This week’s installment of “The Friday Five” follows… providing a snapshot of recent press coverage that demonstrates how Akamai is helping customers move Faster Forward. Highlights include:
- Give me an “N”… give me an “A”… give me a “B”
- Are you saying I have a bad reputation?
- How do you define enterprise mobility?
- No “Silver Bullet” for security woes
- And still more State of the Internet
April 14, 2015
The streaming video industry has spent a lot of time and money building out the infrastructure to support television sized audiences. Are dynamic ad insertion solutions ready for the same challenge? The announcement that Akamai has integrated Adobe Primetime’s Ad Scaleplatform aims to ensure the ads are shown, no matter what the load.
According to John Bishop, CTO of the Media Business at Akamai, ensuring the right ad is ready to play every time an ad break approaches is just as tough as making the movie or show scale. With targeted dynamic ad insertion, everyone watching the stream gets their own custom list of ads (the “ad manifest”.) That means if there are 100,000 viewers there are also 100,000 ad manifests to manage.
(See also: FierceOnline Video, V-Net, Streaming Media, VideoNuze, AdExchanger, MediaPost, Rapid TV News, TREFIS, Broadcasting & Cable, Computerworld, Huffington Post, Telecompaper, Global Security, Panorama Audiovisual, Advanced Television, Computerworld)
April 15, 2015
Akamai Technologies has released a data analytics engine which continuously analyses more than two Petabytes of data to help thwart security threats.
Akamai Cloud Security Intelligence, a data processing engine within the Akamai Intelligent Platform, is used to analyse data related to web security threats.
Akamai uses the resulting intelligence to not only continuously update and improve the Kona Site Defender application security rule set, but also provides the framework around which innovative offerings, such as the newly available Kona Client Reputation solution are built. Through the ability to analyse more than 20 terabytes of daily Web attack traffic associated with hundreds of millions of unique IP addresses on an hourly basis, Cloud Security Intelligence is designed to provide more comprehensive insight into how malicious actors are attacking web properties.
ABC Technology and Games
April 17, 2015
According to research firm IDC, global smartphone shipments are predicted to reach 1.4 billion in 2015, representing a 12.2% year-on-year increase. Consequently, as smart devices adoption continues to grow at an exponential pace, enterprise mobility has become a greater area of focus for businesses. Organisations that enable the workforce with mobility and collaboration will have a clear advantage over those that fail to do so. According to IDC, enterprises are on the cusp of unlocking greater value from mobility by integrating collaborative applications and video tools into their overall enterprise mobility strategy. But what does this mean for organisations?
Most organisations now allow access to services such as email and calendar on phones and tablets, but few go beyond these basics. In order to truly take mobility, productivity and collaboration to the next level, organisations need to invest in bringing more applications to mobile devices. These applications may range from sales tracking to customer care and all can help improve productivity, efficiency and customer satisfaction. In fact an IDC survey of more than 500 executives across Asia Pacific found that raising productivity, improving customer service and lowering cost of operations are among the top reasons why investing in mobility makes sense.
*Authored by Akamai’s Varun Jaitly, APJ Product Manager
April 13, 2015
Most Australian businesses are acutely aware of the security risks they face today. However, while many focus on utilising a bundle of security solutions in hope of finding a ‘silver bullet’ to fix its security woes, many forget the basics.
As we look forward in 2015, it’s also important to remember the many examples of organisations that fell victim to cyber security breaches in the year gone by.
Australian businesses can minimise their chances of experiencing such a security breach in 2015 by observing some basic yet timeless fundamentals when it comes to securing business operations in an online environment. Here are seven essentials below:
*Authored by Akamai’s John Ellis, APJ Chief Strategist, Cyber Security
April 13, 2015
When it comes to broadband deployments worldwide, the United States still ranks high, but not as high as it used to, according to a new report.
“Other countries have been improving faster than we have,” said David Belson, editor of the Fourth Quarter 2014 State of the Internet Report from Akamai Technologies. “The challenge is we have areas of high population density, but also lots of rural areas where it’s harder to deliver broadband. Also, in some areas there is not a lot of competition. There is a lot of noise being made about deployments here and there. And that’s good news, but it’s really fits and starts, and right now that’s not enough to move the U.S. needle.”
(See also Host Review)
April 15, 2015
For Akamai, the global content delivery network, demand for bandwidth has grown by 60 percent annually and will continue to accelerate with the delivery of high quality files delivered across screens. While demand is rising, Akamai is seeking to level costs for media owners, explains Tom Leighton, CEO and co-founder in this interview with Beet.TV
He explained that the recent acquisition of Octoshape is part of the strategy for managing bandwidth costs.
We spoke at the Akamai booth at the NAB Show in Las Vegas.