Get In Touch
June 2019 Archives
Effective communication skills are fundamental to developing both immediate and long term relationships with our customers. How else can we learn the answers to questions such as: "What are our customers concerns, needs, and desires?", "How can we best address their short and long term needs?", And "What kind of customer experience are we providing"?
I was quite fortunate to visit Tokyo for the first time last year, and it was an unforgettable experience to explore all the sights and sounds around the Ginza district and to interact with the very friendly Japanese people. It wasn't all play, though -- and I had to get some real work done as well.
What's in a Login Button? All you need to know about the new "Sign in with Apple" For Akamai Identity Cloud, we intend to support our clients that wish to implement "Sign in with Apple" just like we do for Facebook, Google, Instagram, Twitter, LinkedIn and about 30 other Identity Providers. If you use it for your apps and websites, here's what you need to know.
Authors: Mark Greve, Domițian Tămaș-Selicean The online video player landscape is fragmented with a wide variety of players across a mix of popular platforms. In the world of HTML5-video players in browsers, there are a number of open-source solutions (e.g., hls.js, dash.js, Shaka Player), as well as commercial offerings which include Akamai's AMP.
From its beginnings as a replacement for a centralized database, the Domain Name System (DNS) has evolved into a dynamic, highly distributed, question-answer protocol. The proverbial "phone book of the internet" has increased in complexity and scale alongside the rapid growth of the World Wide Web. One primary example is Domain Name System Security Extensions (DNSSEC). The founding architects of DNS did not include any inherent security protections for the
It's a busy time for my team as we prepare for next week's customer conference, Edge World, in Las Vegas. I'm excited for another productive week of interacting and innovating with our customers. There's still time for you to join us; register here.
With growing mobile and remote workforces, enterprises must allow many different device types to access their applications in the name of productivity and flexibility. Traditional, perimeter-based security methods are no longer viable due to complexity, maintenance overhead, and inherently insecure model. Instead, businesses should shift their focus to verifying who and what is accessing a network and eliminating the perimeter.