After having fine tuned every knob, switch, and slider to maximize cacheability on the Akamai Network, you head over to look at the offload graph hovering at a hair under 100 percent, taking immense pride in what you've accomplished. All in a day's work! The next morning rolls around and you come to find out that the Marketing team is launching a promotion to increase customer engagement and sales that requires a major update to the homepage... the kind of launch that requires removing objects from cache and re-publishing new ones, all within the instance it takes to split an atom into its elements.
Get In Touch
January 2016 Archives
By Nelson Chao and Will Law
On November 30 in Los Angeles, Nokia Technologies held a launch event to announce the availability of the OZO, a first-of-its kind 3D 360-degree virtual reality (VR) camera, which is defining a new category in professional VR capture. To demonstrate the camera's capabilities, Nokia Technologies partnered with Akamai to deliver a live stream using the Akamai Network. Nokia Technologies used an OZO to live stream a performance by California surf-rock band Best Coast from atop the Capitol Records tower in Hollywood to guests and press at the event in downtown Los Angeles, who got to watch via VR headsets.
On Jan. 28, 2016, OpenSSL released a new version of OpenSSL software. This release contains (among others) two potentially important security fixes to which we would like to draw your attention:
- SSLv2 does not block disabled ciphers (CVE-2015-3197) and
- DH small subgroups (CVE-2016-0701)
Akamai would like to inform you that our customers are not vulnerable to these issues on our delivery platform, however, customers should confirm that their origin servers are not exposed to these two issues. Here are some additional details about these two fixes.
If there was ever a truism it is that technology is rapidly evolving under our feet. What was right today, is likely to be sub-optimal tomorrow. This situation can cause a sense of paralysis leading to delayed action because next week the "Next Great Thing" is coming soon. With the advent of HTTP/2 (h2) that translates to holding off on optimizing your web properties. When you have large portions of your user base on h2 and a similarly large portion on h1, you need to double your efforts to keep up!
The discussions among the insurance industry participants at Akamai's Edge conference this past October were fascinating. It was abundantly clear, that there are major shifts ahead that will set the course for where the industry is headed in the long-term. Although the insurance industry as a whole has been less agile, heavily burdened by legacy systems and is really one of the last data-driven businesses to realize a full digital disruption, the tides are definitely changing.
Are you delivering or thinking of delivering your web presence or application through a CDN? The many reasons to do so are well documented. Your site will be faster, more reliable, and you will require less data centre bandwidth and infrastructure. All this leads to a better user experience, which affects profitability, customer retention, conversation rates, etc. But this post isn't about why you should use a CDN. We're going to examine why you should hide your hosting presence (the Origin as we refer to it) from the Internet and how to do it.
The recent volatility in the stock market serves as a reminder to those in the brokerage world about the challenges of capacity planning during unstable equity markets. We are only 10 trading days into 2016, and the the S&P 500 index is down 8.0%. As shown in the table below, we've now had 4 days of 400+ point swings in the market.
Your web application by default is accessible to the entire planet. This exposure can open your site up to unnecessary risk. Akamai's Request Control Cloudlet can quickly allow or deny access to website content based on the IP or Geography associated with an inbound request. For example, you may deny access to users in embargoed countries or allow it only to a specific region where your users live. Manage the cloudlet via easy-to-manage whitelist and blacklists based on the IP address or geographic location associated with the inbound request. Activate the cloudlet policies in seconds by using the dedicated user interface.
These API's are critical to us...without them, we're hurting. - Terry Drozdowski, Director of Engineering, Exceda.
At Akamai, we believe the future of the Internet lies in the hands of the developers and architects who tackle hard problems every day. With our Open Platform Initiative, we simplified access to the Akamai Intelligent Platform for better and easier integration with home-grown and third party technologies and applications. The initiative exposes the power and breadth of Akamai - over 200,000 servers at the farthest reaches at the Edge of the Internet, petabytes of distributed storage, and terabytes of global bandwidth. By providing this technology, our customers and partners can design the next killer application to deliver innovative web experiences while removing all the inherent impediments of building applications on the raw Internet.
Health IT Security recently published the results of Akamai's latest State of the Internet report, emphasizing that "Distributed denial of services (DDoS) attacks are up during the third quarter of 2015, reinforcing the healthcare industry's growing concern for healthcare data security." They have hit on a very salient point here, because while many may think that healthcare providers are not likely targets of DDoS attacks, there are definite reasons why DDoS attacks should be of particular focus in the healthcare industry:
By Rich Salz
Akamai was informed of a new TLS vulnerability -- SLOTH -- by researcher Karthik Bharghaven. Akamai then worked with the researcher to confirm and fix the vulnerability in an expedient manner prior to public disclosure. Consequently, we minimized the chances of an exploit and have determined that Akamai customers are now not vulnerable to SLOTH.
Akamai's Threat Research Division has identified a sophisticated search engine optimization (SEO) campaign that uses SQL injections to attack targeted websites.
An advisory on the subject, written by Ryan Barnett of the company's cloud security intelligence team, is available here.
By Larry W. Cashdollar, Akamai SIRT
A few weeks ago I noticed a tweet from someone I have been following off and on for a few weeks. The tweet highlighted an exposed administration panel in a software product called Delegate. The Delegate software is described as, "a multi-purpose application-level gateway, or a proxy server which runs on multiple platforms (Unix, Windows and MacOS X)". What this software does is allow network connections to be relayed or proxied through it.
The recent vulnerability I discovered in Delegate 9.9.13 abuses a binary that is normally setuid root during installation when built from source. The action of setting a binary on a UNIX system setuid root allows any local user on the system to execute that binary as the root or administrative user.
It wasn't too long ago that the only reason a site would leverage HTTPS was to encrypt sensitive data so it couldn't be read in transit. Times are changing and the Internet as we know it is moving more and more towards encrypting all website traffic. Below are 7 good reasons to move your website to only use HTTPS.
With an increase of awareness and interest in Bots' impact - both good and bad - on retail, travel and hospitality companies, Akamai wanted to leverage its global view of the Internet to see what changes occurred for Bot traffic during the recent holiday shopping days for North American retailers.