SlideShare uma empresa Scribd logo
1 de 11
Baixar para ler offline
Akamai Partner Training
      Malcolm Rowe
      Vice President, Asia Pacific




12th September 2012
Zero One Taipei Taiwan               Akamai Confidential
Akamai’s Origins

 • Founded in 1998 by Dr. Tom Leighton and Danny Lewin
 • Spawned from a research project at the MIT Cambridge (USA)
 • Focused on the development of distributed algorithms for load
   balancing, packet routing, server assignment and content caching
 • The goal: Make the Internet faster, secure and more reliable




Akamai Confidential              Faster ForwardTM                     © 2012 Akamai
The Internet: Simple on the Outside…




                                The Internet

Data center                                          End-User




 Akamai Confidential              Faster ForwardTM      © 2012 Akamai
…But Complex on the Inside
                                                 Thousands of
                                                   networks
Numerous Applications




                                                The Internet

 Data center
                        Increasing
                          Threats
                                      Billions of                         Millions of users
                                     Configurations                      on myriad devices


  Akamai Confidential                                 Faster ForwardTM                © 2012 Akamai
The challenges of the Internet continue…


                                                  2006          2011       2016

# of Unique IP Addresses per day:                 225M          600M       1,620M

                      Content Served per day:     1.6 PB        50 PB      1,500 PB

    Mobile Traffic Delivered per day:             <3 TB         520 TB     91,000 TB

       Commerce Transacted per day:               $140M         $550M      $1,650M

                          Peak Attack Traffic:    24Gbps        200 Gbps   1,600 Gbps




Akamai Confidential                          Faster ForwardTM                         © 2012 Akamai
OUR MISSION: ACCELERATE INNOVATION
          In a hyperconnected world you must master the trends of cloud, media,
                        mobile, while overcoming security threats.




               CLOUD           MEDIA                       MOBILE   SECURITY




Akamai Confidential                     Faster ForwardTM                       © 2012 Akamai
Akamai Today


 2500             Employees
 4000             Customer
 1,12B            Revenue
 63,2%            Market Share




Akamai Confidential              Faster ForwardTM   © 2012 Akamai
The CDN market is a hard battlefield – Value is King
Limelight Networks                        Akamai




Akamai Confidential           Faster ForwardTM         © 2012 Akamai
Top 100 Worldwide Global Brands trust Akamai




     Akamai Confidential                       Faster ForwardTM   © 2012 Akamai
Our Customers Extend Across All Industries
                                                         MEDIA &
ENTERPRISE             COMMERCE   HIGH-TECH                           PUBLIC SECTOR
                                                      ENTERTAINMENT




 Akamai Confidential               Faster ForwardTM                       © 2012 Akamai
We remove the complexities of technology so our customers can capture
                the opportunity and meet the demands of the hyperconnected world.




Akamai Confidential                        Faster ForwardTM                      © 2012 Akamai

Mais conteúdo relacionado

Mais procurados

EMC's IT's Cloud Transformation, Thomas Becker, EMC
EMC's IT's Cloud Transformation, Thomas Becker, EMCEMC's IT's Cloud Transformation, Thomas Becker, EMC
EMC's IT's Cloud Transformation, Thomas Becker, EMCCloudOps Summit
 
Comment exploiter les solutions d'intégration entre applications Cloud et "on...
Comment exploiter les solutions d'intégration entre applications Cloud et "on...Comment exploiter les solutions d'intégration entre applications Cloud et "on...
Comment exploiter les solutions d'intégration entre applications Cloud et "on...Marc Jouve
 
Cloud marketplaces will open standards makes dreams of profitability a realit...
Cloud marketplaces will open standards makes dreams of profitability a realit...Cloud marketplaces will open standards makes dreams of profitability a realit...
Cloud marketplaces will open standards makes dreams of profitability a realit...Khazret Sapenov
 
Virtualization: where it came from and where it's going
Virtualization: where it came from and where it's goingVirtualization: where it came from and where it's going
Virtualization: where it came from and where it's goingKyle Smith
 
CSS Corp AWS_roadshow_bangalore
CSS Corp AWS_roadshow_bangaloreCSS Corp AWS_roadshow_bangalore
CSS Corp AWS_roadshow_bangaloreMovate
 
Bullet Proof Your Amazon Cloud Deployment: Best Practices in Deploying Applic...
Bullet Proof Your Amazon Cloud Deployment: Best Practices in Deploying Applic...Bullet Proof Your Amazon Cloud Deployment: Best Practices in Deploying Applic...
Bullet Proof Your Amazon Cloud Deployment: Best Practices in Deploying Applic...Movate
 
Moving apps to_the_cloud
Moving apps to_the_cloudMoving apps to_the_cloud
Moving apps to_the_cloudOpSource
 
CSS Corp at Silicon India
CSS Corp at Silicon IndiaCSS Corp at Silicon India
CSS Corp at Silicon IndiaMovate
 
Public, Private and Hybrid: For Enterprise, It's All About the Cloud
Public, Private and Hybrid: For Enterprise, It's All About the CloudPublic, Private and Hybrid: For Enterprise, It's All About the Cloud
Public, Private and Hybrid: For Enterprise, It's All About the CloudOpSource
 
Velocity EU 2014: Recycling the Web (why it's slowing your mobile app)
Velocity EU 2014: Recycling the Web (why it's slowing your mobile app)Velocity EU 2014: Recycling the Web (why it's slowing your mobile app)
Velocity EU 2014: Recycling the Web (why it's slowing your mobile app)Colin Bendell
 
AWS Partner Presentation - CSS Corp
AWS Partner Presentation - CSS CorpAWS Partner Presentation - CSS Corp
AWS Partner Presentation - CSS CorpAmazon Web Services
 
Soyez plus flexibles avec la sauvegarde dans le cloud DPS
Soyez plus flexibles avec la sauvegarde dans le cloud DPSSoyez plus flexibles avec la sauvegarde dans le cloud DPS
Soyez plus flexibles avec la sauvegarde dans le cloud DPSRSD
 
IBM SmartCloudEnterprise use of IBM Rational Solutions
IBM SmartCloudEnterprise use of IBM Rational SolutionsIBM SmartCloudEnterprise use of IBM Rational Solutions
IBM SmartCloudEnterprise use of IBM Rational SolutionsAlex Amies
 
Government 2.1 - Let The Virtual Journey Begins, NOW: From Desktop To the Clo...
Government 2.1 - Let The Virtual Journey Begins, NOW: From Desktop To the Clo...Government 2.1 - Let The Virtual Journey Begins, NOW: From Desktop To the Clo...
Government 2.1 - Let The Virtual Journey Begins, NOW: From Desktop To the Clo...HKITF
 
How Cloud Providers' Business Needs Drive Enterprise Identity & Security
How Cloud Providers' Business Needs Drive Enterprise Identity & SecurityHow Cloud Providers' Business Needs Drive Enterprise Identity & Security
How Cloud Providers' Business Needs Drive Enterprise Identity & SecurityNovell
 
Vincent Desveronnieres, Oracle
Vincent Desveronnieres,  OracleVincent Desveronnieres,  Oracle
Vincent Desveronnieres, OracleEwa Stepien
 
Why i - Common Europe 2012
Why i - Common Europe 2012Why i - Common Europe 2012
Why i - Common Europe 2012COMMON Europe
 
V c loudapi_coffeetalk__pimplaskar_may2010
V c loudapi_coffeetalk__pimplaskar_may2010V c loudapi_coffeetalk__pimplaskar_may2010
V c loudapi_coffeetalk__pimplaskar_may2010Pablo Roesch
 

Mais procurados (20)

Meta soft corporate profile
Meta soft  corporate profileMeta soft  corporate profile
Meta soft corporate profile
 
EMC's IT's Cloud Transformation, Thomas Becker, EMC
EMC's IT's Cloud Transformation, Thomas Becker, EMCEMC's IT's Cloud Transformation, Thomas Becker, EMC
EMC's IT's Cloud Transformation, Thomas Becker, EMC
 
Comment exploiter les solutions d'intégration entre applications Cloud et "on...
Comment exploiter les solutions d'intégration entre applications Cloud et "on...Comment exploiter les solutions d'intégration entre applications Cloud et "on...
Comment exploiter les solutions d'intégration entre applications Cloud et "on...
 
Css Corp Profile
Css  Corp  ProfileCss  Corp  Profile
Css Corp Profile
 
Cloud marketplaces will open standards makes dreams of profitability a realit...
Cloud marketplaces will open standards makes dreams of profitability a realit...Cloud marketplaces will open standards makes dreams of profitability a realit...
Cloud marketplaces will open standards makes dreams of profitability a realit...
 
Virtualization: where it came from and where it's going
Virtualization: where it came from and where it's goingVirtualization: where it came from and where it's going
Virtualization: where it came from and where it's going
 
CSS Corp AWS_roadshow_bangalore
CSS Corp AWS_roadshow_bangaloreCSS Corp AWS_roadshow_bangalore
CSS Corp AWS_roadshow_bangalore
 
Bullet Proof Your Amazon Cloud Deployment: Best Practices in Deploying Applic...
Bullet Proof Your Amazon Cloud Deployment: Best Practices in Deploying Applic...Bullet Proof Your Amazon Cloud Deployment: Best Practices in Deploying Applic...
Bullet Proof Your Amazon Cloud Deployment: Best Practices in Deploying Applic...
 
Moving apps to_the_cloud
Moving apps to_the_cloudMoving apps to_the_cloud
Moving apps to_the_cloud
 
CSS Corp at Silicon India
CSS Corp at Silicon IndiaCSS Corp at Silicon India
CSS Corp at Silicon India
 
Public, Private and Hybrid: For Enterprise, It's All About the Cloud
Public, Private and Hybrid: For Enterprise, It's All About the CloudPublic, Private and Hybrid: For Enterprise, It's All About the Cloud
Public, Private and Hybrid: For Enterprise, It's All About the Cloud
 
Velocity EU 2014: Recycling the Web (why it's slowing your mobile app)
Velocity EU 2014: Recycling the Web (why it's slowing your mobile app)Velocity EU 2014: Recycling the Web (why it's slowing your mobile app)
Velocity EU 2014: Recycling the Web (why it's slowing your mobile app)
 
AWS Partner Presentation - CSS Corp
AWS Partner Presentation - CSS CorpAWS Partner Presentation - CSS Corp
AWS Partner Presentation - CSS Corp
 
Soyez plus flexibles avec la sauvegarde dans le cloud DPS
Soyez plus flexibles avec la sauvegarde dans le cloud DPSSoyez plus flexibles avec la sauvegarde dans le cloud DPS
Soyez plus flexibles avec la sauvegarde dans le cloud DPS
 
IBM SmartCloudEnterprise use of IBM Rational Solutions
IBM SmartCloudEnterprise use of IBM Rational SolutionsIBM SmartCloudEnterprise use of IBM Rational Solutions
IBM SmartCloudEnterprise use of IBM Rational Solutions
 
Government 2.1 - Let The Virtual Journey Begins, NOW: From Desktop To the Clo...
Government 2.1 - Let The Virtual Journey Begins, NOW: From Desktop To the Clo...Government 2.1 - Let The Virtual Journey Begins, NOW: From Desktop To the Clo...
Government 2.1 - Let The Virtual Journey Begins, NOW: From Desktop To the Clo...
 
How Cloud Providers' Business Needs Drive Enterprise Identity & Security
How Cloud Providers' Business Needs Drive Enterprise Identity & SecurityHow Cloud Providers' Business Needs Drive Enterprise Identity & Security
How Cloud Providers' Business Needs Drive Enterprise Identity & Security
 
Vincent Desveronnieres, Oracle
Vincent Desveronnieres,  OracleVincent Desveronnieres,  Oracle
Vincent Desveronnieres, Oracle
 
Why i - Common Europe 2012
Why i - Common Europe 2012Why i - Common Europe 2012
Why i - Common Europe 2012
 
V c loudapi_coffeetalk__pimplaskar_may2010
V c loudapi_coffeetalk__pimplaskar_may2010V c loudapi_coffeetalk__pimplaskar_may2010
V c loudapi_coffeetalk__pimplaskar_may2010
 

Destaque

VMware zimbra email and collaboration for the post pc era
VMware zimbra email and collaboration for the post pc eraVMware zimbra email and collaboration for the post pc era
VMware zimbra email and collaboration for the post pc era零壹科技股份有限公司
 
賽門鐵克 Backup Exec 2012 技術簡報
賽門鐵克 Backup Exec 2012 技術簡報賽門鐵克 Backup Exec 2012 技術簡報
賽門鐵克 Backup Exec 2012 技術簡報Wales Chen
 
賽門鐵克 VMware 完整解決方案
賽門鐵克 VMware 完整解決方案賽門鐵克 VMware 完整解決方案
賽門鐵克 VMware 完整解決方案Wales Chen
 
Cisco unified collaboration training presentation by Zerone
Cisco unified collaboration training presentation by ZeroneCisco unified collaboration training presentation by Zerone
Cisco unified collaboration training presentation by Zerone零壹科技股份有限公司
 
賽門鐵克個人資料保護法解決方案 (專注在 DLP)
賽門鐵克個人資料保護法解決方案 (專注在 DLP)賽門鐵克個人資料保護法解決方案 (專注在 DLP)
賽門鐵克個人資料保護法解決方案 (專注在 DLP)Wales Chen
 
Cisco data center switch nexus series training presentation by zerone
Cisco data center switch nexus series training presentation by zeroneCisco data center switch nexus series training presentation by zerone
Cisco data center switch nexus series training presentation by zerone零壹科技股份有限公司
 

Destaque (20)

VMware zimbra email and collaboration for the post pc era
VMware zimbra email and collaboration for the post pc eraVMware zimbra email and collaboration for the post pc era
VMware zimbra email and collaboration for the post pc era
 
01 vad 產品介紹_d-security文件加密(2013-0529)
01 vad 產品介紹_d-security文件加密(2013-0529)01 vad 產品介紹_d-security文件加密(2013-0529)
01 vad 產品介紹_d-security文件加密(2013-0529)
 
零壹科技 個人資料管理系統 (PIMS) WorkShop
零壹科技 個人資料管理系統 (PIMS) WorkShop零壹科技 個人資料管理系統 (PIMS) WorkShop
零壹科技 個人資料管理系統 (PIMS) WorkShop
 
Net iq sentinel log manager (work shop)
Net iq sentinel log manager (work shop)Net iq sentinel log manager (work shop)
Net iq sentinel log manager (work shop)
 
Symantec System Recovery 2011_0320
Symantec System Recovery 2011_0320Symantec System Recovery 2011_0320
Symantec System Recovery 2011_0320
 
Symantec Backup Exec 2012 產品介紹_0320
Symantec Backup Exec 2012 產品介紹_0320Symantec Backup Exec 2012 產品介紹_0320
Symantec Backup Exec 2012 產品介紹_0320
 
Symantec Backup Exec 2012 產品技術訓練
Symantec Backup Exec 2012 產品技術訓練Symantec Backup Exec 2012 產品技術訓練
Symantec Backup Exec 2012 產品技術訓練
 
壹點通行銷同步雲 雲端服務說明會簡報
壹點通行銷同步雲  雲端服務說明會簡報壹點通行銷同步雲  雲端服務說明會簡報
壹點通行銷同步雲 雲端服務說明會簡報
 
01 vad 產品介紹_dmp文件管理(2013-0529)
01 vad 產品介紹_dmp文件管理(2013-0529)01 vad 產品介紹_dmp文件管理(2013-0529)
01 vad 產品介紹_dmp文件管理(2013-0529)
 
Symantec system recovery 2011產品技術訓練
Symantec system recovery 2011產品技術訓練Symantec system recovery 2011產品技術訓練
Symantec system recovery 2011產品技術訓練
 
SonicWall NSA 2400 Getting Started Guide
SonicWall NSA 2400 Getting Started GuideSonicWall NSA 2400 Getting Started Guide
SonicWall NSA 2400 Getting Started Guide
 
賽門鐵克 Backup Exec 2012 技術簡報
賽門鐵克 Backup Exec 2012 技術簡報賽門鐵克 Backup Exec 2012 技術簡報
賽門鐵克 Backup Exec 2012 技術簡報
 
Symantec Endpoint Protection 12.1
Symantec Endpoint Protection 12.1Symantec Endpoint Protection 12.1
Symantec Endpoint Protection 12.1
 
Double take 6.0 實機體驗營
Double take 6.0 實機體驗營Double take 6.0 實機體驗營
Double take 6.0 實機體驗營
 
賽門鐵克 VMware 完整解決方案
賽門鐵克 VMware 完整解決方案賽門鐵克 VMware 完整解決方案
賽門鐵克 VMware 完整解決方案
 
Cisco unified collaboration training presentation by Zerone
Cisco unified collaboration training presentation by ZeroneCisco unified collaboration training presentation by Zerone
Cisco unified collaboration training presentation by Zerone
 
賽門鐵克個人資料保護法解決方案 (專注在 DLP)
賽門鐵克個人資料保護法解決方案 (專注在 DLP)賽門鐵克個人資料保護法解決方案 (專注在 DLP)
賽門鐵克個人資料保護法解決方案 (專注在 DLP)
 
VMware vSphere5.1 Training
VMware vSphere5.1 TrainingVMware vSphere5.1 Training
VMware vSphere5.1 Training
 
NetApp Product training
NetApp Product trainingNetApp Product training
NetApp Product training
 
Cisco data center switch nexus series training presentation by zerone
Cisco data center switch nexus series training presentation by zeroneCisco data center switch nexus series training presentation by zerone
Cisco data center switch nexus series training presentation by zerone
 

Semelhante a Akamai partner training by Malcolm Rowe

Data is the soil khan smith create tech 2012
Data is the soil khan smith create tech 2012Data is the soil khan smith create tech 2012
Data is the soil khan smith create tech 2012Khan Smith
 
Akamai corporate presentation english
Akamai corporate presentation englishAkamai corporate presentation english
Akamai corporate presentation englishJonny Nässlander
 
Tom uk soti_final_without video.4.21.15
Tom uk soti_final_without video.4.21.15Tom uk soti_final_without video.4.21.15
Tom uk soti_final_without video.4.21.15Liz Bradley
 
Etail 2012 Akamai Chief Scientist keynote
Etail 2012 Akamai Chief Scientist keynoteEtail 2012 Akamai Chief Scientist keynote
Etail 2012 Akamai Chief Scientist keynoteLiz Bradley
 
Future of CDN - Next 10 Years - Ahmet Ozalp, Akamai Technologies - DigiWorld ...
Future of CDN - Next 10 Years - Ahmet Ozalp, Akamai Technologies - DigiWorld ...Future of CDN - Next 10 Years - Ahmet Ozalp, Akamai Technologies - DigiWorld ...
Future of CDN - Next 10 Years - Ahmet Ozalp, Akamai Technologies - DigiWorld ...IDATE DigiWorld
 
Akamai: From Theory to Practice
Akamai: From Theory to PracticeAkamai: From Theory to Practice
Akamai: From Theory to PracticeLiz Bradley
 
Replacing recovery with resilience
Replacing recovery with resilienceReplacing recovery with resilience
Replacing recovery with resilienceAkamai Technologies
 
Akamai in a hyperconnected world
Akamai in a hyperconnected worldAkamai in a hyperconnected world
Akamai in a hyperconnected worldmagda3695
 
Akamai in a hyperconnected world
Akamai in a hyperconnected worldAkamai in a hyperconnected world
Akamai in a hyperconnected worldmagda3695
 
Atmosphere 2014: Helping the Internet to scale since 1998 - Paweł Kuśmierski
Atmosphere 2014: Helping the Internet to scale since 1998 - Paweł KuśmierskiAtmosphere 2014: Helping the Internet to scale since 1998 - Paweł Kuśmierski
Atmosphere 2014: Helping the Internet to scale since 1998 - Paweł KuśmierskiPROIDEA
 
Cloud Technology to Facilitate Growth
Cloud Technology to Facilitate GrowthCloud Technology to Facilitate Growth
Cloud Technology to Facilitate GrowthIconnyx
 
Networks, Networks Everywhere, And Not A Packet To Drink
Networks, Networks Everywhere, And Not A Packet To DrinkNetworks, Networks Everywhere, And Not A Packet To Drink
Networks, Networks Everywhere, And Not A Packet To DrinkReadWrite
 
State of the Internet: Mirai, IOT and History of Botnets
State of the Internet: Mirai, IOT and History of BotnetsState of the Internet: Mirai, IOT and History of Botnets
State of the Internet: Mirai, IOT and History of BotnetsRahul Neel Mani
 
Performance Implications of Mobile Design (Perf Audience Edition)
Performance Implications of Mobile Design (Perf Audience Edition)Performance Implications of Mobile Design (Perf Audience Edition)
Performance Implications of Mobile Design (Perf Audience Edition)Guy Podjarny
 
Akamai internet insights
Akamai internet insightsAkamai internet insights
Akamai internet insightsJustin Dorfman
 
The evolution of continuous cloud security and compliance - DEM05-S - New Yor...
The evolution of continuous cloud security and compliance - DEM05-S - New Yor...The evolution of continuous cloud security and compliance - DEM05-S - New Yor...
The evolution of continuous cloud security and compliance - DEM05-S - New Yor...Amazon Web Services
 
Site Shield Product Brief - Origin defense by cloaking web infrastructure and...
Site Shield Product Brief - Origin defense by cloaking web infrastructure and...Site Shield Product Brief - Origin defense by cloaking web infrastructure and...
Site Shield Product Brief - Origin defense by cloaking web infrastructure and...Akamai Technologies
 
How to Counter Cybersecurity Attacks - Trust No One
How to Counter Cybersecurity Attacks - Trust No OneHow to Counter Cybersecurity Attacks - Trust No One
How to Counter Cybersecurity Attacks - Trust No OneElisabeth Bitsch-Christensen
 
Hans Nipshagen (Akamai) | TU - Hack & Attacks
Hans Nipshagen (Akamai) | TU - Hack & AttacksHans Nipshagen (Akamai) | TU - Hack & Attacks
Hans Nipshagen (Akamai) | TU - Hack & AttacksMedia Perspectives
 

Semelhante a Akamai partner training by Malcolm Rowe (20)

Data is the soil khan smith create tech 2012
Data is the soil khan smith create tech 2012Data is the soil khan smith create tech 2012
Data is the soil khan smith create tech 2012
 
Akamai corporate presentation english
Akamai corporate presentation englishAkamai corporate presentation english
Akamai corporate presentation english
 
Tom uk soti_final_without video.4.21.15
Tom uk soti_final_without video.4.21.15Tom uk soti_final_without video.4.21.15
Tom uk soti_final_without video.4.21.15
 
Etail 2012 Akamai Chief Scientist keynote
Etail 2012 Akamai Chief Scientist keynoteEtail 2012 Akamai Chief Scientist keynote
Etail 2012 Akamai Chief Scientist keynote
 
Future of CDN - Next 10 Years - Ahmet Ozalp, Akamai Technologies - DigiWorld ...
Future of CDN - Next 10 Years - Ahmet Ozalp, Akamai Technologies - DigiWorld ...Future of CDN - Next 10 Years - Ahmet Ozalp, Akamai Technologies - DigiWorld ...
Future of CDN - Next 10 Years - Ahmet Ozalp, Akamai Technologies - DigiWorld ...
 
Akamai: From Theory to Practice
Akamai: From Theory to PracticeAkamai: From Theory to Practice
Akamai: From Theory to Practice
 
Replacing recovery with resilience
Replacing recovery with resilienceReplacing recovery with resilience
Replacing recovery with resilience
 
Akamai in a hyperconnected world
Akamai in a hyperconnected worldAkamai in a hyperconnected world
Akamai in a hyperconnected world
 
Akamai in a hyperconnected world
Akamai in a hyperconnected worldAkamai in a hyperconnected world
Akamai in a hyperconnected world
 
Atmosphere 2014: Helping the Internet to scale since 1998 - Paweł Kuśmierski
Atmosphere 2014: Helping the Internet to scale since 1998 - Paweł KuśmierskiAtmosphere 2014: Helping the Internet to scale since 1998 - Paweł Kuśmierski
Atmosphere 2014: Helping the Internet to scale since 1998 - Paweł Kuśmierski
 
Cloud Technology to Facilitate Growth
Cloud Technology to Facilitate GrowthCloud Technology to Facilitate Growth
Cloud Technology to Facilitate Growth
 
Networks, Networks Everywhere, And Not A Packet To Drink
Networks, Networks Everywhere, And Not A Packet To DrinkNetworks, Networks Everywhere, And Not A Packet To Drink
Networks, Networks Everywhere, And Not A Packet To Drink
 
State of the Internet: Mirai, IOT and History of Botnets
State of the Internet: Mirai, IOT and History of BotnetsState of the Internet: Mirai, IOT and History of Botnets
State of the Internet: Mirai, IOT and History of Botnets
 
DESAYUNO DE TRABAJO AKAMAI
DESAYUNO DE TRABAJO AKAMAIDESAYUNO DE TRABAJO AKAMAI
DESAYUNO DE TRABAJO AKAMAI
 
Performance Implications of Mobile Design (Perf Audience Edition)
Performance Implications of Mobile Design (Perf Audience Edition)Performance Implications of Mobile Design (Perf Audience Edition)
Performance Implications of Mobile Design (Perf Audience Edition)
 
Akamai internet insights
Akamai internet insightsAkamai internet insights
Akamai internet insights
 
The evolution of continuous cloud security and compliance - DEM05-S - New Yor...
The evolution of continuous cloud security and compliance - DEM05-S - New Yor...The evolution of continuous cloud security and compliance - DEM05-S - New Yor...
The evolution of continuous cloud security and compliance - DEM05-S - New Yor...
 
Site Shield Product Brief - Origin defense by cloaking web infrastructure and...
Site Shield Product Brief - Origin defense by cloaking web infrastructure and...Site Shield Product Brief - Origin defense by cloaking web infrastructure and...
Site Shield Product Brief - Origin defense by cloaking web infrastructure and...
 
How to Counter Cybersecurity Attacks - Trust No One
How to Counter Cybersecurity Attacks - Trust No OneHow to Counter Cybersecurity Attacks - Trust No One
How to Counter Cybersecurity Attacks - Trust No One
 
Hans Nipshagen (Akamai) | TU - Hack & Attacks
Hans Nipshagen (Akamai) | TU - Hack & AttacksHans Nipshagen (Akamai) | TU - Hack & Attacks
Hans Nipshagen (Akamai) | TU - Hack & Attacks
 

Último

Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 

Último (20)

Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 

Akamai partner training by Malcolm Rowe

  • 1. Akamai Partner Training Malcolm Rowe Vice President, Asia Pacific 12th September 2012 Zero One Taipei Taiwan Akamai Confidential
  • 2. Akamai’s Origins • Founded in 1998 by Dr. Tom Leighton and Danny Lewin • Spawned from a research project at the MIT Cambridge (USA) • Focused on the development of distributed algorithms for load balancing, packet routing, server assignment and content caching • The goal: Make the Internet faster, secure and more reliable Akamai Confidential Faster ForwardTM © 2012 Akamai
  • 3. The Internet: Simple on the Outside… The Internet Data center End-User Akamai Confidential Faster ForwardTM © 2012 Akamai
  • 4. …But Complex on the Inside Thousands of networks Numerous Applications The Internet Data center Increasing Threats Billions of Millions of users Configurations on myriad devices Akamai Confidential Faster ForwardTM © 2012 Akamai
  • 5. The challenges of the Internet continue… 2006 2011 2016 # of Unique IP Addresses per day: 225M 600M 1,620M Content Served per day: 1.6 PB 50 PB 1,500 PB Mobile Traffic Delivered per day: <3 TB 520 TB 91,000 TB Commerce Transacted per day: $140M $550M $1,650M Peak Attack Traffic: 24Gbps 200 Gbps 1,600 Gbps Akamai Confidential Faster ForwardTM © 2012 Akamai
  • 6. OUR MISSION: ACCELERATE INNOVATION In a hyperconnected world you must master the trends of cloud, media, mobile, while overcoming security threats. CLOUD MEDIA MOBILE SECURITY Akamai Confidential Faster ForwardTM © 2012 Akamai
  • 7. Akamai Today 2500 Employees 4000 Customer 1,12B Revenue 63,2% Market Share Akamai Confidential Faster ForwardTM © 2012 Akamai
  • 8. The CDN market is a hard battlefield – Value is King Limelight Networks Akamai Akamai Confidential Faster ForwardTM © 2012 Akamai
  • 9. Top 100 Worldwide Global Brands trust Akamai Akamai Confidential Faster ForwardTM © 2012 Akamai
  • 10. Our Customers Extend Across All Industries MEDIA & ENTERPRISE COMMERCE HIGH-TECH PUBLIC SECTOR ENTERTAINMENT Akamai Confidential Faster ForwardTM © 2012 Akamai
  • 11. We remove the complexities of technology so our customers can capture the opportunity and meet the demands of the hyperconnected world. Akamai Confidential Faster ForwardTM © 2012 Akamai