Blog

Follow and Subscribe

More stories

August 20

In this blog post, Vladimir Vuksan outlines three common methods you can use for blocking or limiting access to content with Fastly.

August 11

At Fastly Altitude 2015, Joe Williams, a computer operator at GitHub, gave a talk on mitigating security threats (like DDoS attacks) with a CDN. This post is an overview of his talk, with…

August 10

Your site's performance needs to be monitored closely, but once you start your monitoring initiative, you might find yourself drowning in an endless wave of information. This can make it…

August 5

We’ve raised $75 million in Series D funding led by Iconiq Capital, with new contributions from existing investors Amplify Partners, August Capital, Battery Ventures, IDG Ventures, and O…

August 3

We often say that Fastly can easily become an extension of your app — there are three major components that make this possible: caching, control, and visibility.

July 30

Building a new point of presence (POP) from scratch involves all of the engineering groups within Fastly. Our data center infrastructure (DCI) team spearheads and coordinates the POP build…

July 21

In this blog post, I'll describe how to use AFL's experimental persistent mode to blow the doors off of a server without having to make major modifications to the server's codebase. I've…

July 15

We’re more engaged online than ever before, especially when it comes to consuming news. If you work with online media brands, you’re well aware that the way readers engage with news events…