Get In Touch
June 2016 Archives
With this issue, the start of the ninth volume of the State of the Internet Report, we are introducing several changes, with several more planned to follow in subsequent issues. The first notable change is within the regional breakout sections of the report. For the last several years, the report has included a "Geography: Europe, Middle East, and Africa (EMEA)" section, surveying a selected set of countries within those regions.
Recently, Akamai announced the company's plans to expand its sustainability initiatives through an innovative renewable energy procurement strategy. Unlike many of its peers in the tech industry, Akamai does not operate its own data centers. That means, for example, we don't have roofs on which to install solar panels, which is one key way of generating your own renewable power.
This blog post is part of an ongoing series where we discuss a wide range of topics related to HTTP/2 (h2). In today's post, I explore why TTFB (Time to First Byte) may not be the best measure of h2 performance. I also address questions regarding why TTFB may be higher for h2, and why that's not necessarily a bad thing.
In his latest white paper, "Innovation in Communication Services: Breaking with the Past without Waiting for the Future," Patrick Donegan of Heavy Reading discusses a key aspect of digital transformation: the ability to offer innovative services that enhance the subscriber experience. More specifically, he discusses the need for personalized services--as well as why DNS technology is an ideal way to achieve personalization in new service offerings.
It is interesting to see how fiction can affect our judgement or, at least, our opinions. Below, what you have is an excerpt (the first chapter) of a draft of a novel that I have come across and made me think a lot. Bear with me: read this entire article and then come back to this post. If nothing else, you may enjoy 4 minutes of literature.
When we published our recent Locky blog post, we didn't expect it to have such a quick effect: a day after the post went online, this notorious ransomware went offline. We immediately figured it out - a blog post can change the world.
They may not have many leather bound books or smell of rich mahogany, but images are...kind of a big deal. In fact, it would be fair to say that content owners and consumers have gone a bit "image crazy" in the past few years.
We just released a new whitepaper outlining the upcoming types of cyberthreats and malicious activity affecting digital consumers, and how organizations and operators can address them. Below is an excerpt.
By Will Law and Shawn Michels Apple's June 15th announcement at its Worldwide Developers Conference that it will add fragmented MP4 (fMP4) support to HLS marks a significant step in simplifying online video streaming. fMP4 is the parent of the emerging Common Media Application Format (CMAF), and Apple's plan to support fMP4 brings the industry closer to the single format for OTT distributors and playback support on all consumer electronics
This blog post is part of an ongoing series where we will discuss a wide range of H2-related topics. In today's post, we talk about some of the misconceptions regarding HTTP/2 being a silver bullet for improved website performance.
I was on a flight to Brazil last night to kick off a week of meetings with partners and customers in Latin America. During the eight-and-a-half-hour flight from Atlanta, I got an opportunity to watch a few movies I've been meaning to catch up on, and on the top of the list was Steve Jobs. There's a scene near the end of the movie where Steve is trying to recruit
For a couple of reasons, I'm pleased to share this video and case study showing how Ubisoft is working with Akamai to enhance their player experience and streamline game development. Have a look to learn how the publisher of hugely successful titles such as Assassin's Creed, Tom Clancy's Ghost Recon, Just Dance and many others is addressing rising customer expectations for fast downloads and gameplay, as well as mitigating the
I am scheduled to give a security talk next week at the Gartner Security Summit entitled: Web Application Defender's Field Report. In the talk, I will be covering statistics and technical details of web application attacks from our just released State of the Internet (SOTI) Report for Q1 2016. One of the more interesting details of the report centers around the analysis of massive Account Takeover (ATO) attack campaigns that
On my walk into the Akamai office this morning, I passed a small auto repair shop. It didn't spring up out of nowhere; it's been there all along. I just happened to notice it on today's commute because there was a team of two loading tires from a van into the shop. The task itself wasn't worth noticing, but the way they were performing it was.
Jason Miller, our chief strategist of Commerce, was recently published in Retail TouchPoints magazine. In his article, How to Better Understand the Bot Ecosystem, Jason talks about the different ways to distinguish between good bots and bad bots and how the distinctions change across applications and environments.
It has now been five years since World IPv6 Day and four years since World IPv6 Launch. The long-term global Internet transition to IPv6 is well underway and increasingly entering the mainstream. The American Registry for Internet Numbers (ARIN) exhausted its free pool of IPv4 addresses in September 2015, following all of the other registries except for Africa's AFRINIC (which is on track to exhaust its IPv4 free pool in
While the tactile nature of in-store shopping is nice, what is often missing from the in-store experience is the personalization available online. Jason Miller, our chief strategist of Commerce, has recently published an article - Why the In-Store Experience Still Matters - on Apparel Magazine to discuss how retailers are finding new ways to personalize the in-store shopping experience.
In my last blog when I kicked off our MobilePerf Blog Series, I talked about mobile Search Engine Optimization (SEO) and Google's guidance on how to make your sites mobile friendly. Google just announced that they will also factor in your mobile site's page speed when ranking your organization in the mobile friendly search results.
Locky is a new cyberthreat that has received a lot of attention in security circles over the last few months because it has been unusually successful. Locky is advanced ransomware that encrypts a person's files and holds them for ransom. It uses a number of different technologies to avoid being detected or blocked and takes great care to hide its path back to the attackers. The code is obfuscated to
Last week, I was standing in Singapore freezing. If you've ever been there, you'll know this sounds crazy, as the typical weather all year long is 88 degrees with 85% humidity. At this moment, I was standing at a small staircase ready to step on stage at Casual Connect Asia in the Hard Rock Hotel. Maybe in response to the weather, this room's air con was cranked up.
By Akamai SIRT Two quarters ago, we introduced Sankey diagrams to the State of the Internet: Security Report. Sankey graphs help visualize energy, material, or cost transfers between processes. The Sankey graph below shows how DDoS reflection attacks have trended during the past five quarters. We tracked ten infrastructure-layer DDoS-reflection vectors. The most used vectors seem to correlate with the number of Internet devices that use these specific service protocols
Apple's upcoming App Store submission requirement around supporting IPv6-only environments (announced last year at WWDC and being enforced starting June 1) has been getting plenty of recent coverage. iOS application developers already need to make sure their applications work in IPv6-only environments with NAT64+DNS64; however, this by itself does not mean that those applications (or web-based applications) obtain content over native IPv6.
Akamai SIRT is investigating a new DDoS reflection and amplification method that abuses TFTP. This is yet another UDP-based protocol that has been added to the list of DDoS amplification scripts available for malicious use. A new advisory authored by Jose Arteaga outlining the threat and suggested defenses can be downloaded here.