Get In Touch
Over the last two years, we've seen a surge in OTT offerings as viewers insist on watching what they want, when they want, on any device, anywhere. Major content creators like Netflix and Amazon have made significant strides to push this technology into the mainstream, however true mass adoption will happen when traditional broadcast companies adopt OTT in a significant way. AkamaiTV's Ian Munford recently sat down with Mark Harrison
It somehow doesn't seem that long ago, but nineteen years ago during Y2K I spent my New Year's Eve in the Akamai Network Operations center, waiting to respond to anything that might go awry as the clock struck midnight in key time zones such as Greenwich and Boston. As of January 9, 2019, we are roughly half-way from Y2K to "Y2038", the next large time epoch roll-over event. In 2038
After years of hype, AI is finally making headway in industries like manufacturing, medicine and transportation -- and it's beginning to play a supporting role in media & entertainment. AkamaiTV's Paul Jackson chatted with Peter Chave, Principal Architect here at Akamai, to learn how AI is stepping into the spotlight to not only change how content is produced, but also how we interact with it.
The breathtaking pace at which everyone and everything is becoming connected is having a profound effect on digital business, from delivering exceptional experiences, to ensuring the security of your customers, applications, and workforce.
Authentication on the World Wide Web is badly broken. We all know it, or at least sense it. Every web site or mobile app that we want to use asks us to register and set up yet another account with yet another username and password. With the typical end user having tens of online accounts, this results in a dizzying number of usernames and passwords to keep track of. Or
Christmas Holiday Retail Sales In early November, eMarketer forecast that the 2018 U.S. online retail holiday sales would be $106 billion, a healthy increase of 16.6% over 2017.
Data breaches have become incessant. Recently, a very popular airline sevices company revealed a suspected breach involving customer credit card information. Even more recently, a hospital in Indiana reported that a virus had infected some of its systems that caused the hospital to be placed on diversion. A disaster recovery software company also admitted that a breach of its marketing databases occurred. If that isn't enough, an online electronics retailer
Managing security configurations for large organizations with locations scattered around the world can be challenging. Likewise, some businesses have multiple operating divisions that are separate entities but all use the same IT infrastructure. As an IT leader, you likely want to have consistency in baseline security and acceptable use policies, yet have regional or line of business security teams have the flexibility to make changes that reflect specific needs in
Many companies have their own applications, internal domains, and local area network (LAN). But when it comes to business applications, organizations are increasingly dependent on cloud-based resources. These may include email servers, customer relationship management (CRM) software, or other applications. However, when access to internal machines by external users is necessary, the most common solutions are centered on virtual private networks (VPNs).