Akamai Diversity

The Akamai Blog

Jim Gilbert

Jim Gilbert

July 18, 2019 11:00 AM

Akamai Load Balancing to Lock-in Quality

The Right Service from the Right Edge at the Right Time Introduction As Akamai's Global Traffic Management for Cloud, Data Centers and CDNs blog introduces, Akamai's Intelligent Edge™ platform includes DNS and Layer 7 load balancing capabilities that combine to get users to the right edge at the right time. In this blog, Akamai poses a use case and describes how to address it using Akamai Global Traffic Management (GTM)

Craig Sparling

Craig Sparling

July 2, 2019 11:00 AM

5 Years of Fighting DDoS with the Power of Akamai

Additional analysis and research provided by Principal Architect, Tom Emmons Earlier this year, Akamai celebrated the fifth anniversary of the Prolexic acquisition. The merger was officially completed in February of 2014, and a lot has happened since then. In this post, we want to spend a moment reflecting on the last five years and look at what's ahead.

Andrew Heifetz

Andrew Heifetz

June 28, 2019 11:00 AM

Enhancing Customer Value, Building Customer Relation ...

Effective communication skills are fundamental to developing both immediate and long term relationships with our customers. How else can we learn the answers to questions such as: "What are our customers concerns, needs, and desires?", "How can we best address their short and long term needs?", And "What kind of customer experience are we providing"?

Jano van Deventer

Jano van Deventer

June 25, 2019 11:00 AM

Intercept SaaS Services with the Akamai EAA Client

I was quite fortunate to visit Tokyo for the first time last year, and it was an unforgettable experience to explore all the sights and sounds around the Ginza district and to interact with the very friendly Japanese people. It wasn't all play, though -- and I had to get some real work done as well.

Sven Dummer

Sven Dummer

June 24, 2019 11:00 AM

Sign in with Apple

What's in a Login Button? All you need to know about the new "Sign in with Apple" For Akamai Identity Cloud, we intend to support our clients that wish to implement "Sign in with Apple" just like we do for Facebook, Google, Instagram, Twitter, LinkedIn and about 30 other Identity Providers. If you use it for your apps and websites, here's what you need to know.

Akamai

Akamai

June 19, 2019 11:00 AM

Enhancing video streaming quality for ExoPlayer - Pa ...

Authors: Mark Greve, Domițian Tămaș-Selicean The online video player landscape is fragmented with a wide variety of players across a mix of popular platforms. In the world of HTML5-video players in browsers, there are a number of open-source solutions (e.g., hls.js, dash.js, Shaka Player), as well as commercial offerings which include Akamai's AMP.

Sam Preston

Sam Preston

June 12, 2019 11:00 AM

DNSSEC: How It Works & Key Considerations

From its beginnings as a replacement for a centralized database, the Domain Name System (DNS) has evolved into a dynamic, highly-distributed question-answer protocol. The proverbial 'phone book of the internet' has increased in complexity and scale alongside the rapid growth of the world wide web. One primary example is DNSSEC (Domain Name System Security Extensions): the founding architects of DNS did not include any inherent security protections for the protocol,

Charlie Phillips

Charlie Phillips

June 5, 2019 11:30 AM

GSS at Edge World

It's a busy time for my team as we prepare for next week's customer conference, Edge World, in Las Vegas. I'm excited for another productive week of interacting and innovating with our customers. There's still time for you to join us; register here.

James Chan

James Chan

June 3, 2019 9:00 AM

I Am The One Who Knocks -- Device Posture and Detect ...

With growing mobile and remote workforces, enterprises must allow many different device types to access their applications in the name of productivity and flexibility. Traditional, perimeter-based security methods are no longer viable due to complexity, maintenance overhead, and inherently insecure model. Instead, businesses should shift their focus to verifying who and what is accessing a network and eliminating the perimeter.