Kubernetes the Hard Way
Kubernetes can be challenging. To help understand the complexity, Jorge Gaona forked a well-known repository to create a Linode-specific approach.
View ArticleCutting Latency, Not Security
Content Security Policy (CSP) is a security feature implemented in browsers to protect websites and web applications from attacks.
View ArticleIncreased Capacity in Asia: Mumbai and Singapore Expansions Now Available
We’ve added capacity in Mumbai, IN and Singapore, SG for our growing customer base in Asia.
View ArticleMigrating from Client-Side to Server-Side Adaptive Bitrate Streaming
In this blog post, we will explore the technical aspects of transitioning from client-side to server-side ABR, focusing on implementation and performance.
View ArticleIn-memory Data Management Caching Tools: A Guide to the Best Options
In-memory data management caching tools store frequently accessed data in memory, which significantly improves performance by reducing how often the database needs to be accessed. There are so many...
View ArticleWhat’s New for Developers: October 2024
Read about the latest Akamai PowerShell release, learn how to build a NAT Gateway in a VPC, read new Object Storage migration docs, and more.
View ArticlePay Attention to Your Non-Production Subdomains
Security teams often focus on an organization's main production domain. Learn why paying attention to your non-production subdomains matters.
View ArticleLoose Lips Can Sink Websites Too
This blog dives into how exposed version numbers in your tech stack can lead to serious vulnerabilities, and what you can do to tighten security.
View ArticleImprove SEO with Prerender.io
In this post, we’ll look at how prerendering services from Prerender.io can help you overcome SEO obstacles.
View ArticleScrub EXIF Image Data in Your DevOps Pipeline
When you take a photo with a digital camera or smartphone, you’re capturing more than just a beautiful image. Within that image file, you also have something called EXIF data (EXIF stands for...
View ArticleIn the Dark about Shadow APIs?
Shadow APIs aren’t typically a risk you would think about when developing APIs. See real-world examples to understand the threats they pose.
View ArticleIntroducing the Akamai App Platform
Akamai App Platform, built on Otomi, is now available in beta.
View ArticleGetting Started with Akamai App Platform
Step-by-step instructions to provision a Kubernetes cluster with Akamai App Platform enabled and then build, deploy and publicly expose an application.
View ArticleAkamai Managed Database Services: Powered by Aiven
Akamai has partnered with Aiven, a leading global managed database provider, to offer customers a streamlined way to offload the complexities of database setup, configuration, patching, backups, and...
View ArticleMore Power at the Edge: Introducing Distributed Compute Regions
10 Distributed Compute Regions across the Americas, Europe, Africa, Asia, and Oceania are now available.
View ArticleFrankfurt Expansion Now Available for All Customers
Our latest core compute region expansion is live in Frankfurt, DE.
View ArticleWhat’s New for Developers: November 2024
As the holiday season approaches and we bid farewell to another year, there’s no slowing down in developer content and releases. Last month, we launched the latest Akamai Terraform Provider and...
View ArticleJust Right: New GPUs Now Available
Deploy cloud GPU instances optimized for media workloads and lightweight AI applications, powered by NVIDIA RTX 4000 Ada Generation GPU cards.
View ArticlePad Credit Card Information to Protect Your Customers’ Wallets
We take a look at a recently-assessed API, to see how it avoided the problem that helped the Allies beat the Axis powers in World War II.
View ArticleAuthentication Isn’t Everything
Alex Leung explains why fortifying one's login API and loosening other parts of one's security posture can lead to cybersecurity issues.
View Article