Akamai Diversity

The Akamai Blog

The Recipe for SaaS Success Part 2: MINDBODY

In my previous post, I discussed roadblocks to successful SaaS application delivery and IDC's recommendation that most providers partner or buy, rather than build, infrastructure and monitoring cloud services. Now I want to delve into what that process looks like and the business benefits providers can see using MINDBODY, which has perfected their own personal recipe for SaaS success.

Bringing OTT Video to Life at NAB

We are less than a month away from NAB and Akamai has some big plans in store. With the amount of buzz centered around over-the-top (OTT) video, our floor presence is dedicated to bringing OTT workflow and delivery to life. Show attendees can experience a behind-the-scenes look at the technologies that are helping drive the seismic transformation in media delivery and consumption. Each section of the Akamai booth will represent a key component of OTT workflow including capture, cloud, monitor and consume.

The medical device industry is a global industry.  Globalization offers opportunities to increase revenue and decrease costs; it enriches the innovation that drives the industry by enabling collaboration with subject matter experts from across the globe; and it also enables medical device companies to establish global network relationships with suppliers, manufacturing sites, distributors and customers around the world.

HTTP Strict Transport Security (known as HSTS for short) is a security signal that instructs the browser to attempt all requests to your website using HTTPS. In short, with HSTS enabled, a modern browser will never attempt to visit your site on HTTP. Furthermore, the browser remembers this instruction for an amount of time you set. So the next time a user visits your website, their browser won't attempt a HTTP request.

BillGates Malware used in DDoS Attacks

By Bill Brenner, Akamai SIRT Senior Tech Writer

Akamai's Security Intelligence Research Team (SIRT) continues to see the BillGates trojan/bot family of malware being used to launch DDoS attacks. Attackers who control the malware -- first disclosed on a Russian IT website in February 2014 -- can gain full control of infected systems.

Akamai SIRT member Tsvetelin Choranov led the research effort outlined in this advisory.

Life Lessons at NAB

Less than a year out of college and getting ready to cover my first NAB Show as a wet-behind-the-ears trade journalist in the mid 90s, I remember receiving a fascinating (especially at the time) piece of advice. It came from a veteran of many shows, not to mention many trips to Las Vegas, shortly after I was assigned an ambitious list of conference sessions to report on during the week.

3 Recommendations for a Successful Social Media Strategy

The highly regulated environment of the financial services industry has likely contributed to the fact that many banks and financial institutions have been relatively slow to embrace social media engagement. However, with a deep understanding of the landscape and the compliance issues that govern the industry, financial institutions can have great success within the social media landscape.

Play Games Like a Player

Do you remember what it was like to play a game? Not as a games industry insider, studying a competitor's game, or keenly critiquing your own work. Just playing a game because it was fun, and because you had nothing at stake, and because there was a ninja on the box.

Securing the future of mobile video

By Lu Bolden, Vice President, Business Development, Verimatrix

The coming of age for mobile video and TV was perhaps one of the most tangible takeaways from the recent Mobile World Congress (MWC) at Barcelona, amid some of the more futuristic demonstrations around say the Internet of Things and virtual reality. 

On Trust and Video Games

I was about to hop on the Caltrain to San Francisco when I got the call. Over the metal on metal screech of the locomotive pulling into the station I could only make out the last few words, "to verify a few recent transactions". After boarding the train, I stood in the vestibule whispering for 20 minutes. It was my bank. Someone had gotten access to my debit card information and was making purchases in a country I'd never visited.