Get In Touch
April 2017 Archives
Summary Adversaries calling themselves the Lizard Squad have been sending businesses extortion letters, demanding payment in bitcoin to prevent a Distributed Denial of Service (DDoS) or other attack against their applications. These letters have been sent to businesses across the globe and across industries for several years, with little follow-through. These letters appear to come from multiple groups including Lizard Squad, the Armada Collective, and DD4BC, though in many case
In our previous blog, we saw how a new generation of users are increasing the expectations of a mobile app like never before and identified the three key success criteria for mobile apps: 1) increase customer conversions, 2) drive installs and 3) increase customer loyalty. For this blog we profiled the Top 100 retail apps in the app store to explain how you can leverage Akamai features to meet the
We all know what happens whenever anyone or anything tries to access a resource on the Internet. It all starts with a DNS request that translates a URL (www.akamai.com) into an IP address (184.108.40.206): Now if we dive a little deeper into the DNS request flow we can see the requester make a request to the recursive DNS infrastructure of either their ISP or their enterprise. In other words recursive
Inside the Mind of a CybercriminalThe rise of open source malware, IoT-based threats, and criminal services-for-hire is fomenting a new era in cybercrime. While global cybercrime is expanding and cybercriminals are stuffing their bank accounts, individuals and businesses (especially SMBs) are directly impacted. Many worry about the safety and security of their online experiences and what communication service providers (CSPs) are doing to protect them.
SharePoint, Microsoft's 16-year-old flagship file storage and collaboration product, is used by over 200 million worldwide users. Likened to a Swiss Army knife, SharePoint performs so many functions that it has become an integral part of most enterprise IT fabrics. Of course, it is not perfect - no product is. And like many incumbent products, there are always new challengers ready to deliver advanced feature and performance capabilities. Google Apps
I'm extremely excited to announce the release of our very first State of Online Retail Performance report. This report is a semi-annual analysis of the intersection of performance metrics from three different perspectives: IT, business, and user experience. It's always a thrill to release new research into the wild, and I'm extra thrilled about this particular project. As our first piece of new research to be released under the
It's all about the "audience of you" as Akamai gears up for next week's 2017 NAB Show in Las Vegas. With that phrase, we're talking about helping to deliver the best possible experiences for each and every OTT video viewer. It's not an easy thing to do, but we're demonstrating a host of new products and technology that can help make sure consumers enjoy nothing less than flawless viewing ...
We are all familiar with the enterprise security approach of treating an organization like a castle, and protecting it with a moat. Moats have been used for perimeter defense since ancient Egypt. While the moat and castle enterprise security approach has worked well in the past it is starting to show its age.