Get In Touch
HTTP/2 (h2) is incredibly exciting: The first major rev to HTTP in 15 years, focused on modern web development, performance minded, etc., etc. But one thing that has people looking at it with trepidation is that to use it you effectively need to move your site over to TLS (i.e. HTTPS). Though not a requirements in the protocol, no major browser has plans to put h2 in the clear. Whether
During an early summer morning on August 1982, in the brightly lit hallway of a non-descript academic building on the campus of University of California Berkeley, two scientists who were working on what the world will later know as the Internet, had a brief but very important conversation:"How can we trust ARPANET?""Because you can trust your colleagues."
Search Engine Optimization (SEO) campaigns are prevalent and legitimate ways to promote web applications in order to get a better visibility and more traffic to your web application. But what happens when an SEO campaign crosses the line into the dark side and becomes malicious? Recently the Akamai Threat Research Team discovered a highly sophisticated SEO attack campaign that was promoting the search results rating for a web application
Akamai famously lost the first competition it entered, the MIT 50k, before securing funding and becoming a wildly successful start up and one of the largest IPOs in history. Today Akamai is a 2B public company that prides itself on fighting the odds in order to challenge the status quo and provide business value to customers.
Akamai's 8th Annual Customer Conference is approaching quickly and we have some great industry speakers joining us to share how they are overcoming some of the toughest challenges in Commerce. Speakers from Norwegian Cruise Lines, Crocs, Mary Kay and Guitar Center, among many others will share ideas, best practices and tactics to improve customer experience and increase key performance metrics as we address key trends shaping the industry.
It's no secret that digital video entertainment is in the midst of a massive transformation that includes the way content is packaged, distributed and consumed. The days of consumers demanding large cable TV packages and renting feverishly from local video stores are a distant past. Today, electronic consumer media spend has already surpassed physical, the words "skinny bundle" have crept into our vocabulary and those of us in the
As a New Englander and avid Patriots fan, I have been obsessed with watching everything #FreeBrady related. I can't get enough. Short of reading the entire 243-page Wells report - Snooze - I want to watch everything that is going on with deflategate in order to support my favorite QB against all the haters out there.
The Q2 2015 State of the Internet Security Report (SOTI Security) is due out in the next couple of weeks, and today we continue previewing various sections. Yesterday we told you about security risks that come into play when third-party plug-ins are used with Wordpress. Today we look at attack vectors the bad guys favored in Q2.
The Q2 2015 State of the Internet - Security Report (SOTI Security) is due out in the next couple of weeks, and today we begin previewing various sections. Let's begin with the potential security risks that come into play when third-party plug-ins are used with Wordpress. WordPress is the world's most popular website and blogging platform. Its ever-growing popularity makes it an attractive target for attackers who aim to exploit hundreds