How Cloud Computing Helped Netflix Emerge as a Streaming Media Powerhouse

How Cloud Computing Helped Netflix Emerge as a Streaming Media Powerhouse

Netflix may be getting a lot of bad press in recent times due to its management’s ill-advised decision to raise subscription rates by almost 50% resulting in widespread customer dissatisfaction and a groveling apology by CEO Reed Hastings, but it was not long ago that it was considered the epitome of home entertainment.Netflix is another new-age company that owes its success to cloud computing, the same way that Zynga, the creators of Facebook game sensation Farmville, does (See: Zynga, the Latest Cloud Computing Success). And not surprisingly, for both of them, the cloud provider of choice is Amazon, perhaps the earliest player in the game.

Although Netflix began life as a DVD-by-mail service in 1997, it was with the introduction of the on-demand streaming service that it saw a huge expansion of its customer base. In fact, when it crossed 10 million subscribers in 2009, it “attributed the recent surge in subscribers to growing consumer recognition of the value and convenience offered by Netflix and increasingly more ways to instantly watch a growing library of movies and TV episodes from Netflix on PCs, Intel-based Macs and TVs.”

Not surprisingly, this model was soon adopted by many other providers like Fox’s Hulu, Amazon and even Google, who created a paid version of YouTube content. Now, running such a service required a level of flexibility, resource optimization and redundancy that traditional data centers were ill-equipped to provide (See: Virtualization: The Virtual Way to Real-World Benefits). That is why Netflix today relies almost exclusively on cloud services for its infrastructure.

This point was reiterated by Netflix Cloud Security Architect Jason Chan in his presentation “Practical Cloud Security” at the United Security Summit in San Francisco. During his presentation, Chan articulated the advantages that being on the cloud provided Netflix, advantages that were not possible with traditional IT infrastructure.

Chen explained that in a traditional data center, applications are long-lived, code is pushed to running systems, and it can be difficult to enforce deployment patterns such as patches. However, on the cloud, new versions are written which replace the old ones entirely with new instances, eliminating the need for patches. Also, while earlier repeatable tasks such as adding a user account, changing firewall configurations or forensic analysis required multiple steps and interfacing with multiple systems, “these tasks are a simple API call with cloud.” Moreover, with systems being added to groups that control the connectivity, “there’s no one chokepoint” like the traditional firewall.

The key lesson we learned is you have to leave the old ways behind,” Chan said. However, he agreed that moving to the cloud did introduce some specific security concerns that had to be addressed. With Amazon having launched a similar service in direct competition with its own customer Netflix (See: Is Amazon’s Cloud Player a Game Changer in the Music Industry? ), this space should see some interesting developments in the near future.

By Sourya Biswas

Sorry, comments are closed for this post.

Are You SURE You Are Ready For The Cloud?: Security of Business

Are You SURE You Are Ready For The Cloud?: Security of Business

Cloud Business Security Last month I went into the financial side of moving to the cloud. This month I am going to focus on the other main reason I have seen customers migrate to the cloud: Security of business. When I say security, I do not mean username and passwords, but a stability of the environment…

How Will The Internet of Things Affect The Business World?

How Will The Internet of Things Affect The Business World?

Internet of Things and the Business World? Experts predict that by 2020, the Internet of Things will have a market greater than $1 Trillion, yet despite it being the new buzzword, many people have no idea how this predicted revolution will shape the business world. We’ve all heard predictions of various appliances with sensors, wearable…

Disaster Recovery – A Thing Of The Past!

Disaster Recovery – A Thing Of The Past!

Disaster Recovery  Ok, ok – I understand most of you are saying disaster recovery (DR) is still a critical aspect of running any type of operations. After all – we need to secure our future operations in case of disaster. Sure – that is still the case but things are changing – fast. There are…

Are You Sure You Are Ready For The Cloud: Security

Are You Sure You Are Ready For The Cloud: Security

Cloud Security For the last several months, we have been discussing ways to make sure you are ready for the next step in your IT evolution: Cloud. When review the different steps of making sure you are ready, one that I have intentionally avoided was Security. I spoke to you about “Security of Business”, but…

The iCloud Scandal – Who Is To Blame? –  ‘Cloud’ Security vs. ‘Internet’ Security

The iCloud Scandal – Who Is To Blame? – ‘Cloud’ Security vs. ‘Internet’ Security

How the iCloud Scandal Has Helped to Define the Difference Between ‘Cloud’ Security and ‘Internet’ Security Busting the myth that bad cloud security was to blame for Apple’s recent celebrity data disaster Overview: We discuss the ‘celebrity hacking’ iCloud saga and debate whether or not the breach was likely down to Cloud encryption issues or…

Shadow IT To Remain A Focus For Both Cloud Vendors And CIOs

Shadow IT To Remain A Focus For Both Cloud Vendors And CIOs

Shadow IT To Remain A Focus Shadow IT, a phenomenon defined as building internal IT systems without the official organizational approval has been a growing concern for CIOs over the last few years. In 2015, it climbed to the top of the list of the emerging IT threats, with as much as 83% CIOs reporting…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

CloudTweaks is recognized as one of the leading influencers in cloud computing, infosec, big data and the internet of things (IoT) information. Our goal is to continue to build our growing information portal by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Advertising