article thumbnail

The Roots of Today's Modern Backend Engineering Practices

The Pragmatic Engineer

Backend code I wrote and pushed to prod took down Amazon.com for several hours. and hand-rolled C -code. To update code, we flipped a symlink ( a symbolic link is a file whose purpose is to point to a file or directory ) to swap between the code and HTML files contained in these directories.

article thumbnail

AVIF for Next-Generation Image Coding

Netflix Tech

The goal is to have the compressed image look as close to the original as possible while reducing the number of bytes required. Brief overview of image coding formats The JPEG format was introduced in 1992 and is widely popular. This is followed by quantization and entropy coding. Advanced Video Coding ( AVC ) format.

Coding 91
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Data Engineering Weekly #221

Data Engineering Weekly

Built for the AI era, Components offers compartmentalized code units with proper guardrails that prevent "AI slop" while supporting code generation. If you look at all the BI or UI-based ETL tools, the code is a black box for us, but we validate the outcome generated by the black-box.

article thumbnail

Life of a Netflix Partner Engineer?—?The case of extra 40 ms

Netflix Tech

Next I started reading the Ninja source code. I wanted to find the precise code that delivers the audio data. I recognized a lot, but I started to lose the plot in the playback code and I needed help. You can see three distinct behaviors in this chart: The two, tall spiky parts where the data rate reaches 500 bytes/ms.

Bytes 144
article thumbnail

Top 20+ Cyber Security Projects for 2023 [With Source Code]

Knowledge Hut

Source code 2. Source code 3. Source code 4. Source Code Cyber Security Final Year Projects 1. Source code 2. Source code 3. The project will focus on creating a user-friendly interface as a web / Desktop application and incorporating robust algorithms to assess password strength accurately.

Coding 98
article thumbnail

Separating debug symbols from executables

Tweag

In short, debug symbols are extra “stuff” in your intermediate object files — and ultimately in your executables — that help your debugger map the machine code being executed back into higher-level source code concepts like variables and functions. corresponds to which part of the source code (variables, functions, etc.).

Bytes 124
article thumbnail

A fine-grained network traffic analysis with Millisampler

Engineering at Meta

How it works: Millisampler comprises userspace code to schedule runs, store data, and serve data, and an eBPF-based tc filter that runs in the kernel to collect fine-timescale data. The user code attaches the tc filter and enables data collection. Millisampler collects a variety of metrics.

Bytes 126