Learn more about the technology behind the Internet.
A Content Delivery Network (CDN) is a system of distributed servers that deliver web content and pages to users based on their geographic locations to improve performance and reduce latency.
Learn about the metrics and best practices you should consider when gauging the performance of your CDN.
Live streaming is a real-time data transmission method enabling video content to be shared and viewed simultaneously without the need for prior recording or storage.
Serverless computing is a type of cloud computing - a dynamic method of delivering backend services on an as-needed basis.
Edge computing is computational processing at the edge of the network, at or near the source of the data, instead of processing within a centralized infrastructure.
Cloud computing provides users with on-demand access to computing resources, such as servers, storage, applications, and services all over the internet, instead of storing and managing them locally on their own servers or data centers.
A WAF is a specialized security solution that shields a web application from the internet, safeguarding the server by detecting and blocking malicious HTTP and HTTPS traffic to and from a web service.
A Distributed Denial of Service (DDoS) attack is a malicious attempt to impact the availability of a targeted system. The attacker uses multiple compromised sources to produce a volumetric attack.
Transport Layer Security (TLS) is an Internet Engineering Task Force (IETF) standard protocol that provides authentication, privacy, and data integrity for communications over the internet.
Bots are software programs designed to perform automated tasks on the internet. They can be programmed to automatically crawl websites for data, interact with users through chat interfaces, fill out forms, and/or perform repetitive tasks.
The robots.txt file lives within a website’s directory and provides bots with rules for which pages or files should be accessed. It is a guideline that website owners use to control how search engines and other bots interact with their websites.
A botnet is a group of compromised computers or Internet of Things devices (IoT) that are under the control of a hacker (also known as a “botmaster” or “bot herder”). They enable a botmaster to launch large-scale attacks.
OS command injection is a web application vulnerability that allows attackers to execute arbitrary commands on the underlying operating system.
Directory traversal, also known as “path traversal” (and identified with CWE-22), is a web application vulnerability that enables attackers to access unintended files on an underlying filesystem.
A cloud firewall acts as a virtual shield, protecting the digital boundaries of your cloud infrastructure from unauthorized access and cyberattacks.
An LLM (Large language model) is a sophisticated AI language model system designed to comprehend and produce human-like text by analyzing enormous amounts of language data.
In machine learning (ML), AI systems are trained on vast amounts of data to develop statistical models and algorithms. “Learning” is the algorithm’s ability to adjust its models based on new data, becoming more accurate and efficient over time.