Get In Touch
July 2017 Archives
Your extraordinary work on game development through concept to crunch, your tireless community building, brand awareness, and engagement all converge on one moment: Launching the game. Is it possible to ever finish building a video game? The longer the dev cycle, the more likely it is you'll run out the clock on tech, slipping down the slope toward obsolescence. The more time you give your team, the more features and
Ransomware has changed a lot since it was introduced back in 1989 by Dr. Joseph Popp, where 20,000 floppy disks were distributed via snail mail. The malware hid files on a victim's hard drive and encrypted only the file names, rather than the entire files themselves. As one might assume, the entire remediation process was manual, rather than digital. Popp's program asked victims to print the ransom note and send
I recently wrote an article for Information Security Magazine where I explained how internet security researchers could use their spam folders as a resource tool. It got me thinking about going into greater detail on what I've found in my inbox. Phishing Sites I noticed an increase in "free gift cards" and other e-commerce type offers in my spam email account around Black Friday the day after Thanksgiving, which
Congratulations to TalkTalk, who were just named the number one provider in the UK for Fibre Broadband response times by the SamKnows industry benchmark. How did they accomplish this? With the support of Nominum's, now part of Akamai, carrier-class DNS software solution, CacheServe.
The Akamai-sponsored Girls Who Code program is well under way! Week 2 featured lots of activity in the Girls Who Code classroom at Akamai's Cambridge, MA headquarters. The girls learned to use Scratch, a visual programming language that was developed at MIT to help people learn to code. They used Scratch to create a paddle-ball game and a side-scroller game. This included the use of functions, parameters, user input, conditionals,
Takes a second to say goodbyeSay goodbye, oh, oh, ohIt takes a second to say goodbyeSay goodbye, oh, oh, oh, say bye byeWhere you going to now When U2 penned the lyrics to its song, "Seconds," in 1983, there was no such thing as online video. In fact, video had killed the radio star only four years earlier, and the Internet was a notion that barely extended beyond the walls
There's an old adage that if something seems too good to be true, it probably is. If you're like me, you can apply this to your own experiences. For example, about 5 years ago a small chain of gyms that exclusively used vibrating exercise machines popped up near my home. Their gym goers would stand on a vibration platform for 15 minutes while reading or watching TV. The gym promised
Imagine your player's first experience with your game. Finally, after waiting all these years, she's got the game in hand. She tears the cellophane, cracks the case, slots the disc, and . . . "Game is now updating. Please wait." Watching 20 GB load onto a machine is not anyone's idea of fun.
Your customers are unique and they all expect fast, secure, personalized digital experiences. They are spread across the world, in regions of varying network connectivity, utilize a plethora of devices and screen sizes - making it challenging to deliver your experiences. By delivering 95 Exabytes of data over billions of devices every year, Akamai provides the world's largest and most trusted cloud delivery platform that empowers you to provide fast,
Written by Lisa Adams The Girls Who Code Summer Immersion program at Akamai Technologies is off to a great start! During Week 1 we welcomed the class of 20 girls and the teaching team of three instructors from Girls Who Code. The girls began learning how to program in the Scratch language, and already gave impressive demonstrations using their new skills! We also conducted the Meet and Greet event, which
Written by Or Katz and Raviv Perets A widespread phishing scam that offers free airline tickets has been spotted in the wild by Akamai's Enterprise Threat Protector (ETP) security research team. The campaign uses a number of social engineering techniques to trick people into providing their private information. When someone clicks on the link in the phishing email, they are taken to a dedicated website that tells them they have