Spotify is a legal music streaming service available in Europe with over 10 million total users. It uses a peer-to-peer (P2P) network to supplement its servers for content delivery, reducing latency, costs, and improving availability. The P2P network employs techniques like caching, encryption, and obfuscation to provide a fast, secure experience for users. Analysis shows that 55.4% of content is served from local caches, 35.8% from peers, and 8.8% from Spotify servers, demonstrating the effectiveness of the P2P approach.
Ricardo Vice Santos discusses distributed, web-scale systems used at Spotify. He explains that Spotify uses a decentralized architecture with services that are decoupled and horizontally scalable. Key services are read-only for scalability and use techniques like DNS lookups, sharding via consistent hashing, and eventual consistency across replicas to distribute load. This allows Spotify to provide fast, reliable music streaming at a massive scale.
Spotify: Horizontal Scalability for Great SuccessNick Barkas
The document discusses Spotify's use of horizontal scalability to handle its large user and music catalog sizes. It describes how Spotify scales out by distributing work across separate services and handling shared data through techniques like sharding and eventual consistency. Key approaches Spotify uses include running multiple instances of each service, using load balancers to distribute requests, storing only necessary data in globally consistent databases, and implementing distributed hash tables for service discovery.
Spotify: Playing for millions, tuning for moreNick Barkas
Barcelona Developers Conference presentation by Nick Barkas and David Poblador i Garcia, 18 November 2011. How we manage a huge collection of servers and some of the technologies we use for building a scalable, high performance music streaming service.
2nd ICANN APAC-TWNIC Engagement Forum: DNS OblivionAPNIC
APNIC Chief Scientist Geoff Huston gives an overview of the complex many-layered model of DNS security, and a new emerging world of choices for protecting traffic, hiding queries, and the future trends in ISP provided, and independent third-party DNS services at the 2nd ICANN APAC-TWNIC Engagement Forum, held from 15 to 16 April 2021.
APNIC Product Manager, Registry Services George Michaelson present on why RPKI really matters at the 2nd ICANN APAC-TWNIC Engagement Forum, held from 15 to 16 April 2021.
PacNOG 29: Routing security is more than RPKIAPNIC
APNIC Chief Scientist presented on how much more there is to routing security than just RPKI at PacNOG 29, held online from 29 November to 9 December 2021.
Spotify is a legal music streaming service available in Europe with over 10 million total users. It uses a peer-to-peer (P2P) network to supplement its servers for content delivery, reducing latency, costs, and improving availability. The P2P network employs techniques like caching, encryption, and obfuscation to provide a fast, secure experience for users. Analysis shows that 55.4% of content is served from local caches, 35.8% from peers, and 8.8% from Spotify servers, demonstrating the effectiveness of the P2P approach.
Ricardo Vice Santos discusses distributed, web-scale systems used at Spotify. He explains that Spotify uses a decentralized architecture with services that are decoupled and horizontally scalable. Key services are read-only for scalability and use techniques like DNS lookups, sharding via consistent hashing, and eventual consistency across replicas to distribute load. This allows Spotify to provide fast, reliable music streaming at a massive scale.
Spotify: Horizontal Scalability for Great SuccessNick Barkas
The document discusses Spotify's use of horizontal scalability to handle its large user and music catalog sizes. It describes how Spotify scales out by distributing work across separate services and handling shared data through techniques like sharding and eventual consistency. Key approaches Spotify uses include running multiple instances of each service, using load balancers to distribute requests, storing only necessary data in globally consistent databases, and implementing distributed hash tables for service discovery.
Spotify: Playing for millions, tuning for moreNick Barkas
Barcelona Developers Conference presentation by Nick Barkas and David Poblador i Garcia, 18 November 2011. How we manage a huge collection of servers and some of the technologies we use for building a scalable, high performance music streaming service.
2nd ICANN APAC-TWNIC Engagement Forum: DNS OblivionAPNIC
APNIC Chief Scientist Geoff Huston gives an overview of the complex many-layered model of DNS security, and a new emerging world of choices for protecting traffic, hiding queries, and the future trends in ISP provided, and independent third-party DNS services at the 2nd ICANN APAC-TWNIC Engagement Forum, held from 15 to 16 April 2021.
APNIC Product Manager, Registry Services George Michaelson present on why RPKI really matters at the 2nd ICANN APAC-TWNIC Engagement Forum, held from 15 to 16 April 2021.
PacNOG 29: Routing security is more than RPKIAPNIC
APNIC Chief Scientist presented on how much more there is to routing security than just RPKI at PacNOG 29, held online from 29 November to 9 December 2021.
Tech Talks @Rosenstraße discussed SPDY, a new protocol developed by Google to make web content delivery faster and more efficient than HTTP. SPDY uses many of HTTP's foundations but adds features like compression, multiplexing, and prioritization to reduce page load times. It is built on top of SSL for security and takes advantage of SSL's widespread support in firewalls. While still a draft, SPDY has shown promise in reducing page load times in tests. The talk covered the technical details of how SPDY works and potential issues like a lack of debugging tools.
APRICOT 2015 - NetConf for Peering AutomationTom Paseka
Netconf can be used for automating peering configuration by programmatically generating and pushing XML configuration templates. This avoids manual configuration which is prone to human error. Basic scripts can pull peer details from sources like PeeringDB and generate configuration for groups like BGP neighbors, then use Netconf handlers to validate and push the changes. More advanced automation could integrate peering workflow and status monitoring. Netconf provides an API to generate validated configuration at scale for peering automation compared to traditional manual methods.
Layer 7 denial of services attack mitigationAmmar WK
This document discusses layer 7 denial of service attacks and mitigation techniques. It describes how layer 7 attacks target application layer protocols like HTTP and FTP to overwhelm servers. The document then provides an example of an HTTP flood attack against a website and the steps taken to analyze logs and implement mitigation like rate limiting, timeouts, and firewall rules. Effective mitigation requires identifying attacks, hardening servers, and contacting authorities.
What every successful open source project needsSteven Francia
In the last few years open source has transformed the software industry. From Android to Wikipedia, open source is everywhere, but how does one succeed in it? While open source projects come in all shapes and sizes and all forms of governance, no matter what kind of project you’re a part of, there are a set of fundamentals that lead to success. I’d like to share some of the lessons I’ve learned from running two of the largest commercial open source projects, Docker and MongoDB, as well as some very successful community projects.
This presentation was delievered at sinfo.org in Feb 2015.
BSides: BGP Hijacking and Secure Internet RoutingAPNIC
The document provides an introduction to internet routing, BGP hijacking, and the Resource Public Key Infrastructure (RPKI) system for securing internet routing. It discusses how BGP works and how hijacks can occur when more specific routes are announced. The document then summarizes the RPKI framework for validating route origins using Route Origin Authorizations (ROAs) and filtering routes based on their validation state. It provides examples of implementing RPKI on routers to help secure internet routing.
This document discusses open recursive DNS resolvers and the security issues they pose. It notes that while recursive resolvers are meant to cache and deliver DNS queries, many are not properly secured, allowing them to be abused for large reflection attacks. These attacks work by spoofing the source IP address of the victim in queries to open resolvers, which then send much larger responses to the victim, amplifying the attack traffic. The document shows that open resolvers come from networks all over the world and urges securing resolvers by filtering source addresses and disabling insecure recursive features.
Mr. Olsen delivered a presentation about the changes that he implemented during the COVID-19 crisis of 2020. The presentation outlines general change management practices as well as the key changes that he implemented during the "stay-at-home" guidelines imposed by the Illinois state government.
This document summarizes Tomas Doran's talk about his new Message::Passing Perl library for messaging, interoperability, and log aggregation. The library provides a framework for passing messages between different messaging systems and protocols. It uses a simple model where inputs produce events as hashes, outputs consume events, and filters can both produce and consume events. The core distribution includes roles for common inputs, outputs, and filters. Adaptors in separate modules provide connectivity to protocols like ZeroMQ, AMQP, STOMP, Elasticsearch, Redis PubSub, Syslog, MongoDB, and others. The goal is to simplify building complex message processing chains across different systems. Examples are provided to illustrate passing messages between protocols.
This document summarizes radio listenership data from Absolute Radio and other stations over multiple quarters. It shows that Absolute Radio's reach was steady after a 14% increase last quarter, while its listening hours were slightly down. National radio saw Classic FM's reach increase 6% and in London, Capital FM became the number 2 commercial station with a 4% reach increase. Overall radio listening continues to increase, with more people listening to radio than ever before.
A presentation for the International Media Forum at the Public Broadcasting Corporation of the Kyrgyz Republic dedicated to the 85th anniversary of the Kyrgyz Radio
- Absolute Radio's listening hours were up 1.7% overall in Q4 2009 compared to Q3 2009, and up 5.5% in London. Total hours were 6,833.
- Absolute Radio's reach was down 7.3% in Q4 2009 compared to Q3 2009. Total reach was 803,000.
- Absolute Radio's digital listening, primarily via DAB and online, was 32% of its total listening, up from 24.8% in 2009. Its podcast downloads set a new record in December 2009.
The document discusses PeerSim, an open source simulation engine for peer-to-peer networks. PeerSim allows modeling of network protocols with up to 1 million nodes and has two simulation modes: event-driven and cycle-driven. The document then describes using PeerSim to create protocols for finding the minimum and maximum values in a network, including implementing MaxFunction and MinFunction classes, observer classes, and configuration files to test the protocols.
Absolute Radio is a 15 year old, 36 year old branded radio station in the UK purchased by Bennett Coleman & Co in 2008. It has a weekly reach of over 47,000 listeners and is focusing on growing its digital presence through various online and mobile platforms like podcasting, streaming, and applications. This includes using social media like Twitter to engage listeners and drive online traffic to its website and digital platforms. The presentation outlines Absolute Radio's strategy to transition to being a digital and mobile media company while maintaining its core radio business.
This document summarizes radio listening trends in the UK. It shows that Absolute Radio's reach was steady after a 14% increase last quarter, while its station hours were slightly down. It also shows that Classic FM's national reach was up 6% and Capital FM has become the number 2 commercial station in London with a 4% reach increase. Overall radio listening continues to increase, with more people listening to radio than ever before.
Social Media is a human p2p network. And Uber and AirBnb are the Napster of t...Xavier Damman
Quick presentation made with Noah Brier at the Global Council on Social Media at the World Economic Forum in Dubai, November 2014.
It's a bit cryptic without the presenter's notes. The general story goes like this:
Social Media is in fact the human usable version of p2p networks. We've seen already those networks at work disrupting the music industry with Napster. Incumbents first ignored it, then fought it by suing people downloading songs of Madonna in their garage, then more subtly by introducing songs on the networks with blips and other flaws. Then eventually, we got what we wanted, all the songs available to us with Spotify.
Thanks to mobile phones, p2p networks are now connecting people and allow new disruptions. Uber and Airbnb are the Napster of the cabs and hotel industry. Protests in Hong Kong and Hungary are also enabled by people who have (literally) the power in their hands.
What are the fundamentals of p2p networks?
They don't have borders, they are now happening on mobile devices and they are platforms for exchange of information, they don't provide information per se, they empower their users to exchange some sort of information. As such, they scale very well without borders.
The question is how can BI (Before Internet) companies leverage those networks instead of wasting their energy fighting them.
There are probably a lot to learn from what happened between Napster and Spotify that could apply to many other industries and institutions.
This document discusses the future of radio in the Middle East. It outlines how new trends like streaming services, podcasts, and personalized radio are shifting listeners' expectations and behaviors. Radio must adapt to staying relevant to younger generations who want control over what they listen to, when, and on which devices. The Middle East has high rates of internet and mobile usage growth, presenting opportunities for radio to engage audiences online and through new platforms and business models beyond traditional FM broadcasts.
This document summarizes a presentation given by Indra Utoyo from PT Telekomunikasi Indonesia about the future of radio. It discusses how radio needs to change and adapt to new technologies like streaming, podcasting, and social media to remain relevant. It outlines key features for radio 2.0, including live streaming, contextual podcasting, social marketing, and multi-device access. It also discusses how radio businesses can innovate their models and services to grow revenue by 600% over 5 years through technology innovations and new business processes and models. PT Telekomunikasi Indonesia aims to support the transformation of the radio industry in Indonesia.
The document discusses trends in radio listening in the UK based on data from RAJAR (Radio Joint Audience Research). It provides charts showing declines in radio reach and hours among younger listeners aged 15-24 since the early 2000s, as well as increases in listening among older age groups such as those aged 55+. The document also examines the dominance of BBC Radio 2 in terms of its large reach and hours of up to 16 million and 14 million respectively.
The document discusses future scenarios for broadcast spectrum use and technologies. It outlines possibilities for digital television and radio services, including full analog to digital transition or hybrid models. New services like mobile TV and radio are also discussed. The spectrum could be shared between broadcast services and other wireless technologies to provide broadband access. Overall broadcasting is expected to continue evolving to distribute multimedia content across various platforms and devices.
The document contains charts and graphs showing statistics about Absolute Radio's traffic and engagement across various digital platforms from November 2009 to July 2010. The charts show Absolute Radio's traffic from different browsers and mobile devices, its traffic from search engines like Google, growth in YouTube views and search terms, and Google Listen's small share of podcast downloads.
Fjord CEO Olof Schybergson spoke at Marketforce's Future of Broadcasting conference in London in June 2011 on the changing media landscape. Learn more about Fjord at www.fjordnet.com. Follow us on Twitter @fjord
Tech Talks @Rosenstraße discussed SPDY, a new protocol developed by Google to make web content delivery faster and more efficient than HTTP. SPDY uses many of HTTP's foundations but adds features like compression, multiplexing, and prioritization to reduce page load times. It is built on top of SSL for security and takes advantage of SSL's widespread support in firewalls. While still a draft, SPDY has shown promise in reducing page load times in tests. The talk covered the technical details of how SPDY works and potential issues like a lack of debugging tools.
APRICOT 2015 - NetConf for Peering AutomationTom Paseka
Netconf can be used for automating peering configuration by programmatically generating and pushing XML configuration templates. This avoids manual configuration which is prone to human error. Basic scripts can pull peer details from sources like PeeringDB and generate configuration for groups like BGP neighbors, then use Netconf handlers to validate and push the changes. More advanced automation could integrate peering workflow and status monitoring. Netconf provides an API to generate validated configuration at scale for peering automation compared to traditional manual methods.
Layer 7 denial of services attack mitigationAmmar WK
This document discusses layer 7 denial of service attacks and mitigation techniques. It describes how layer 7 attacks target application layer protocols like HTTP and FTP to overwhelm servers. The document then provides an example of an HTTP flood attack against a website and the steps taken to analyze logs and implement mitigation like rate limiting, timeouts, and firewall rules. Effective mitigation requires identifying attacks, hardening servers, and contacting authorities.
What every successful open source project needsSteven Francia
In the last few years open source has transformed the software industry. From Android to Wikipedia, open source is everywhere, but how does one succeed in it? While open source projects come in all shapes and sizes and all forms of governance, no matter what kind of project you’re a part of, there are a set of fundamentals that lead to success. I’d like to share some of the lessons I’ve learned from running two of the largest commercial open source projects, Docker and MongoDB, as well as some very successful community projects.
This presentation was delievered at sinfo.org in Feb 2015.
BSides: BGP Hijacking and Secure Internet RoutingAPNIC
The document provides an introduction to internet routing, BGP hijacking, and the Resource Public Key Infrastructure (RPKI) system for securing internet routing. It discusses how BGP works and how hijacks can occur when more specific routes are announced. The document then summarizes the RPKI framework for validating route origins using Route Origin Authorizations (ROAs) and filtering routes based on their validation state. It provides examples of implementing RPKI on routers to help secure internet routing.
This document discusses open recursive DNS resolvers and the security issues they pose. It notes that while recursive resolvers are meant to cache and deliver DNS queries, many are not properly secured, allowing them to be abused for large reflection attacks. These attacks work by spoofing the source IP address of the victim in queries to open resolvers, which then send much larger responses to the victim, amplifying the attack traffic. The document shows that open resolvers come from networks all over the world and urges securing resolvers by filtering source addresses and disabling insecure recursive features.
Mr. Olsen delivered a presentation about the changes that he implemented during the COVID-19 crisis of 2020. The presentation outlines general change management practices as well as the key changes that he implemented during the "stay-at-home" guidelines imposed by the Illinois state government.
This document summarizes Tomas Doran's talk about his new Message::Passing Perl library for messaging, interoperability, and log aggregation. The library provides a framework for passing messages between different messaging systems and protocols. It uses a simple model where inputs produce events as hashes, outputs consume events, and filters can both produce and consume events. The core distribution includes roles for common inputs, outputs, and filters. Adaptors in separate modules provide connectivity to protocols like ZeroMQ, AMQP, STOMP, Elasticsearch, Redis PubSub, Syslog, MongoDB, and others. The goal is to simplify building complex message processing chains across different systems. Examples are provided to illustrate passing messages between protocols.
This document summarizes radio listenership data from Absolute Radio and other stations over multiple quarters. It shows that Absolute Radio's reach was steady after a 14% increase last quarter, while its listening hours were slightly down. National radio saw Classic FM's reach increase 6% and in London, Capital FM became the number 2 commercial station with a 4% reach increase. Overall radio listening continues to increase, with more people listening to radio than ever before.
A presentation for the International Media Forum at the Public Broadcasting Corporation of the Kyrgyz Republic dedicated to the 85th anniversary of the Kyrgyz Radio
- Absolute Radio's listening hours were up 1.7% overall in Q4 2009 compared to Q3 2009, and up 5.5% in London. Total hours were 6,833.
- Absolute Radio's reach was down 7.3% in Q4 2009 compared to Q3 2009. Total reach was 803,000.
- Absolute Radio's digital listening, primarily via DAB and online, was 32% of its total listening, up from 24.8% in 2009. Its podcast downloads set a new record in December 2009.
The document discusses PeerSim, an open source simulation engine for peer-to-peer networks. PeerSim allows modeling of network protocols with up to 1 million nodes and has two simulation modes: event-driven and cycle-driven. The document then describes using PeerSim to create protocols for finding the minimum and maximum values in a network, including implementing MaxFunction and MinFunction classes, observer classes, and configuration files to test the protocols.
Absolute Radio is a 15 year old, 36 year old branded radio station in the UK purchased by Bennett Coleman & Co in 2008. It has a weekly reach of over 47,000 listeners and is focusing on growing its digital presence through various online and mobile platforms like podcasting, streaming, and applications. This includes using social media like Twitter to engage listeners and drive online traffic to its website and digital platforms. The presentation outlines Absolute Radio's strategy to transition to being a digital and mobile media company while maintaining its core radio business.
This document summarizes radio listening trends in the UK. It shows that Absolute Radio's reach was steady after a 14% increase last quarter, while its station hours were slightly down. It also shows that Classic FM's national reach was up 6% and Capital FM has become the number 2 commercial station in London with a 4% reach increase. Overall radio listening continues to increase, with more people listening to radio than ever before.
Social Media is a human p2p network. And Uber and AirBnb are the Napster of t...Xavier Damman
Quick presentation made with Noah Brier at the Global Council on Social Media at the World Economic Forum in Dubai, November 2014.
It's a bit cryptic without the presenter's notes. The general story goes like this:
Social Media is in fact the human usable version of p2p networks. We've seen already those networks at work disrupting the music industry with Napster. Incumbents first ignored it, then fought it by suing people downloading songs of Madonna in their garage, then more subtly by introducing songs on the networks with blips and other flaws. Then eventually, we got what we wanted, all the songs available to us with Spotify.
Thanks to mobile phones, p2p networks are now connecting people and allow new disruptions. Uber and Airbnb are the Napster of the cabs and hotel industry. Protests in Hong Kong and Hungary are also enabled by people who have (literally) the power in their hands.
What are the fundamentals of p2p networks?
They don't have borders, they are now happening on mobile devices and they are platforms for exchange of information, they don't provide information per se, they empower their users to exchange some sort of information. As such, they scale very well without borders.
The question is how can BI (Before Internet) companies leverage those networks instead of wasting their energy fighting them.
There are probably a lot to learn from what happened between Napster and Spotify that could apply to many other industries and institutions.
This document discusses the future of radio in the Middle East. It outlines how new trends like streaming services, podcasts, and personalized radio are shifting listeners' expectations and behaviors. Radio must adapt to staying relevant to younger generations who want control over what they listen to, when, and on which devices. The Middle East has high rates of internet and mobile usage growth, presenting opportunities for radio to engage audiences online and through new platforms and business models beyond traditional FM broadcasts.
This document summarizes a presentation given by Indra Utoyo from PT Telekomunikasi Indonesia about the future of radio. It discusses how radio needs to change and adapt to new technologies like streaming, podcasting, and social media to remain relevant. It outlines key features for radio 2.0, including live streaming, contextual podcasting, social marketing, and multi-device access. It also discusses how radio businesses can innovate their models and services to grow revenue by 600% over 5 years through technology innovations and new business processes and models. PT Telekomunikasi Indonesia aims to support the transformation of the radio industry in Indonesia.
The document discusses trends in radio listening in the UK based on data from RAJAR (Radio Joint Audience Research). It provides charts showing declines in radio reach and hours among younger listeners aged 15-24 since the early 2000s, as well as increases in listening among older age groups such as those aged 55+. The document also examines the dominance of BBC Radio 2 in terms of its large reach and hours of up to 16 million and 14 million respectively.
The document discusses future scenarios for broadcast spectrum use and technologies. It outlines possibilities for digital television and radio services, including full analog to digital transition or hybrid models. New services like mobile TV and radio are also discussed. The spectrum could be shared between broadcast services and other wireless technologies to provide broadband access. Overall broadcasting is expected to continue evolving to distribute multimedia content across various platforms and devices.
The document contains charts and graphs showing statistics about Absolute Radio's traffic and engagement across various digital platforms from November 2009 to July 2010. The charts show Absolute Radio's traffic from different browsers and mobile devices, its traffic from search engines like Google, growth in YouTube views and search terms, and Google Listen's small share of podcast downloads.
Fjord CEO Olof Schybergson spoke at Marketforce's Future of Broadcasting conference in London in June 2011 on the changing media landscape. Learn more about Fjord at www.fjordnet.com. Follow us on Twitter @fjord
This document provides a history of Absolute Radio from its origins in 1993 as Virgin Radio through its various ownership changes. It discusses how Absolute Radio listeners engage with the station through various digital platforms like DAB and online. It also outlines Absolute Radio's strategy of providing a wide-ranging playlist with live sessions and no repeats to attract listeners, as well as their community involvement and marketing through online, outdoor, and events.
The Future of Radio and Broadcasting (Gerd Leonhard, The Futures Agency)Gerd Leonhard
Gerd Leonhard discusses the future of radio in a presentation. He notes that ubiquitous broadband connectivity and powerful, cheap smartphones are changing media consumption habits quickly. Digital content is increasingly accessed via streaming rather than downloads. This will impact what radio means as mobile devices and tablets also function as radios. Broadcast culture is shifting to broadband culture, allowing limitless personalized choice anywhere via services like Pandora. Radio must add interactive and on-demand features to archives to remain relevant as social networks also become broadcasters. Selection, relevance and context will be more important than access alone for radio to succeed in the future.
This document discusses copyright issues related to internet radio. It covers the different types of musical copyrights - sound recordings and musical compositions. It explains the exclusive rights copyright holders have, including reproduction, distribution, public performance, and digital audio transmission. It discusses the different types of licenses - compulsory and non-compulsory - and how interactive and non-interactive services are defined. It notes the challenges internet radio services face with high royalty rates and how this impacts their business models.
2020 global digital transformation communicasia Gerd Leonhard Futurist Speake...Gerd Leonhard
This document discusses global digital transformation over the next 5 years. Key points include:
- Exponential increases in connectivity, data, intelligence, and the convergence of man and machine through intelligent digital assistants.
- Technology is developing exponentially while humans remain linear, raising questions around who will control and regulate emerging technologies.
- As everything becomes connected, security, standards, ethics and rules will be crucial to address issues like addiction, privacy and the control of emerging technologies.
- Embracing technology while maintaining human values and purpose will be important for responsible transformation.
The future of marketing, advertising and the Internet: Futurist Speaker Gerd ...Gerd Leonhard
A collection of themes and memes from my most recent keynotes on marketing, branding, advertising and the internet, see http://www.gerdtube.com for videos and http://www.gerd.io for all other links
News Media 2017: Trends & Forecasts in headlines Tatiana Repkova
Enjoy the third annual digest of the Media Managers Club online database!
Content:
1) Digital, online, mobile and social media trends
2) Newspaper trends
3) Magazine trends
4) Broadcasting trends
5) Future of the news and journalism, industry forecasts
The online database at mediamanagersclub.org is searchable by more than 600 subtopics, 234 countries and territories, by geographical and political regions, and time periods (full data for years 2012-2016).
Technology vs Humanity: key themes from Futurist Gerd Leonhard's new bookGerd Leonhard
The document discusses the benefits of exercise for mental health. Regular physical activity can help reduce anxiety and depression and improve mood and cognitive function. Exercise causes chemical changes in the brain that may help alleviate symptoms of mental illness and boost overall mental well-being.
Talk on Spotify: Large Scale, Low Latency, P2P Music-on-Demand StreamingSameera Horawalavithana
This document summarizes a presentation on Spotify's large-scale, low-latency peer-to-peer music streaming system. Spotify uses a hybrid client-server and P2P approach to stream over 8 million tracks to 24 million users. The key aspects covered include Spotify's custom protocol, unstructured P2P overlay, and evaluation of the system's performance based on real data. Evaluation results showed median playback latencies of 265ms, stutter rates below 1%, and that the system was able to efficiently locate peers and was not severely impacted by client churn.
P2P systems utilize the resources of nodes at the edge of the internet in a decentralized way. Each node acts as both a client and server. An overlay network forms the virtual connections between peers. Structured overlays arrange peers in a restrictive structure to enable efficient lookup, while unstructured overlays connect peers randomly. Popular applications include file sharing with BitTorrent maximizing bandwidth usage, and communications with Skype utilizing direct peer connections. Management of these dynamic networks under high churn is an ongoing challenge.
Presentation from October 2010:
As a method for quick and efficient sharing of files, many computer users have turned towards P2P applications to obtain information and media that they require at home and on the job. With transmissions occurring over non-HTTP connections, even many technically savvy users don't realize just how easily their downloads and habits can be tracked and monitored across a network. This technical talk will delve into the network and file system forensic artifacts of P2P applications, focusing more towards BitTorrent but also including other relevant protocols. It will show what artifacts are left behind, and how some can be hidden away by knowledgeable users. It will also cover many of the new legal challenges that P2P users face and some of the newest protocol implementations created to bypass these legal restrictions. This information is focused towards forensics examiners and network administrators that wish to mitigate the risks of P2P communications, though the information is appropriate for all audiences and skill levels. This is a similar talk to one given at the DoD Cyber Crime Conference, GFIRST, and in briefings to the U.S. DoJ and various law enforcement agencies, though recreated for BSides Delaware.
PeerShark - Detecting Peer-to-Peer Botnets by Tracking ConversationsPratik Narang
This document describes PeerShark, a system for detecting peer-to-peer botnets by tracking conversations on a network. It analyzes network traffic to identify conversations between IP addresses and aggregates them to detect long, stealthy botnet conversations despite variations in protocols and ports. PeerShark extracts features from conversations like duration, packet count, volume, and inter-arrival times. It then classifies conversations as benign peer-to-peer applications or malicious botnets using machine learning. When tested on real peer-to-peer application and botnet traffic, PeerShark achieved over 95% accuracy on average at detecting botnets.
ProjectTox: Free as in freedom Skype replacementWei-Ning Huang
ProjectTox is a decentralized, end-to-end encrypted messaging network that aims to provide a free and secure alternative to Skype. It uses a distributed hash table and end-to-end encryption to allow communication without a centralized server. The core supports text, file transfers, group chat, and audio/video calls between two users. Several clients have been developed including Toxic for the command line and PyTox which provides full audio/video support through Python bindings. The developer demonstrated PyTox's new audio/video functionality and encouraged participants to join the project on GitHub or its wiki.
Slides from a talk I gave at Scandinavian Developers Conference 2012 on the architecture of Spotify. The slides follows a story of playing a track and the steps to get there.
This document provides an overview of video formats and streaming options. It discusses:
- Video is made up of different frame types including I-frames, which are reference frames, and P/B-frames, which are predicted frames expressed through motion vectors and coefficients.
- Common video container formats include MP4, MKV and QuickTime, while common video formats are MPEG2 and H264. Audio formats include AAC and MP3.
- TCP streaming can add latency as packets are buffered and require confirmation, while dropped packets can cause buffering. UDP is better for low-latency applications as it is less reliable but does not buffer packets.
- Streaming options include HLS for on-
BitTorrent is a peer-to-peer file sharing protocol that accounts for 43-70% of internet traffic. It was designed in 2001 by Bram Cohen and allows users to download large files quickly and efficiently by breaking them into pieces that are downloaded simultaneously from multiple sources. A BitTorrent transfer involves a torrent file that contains metadata about the file pieces, peers known as seeds that have the full file, and leechers still downloading. A tracker assists in communication between peers in the swarm.
Torrent is a protocol that allows users to download large files quickly using minimal bandwidth by connecting to other computers simultaneously downloading or sharing the same file. It works by using a tracker to identify the "swarm" of connected computers that have pieces of the requested file, and the torrent client software trades pieces with others in the swarm. This decentralized process means torrent downloads can be faster even on slow internet connections compared to traditional downloading. However, it requires at least one computer continuing to share the full file as a "seeder" in order for the download to work.
Slides for the 60 minutes "part 2" Janus workshop I presented at the virtual edition of ClueCon 2021. This time the slides covered Janus ability to bridge WebRTC and non-WebRTC applications to do interesting things, especially with the help of plain RTP and RTP forwarders. Check the conference recordings to see the actual demos in action.
Slides for the presentation I made at ClueCon 21 on the experimental RED support in WebRTC, and how we've started tinkering with it in Janus. The presentation also addresses a more generic overview on audio features in WebRTC.
BitTorrent is a peer-to-peer file sharing protocol that is commonly used to distribute large files over the Internet. It addresses limitations of traditional client-server models by utilizing the uploading bandwidth of peers that have already downloaded parts of a file. The key aspects of BitTorrent include dividing files into pieces, incentivizing contribution through a tit-for-tat approach, and encouraging diversity in content exchange through a rarest-first piece selection strategy. While BitTorrent has enabled widespread distribution of content, it also relies on trackers and can experience performance issues when interest in files declines.
The document summarizes the BitTorrent protocol. It describes how peer-to-peer networks allow computers to pool resources for content distribution without a central point of control. It then explains that BitTorrent was developed in 2001 as a protocol for quick file sharing among peers. The key aspects covered are how torrent files allow peers to find content and verify integrity, how trackers maintain lists of peers sharing content, and how the protocol encourages uploading through rewarding peers with high download performance.
This document discusses the history and evolution of peer-to-peer (P2P) file sharing networks. It begins with an overview of P2P networks and how they differ from single-server models by allowing files to be transferred directly between clients. It then covers some key P2P platforms like Napster, KaZaa, and BitTorrent. The document analyzes the legal challenges faced by early P2P services and discusses how the music industry has attempted to curb illegal file sharing. Finally, it poses several questions about P2P networks and their impact on business models and social issues.
Just a few slides to talk about the first efforts on JamRTC, a native application based on GStreamer to do live jam sessions using WebRTC and Janus as an SFU. Mostly an overview of the initial architecture, with questions at the end to figure out if the approach is right or not, how to minimize latency, etc.
This document discusses peer-to-peer networks and the BitTorrent protocol. It describes how peer-to-peer networks allow clients to act as both servers and clients by sharing resources directly without a central server. It then explains key aspects of BitTorrent, including that it was created by Bram Cohen in 2003 as a P2P file transfer protocol for large file sharing where all users actively participate. The document also defines terms like torrent files, trackers, swarms, peers, leechers and seeders that are important components of how the BitTorrent protocol functions.
This slide deck was used for a 2-day short course at IIT Gandhinagar in Spring 2015. Being a 2-day course, it focuses more on a qualitative description of how we access the Internet.
This document discusses peer-to-peer (P2P) networks and file sharing. It defines P2P networks as connections between computers that share resources without a separate server. P2P networks allow each connected computer to act as both a client and file server. BitTorrent is introduced as a popular P2P protocol for large file sharing. Advantages of P2P networks include lower costs since no central server is needed, while disadvantages include security and copyright issues with some shared files.
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
Digital Marketing Trends in 2024 | Guide for Staying AheadWask
https://www.wask.co/ebooks/digital-marketing-trends-in-2024
Feeling lost in the digital marketing whirlwind of 2024? Technology is changing, consumer habits are evolving, and staying ahead of the curve feels like a never-ending pursuit. This e-book is your compass. Dive into actionable insights to handle the complexities of modern marketing. From hyper-personalization to the power of user-generated content, learn how to build long-term relationships with your audience and unlock the secrets to success in the ever-shifting digital landscape.
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/building-and-scaling-ai-applications-with-the-nx-ai-manager-a-presentation-from-network-optix/
Robin van Emden, Senior Director of Data Science at Network Optix, presents the “Building and Scaling AI Applications with the Nx AI Manager,” tutorial at the May 2024 Embedded Vision Summit.
In this presentation, van Emden covers the basics of scaling edge AI solutions using the Nx tool kit. He emphasizes the process of developing AI models and deploying them globally. He also showcases the conversion of AI models and the creation of effective edge AI pipelines, with a focus on pre-processing, model conversion, selecting the appropriate inference engine for the target hardware and post-processing.
van Emden shows how Nx can simplify the developer’s life and facilitate a rapid transition from concept to production-ready applications.He provides valuable insights into developing scalable and efficient edge AI solutions, with a strong focus on practical implementation.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceIndexBug
Imagine a world where machines not only perform tasks but also learn, adapt, and make decisions. This is the promise of Artificial Intelligence (AI), a technology that's not just enhancing our lives but revolutionizing entire industries.
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on integration of Salesforce with Bonterra Impact Management.
Interested in deploying an integration with Salesforce for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxSitimaJohn
Ocean Lotus cyber threat actors represent a sophisticated, persistent, and politically motivated group that poses a significant risk to organizations and individuals in the Southeast Asian region. Their continuous evolution and adaptability underscore the need for robust cybersecurity measures and international cooperation to identify and mitigate the threats posed by such advanced persistent threat groups.
2. Basic requirements
• Lots of music
• Available everywhere, with great user interfaces
• More convenient than piracy
• Fast start of playback
• High availability (enough nines to put CDs in the
basement)
• Large scale (many many users)
3. The music
• Over 10 million tracks
• Growing every day, around 10k per day
• 96-320 kbps audio streams, most are Ogg
Vorbis q5, 160kbps
9. Latency matters
• High latency can be a problem, not only in
First Person Shooters
• Increased latency of Google searches by 100
– 400ms decreased usage by 0.2 – 0.6% (Jake
Brutlag, 2009)
• Slow performance is one of the major
reasons users abandon services
• Users don't come back
10. Latency matters
• Focus on low latency
• On average, the human notion of “instantly” is 200ms
• The median latency to begin play a track in Spotify is
265ms
• Due to disk lookup, at times it's actually faster to start
playing a track from network than from disk
• The SLA is maintained by monitoring latency in the client
11. Playing a track
• Check local cache
• Request first piece from Spotify servers
• Meanwhile, search P2P for remainder
• Switch between servers & P2P as needed
• Towards the end of a track, start pre-
fetching the next one via P2P rather than
our servers
12. When to start playing?
• Trade off between stutter & latency
• Look at last 15 min of transfer rates
• Model as Markov chain and simulate
• Coupled with some heuristics
13.
14. • Production storage is a cache with fast drives &
lots of RAM
• Serves the most popular content
• A cache miss will generate a request to master
storage
• User will experience longer latency
• Production storage is available in several data
centers to ensure closeness to the user (latency
wise)
Production storage
15. Master storage
• Works as a DHT, with some redundancy
• Contains all available tracks but has slower
drives and access
• Tracks are kept in several formats, adding
up to around 290TB
16.
17. P2P helps
• Easier to scale
• Less servers
• Less bandwidth
• Better uptime
• Less costs
• Fun!
18. P2P overview
• Not a piracy network, all tracks are added
by Spotify
• Used on all desktop clients (no mobile)
• Each client connected to <= 60 others
• All nodes are equals (no super nodes)
• A track is downloaded from several peers
19. P2P custom protocol
• Ask for most urgent pieces first
• If a peer is slow, re-request from new peers
• When buffers run low, download from
central servers
• If loading from servers, estimate at what
point P2P will catch up
• If buffers are very low, stop uploading
20. P2P finding peers
• Partial central tracker (BitTorrent-style)
• Broadcast query in small neighborhood
(Gnutella-style)
• Two mechanisms results in higher
availability
• Limited broadcast for local (LAN) peer
discovery (cherry on top...)
21. P2P security
• The client needs to be able to play music, but we have to
prevent reverse engineering from doing the same
• Therefor we can't openly discuss the details (Security
Trough Obscurity) but...
• Closed environment
• Verify integrity of downloaded files
• Data transfers are encrypted
• Usernames are not exposed in P2P network, all peers
assigned pseudonym
22. So, what's the
outcome?
• At over 10 million users the responses are
• 55.4% from client cache
• 35.8% from the P2P network
• 8.8% from the servers
23.
24. I'd like to know more...
• Get in touch with us
• Checkout Gunnar Kreitz's slides and
academic papers on the subject:
http://www.csc.kth.se/~gkreitz/spotify-p2p10/