Get In Touch
Additional analysis and research provided by Principal Architect, Tom Emmons Earlier this year, Akamai celebrated the fifth anniversary of the Prolexic acquisition. The merger was officially completed in February of 2014, and a lot has happened since then. In this post, we want to spend a moment reflecting on the last five years and look at what's ahead.
Effective communication skills are fundamental to developing both immediate and long term relationships with our customers. How else can we learn the answers to questions such as: "What are our customers concerns, needs, and desires?", "How can we best address their short and long term needs?", And "What kind of customer experience are we providing"?
I was quite fortunate to visit Tokyo for the first time last year, and it was an unforgettable experience to explore all the sights and sounds around the Ginza district and to interact with the very friendly Japanese people. It wasn't all play, though -- and I had to get some real work done as well.
What's in a Login Button? All you need to know about the new "Sign in with Apple" For Akamai Identity Cloud, we intend to support our clients that wish to implement "Sign in with Apple" just like we do for Facebook, Google, Instagram, Twitter, LinkedIn and about 30 other Identity Providers. If you use it for your apps and websites, here's what you need to know.
Authors: Mark Greve, Domițian Tămaș-Selicean The online video player landscape is fragmented with a wide variety of players across a mix of popular platforms. In the world of HTML5-video players in browsers, there are a number of open-source solutions (e.g., hls.js, dash.js, Shaka Player), as well as commercial offerings which include Akamai's AMP.
From its beginnings as a replacement for a centralized database, the Domain Name System (DNS) has evolved into a dynamic, highly-distributed question-answer protocol. The proverbial 'phone book of the internet' has increased in complexity and scale alongside the rapid growth of the world wide web. One primary example is DNSSEC (Domain Name System Security Extensions): the founding architects of DNS did not include any inherent security protections for the protocol,
It's a busy time for my team as we prepare for next week's customer conference, Edge World, in Las Vegas. I'm excited for another productive week of interacting and innovating with our customers. There's still time for you to join us; register here.
With growing mobile and remote workforces, enterprises must allow many different device types to access their applications in the name of productivity and flexibility. Traditional, perimeter-based security methods are no longer viable due to complexity, maintenance overhead, and inherently insecure model. Instead, businesses should shift their focus to verifying who and what is accessing a network and eliminating the perimeter.
Start Playing Here High-profile data breaches and increasingly sophisticated security threats are driving smart brands to better manage the mass amounts of consumer data they've spent years collecting. To do so, brands must prioritize their customers' interests and build a modern data security and privacy strategy where consumer trust is central.