Quantcast
Channel: Linode News & Updates - Blog | Akamai
Browsing all 61 articles
Browse latest View live

Kubernetes the Hard Way

Kubernetes can be challenging. To help understand the complexity, Jorge Gaona forked a well-known repository to create a Linode-specific approach.

View Article


Cutting Latency, Not Security

Content Security Policy (CSP) is a security feature implemented in browsers to protect websites and web applications from attacks.

View Article


Increased Capacity in Asia: Mumbai and Singapore Expansions Now Available

We’ve added capacity in Mumbai, IN and Singapore, SG for our growing customer base in Asia.

View Article

Migrating from Client-Side to Server-Side Adaptive Bitrate Streaming

In this blog post, we will explore the technical aspects of transitioning from client-side to server-side ABR, focusing on implementation and performance.

View Article

In-memory Data Management Caching Tools: A Guide to the Best Options

In-memory data management caching tools store frequently accessed data in memory, which significantly improves performance by reducing how often the database needs to be accessed. There are so many...

View Article


What’s New for Developers: October 2024

Read about the latest Akamai PowerShell release, learn how to build a NAT Gateway in a VPC, read new Object Storage migration docs, and more.

View Article

Pay Attention to Your Non-Production Subdomains

Security teams often focus on an organization's main production domain. Learn why paying attention to your non-production subdomains matters.

View Article

Loose Lips Can Sink Websites Too

This blog dives into how exposed version numbers in your tech stack can lead to serious vulnerabilities, and what you can do to tighten security.

View Article


Improve SEO with Prerender.io

In this post, we’ll look at how prerendering services from Prerender.io can help you overcome SEO obstacles.

View Article


Scrub EXIF Image Data in Your DevOps Pipeline

When you take a photo with a digital camera or smartphone, you’re capturing more than just a beautiful image. Within that image file, you also have something called EXIF data (EXIF stands for...

View Article

In the Dark about Shadow APIs?

Shadow APIs aren’t typically a risk you would think about when developing APIs. See real-world examples to understand the threats they pose.

View Article

Introducing the Akamai App Platform

Akamai App Platform, built on Otomi, is now available in beta.

View Article

Getting Started with Akamai App Platform

Step-by-step instructions to provision a Kubernetes cluster with Akamai App Platform enabled and then build, deploy and publicly expose an application.

View Article


Akamai Managed Database Services: Powered by Aiven

Akamai has partnered with Aiven, a leading global managed database provider, to offer customers a streamlined way to offload the complexities of database setup, configuration, patching, backups, and...

View Article

More Power at the Edge: Introducing Distributed Compute Regions

10 Distributed Compute Regions across the Americas, Europe, Africa, Asia, and Oceania are now available.

View Article


Frankfurt Expansion Now Available for All Customers

Our latest core compute region expansion is live in Frankfurt, DE.

View Article

What’s New for Developers: November 2024

As the holiday season approaches and we bid farewell to another year, there’s no slowing down in developer content and releases. Last month, we launched the latest Akamai Terraform Provider and...

View Article


Just Right: New GPUs Now Available

Deploy cloud GPU instances optimized for media workloads and lightweight AI applications, powered by NVIDIA RTX 4000 Ada Generation GPU cards.

View Article

Pad Credit Card Information to Protect Your Customers’ Wallets

We take a look at a recently-assessed API, to see how it avoided the problem that helped the Allies beat the Axis powers in World War II.

View Article

Authentication Isn’t Everything

Alex Leung explains why fortifying one's login API and loosening other parts of one's security posture can lead to cybersecurity issues.

View Article
Browsing all 61 articles
Browse latest View live