Akamai Diversity

The Akamai Blog

Shane Keats

Shane Keats

January 15, 2019 9:45 AM

#OTTuesday: The Current State of Linear Broadcast an ...

Over the last two years, we've seen a surge in OTT offerings as viewers insist on watching what they want, when they want, on any device, anywhere. Major content creators like Netflix and Amazon have made significant strides to push this technology into the mainstream, however true mass adoption will happen when traditional broadcast companies adopt OTT in a significant way. AkamaiTV's Ian Munford recently sat down with Mark Harrison

Erik Nygren

Erik Nygren

January 10, 2019 1:32 PM

Preparing for Y2038 (Already?!)

It somehow doesn't seem that long ago, but nineteen years ago during Y2K I spent my New Year's Eve in the Akamai Network Operations center, waiting to respond to anything that might go awry as the clock struck midnight in key time zones such as Greenwich and Boston. As of January 9, 2019, we are roughly half-way from Y2K to "Y2038", the next large time epoch roll-over event. In 2038

Shane Keats

Shane Keats

January 8, 2019 9:45 AM

#OTTuesday: AI Destined for Big Role in Entertainmen ...

After years of hype, AI is finally making headway in industries like manufacturing, medicine and transportation -- and it's beginning to play a supporting role in media & entertainment. AkamaiTV's Paul Jackson chatted with Peter Chave, Principal Architect here at Akamai, to learn how AI is stepping into the spotlight to not only change how content is produced, but also how we interact with it.

Ari Weil

Ari Weil

January 7, 2019 11:30 AM

From the Core to the Edge: 3 Security Imperatives an ...

The breathtaking pace at which everyone and everything is becoming connected is having a profound effect on digital business, from delivering exceptional experiences, to ensuring the security of your customers, applications, and workforce.

John Summers

John Summers

January 7, 2019 8:03 AM

Digital Identity, Digital Trust, Janrain and Akamai

Authentication on the World Wide Web is badly broken. We all know it, or at least sense it. Every web site or mobile app that we want to use asks us to register and set up yet another account with yet another username and password. With the typical end user having tens of online accounts, this results in a dizzying number of usernames and passwords to keep track of. Or

Chris Wraight

Chris Wraight

January 4, 2019 2:07 PM

Christmas Day was Quiet for Online Retailers But Pic ...

Christmas Holiday Retail Sales In early November, eMarketer forecast that the 2018 U.S. online retail holiday sales would be $106 billion, a healthy increase of 16.6% over 2017.

Chinedu Egonu

Chinedu Egonu

December 31, 2018 10:43 AM

Zero Trust and the Case for Application Microsegment ...

Data breaches have become incessant. Recently, a very popular airline sevices company revealed a suspected breach involving customer credit card information. Even more recently, a hospital in Indiana reported that a virus had infected some of its systems that caused the hospital to be placed on diversion. A disaster recovery software company also admitted that a breach of its marketing databases occurred. If that isn't enough, an online electronics retailer

Jim Black

Jim Black

December 20, 2018 2:37 PM

New Delegated Administration feature in Enterprise T ...

Managing security configurations for large organizations with locations scattered around the world can be challenging. Likewise, some businesses have multiple operating divisions that are separate entities but all use the same IT infrastructure. As an IT leader, you likely want to have consistency in baseline security and acceptable use policies, yet have regional or line of business security teams have the flexibility to make changes that reflect specific needs in

Maria Ramirez

Maria Ramirez

December 19, 2018 2:36 PM

Zero Trust Security Protects Businesses while Enabli ...

Many companies have their own applications, internal domains, and local area network (LAN). But when it comes to business applications, organizations are increasingly dependent on cloud-based resources. These may include email servers, customer relationship management (CRM) software, or other applications. However, when access to internal machines by external users is necessary, the most common solutions are centered on virtual private networks (VPNs).