Remove Architecture Remove Network Remove Software Engineering
article thumbnail

Designing Instagram

High Scalability

Architecture. FUN FACT : In this talk , Dikang Gu, a software engineer at Instagram core infra team has mentioned about how they use Cassandra to serve critical usecases, high scalability requirements, and some pain points. It’s apparent that the most important features for feed ranking will be related to social network.

Design 334
article thumbnail

Snap: a microkernel approach to host networking

The Morning Paper

Snap: a microkernel approach to host networking Marty et al., This paper describes the networking stack, Snap , that has been running in production at Google for the last three years+. You need a lot of software engineers and the willingness to rewrite a lot of software to entertain that idea. SOSP’19.

Network 92
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Site reliability done right: 5 SRE best practices that deliver on business objectives

Dynatrace

This shift is leading more organizations to hire site reliability engineers to guarantee the reliability and resiliency of their services. How site reliability engineering affects organizations’ bottom line SRE applies the disciplines of software engineering to infrastructure management, both on-premises and in the cloud.

article thumbnail

What is application security? And why it needs a new approach

Dynatrace

Application security is a software engineering term that refers to several different types of security practices designed to ensure applications do not contain vulnerabilities that could allow illicit access to sensitive data, unauthorized code modification, or resource hijacking. Dynatrace news. So, why is all this important?

article thumbnail

The Show Must Go On: Securing Netflix Studios At Scale

The Netflix TechBlog

Supporting developers through those checklists for edge cases, and then validating that each team’s choices resulted in an architecture with all the desired security properties, was similarly not scalable for our security engineers. With these lofty goals in mind, we turned to our central engineering teams to help get us there.

Internet 227
article thumbnail

Edge Authentication and Token-Agnostic Identity Propagation

The Netflix TechBlog

A few years ago, we decided to address this complexity by spinning up a new initiative, and eventually a new team, to move the complex handling of user and device authentication, and various security protocols and tokens, to the edge of the network, managed by a set of centralized services, and a single team. We are serving over 2.5

article thumbnail

Consistent caching mechanism in Titus Gateway

The Netflix TechBlog

The original assumptions and architectural choices were no longer viable. Overview The figure below depicts a simplified high-level architecture of a single Titus cluster (a.k.a As the number of Titus users increased over the years, the load and pressure on the system increased substantially.

Cache 233