HTTP2 is the second major version of the HTTP protocol. It changes the way HTTP is transferred "on the wire" by introducing a full binary protocol, made up of TCP connections, streams and frames, rather than simply being a plain-text protocol. Such a fundamental change between HTTP/1.x to HTTP/2, meant that client side and server side implementations had to incorporate completely new code to support new HTTP2 features - this fact, introduces nuances in protocol implementations, which in turn, might be used to passively fingerprint web clients.
Get In Touch
Recently by Akamai
The Domain Name System - the DNS - is the foundation of the internet. Beyond connecting IP addresses with web requests, DNS provides the basis for both the detection of and protection from global cyberthreats before they reach an organization's corporate network resources --particularly given that more than 90% of malware uses DNS for command and control. This presents a tremendous opportunity for service providers to utilize their DNS infrastructure to provide security services to their business customers, which have a tremendous need for stronger, more proactive cyber protection.
The State of the Internet Report is growing up - with this issue, it enters its tenth year of publication. Over time, it has matured in many ways, including its length, design, and the content it includes. Looking back at that first issue (all 17 pages of it), for the first quarter of 2008, we find that the report covered:
As technology continues to develop, more and more applications become not just convenient, but necessary. It was less than a decade ago that it was inconceivable we would 'need' to carry a consumer device to access the internet in our pockets. Today, it is essential. The same is true with the applications we use for business, commerce and government. They need to be accessible in our pockets 24/7.
Along with this convenience comes the hassles of securely gaining access to these applications, and to do so without putting the security of important organizational data at risk.
SharePoint, Microsoft's 16-year-old flagship file storage and collaboration product, is used by over 200 million worldwide users. Likened to a Swiss Army knife, SharePoint performs so many functions that it has become an integral part of most enterprise IT fabrics. Of course, it is not perfect - no product is. And like many incumbent products, there are always new challengers ready to deliver advanced feature and performance capabilities. Google Apps and Slack come to mind, and even claim to be taking away some - albeit modest - market share.
I'm extremely excited to announce the release of our very first State of Online Retail Performance report. This report is a semi-annual analysis of the intersection of performance metrics from three different perspectives: IT, business, and user experience.
It's always a thrill to release new research into the wild, and I'm extra thrilled about this particular project.
As our first piece of new research to be released under the Akamai umbrella, it's fitting that this project is also the biggest of its kind in the performance industry. We gathered one month's worth of beacon data from leading retail sites, comprised of our customers who have given permission for their data to be anonymized, aggregated and used in this type of research. This study represents a whopping 27.7 billion beacons' worth of user data - which equates to more than 10 billion user visits.
No matter what else she does in her day, Judy Piper is, first and foremost, a people manager. Her role as a senior engineering manager in the Enterprise business unit is all about empowering others, and her curiosity and fearlessness help her succeed. Judy recently answered a few questions about her cool new project, her advice to others and her favorite extreme sport.
From an IT management perspective, remote access management can be complex. Deployment, administration, testing and compliance is often multifaceted and time consuming, and security is an on-going concern.
Granted, I have talked with IT professionals who tell me VPNs - being the primary remote access technology deployed by enterprises - are not difficult to deploy and maintain. They tell me VPNs are a 'set it and forget it' technology, and they serve their organizations well because they have just a few remote workers.
The pervasiveness of technology has meant automation of tasks, allowing better productivity, with more time to do more. However, the dark side of technology would be that enterprises and individuals alike are vulnerable to cybercrimes, compromise of identities, loss of data and subject to malicious attacks.
In our recent 'State of the Internet / Security Q4 2016 report', we reported that Akamai mitigated 3,826 distributed denial of service (DDoS) attack events on our Prolexic network, a 4% increase in attacks since Q4 2015.
One of the questions I am frequently asked about the State of the Internet is how things are changing - what are the trends we see in the data? As we've just closed out the ninth year of publication of the Connectivity report, I thought that it would be a good time to take look back and see just how much better things have gotten since the initial report, which covered the first quarter of 2008.
The graphs below cover the key connection speeds and broadband adoption metrics currently covered within the report, along with a look at connections under 256 kbps - some folks out there are still stuck on dial-up quality connections. For ease of review, we've aggregated the data at a continental level - obviously, that means that the changes seen in a specific country will be lost in the averaging. For more granular insight, similar country-level trending graphs can be built and exported (as can the underlying data) using the State of the Internet graph visualization tool. (And you can always contact us at email@example.com with questions as well.)