to the canary cluster or to a baseline cluster. Configured thusly, the sticky canary router enables the analysis of approximately full sections of client interactions with the canary servers, thereby facilitating identification of client-side effects of the changes.

    Distributed traffic management system and techniques

    公开(公告)号:US09621588B2

    公开(公告)日:2017-04-11

    申请号:US14495631

    申请日:2014-09-24

    Applicant: Netflix, Inc.

    Abstract: Approaches, techniques, and mechanisms are disclosed for implementing a distributed firewall. In an embodiment, many different computer assets police incoming messages based on local policy data. This local policy data is synchronized with global policy data. The global policy data is generated by one or more separate analyzers. Each analyzer has access to message logs, or information derived therefrom, for groups of computer assets, and is thus able to generate policies based on intelligence from an entire group as opposed to an isolated asset. Among other effects, some of the approaches, techniques, and mechanisms may be effective even in computing environments with limited supervision over the attack surface, and/or computing environments in which assets may need to make independent decisions with respect to how incoming messages should be handled, on account of latency and/or unreliability in connections to other system components.

Patent Agency Ranking