Back to blog

Follow and Subscribe

Tutti i post del blog

Page 11 of 50

  • Built with Fastly: Northflank’s Developer Platform

    Austin Spires, Will Stewart

    Discover how Fastly empowers engineering teams to build and scale web applications, like startup Northflank, and how Fastly's products assist in reaching their goals.

    Clienti
    DevOps
  • The Open Web is Vibrant, and Vital to 2025

    Austin Spires, Jenn Turner

    Explore Fastly's commitment to the open web and education, where ideas flourish into impactful online experiences. Check out what members of Fast Forward accomplished in 2024.

    Culture
    + 2 more
  • Profiling Fastly Compute Applications

    Leon Brocard

    Unlock superior web performance with Fastly Compute. Utilize our edge network and WebAssembly to build fast, secure applications tailored for your users.

    Compute
    + 2 more
  • Thanks to the internet’s on-call teams

    Austin Spires

    Thank you for the essential role that on-call teams play in ensuring internet reliability and security, particularly during the holiday season. We appreciate your dedication.

    Culture
    + 4 more
  • The headers we don't want

    Andrew Betts

    HTTP headers are an important way of controlling how caches and browsers process your web content. But many are used incorrectly or pointlessly, which adds overhead at a critical time in the loading of your page, and may not work as you intended.

  • Lean Threat Intelligence, Part 4: Batch alerting

    Zack Allen

    In Part 3, we showcased a technology that allows you to route messages to and from topics via Kafka. Now that data is flowing, how can you start monitoring and reacting to security events? In this post, we’ll show you a batch alerting strategy that you can use with Graylog and Kafka.

    Sicurezza
  • Battling log absurdity with Kafka

    Zack Allen

    In “Lean Threat Intelligence Part 2: The foundation,” we explained how we built our log management system, Graylog, using Chef. Next, we’ll cover how we created a message pipeline that allows us to route messages to different endpoints for analysis or enrichment.

    Sicurezza
  • Lean Threat Intelligence Part 2: The foundation

    Rusty Bower, Zack Allen

    In part 1, I discussed the general workflow the Threat Intelligence team at Fastly uses to plan for projects. After performing research and seeing what others have done in this space, we can now move forward with technology selection.

    Sicurezza
  • Diff at the edge with serverless cloud functions

    Andrew Betts

    Requesting the difference between two previously cached files — using just a CDN configuration and a serverless cloud compute function — is a great example of exploiting edge and serverless compute services to make your website more efficient and performant, and lower your bandwidth costs. Read on to learn more.

    Prestazioni
    Compute
  • Cache hit ratios at the edge: a performance study

    Hooman Beheshti

    In an earlier post, we discussed the meaning of cache hit ratio (CHR) and analyzed what the metric is and isn’t telling us, showing why we really need two different CHR metrics (CHR-edge and CHR-global) to fully understand how a CDN is serving your clients. In this post, we’ll analyze CHR-edge by way of a discussion about performance measurement via testing.

    Prestazioni
  • Understanding the Vary header in the browser

    Andrew Betts

    Browsers need to understand and respond to Vary rules, and the way they do this is different from the way Vary is treated by CDNs. In this post, Principal Developer Advocate Andrew Betts explores the murky world of cache variation in the browser.

    Prestazioni
  • Fastly’s Edge Cloud Industry Reports: A Year in Review

    John Agger

    Explore our industry reports on edge cloud strategies, addressing performance and security challenges. Unlock innovative solutions for common business challenges.

    Approfondimenti del settore
    Edge network
  • Hijacking the control flow of a WebAssembly program

    Jonathan Foote

    While WebAssembly has already proven a fertile attack surface for the browser, as more web application code moves to WebAssembly from Javascript there will be a need to research and secure WebAssembly programs themselves. The WebAssembly design obviates common classes of attacks that might be inherited from development languages like C and C++, but there is still some room for exploitation. This tutorial will cover control flow protection guarantees provided by WebAssembly, known weaknesses, and how to use clang control flow integrity (CFI) in WebAssembly programs to mitigate some risks around control flow hijacks.

    WebAssembly
  • The truth about cache hit ratios

    Hooman Beheshti

    Cache hit ratio is a common metric that evaluates a CDN's performance. Learn more about how to improve your cache hit ratio.

    Prestazioni
  • A modular Edge Side Includes component for JavaScript Compute

    Katsuyuki Omuro

    Fastly’s ESI library for JavaScript, now available on npm, allows you to add powerful ESI processing to your application.

    Edge network
    + 2 more
  • Fastly Named to Newsweek Excellence Index 2025

    Puja Jaspal

    Fastly's inclusion in the 2025 Newsweek Excellence Index reflects our dedication to social responsibility and employee well-being, showcasing our commitment to excellence.

    Notizie aziendali
    Culture
  • 2024: End of Year Product Release Rewind

    Leigh Clancy

    We’re always improving the Fastly platform to enable developers, security experts, and more! See an overview of the product releases that we unveiled in 2024.

    CDN & distribuzione
    + 5 more
    Un'illustrazione di una mano che regge un megafono da cui escono le icone dello scudo e del lucchetto
  • What does it all mean? An introduction to semantic caching and Fastly’s AI Accelerator

    Jesse von Doom

    Fastly’s AI Accelerator is a pass-through API that makes semantic caching easy and works with your existing code.

    Compute
    + 4 more
  • How to Save Christmas for Beyoncé

    Anil Dash

    This Christmas, Netflix is bringing the world a Beyoncé halftime show, promising unforgettable moments - but will this massive live event go off without a hitch?

    CDN & distribuzione
    Prestazioni
  • Scaling Fastly Network: Fighting FIB | Fastly

    João Taveira Araújo

    This post is the first in a series detailing the evolution of network software at Fastly. We’re unique amongst our peers in that from inception, we’ve always viewed networking as an integral part of our product rather than a cost center. We rarely share what we do with the wider networking community however, in part because we borrow far more from classic systems theory than contemporary networking practice.

    Prodotto
    + 2 more