Tutti i post del blog
Page 11 of 50
-
Built with Fastly: Northflank’s Developer Platform
Austin Spires, Will Stewart
Discover how Fastly empowers engineering teams to build and scale web applications, like startup Northflank, and how Fastly's products assist in reaching their goals.
ClientiDevOps
-
The Open Web is Vibrant, and Vital to 2025
Austin Spires, Jenn Turner
Explore Fastly's commitment to the open web and education, where ideas flourish into impactful online experiences. Check out what members of Fast Forward accomplished in 2024.
Culture+ 2 more
-
Profiling Fastly Compute Applications
Leon Brocard
Unlock superior web performance with Fastly Compute. Utilize our edge network and WebAssembly to build fast, secure applications tailored for your users.
Compute+ 2 more
-
Thanks to the internet’s on-call teams
Austin Spires
Thank you for the essential role that on-call teams play in ensuring internet reliability and security, particularly during the holiday season. We appreciate your dedication.
Culture+ 4 more
-
The headers we don't want
Andrew Betts
HTTP headers are an important way of controlling how caches and browsers process your web content. But many are used incorrectly or pointlessly, which adds overhead at a critical time in the loading of your page, and may not work as you intended.
-
Lean Threat Intelligence, Part 4: Batch alerting
Zack Allen
In Part 3, we showcased a technology that allows you to route messages to and from topics via Kafka. Now that data is flowing, how can you start monitoring and reacting to security events? In this post, we’ll show you a batch alerting strategy that you can use with Graylog and Kafka.
Sicurezza -
Battling log absurdity with Kafka
Zack Allen
In “Lean Threat Intelligence Part 2: The foundation,” we explained how we built our log management system, Graylog, using Chef. Next, we’ll cover how we created a message pipeline that allows us to route messages to different endpoints for analysis or enrichment.
Sicurezza -
Lean Threat Intelligence Part 2: The foundation
Rusty Bower, Zack Allen
In part 1, I discussed the general workflow the Threat Intelligence team at Fastly uses to plan for projects. After performing research and seeing what others have done in this space, we can now move forward with technology selection.
Sicurezza -
Diff at the edge with serverless cloud functions
Andrew Betts
Requesting the difference between two previously cached files — using just a CDN configuration and a serverless cloud compute function — is a great example of exploiting edge and serverless compute services to make your website more efficient and performant, and lower your bandwidth costs. Read on to learn more.
PrestazioniCompute -
Cache hit ratios at the edge: a performance study
Hooman Beheshti
In an earlier post, we discussed the meaning of cache hit ratio (CHR) and analyzed what the metric is and isn’t telling us, showing why we really need two different CHR metrics (CHR-edge and CHR-global) to fully understand how a CDN is serving your clients. In this post, we’ll analyze CHR-edge by way of a discussion about performance measurement via testing.
Prestazioni -
Understanding the Vary header in the browser
Andrew Betts
Browsers need to understand and respond to Vary rules, and the way they do this is different from the way Vary is treated by CDNs. In this post, Principal Developer Advocate Andrew Betts explores the murky world of cache variation in the browser.
Prestazioni -
Fastly’s Edge Cloud Industry Reports: A Year in Review
John Agger
Explore our industry reports on edge cloud strategies, addressing performance and security challenges. Unlock innovative solutions for common business challenges.
Approfondimenti del settoreEdge network
-
Hijacking the control flow of a WebAssembly program
Jonathan Foote
While WebAssembly has already proven a fertile attack surface for the browser, as more web application code moves to WebAssembly from Javascript there will be a need to research and secure WebAssembly programs themselves. The WebAssembly design obviates common classes of attacks that might be inherited from development languages like C and C++, but there is still some room for exploitation. This tutorial will cover control flow protection guarantees provided by WebAssembly, known weaknesses, and how to use clang control flow integrity (CFI) in WebAssembly programs to mitigate some risks around control flow hijacks.
WebAssembly -
The truth about cache hit ratios
Hooman Beheshti
Cache hit ratio is a common metric that evaluates a CDN's performance. Learn more about how to improve your cache hit ratio.
Prestazioni -
A modular Edge Side Includes component for JavaScript Compute
Katsuyuki Omuro
Fastly’s ESI library for JavaScript, now available on npm, allows you to add powerful ESI processing to your application.
Edge network+ 2 more -
Fastly Named to Newsweek Excellence Index 2025
Puja Jaspal
Fastly's inclusion in the 2025 Newsweek Excellence Index reflects our dedication to social responsibility and employee well-being, showcasing our commitment to excellence.
Notizie aziendaliCulture
-
2024: End of Year Product Release Rewind
Leigh Clancy
We’re always improving the Fastly platform to enable developers, security experts, and more! See an overview of the product releases that we unveiled in 2024.
CDN & distribuzione+ 5 more
-
What does it all mean? An introduction to semantic caching and Fastly’s AI Accelerator
Jesse von Doom
Fastly’s AI Accelerator is a pass-through API that makes semantic caching easy and works with your existing code.
Compute+ 4 more
-
How to Save Christmas for Beyoncé
Anil Dash
This Christmas, Netflix is bringing the world a Beyoncé halftime show, promising unforgettable moments - but will this massive live event go off without a hitch?
CDN & distribuzionePrestazioni
-
Scaling Fastly Network: Fighting FIB | Fastly
João Taveira Araújo
This post is the first in a series detailing the evolution of network software at Fastly. We’re unique amongst our peers in that from inception, we’ve always viewed networking as an integral part of our product rather than a cost center. We rarely share what we do with the wider networking community however, in part because we borrow far more from classic systems theory than contemporary networking practice.
Prodotto+ 2 more







