Time filter

Source Type

Cambridge, MA, United States

Akamai Technologies Inc. | Date: 2015-11-30

Using cryptographic techniques, sensitive data is protected against disclosure in the event of a compromise of a content delivery network (CDN) edge infrastructure. These techniques obviate storage and/or transfer of such sensitive data, even with respect to payment transactions that are being authorized or otherwise enabled from CDN edge servers.

Akamai Technologies Inc. | Date: 2015-05-18

A method of delivering a live stream includes recording the stream using a recording tier, and playing the stream using a player tier. The step of recording the stream includes sub-steps that begin when the stream is received in a source format. The stream is then converted into an intermediate format (IF), which is an internal format for delivering the stream within an overlay network. The player process begins when a requesting client is associated with a network proxy. In response to receipt at the proxy of a request for the stream or a portion thereof, the proxy retrieves (either from the archive or the data store) a stream manifest and at least one fragment index. Using the fragment index, the intermediate format file fragments are retrieved to the proxy, converted to a target format, and then served in response to the client request.

To serve content through a content delivery network (CDN), the CDN must have some information about the identity, characteristics and state of its target objects. Such additional information is provided in the form of object metadata, which according to the invention can be located in the request string itself, in the response headers from the origin server, in a metadata configuration file distributed to CDN servers, or in a per-customer metadata configuration file. CDN content servers execute a request identification and parsing process to locate object metadata and to handle the request in accordance therewith. Where different types of metadata exist for a particular object, metadata in a configuration file is overridden by metadata in a response header or request string, with metadata in the request string taking precedence.

Akamai Technologies Inc. | Date: 2015-03-26

In non-limiting embodiments described herein, multipath TCP can be implemented between clients and servers, the servers being in a distributed computing system. Multipath TCP can be used in a variety of ways to increase reliability, efficiency, capacity, flexibility, and performance of the distributed computing system. Examples include achieving path redundancy, connection migration between servers and between points-of-presence, end-user mapping (or -remapping), migration or path redundancy for special object delivery, and others.

Akamai Technologies Inc. | Date: 2015-04-21

The process of rendering web pages can be significantly improved with a content delivery system that pre-renders web content for a client device. A web page program can be pre-executed and the result delivered to a requesting client device, rather than or before sending a traditional set of web page components, such as a markup language document, cascading style sheets, embedded objects. This pre-execution can relieve the client device of the burden of rendering the web page, saving resources and decreasing latency before the web page is ready, and can reduce the number of network requests that the client device must make before being able to display the page. Disclosed herein are methods, systems, and devices for creating and delivering pre-rendered web pages for accelerated browsing.

Discover hidden collaborations