Akamai Diversity

The Akamai Blog

Mani Sundaram

Mani Sundaram

September 18, 2014 10:00 AM

Akamai SOC + PLX SOC + Akamai Cloud Security Solutio ...

Over the last five months, the services and support management teams from Akamai have been working hard on integrating the Akamai and Prolexic Security Operation Center (SOC). Given the progress that we've made along the way, we think it would be timely for us to talk about how this effort from both companies could help our customers against the ever-changing attack sphere.

Pierre Lermant

Pierre Lermant

July 29, 2014 11:00 AM

Top Five Web Performance Pitfalls: How to prevent th ...

Every web site is unique, and each presents its own set of performance challenges and opportunities. These challenges can be exacerbated by perfectly reasonable business goals and site features, which can negatively affect the overall end-user experience. Business requirements (more features/ads), analytics (data beacons), time to market (we want it now), resources and cost constraints are all considerations that should be balanced with their effect on delivering a web experience

Patrice Boffa

Patrice Boffa

July 15, 2014 9:59 AM

Search Engine Impersonation: The Wolf in Sheep's Clo ...

All companies with a web presence want search engines to crawl their sites and index their content because it's the easiest way to drive traffic, improve visibility and increase business. The fact is that companies want search engines to crawl their site on a regular basis and index as much content as possible. As such, they usually assume that all search engine requests are legitimate and really don't pay much

Matt Ringel

Matt Ringel

July 9, 2014 10:25 AM

Pitch. Presentation. Proposal.

Getting people to say they're interested in an idea is easy. Getting people to commit to an idea is hard. Let's talk about the difference between a Pitch, a Presentation, and a Proposal.

Frank Paolino

Frank Paolino

July 2, 2014 2:15 PM

Cloud Based Media Workflows: An Akamai Approach

The following post is part two of a two-part series exploring cloud-based media workflows. In part 1 of "Cloud Based Media Workflows," Barrett Mononen made the case that the cloud offers opportunities to address the complexity of your online media workflow. He noted that the cloud alone doesn't guarantee success -- that you must take a thoughtful, pragmatic approach to realize the greatest business benefits from the cloud. In this

Manuel Alvarez

Manuel Alvarez

June 30, 2014 8:37 AM

Thank you, from the Akamai Meet-Ups

When Akamai's Advance Solutions Group (ASG) launched the Akamai Meet-Up series, we asked ourselves these questions: Would Akamai customers embrace our format? Would they find the events safe for open technical interactions? And would they find Meet-Ups relevant over time? We were pleased when the answer to these questions came in the form of consistent attendance - over 30 per event - and positive feedback from attendees. We created the

Pierre Lermant

Pierre Lermant

May 1, 2014 10:57 AM

And you thought your page could not be cached ...

As we carry out performance evaluations for our customers, we often come across very popular pages that are made 'non-cacheable' at the edge. On top of incurring additional latency and therefore a degraded user experience, it generates heavy loads on our customers' origin infrastructure.

Akamai

Akamai

April 18, 2014 10:06 AM

The Argyle Executive Forum - Post-show report

Great panel session at the Argyle Executive Forum last week around Next Generation of Customer Care. My peers continue to see technology and the Internet as tools to enable and strengthen the customer experience across all industries, yet they still see relationships at the heart of customer intimacy. Folks came from all disciplines are looking for ways to create the ultimate experience through their Customer Care centers. Web experience continues

Aseem Ahmed

Aseem Ahmed

March 21, 2014 12:30 PM

What a web attack looks like to Akamai's Professiona ...

The job of security professionals is becoming tougher by the day. While we work hard to ensure that vulnerabilities are covered, an attacker simply needs to find the weakest link. Not a pleasing thought, but often attackers have the time and resources on their side while the "good guys" work under a whole different set of pressures.