- 30
- 15 757
Preetam Keshari
India
Приєднався 16 жов 2022
I help you become a better software engineer than yesterday. #BetterSDEThanYesterday
Let's begin with step 1: Watch my videos and subscribe.
Hello there!
I am Preetam Keshari Nahak, a CSE graduate from NIT Rourkela, with 5+ years of experience in software developement space and startups. I love to talk about startup culture, learning in startups, software developement concepts in a lucid manner. This channel is your go-to destination for everything related to technology, work life in startups, and career growth. Whether you're an job seeker in IT domain, a tech enthusiast, or a student seeking guidance, you're in the right place!
Here, we delve deep into cloud computing, distributed systems, and cutting-edge tech trends. Additionally, we share insights for job seekers, offering tips to help students and professionals alike land their dream roles in tech. Subscribe and take your first step toward success!
Let's begin with step 1: Watch my videos and subscribe.
Hello there!
I am Preetam Keshari Nahak, a CSE graduate from NIT Rourkela, with 5+ years of experience in software developement space and startups. I love to talk about startup culture, learning in startups, software developement concepts in a lucid manner. This channel is your go-to destination for everything related to technology, work life in startups, and career growth. Whether you're an job seeker in IT domain, a tech enthusiast, or a student seeking guidance, you're in the right place!
Here, we delve deep into cloud computing, distributed systems, and cutting-edge tech trends. Additionally, we share insights for job seekers, offering tips to help students and professionals alike land their dream roles in tech. Subscribe and take your first step toward success!
Why You Can’t Screen Record Netflix! | Secret Tech Behind the Scenes | DRM Explained #netflix #tech
Have you ever tried to screen record Netflix only to end up with a blank screen? Wondering what’s really going on behind the scenes that stops you from capturing your favorite shows and movies? In this video, we dive deep into Netflix’s advanced security tech, from DRM (Digital Rights Management) and encrypted video pipelines to how the platform protects content with trusted hardware.
Join us as we explore Trusted Execution Environments (TEE), and the multi-layered security Netflix and other streaming giants use to keep their content safe. Learn why each device needs its own decryption key and why screen recorders just can’t capture what’s on your display. By the end, you'll have a full understanding of how this powerful technology works!
Don’t forget to subscribe for more videos on tech secrets!
#systemdesign #tech #softwareengineer #softwarearchitecture #backend #softwaredevelopment #technology #netflix #techtips
I make you a better software engineer than yesterday with my videos. #BetterSDEThanYesterday
Let's begin with step 1: Click the link below.
ua-cam.com/channels/m6NjoQQrJbb8JfGfUIrLig.html
Connect with me:
Stay updated with more tech content, tutorials, and insights by following me on social media:
🔗 LinkedIn: linkedin.com/in/preetamnahak
🔗 Twitter: x.com/preetamnahak
🔗 Instagram: preetamnahak
🔗 GitHub: github.com/preetamnahak
🔗 Blog/Website: medium.com/@preetamnahak
Don't forget to subscribe to the channel for more videos on tech, cloud computing, distributed systems, and startup tips!
Join us as we explore Trusted Execution Environments (TEE), and the multi-layered security Netflix and other streaming giants use to keep their content safe. Learn why each device needs its own decryption key and why screen recorders just can’t capture what’s on your display. By the end, you'll have a full understanding of how this powerful technology works!
Don’t forget to subscribe for more videos on tech secrets!
#systemdesign #tech #softwareengineer #softwarearchitecture #backend #softwaredevelopment #technology #netflix #techtips
I make you a better software engineer than yesterday with my videos. #BetterSDEThanYesterday
Let's begin with step 1: Click the link below.
ua-cam.com/channels/m6NjoQQrJbb8JfGfUIrLig.html
Connect with me:
Stay updated with more tech content, tutorials, and insights by following me on social media:
🔗 LinkedIn: linkedin.com/in/preetamnahak
🔗 Twitter: x.com/preetamnahak
🔗 Instagram: preetamnahak
🔗 GitHub: github.com/preetamnahak
🔗 Blog/Website: medium.com/@preetamnahak
Don't forget to subscribe to the channel for more videos on tech, cloud computing, distributed systems, and startup tips!
Переглядів: 695
Відео
EP 02: URL Shortener System Design Explained: How tinyUrl.com Works (Base62, Hashing, Scalability)
Переглядів 2647 годин тому
Ever wondered how a URL shortener like Bit.ly/tinyUrl.com works behind the scenes? In this comprehensive video, we break down the system design of a URL shortener service from the ground up. You'll learn the core concepts such as Base62 encoding, hash functions, and how to handle collisions effectively. We’ll also dive into critical components like the API Gateway, database storage, and caching...
Part 2: Maths Behind Bloom Filters | Efficiently Checking an User Among Billions #systemdesign
Переглядів 21516 годин тому
How to Efficiently Search a User Among Billions? | Maths behind Bloom Filters Explained Description: With billions of users and data points to manage, efficiently searching for specific users is a critical challenge for large-scale systems. In this video, we dive deep into three key approaches used to optimize search operations in high-volume environments. Direct Query: The traditional approach...
EP 01: High Level V/S Low Level System Design | Introduction to System Design #systemdesign
Переглядів 32621 годину тому
Prepping for system design interview? In this video, we’re kicking off a unique system design playlist where we will explore the fundamentals of system design by breaking down real-world use cases. Unlike typical system design tutorials, we won't just talk about theory-we’ll learn by building practical solutions! In today’s video, we’ll cover: What System Design is and why it’s important for so...
How UPI works - The 12 Steps Behind a UPI Txn Explained | Complete Breakdown of UPI’s Technology
Переглядів 207День тому
Unified Payments Interface (UPI) has transformed how digital transactions are conducted in India. It’s fast, secure, and incredibly easy to use - but have you ever wondered what happens behind the scenes when you make a payment through UPI? In this comprehensive video, we break down how UPI works, explaining every step of the transaction process and the technology that makes it all possible. Fr...
How to Convert Text to Vector: Bag of Words, TF-IDF, Word Embedding (Word2Vec) and Transformers BERT
Переглядів 15514 днів тому
🔍 Description: In this video, we dive deep into one of the most crucial techniques in Natural Language Processing (NLP): Text-to-Vector Conversion! 🧠✨ Whether you're classifying text, building recommendation engines, or powering intelligent search systems, converting text into a format that computers can understand is essential for making sense of language. Here’s what we cover: Bag of Words (B...
How Spotify and YouTube Music Recommend Songs Using Vector Database? #softwareengineer #youtube
Переглядів 43821 день тому
How Spotify and UA-cam Music Use Vector Databases for Song Recommendations | Understanding Similarity Search and Vector Databases Ever wondered how music platforms like Spotify and UA-cam Music seem to know exactly what song you want to hear next? It's not magic-it’s advanced technology! In this in-depth video, we explore the power of vector databases and how they revolutionize song recommendat...
3 Techniques for Database Sharding Explained | The Ultimate Guide to Scaling Databases
Переглядів 384Місяць тому
Title: DB Sharding Explained | The Ultimate Guide to Scaling Databases #systemdesign #database #databasedesign Description: In this video, we take a deep dive into the concept of Database Sharding, one of the most powerful techniques for scaling modern databases to handle massive amounts of data and traffic. 💡 What You’ll Learn: What is Database Sharding? Understand the core concept and why sha...
How to Efficiently Check If a User Exists Among Billions? #backend #systemdesign #softwareengineer
Переглядів 5 тис.Місяць тому
Title: How to Efficiently Search a User Among Billions? | Direct Query, Caching, & Bloom Filters Explained Description: With billions of users and data points to manage, efficiently searching for specific users is a critical challenge for large-scale systems. In this video, we dive deep into three key approaches used to optimize search operations in high-volume environments. Direct Query: The t...
Faster DB Queries? Normalization vs Denormalization in DBMS #dbms #database # #backend
Переглядів 217Місяць тому
Faster DB Queries? Normalization vs Denormalization in DBMS #dbms #database # #backend
How SSL Works? - Everything Behind HTTPS Explained #cybersecurity #https #technology #ssl
Переглядів 332Місяць тому
How SSL Works? - Everything Behind HTTPS Explained #cybersecurity #https #technology #ssl
Consensus Algorithms || Proof of work (PoW) || Mining || Blockchain
Переглядів 87Рік тому
Consensus Algorithms || Proof of work (PoW) || Mining || Blockchain
Properties of blockchain || Immutability, irreversible hash, decentralised || Explained in Hindi
Переглядів 64Рік тому
Properties of blockchain || Immutability, irreversible hash, decentralised || Explained in Hindi
What is a blockchain || Genesis block || Blockchain hota kya hai || Explained in Hindi
Переглядів 386Рік тому
What is a blockchain || Genesis block || Blockchain hota kya hai || Explained in Hindi
What are blockchain nodes in decentralised network - Explained in Hindi || Full Blockchain Tutorial
Переглядів 2442 роки тому
What are blockchain nodes in decentralised network - Explained in Hindi || Full Blockchain Tutorial
Centralised vs Decentralised Systems - Explained in Hindi || Full blockchain tutorial
Переглядів 3,9 тис.2 роки тому
Centralised vs Decentralised Systems - Explained in Hindi || Full blockchain tutorial
How was blockchain born? - Explained in Hindi || Full Blockchain Tutorial
Переглядів 1822 роки тому
How was blockchain born? - Explained in Hindi || Full Blockchain Tutorial
Hey is it possible to record from a linux computer then? Coz it doesn't have any specific drm licence
"what is bloom filter how can it be implemented in Laravel for checking username while registering a new user" This prompt gave me more clarity than your video.
Thanks for checking out my video. The goal of this video is to give the BTS working of a bloom filter and not code approach to implement it. It’s practical implementation differs from tech stack to tech stack. I will be creating a video on how to implement it in nodejs with redis. Hope that will help. Thank you 😇
@@preetam.keshari Yes I get it, but you are missing something. I follow bytebytego for similar tech stack explanations. I get things in one go from there. Anyway, thanks for allowing me to go a bit deeper about the bloom filter.
still cannot prevent the leak of netflix series in pirated sites
Even if your os provides all the apis to not allow recording the content you can always use a lightweight virtual VM and run the browser and keep screen - recording the same . The os never knows because its running on virtual box
Hi. Good query. But have you tried running Netflix inside a VM? I don’t think Netflix will allow the content to be played. Or even if does, it might restrict the video quality. However, need to give it a try to know how exactly it works. Good point 😇
As per I know by default also in non apple device Netflix restricts video quality when played in browser @@preetam.keshari
Can't i intercept the drm key using proxy ?? I might have to still to know the algorithm but I think we can get the drm decryption key
Hi. You mean intercepting the DRM key while it’s in transit (via https protocol)?
@@preetam.keshari yes
@@preetam.keshari I mean it might not show up in network tab but can we do it using proxy interceptor or MITM
@@rajatgupta08Even if you intercept it.. it will be in encrypted form.. you will need the private key to decrypt it which is not possible to get. Please watch my video on how SSL works.. you will get a better understanding of how this entire encryption process works. Hope that helps😊. Let me know if you have any other questions. Let’s learn together 😊
What is the collision factor of it ??
Hi. By collision factor do you mean the rate of false positives (error rate)? If so, please watch the Part 2 of this video on my channel, where I have discussed the mathematics behind it. Hope that helps 😇. Let me know if your query is something else. Thank you 🙏
I really love your videos.Pretty informative
Thank you 😇
Hi Sir, can you cover architecture of hyperswitch? It is an open source payment switch by Juspay
I will check it out
but still it cannot prevent recording by obs studio
Interesting 🤔
Very Informative
Thank you 😇
Good job, any tutorial on how to implement.
Hi. Glad that you liked the video. Redis supports bloom filters. It can be implemented using Redis. I will create a video on it soon. Stay tuned 😇
Waiting...
Video dropping at 11am today 😇
Can you refer some awesome tricks that large industries are embracing??
Sure. I will prepare video on this. Thanks for the suggestion 😇
Therotically I (audience 👥)got understanding how things works . It’ll be more helpful if you show something by doing code . It will be more relatable for beginners like me (2+).
Thanks for the suggestion! I'll try to incorporate some code examples in my future videos. 😊
Nice preetam
Thank you sir 🙏😇
awesome explanation bro🙌
Thanks! Glad you liked it! 🙏
subscribed👍:349
Thank you 😇
Nicely Explained ! What will be the next topic that you are going to explore in system design? Also can you suggest me some resources on system design from where you studied?
Hi Anan. Next video on system design will be on designing bit.ly. Here’s the first video of the system design playlist ua-cam.com/video/OEWNIan-Vpw/v-deo.html Some great resources on system design are “System Design Interviews Insider Guide by Alex Xu, Software Architecture Patterns by Mark Richards. Hope that helps 😇
Here's the video which explains how to calculate the optimal value of k and m in Bloom Filters. Please watch the video as an extension to the above video. ua-cam.com/video/uordRLxO0wU/v-deo.html
Helpful
Good going Preetam!
Thank you Abhisek 😇
Great content bro. Subscribed. Can you please make a video to determine the optimal size of m & k ?
Hi. Video preparation is under progress. Stay tuned.
Hi. Here's the video explaining your query ua-cam.com/video/uordRLxO0wU/v-deo.html Let me know if you found it helpful :)
Tera teaching bhi College professor ke jaisa hai. ****** ki tarah bakbak karta hai lekin samjha kuchh nahin pata hai.
when one fox howls all others join in, this video is a example of it
what will happen if all the elements in bit_array is set to 1 after multiple insertions... is it going to give "user_exists" for all new users?
Yes. And that’s where you need to determine the optimal size of k and m based on the requirements like number of users in your database, estimated increase in that number etc. I will create a separate video on how to determine the optimum value of k and m soon.
Great Question mohit,I too had this after his explanation. now I have few more queries, where is this bit array came from, who created it and where is it stored for next checks to be made. Now, that's aside what is the size of k and m in general, let say for a billion users of insta and fb, what is the size. Good explanation but left many loopholes. Probably in next video he will clear these doubts.
@@AdityaRaj-rv5jsHi. We can use redis to implement bloom filter. It supports bloom filter. Now coming to the topic of finding optimal value of k and m, please watch Part 2 of bloom filters which I have released already. Thanks 😊
Informative still interesting content
Thank you 😇
Nice Pritam
Thank you sir
What is the bottleneck process among all these steps? sometimes transaction takes too much of time. Is it step 10 ?
It can be step 8 or 6 where the settlement of funds being remitter and beneficiary bank takes time. Step 10 wont cause any bottleneck.
Please create a video on how chatGPT works
Sure
please make a video on how to determine the optimal size of m and k and the maths behind
Sure
I second that. Thanks for the videos bro.
@@rapoliit Thank you 😇
Hi. Here's the video explaining your query ua-cam.com/video/uordRLxO0wU/v-deo.html Let me know if you found it helpful :)
Suppose return index is 0,4,6 Then it means name doesn't exists in db, then how to set index to 1 in bit arry, as 0 index is already 1 in arry????
If a bit is already set to 1 in the bit array.. you don’t need to set it again. You just need to set the 0 bits to 1.
Excellent content keep posting with real life csse study like spotify
Sure. Thank you 😇
200th subscriber
Thank you
Can we use bloom filter to search matching user ids?
No. It can be used only to detect the existence of a user
Why vertical scaling on a single database node can't be used?
We can use.. but on a longer time horizon.. it will become a bottleneck in terms of performance and costing
Pretty informative.. keep it up
Thank you
idk what vectoral value of video i was watching to get this video as my suggestion but i see the algorithm is doing its job great. thank you for this knowledge and keep providing such content.
Thank you 😇. Will keep making useful tech content.
how those no. decided for songs like tum hi ho has no [0.45, 3.24, -1.34,....].... like this
read vector embedding in NLP. you'll get it
Hi. As I have mentioned in the video, I will create a separate video on the algorithms to convert song to vector. It’s about vector embedding in NLP. I didn’t explain in this video, otherwise video would have become lengthy.
Correct. I will create a separate video on this soon.
@@preetam.keshari ok thanks for reply
@@TheRiteshs Correct. I will create a separate video on vector embedding soon.
I thought here you chose the value of m = k * number of usernames to store 💀 It felt correct for this example you used 😂
No.. it was just random.. there’s a separate algorithm to determine the optimal value of m and k. I will create a separate video on this topic
Redis supports bloom filter we can use redis to implement on our backend
That’s right.
Why every youtuber is talking about this suddenly?
It’s a quite interesting topic to learn
Every one want viewers
@@preetam.kesharilearn something useful, you don't even get access to a platform with a billion users.
You watch one video then the youtube algorithm knows what is your area of interest , that's why 😅😂
pretty informative video. I am not sure why you do not have much views but I have sybscribed to your channel
Thank you :) It means a lot.
Damn😵😵
😁
Sharding or bloom filter?
Bloom filter.
Indexes maybe😅😅
No even index fails for bigger databases 😄
@@preetam.keshari waiting for your video then😝😝
👏👏
😄
Is this concept is valid for mongo DB. Sincario: too many unordered items.
Yes. Denormalization is valid for mongoDB also. You have ObjectIDs there as unique ID of each record similar to id in sql db.
Check the play button below title of this short to watch the full video