
The Akamai Blog Subscribe
October 2018 Archives
The convergence of customer experience and data priv ...
Akamai Customer Day 2018 in London brought together an elite roster of identity leaders and marquee Akamai customers. Kicking off Cybersecurity Awareness month, senior representatives from some of Akamai's multinational clients -- from global pharmaceutical, telecommunications and consumer products companies -- discussed how to manage security and privacy risks in order to protect data and build trust-worthy customer engagement.
Meet the teen who won Technovation 2017
This summer Akamai hosted Girls Who Code for its fourth year in a row. Girls Who Code is a nonprofit organization that aims to support and increase the number of women in computer science. This is a spotlight article on one of the Girls Who Code participants, Aruzhan Koshkarova. Aruzhan, along with her teammates, won the Technovation Challenge last year for the app, QamCare. QamCare is an app that allows
Akamai mentors next generations of girls in tech
This summer Akamai hosted Girls Who Code for its fourth year in a row. Girls Who Code is a nonprofit organization that aims to support and increase the number of women in computer science. Akamai sponsored the Girls Who Code Summer Immersion program this past summer by providing the facilities and resources for the participants to learn. Part of the program involved the girls meeting with their mentor (an Akamai
Picture perfect: How to drive the best shopping expe ...
This article originally appeared on Internet Retailer. There are several key variables that retail marketing and web teams should consider when delivering high-quality images for engaging online shoppers. The quality, format and size of an image must all be considered to ensure that vivid images don't slow page load time.
Why traditional security isn't enough
We are constantly being bombarded with questions around the security of our data, but what about security for the devices needed to connect to that data? The world is a changing place and for those inclined to be unsavoury characters, a great place to anonymously make ill-gotten gains from unsuspecting victims who thought they were doing due diligence with their base-model anti-malware and anti-virus programs. After multiple data breaches, we
Managing Thousands of users in Hundreds of branches ...
We live in a global business world. Almost on a daily basis, we see organizations expanding rapidly across geographies. While businesses in every industry can have international sites, some verticals like banking, finance, education, and retail are more apt to have corporate offices in multiple locales. Companies are typically in Tier 1/metropolitan cities with over 1,000 users, medium branches are in Tier 2 cities with 500-1000 users, Tiers 3 and
Architectural paths for evolving the DNS
The Domain Name System (DNS) is one of the Internet's fundamental systems, providing the top-level hierarchy for naming Internet resources. One of its purposes is to act as a sort of phonebook, allowing names such as "www.example.com" to be resolved to resource information, such as server IP addresses. It provides the hierarchical naming model that enables clients to "resolve" or "lookup" resource records associated with names. This naming hierarchy also
It will take more than web pages that load faster to ...
When designing websites to meet peak traffic demands, it is vital to look beyond basic metrics such as page load speed. Providing visual content optimized for both desktop and mobile devices, and combating security threats will help you drive traffic and improve conversion rates during the holiday shopping season and beyond.
Why top brands put identity first
Today's consumers are digital natives. The median age of the world's population is less than 30 years old. 48% of the US population was born in the digital age -- after 1980 -- and has never experienced life without computers, video games, social media and the Internet. And even those of us who are older have spent the past 10+ years with a mobile phone glued to our hand, shopping
Improving Image & Video Manager with Real User Feedb ...
Steve Krug, a well-known user experience professional, has been quoted on many occasions for saying, "Don't make me think." It's true that users shouldn't have to puzzle around to find what they're looking for or to complete a task. Product usability is equally important to fancy features and technical capabilities because unused products eventually become shelf-ware. Rather than having users adapt to what we think their behavior should be, solution
API Gateway -- Secure API Traffic with OAuth 2.0 and ...
APIs are the connective tissue between software and modern digital experiences, and they must be exposed to consumers in a way that prevents misuse. This means your APIs must have appropriate governance (authorization, authentication, quota management policies) to prevent consumers from abusing APIs. Since releasing API Gateway earlier this year, we're already making it better. But first, in case you missed it, here is a refresher on what Akamai API
mPulse Timeline - New Impactful Way to Gain Insight ...
Introducing mPulse Timeline mPulse Timeline is the new interface of events, milestones & alerts, displayed in a simple & impactful format. Timeline is the first feature to be released for the new mPulse interface. It is a great way to showcase key insights in a friendly calendar timeline view, making it ideal for stakeholders (from various roles across your organisation) to digest & take action.
Find AND Fix First- and Third-Party Issues with the ...
It's been well established that there is a correlation between fast digital experiences and positive business results. What users experience on a site has a direct bearing on their engagement and buying behaviour and consequently the overall success of the business. Slow page load times can lead to high bounce rates, low NPS and SEO ranking. So now that performance is a priority for a lot of digital teams the
What's New in Performance
One of the things I like most about living in New England is the changing of seasons. I find myself looking forward, thinking about what's exciting about the next one. Each season offers something unique and special, and if you're ambitious enough to try new things, a variety of new opportunities. So far, this fall, we've done some apple picking and plan to take a few hikes as the leaves
Automate Firewall Protection on Your Website
by Volker Tegtmeyer and Hans Cathcart Have you ever felt like you did a great job protecting your mission-critical web applications, only to realize so many more web properties require your attention? Web properties are not all equal, and overloaded security teams can only focus on the most critical ones. As a result, there have been several evolving consequences for many organizations:
Prolexic Platform Enhancements - New APJ Scrubbing C ...
by Don Ng and Greg Burns This October, Akamai is announcing the turn-up of two additional Prolexic DDoS mitigation scrubbing centers in Singapore and Osaka, building on the nine previous scrubbing centers turned up this year and adding to our existing APJ footprint in Sydney, Tokyo, and Hong Kong. The new regional centers add approximately 800 Gbps to the Prolexic platform's bandwidth to 7.8 Tbps of dedicated attack mitigation capacity.
Introducing the Bot Endpoint Protection Report
Todays comprehensive monitoring capabilities in Security Center provide great insight into bot activity and countermeasures applied across your valuable web properties. Filter options allow you to focus on almost any desired detail. However, understanding what is happening on specific protected endpoints requires an understanding of not only Web Security Analytics, but also how you should translate a specific question into a sequence of filters. This can be tedious for a
What's New In Security
It's that time of year again. Here at our global headquarters in Cambridge, Massachusetts, the days are getting shorter (at least in terms of sunrise and sunset). Gone are the 90 degree days of summer; 60 is the new normal. And as we are now in the midst of the final months of the year, Starbucks is bringing back its Pumpkin Spice Latte. Just kidding...that happened in August. Here in
Best Practices for Ultra-Low Latency Streaming Using ...
Over the last 15 years, live streaming services have grown from novelties & experiments in to profitable businesses serving an ever-growing cohort of cord-cutters and cord-nevers. Initial streaming implementations mimicked the workflows of the broadcast world, using custom servers to deliver streams via proprietary protocols. Here at Akamai traffic grew 22,000-fold from a 1 Gbps stream in 2001 (the first Victoria's Secret webcast) to 23 Tbps in June 2018 for
Drive Greater Efficiencies in Reaching a Distributed ...
The Challenge: Achieve Consistent Contribution while Maximizing Audience Reach Audiences are becoming increasingly distributed not only from a geographical perspective, but also in the channels viewers use when consuming live content. Content providers need a solution to efficiently and easily reach a distributed audience, while ensuring they are delivering an engaging experience to each of their viewers across across a variety of outlets.
Streamline OTT Delivery using Cloud Origins with Clo ...
By 2020, an estimated 92% of all workloads will be processed in cloud data centers. The emergence of public cloud providers has changed the way organizations build, deploy and manage their applications and workflows.
Tailor Video Experiences for Your End Viewers with M ...
While the number of online viewers continues to grow, content providers must be able to deliver high quality video streams, flawlessly at scale to meet the demands of these audiences. This is no small task as high volumes of requests often come from various locations, diverse device types and networks. When it comes to preparing content, some content providers opt for a one-size-fits-all approach, creating a similar bitrate ladder for
Ensure Highly Reliable First Mile Connectivity with ...
As linear OTT video services become mainstream, many broadcasters and online video distributors are increasingly looking for new ways to enhance service reliability. Many who manage their own origin infrastructures within a datacenter environment are seeking added assurance for ingest of their linear streams. Akamai sat down with several large online video distributors to better understand their requirements, and captured the following:
Go Live! Addressable, Ad-Supported, Live Video At Sc ...
Live streaming poses a unique set of challenges and online audiences can only be monetized to the extent that they remain engaged. From an advertising perspective, the viewing experience between your live content and the ads needs to not only be seamless, but also highly targeted in order to achieve meaningful returns. Prefetch is the name of the game.
Zero Trust Security Architectures - Akamai's Approac ...
This is Part 5 of a 5 part blog series. Jump to Part 1: Introduction Jump to Part 2: Network Micro-Segmentation Jump to Part 3: Software Defined Perimeter Jump to Part 4: Identity Aware Proxy Introduction In the first part of this blog series, we covered an overview of zero trust security architecture concepts. The main concept is that trust should never be assumed based on where a user is