You appear to be offline. Some site functionality may not work.

How Terrarium reframes the compiler and sandbox relationship

Dec 10, 2018  in  Edge, Engineering

Get hands-on with Terrarium, a Fastly project that lets developers harness the power of edge computing in the languages they already use. See how this technology demonstration came to be (and why we’re even using that term), what problems it solves, and where it’s headed.

Read more

Accelerate your digital transformation

Digital transformation is one of the most-discussed topics at executive events — but what does it really mean for businesses? We’ll explore the right framework for businesses of all kinds to think through digital transformation,…

Altitude SF: Tales of scale, video insights, and making the internet better for everyone

1.4 billion active monthly users, 10 billion requests per day, and 5.2 TB per second peak traffic — these are some of the staggering numbers we heard about at our 7th Altitude conference where customers,…

Trust at scale: Introducing Platform TLS and Subscriber Provided Prefix

Today we’re announcing two new offerings on the Fastly platform: Platform TLS and Subscriber Provided Prefix. Both empower companies to provide fast, secure web experiences to their customers and end-users, while reducing the workload on…

Testing HTTP freshness in CDNs

CDNs all use HTTP caching to optimize performance, but sometimes different CDNs do it in slightly different ways and that can make things more complicated for our customers. This blog post makes a case for…

7 business uses for logging

To create effective logs, you first need to consider what you’re trying to achieve in capturing and maintaining logs. If you don’t begin with a clear business goal and proactively plan your logging strategy, you…

3 Common logging challenges

Effective logging requires thoughtful planning and consistent tuning and maintenance. Here are three of the biggest challenges of logging.

Patterns for authentication at the edge

Identity is a boring, but necessary element of most website builds. Validating a user’s identity and access rights is something that is in the critical performance path, required site-wide, and often implemented in a bespoke…

Fastly's Response to SegmentSmack

A remotely exploitable denial-of-service (DoS) attack against the Linux kernel, called SegmentSmack, was made public on August 6th, 2018 as CVE-2018-5390. Fastly was made aware of this vulnerability prior to that date through a responsible…

Elevating the user experience at Fastly

We’re excited to share several recent user experience updates that enhance WAF, Image Optimizer, and user management functionality in the Fastly control panel.

What’s Next for Fastly as We Power the World’s Most Important Companies

Since Fastly’s founding seven years ago, we’ve remained focused on scaling our business differently, with care and purpose. We’re building a talented team, and carefully select customers who share a similar vision – to create…

Hijacking the control flow of a WebAssembly program

While WebAssembly has already proven a fertile attack surface for the browser, as more web application code moves to WebAssembly from Javascript there will be a need to research and secure WebAssembly programs themselves. The…

Network Expansion Update: 51 POPs & 22 Tbps

We have been busy over the first half of the year launching POPs in Vancouver, Canada; Santiago, Chile; Buenos Aires, Argentina; and Mumbai and Chennai, India. Additionally, we’ve completed upgrade cycles to our POPs in…