Get In Touch
October 2018 Archives
We are constantly being bombarded with questions around the security of our data, but what about security for the devices needed to connect to that data? The world is a changing place and for those inclined to be unsavoury characters, a great place to anonymously make ill-gotten gains from unsuspecting victims who thought they were doing due diligence with their base-model anti-malware and anti-virus programs. After multiple data breaches, we
We live in a global business world. Almost on a daily basis, we see organizations expanding rapidly across geographies. While businesses in every industry can have international sites, some verticals like banking, finance, education, and retail are more apt to have corporate offices in multiple locales. Companies are typically in Tier 1/metropolitan cities with over 1,000 users, medium branches are in Tier 2 cities with 500-1000 users, Tiers 3 and
The Domain Name System (DNS) is one of the Internet's fundamental systems, providing the top-level hierarchy for naming Internet resources. One of its purposes is to act as a sort of phonebook, allowing names such as "www.example.com" to be resolved to resource information, such as server IP addresses. It provides the hierarchical naming model that enables clients to "resolve" or "lookup" resource records associated with names. This naming hierarchy also
When designing websites to meet peak traffic demands, it is vital to look beyond basic metrics such as page load speed. Providing visual content optimized for both desktop and mobile devices, and combating security threats will help you drive traffic and improve conversion rates during the holiday shopping season and beyond.
Steve Krug, a well-known user experience professional, has been quoted on many occasions for saying, "Don't make me think." It's true that users shouldn't have to puzzle around to find what they're looking for or to complete a task. Product usability is equally important to fancy features and technical capabilities because unused products eventually become shelf-ware. Rather than having users adapt to what we think their behavior should be, solution
APIs are the connective tissue between software and modern digital experiences, and they must be exposed to consumers in a way that prevents misuse. This means your APIs must have appropriate governance (authorization, authentication, quota management policies) to prevent consumers from abusing APIs. Since releasing API Gateway earlier this year, we're already making it better. But first, in case you missed it, here is a refresher on what Akamai API
Introducing mPulse Timeline mPulse Timeline is the new interface of events, milestones & alerts, displayed in a simple & impactful format. Timeline is the first feature to be released for the new mPulse interface. It is a great way to showcase key insights in a friendly calendar timeline view, making it ideal for stakeholders (from various roles across your organisation) to digest & take action.
It's been well established that there is a correlation between fast digital experiences and positive business results. What users experience on a site has a direct bearing on their engagement and buying behaviour and consequently the overall success of the business. Slow page load times can lead to high bounce rates, low NPS and SEO ranking. So now that performance is a priority for a lot of digital teams the
One of the things I like most about living in New England is the changing of seasons. I find myself looking forward, thinking about what's exciting about the next one. Each season offers something unique and special, and if you're ambitious enough to try new things, a variety of new opportunities. So far, this fall, we've done some apple picking and plan to take a few hikes as the leaves
by Volker Tegtmeyer and Hans Cathcart Have you ever felt like you did a great job protecting your mission-critical web applications, only to realize so many more web properties require your attention? Web properties are not all equal, and overloaded security teams can only focus on the most critical ones. As a result, there have been several evolving consequences for many organizations:
by Don Ng and Greg Burns This October, Akamai is announcing the turn-up of two additional Prolexic DDoS mitigation scrubbing centers in Singapore and Osaka, building on the nine previous scrubbing centers turned up this year and adding to our existing APJ footprint in Sydney, Tokyo, and Hong Kong. The new regional centers add approximately 800 Gbps to the Prolexic platform's bandwidth to 7.8 Tbps of dedicated attack mitigation capacity.
Todays comprehensive monitoring capabilities in Security Center provide great insight into bot activity and countermeasures applied across your valuable web properties. Filter options allow you to focus on almost any desired detail. However, understanding what is happening on specific protected endpoints requires an understanding of not only Web Security Analytics, but also how you should translate a specific question into a sequence of filters. This can be tedious for a
It's that time of year again. Here at our global headquarters in Cambridge, Massachusetts, the days are getting shorter (at least in terms of sunrise and sunset). Gone are the 90 degree days of summer; 60 is the new normal. And as we are now in the midst of the final months of the year, Starbucks is bringing back its Pumpkin Spice Latte. Just kidding...that happened in August. Here in
Over the last 15 years, live streaming services have grown from novelties & experiments in to profitable businesses serving an ever-growing cohort of cord-cutters and cord-nevers. Initial streaming implementations mimicked the workflows of the broadcast world, using custom servers to deliver streams via proprietary protocols. Here at Akamai traffic grew 22,000-fold from a 1 Gbps stream in 2001 (the first Victoria's Secret webcast) to 23 Tbps in June 2018 for
The Challenge: Achieve Consistent Contribution while Maximizing Audience Reach Audiences are becoming increasingly distributed not only from a geographical perspective, but also in the channels viewers use when consuming live content. Content providers need a solution to efficiently and easily reach a distributed audience, while ensuring they are delivering an engaging experience to each of their viewers across across a variety of outlets.
By 2020, an estimated 92% of all workloads will be processed in cloud data centers. The emergence of public cloud providers has changed the way organizations build, deploy and manage their applications and workflows.
While the number of online viewers continues to grow, content providers must be able to deliver high quality video streams, flawlessly at scale to meet the demands of these audiences. This is no small task as high volumes of requests often come from various locations, diverse device types and networks. When it comes to preparing content, some content providers opt for a one-size-fits-all approach, creating a similar bitrate ladder for
As linear OTT video services become mainstream, many broadcasters and online video distributors are increasingly looking for new ways to enhance service reliability. Many who manage their own origin infrastructures within a datacenter environment are seeking added assurance for ingest of their linear streams. Akamai sat down with several large online video distributors to better understand their requirements, and captured the following:
Live streaming poses a unique set of challenges and online audiences can only be monetized to the extent that they remain engaged. From an advertising perspective, the viewing experience between your live content and the ads needs to not only be seamless, but also highly targeted in order to achieve meaningful returns. Prefetch is the name of the game.
This is Part 5 of a 5 part blog series. Jump to Part 1: Introduction Jump to Part 2: Network Micro-Segmentation Jump to Part 3: Software Defined Perimeter Jump to Part 4: Identity Aware Proxy Introduction In the first part of this blog series, we covered an overview of zero trust architecture concepts. The main concept is that trust should never be assumed based on where a user is in