Fastly
Fastly
Blog Post
  • Browsers need to understand and respond to Vary rules, and the way they do this is different from the way Vary is treated by CDNs. In this post, Principal Developer Advocate explores the murky world of cache variation in the browser. Read more

Fastly
Fastly
Blog Post
  • On October 26, we hosted an evening of drinks, snacks, and an excellent security discussion with the security research and engineering communities. Folks gathered at Bespoke Central Lounge in downtown San Francisco to hear from Alex Bazhaniuk, of Eclypsium, Inc., and Stephen Checkoway, of the University of Illinois. Watch the videos from their talks here. Read more

Fastly
Fastly
Blog Post
  • The Fastly Infrastructure and Edge Cloud Operations Teams wrapped up 2017 by completing major milestones in our point of presence (POP) deployments around the globe AND achieving 20 Tbps of connected edge capacity. Since our last update, we’ve deployed additional US POPs in Atlanta, Houston, Columbus, and Palo Alto, brand-new locations in Cape Town, South Africa and Columbus Ohio, plus a new 100GE...

Fastly
Fastly
Blog Post
  • Open source projects are the foundation of the internet; by sponsoring their important work, we support our vision for unfettered, scalable technical innovation. We’ve supported numerous open source projects since the inception of Fastly, and our founding team has invested time into open source development since our incorporation. Read on to learn about the evolution of our Open Source and Nonprof...

Fastly
Fastly
Blog Post
  • As part of our mission to serve the best of the internet, we’re honored to offer complimentary CDN services to nonprofits, including One America Appeal, Direct Relief, Reporters Without Borders, Khan Academy, and more. Although the fall of 2017 had more than its fair share of natural disasters, we were heartened to learn how people gave (and engaged) with nonprofits. Read on to see what we learned...

Fastly
Fastly
YouTube Video
  • The Juniper Dual EC incident In December 2015, Juniper Networks announced that unknown attackers had added unauthorized code to ScreenOS, the operating system for their NetScreen VPN routers. This code created two vulnerabilities: an authentication bypass that enabled remote administrative access, and a second vulnerability that allowed passive decryption of VPN traffic. Reverse engineering of Scr...

Fastly
Fastly
YouTube Video
  • Exploring Your System Deeper Ever wanted to explore deep corners of your system but didn't know how? This could include system boot firmware, ROMs on expansion cards, I/O devices and their firmware, microprocessors, embedded controllers, memory devices, low-level hardware interfaces, virtualization and hypervisors — you could discover if any of these have known vulnerabilities, configured insecure...

Fastly
Fastly
YouTube Video
  • HTTP/2 (or H2, as the cool kids call it) has been ratified for months, and browsers already support it. But do the exciting features that HTTP/2 offers meet expectations? Frederik Deweerdt explores how HTTP/2 fares in the real world, how browser behavior is changing to accommodate new server-side functionality, and how you can get the most of the new protocol everybody’s talking about.

Fastly
Fastly
YouTube Video
  • Peter Bourgon and Sean Braithwaite offer an overview of microservices and data pipelines, explaining how both systems reflect the organizations and people that build them (in adherence to Conway’s law) and can be well understood in terms of their relationship to change and time. You'll learn the virtues and vices of each architecture and get enough context to apply them coherently.

Fastly
Fastly
YouTube Video
  • HTTP/2 (or H2, as the cool kids call it) has been ratified for months, and browsers already support it. But do the exciting features that HTTP/2 offers meet expectations? Frederik Deweerdt explores how HTTP/2 fares in the real world, how browser behavior is changing to accommodate new server-side functionality, and how you can get the most of the new protocol everybody’s talking about.

Fastly
Fastly
YouTube Video
  • Most people working with CDN caches know about the Vary header, but few properly understand what it really does. And with the advent of the Key header, new patterns for varying cache content will emerge. Andrew Betts shares common and advanced use cases for Vary, such as language, A/B testing, compression, and service worker support, and outlines potential changes to consider when Key arrives.

Fastly
Fastly
Blog Post
  • Cyber Monday 2017 was the biggest yet, bringing in $6.59 billion in online sales — compared to $5.03 billion on Black Friday, and 16.8% more revenue than Cyber Monday last year. And, this Cyber Monday was the first $2 billion mobile shopping day. Similar to our observations last year, we saw significant increases in traffic to ecommerce sites during the week of Thanksgiving, with traffic climbing ...

Fastly
Fastly
Blog Post
  • As an edge cloud platform, Fastly is in a unique position to monitor DDoS attack patterns and trends as they evolve. In this post, Jose Nazario, Sr. Director of Security Research, and Ryan Landry, Director of Edge Cloud Operations, take a look back at the history of DDoS, sharing how they’re changing and the trends we’re seeing. Getting a handle on the various shapes and sizes of DDoS will help in...

Fastly
Fastly
Blog Post
  • Our customers’ war stories have taught us that even the most routine changes (like restarting a database or switching backends) can sometimes lead to unexpected errors, but savvy teams already have the tools and processes in place to resolve them as they happen. In this post, we’ll share how Niklas Gustavsson, Principal Engineer at Spotify, encountered live (in production, and accessible to end us...

Fastly
Fastly
YouTube Video
  • Fastly delivers more than a million log events per second. Setting it is up is easy, but there are many features you might not be using to their full extent. This workshop covered setting up logging to various endpoints, dealing with structured data, and getting real-time insights into your customers’ behavior.

Fastly
Fastly
Blog Post
Fastly
Fastly
Blog Post
  • Requesting the difference between two previously cached files — using just a CDN configuration and a serverless cloud compute function — is a great example of exploiting edge and serverless compute services to make your website more efficient and performant, and lower your bandwidth costs. Read on to learn more. Read more

Fastly
Fastly
Blog Post
  • Fastly’s engineering teams are smart and capable — they architect thoughtfully, write elegant code, and work carefully with incredible complexity and scale. So why would they (or anyone) need quality assurance (QA)? In this post, Senior QA Automation Engineer Alice Nodelman examines how the QA mindset works, touching on our approach to QA at Fastly and sharing how you could apply this mindset to y...

Fastly
Fastly
Blog Post
  • We’re pleased to announce the next installment of our Security Speaker Series, which brings together researchers and engineers to share research, tools, and ideas. Join us for drinks, snacks, and a few hours of excellent security discussion on Thursday, Oct. 26 at 6pm PT at Bespoke Central Lounge in downtown San Francisco. Speakers include Alex Bazhaniuk, of Eclypsium, Inc., and Stephen Checkoway,...

Fastly
Fastly
Blog Post
  • In keeping with our security team’s vision for defending the modern web, we launched our Web Application Firewall (WAF) to help our customers secure their sites and applications while providing reliable online experiences for their users. In this post, two of the engineers who built our WAF will take you on a deep dive into the tech behind it, exploring how we built a performant, highly configurab...

Fastly
Fastly
Blog Post
  • Deliberate practice is the act of performing a set of tasks that are just slightly more difficult than what you’re used to, so you can get better at a specific activity and move from a novice to an experienced practitioner. In this post, Security Engineer Sandra Escandor-O’Keefe walks us through the art of deliberate practice, offering tips for novices and mentors alike. Read more

Out-Market Your Competitors?

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account Log in

By signing up, you agree to the Terms of Service and Privacy Policy.

Out-Market Your Competitors

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account

Already a user?  Log in

By signing up, you agree to the Terms of Service and Privacy Policy.