Edge Academy

Learn about tools and concepts related to edge computing, edge delivery, and edge security.

Request Demo

What is the OWASP Top 10?

For developers and administrators of web applications, the OWASP Top 10 is an important fundamental security reference. It provides a foundation from which to build more secure web apps. Here, we’ll look at the list, the organization behind it,...

Read More

What is Peering?

Definition Peering is a method that allows two networks to connect and exchange traffic directly without having to pay a third party to carry traffic across the Internet. Overview The Internet consists of over 25,000 autonomous systems that...

Read More

What is Latency?

Definition Latency is the delay between a user’s action and a web application’s response to that action, often referred to in networking terms as the total round trip time it takes for a data packet to travel. Overview Latency i...

Read More

What is SSL?

Definition Secure Sockets Layer (SSL) is a protocol for securing communication on the Internet. It provides a way for enterprises to encrypt data before sending it to users, preventing third parties from reading it while it’s in transit. Overvi...

Read More

What is SQL Injection?

Definition SQL Injection is the technique of inserting complete or partial SQL commands in user-supplied data fields of web applications and submitting them for execution by the database server. Overview Businesses use fields such as contact forms, f...

Read More

What is Keep-Alive?

Overview The default HTTP connection is usually closed after each request has been completed, meaning that the server closes the TCP connection after delivering the response. In order to keep the connection open for multiple requests, the keep-alive ...

Read More

What is HTTP/2?

Overview Google started development on what would become the basis of HTTP/2 as early as 2010. Known as SPDY, it was designed to work alongside the then-current HTTP/1.1 protocol by manipulating and optimizing traffic as it left the server. In 2015, ...

Read More

What is a Web Cache?

Definition A web cache is a hardware device or software application for temporarily storing frequently-accessed static content. Overview internet users with similar interests often download the same web content over and over again. Without a pro...

Read More

What is an MQTT Server?

Definition Message Queuing Telemetry Transport (MQTT) is a machine-to-machine protocol designed to facilitate lightweight publish/subscribe message transportation. Overview The MQTT protocol is designed to facilitate pub/sub messaging for l...

Read More

What is the Interplanetary File System?

Overview Today, the Internet is based on HyperText Transfer Protocol (HTTP). HTTP relies on location addressing which uses IP addresses to identify the specific server that is hosting the requested information. This means that the information has to ...

Read More

What is runtime?

Definition Runtime is a system used primarily in software development to describe the period of time during which a program is running. Overview Runtime is the final phase of the program lifecycle in which the machine executes the program’s cod...

Read More

What is a Distributed System?

Definition A distributed system, also known as distributed computing, is a system with multiple components located on different machines that communicate and coordinate actions in order to appear as a single coherent system to the end-user. Overview ...

Read More

CDN Use Cases

By caching key data at points of presence (PoPs) strategically located near regional Internet Exchange Points (IXPs), content delivery networks (CDNs) reduce latency to drive benefits including better customer experiences, reduced costs through impro...

Read More

What is TCP Slow Start?

Definition TCP slow start is an algorithm which balances the speed of a network connection. Slow start gradually increases the amount of data transmitted until it finds the network’s maximum carrying capacity. Overview One of the most common wa...

Read More

What is DNS?

Overview Communication using the Internet Protocol (IP) requires each endpoint to be identified by a numeric IP address. IP addresses are needed to actually deliver a message to a receiver, just like a numeric phone number is required to place a call...

Read More

What is CWND and RWND?

Congestion Window (cwnd) is a TCP state variable that limits the amount of data the TCP can send into the network before receiving an ACK. The Receiver Window (rwnd) is a variable that advertises the amount of data that the destination side can recei...

Read More

What is Border Gateway Protocol (BGP)?

Definition Border Gateway Protocol (BGP) is a standardized gateway protocol that exchanges routing information across autonomous systems (AS) on the Internet. Overview Border Gateway Protocol is the protocol that makes the Internet work. Networks or ...

Read More

What is Pub/Sub Messaging?

Definition Pub/sub is shorthand for publish/subscribe messaging, an asynchronous communication method in which messages are exchanged between applications without knowing the identity of the sender or recipient. Overview Four core concepts make up th...

Read More

CDN Customer Stories

Our content delivery network (CDN) is one of the most performant and reliable distributed services available. And thousands of businesses rely on it to deliver both small and large files at breakneck speed. Video streams, website assets, software pat...

Read More

WAF Use Cases

Attacks to web servers are the most prevalent threat in Internet security. Private parts of our lives and the lives of our customers exist on the Internet and hackers know this better than anyone. Exploiting a web server allows them to steal this sen...

Read More

What is Multicloud?

Definition Multicloud is the use of multiple public cloud services from multiple cloud vendors. Overview Multicloud is the norm for many businesses today. Often multicloud environments come about organically as different business requirements req...

Read More

What is Edge Computing?

Definition Edge computing is a distributed architecture that reduces latency by housing applications, data, and compute resources at locations geographically closer to end users. Overview Edge computing is often used in conjunction with the Inter...

Read More

What are Edge Containers?

Definition Edge containers are decentralized computing resources located as close as possible to the end user in order to reduce latency, save bandwidth, and enhance the overall digital experience. Overview The number of devices with access to t...

Read More

What is FaaS?

Definition Function as a service (FaaS) is a cloud computing service that executes code in a serverless manner in which the developer does not need to maintain a server. Overview FaaS is part of a wider concept called serverless computing. Servers ac...

Read More

What are Edge VMs?

Definition Edge VMs are an infrastructural evolution of traditional virtual machines in which the storage and compute resources that power the virtual machine are located geographically closer to the end user (i.e. at the Internet’s edge). Over...

Read More

Edge Serverless Tutorials

Serverless enables developers to execute functions and run cloud compute services on an as-needed basis. Edge serverless enables the same things but with the added benefit of executing functions at the network edge, as close as possible to end users....

Read More

Edge Serverless Customer Stories

Running serverless scripts as the edge is a relatively new concept in edge computing. However, many companies have already started using this technology to create low-latency nanoservices and perform everything from JWT token validation to “coo...

Read More

What are Micro Data Centers?

Definition A micro data center (MDC) is a small-scale modular data center that includes all the compute, storage, networking, power, cooling, and other infrastructure required for a given workload. Overview In recent years, applications including...

Read More

What is Fog Computing?

Definition Fog computing is a decentralized computing infrastructure or process in which computing resources are located between the data source and the cloud or any other data center. Overview To achieve real-time automation, data capture and an...

Read More

What is Distributed Cloud Computing?

Definition Distributed Cloud Computing generalizes the cloud computing model to position, process, and serve data and applications from geographically distributed sites to meet requirements for performance, redundancy and regulations. Overview The tr...

Read More

What is Multi-CDN?

Definition A multi-CDN is the combination of multiple CDNs (content delivery networks) from different providers into a single network. Overview When used correctly, a multi-CDN can provide flexibility, availability, and performance benefits when ...

Read More

What is 5G (for Consumers)?

Definition 5G is the fifth generation of wireless communication technologies and standards that is used by devices such as your smartphone to allow you to stream/download content from the Internet up to 100 times faster than 4G LTE. Overview Ther...

Read More

What is 5G (for Enterprises)?

Definition 5G is the latest generation in the series of cellular communication technologies, operating in higher radio frequency bands, enabling novel usage scenarios beyond current mobile broadband. Overview We live in a data-driven world, with ...

Read More

What is an Edge Server?

Definition An edge server is a server located at the network edge to reduce latency. Overview Edge servers play an important role in edge computing by providing the compute resources required to achieve the objective of reducing latency. There ar...

Read More

What is a WAF?

Definition A Web Application Firewall (WAF) is a security component that protects web applications from attackers by analyzing and filtering HTTP traffic. Overview A firewall is a security device or software that protects systems from unauthorized ac...

Read More

What is a CDN?

Definition A content delivery network (CDN) increases network performance and uptime by caching frequently-accessed content on local servers that are positioned at the Internet’s edge. Overview CDNs are a vital backbone for much of the data...

Read More

What is Edge Serverless?

Definition Edge serverless is an infrastructural evolution of cloud serverless in which the computing resources that deliver serverless functions are located geographically closer to the end user (I.e. at the Internet’s edge). Overview To u...

Read More

Edge Serverless Use Cases

The benefits of running serverless functions in the cloud can be outweighed by network-related performance issues and latency related to cold starts. But this does not need to be the case. There’s another option that allows you to reap the bene...

Read More

Edge VM Use Cases

Internet users have lost their patience for slow-loading web pages or applications, and now that so many applications use encryption, a smarter solution is needed for data processing. The longer the distance between user and server, the higher the ch...

Read More

What is a Brute Force Attack?

Overview Brute force attacks begin with automated software that’s used to guess a password (or an answer) to get behind a locked “digital door.” The automated software can run billions of combinations of letters, numbers, and symbol...

Read More

What is a HAR File?

Overview The HAR file format is an evolving standard and the information contained within it is both flexible and extensible. You can expect a HAR file to include a breakdown of timings including: How long it takes to fetch DNS information How long ...

Read More

What is a Transparent Proxy?

Definition Transparent proxies are intermediary systems that sit between a user and a content provider. When a user makes a request to a web server, the transparent proxy intercepts the request to perform various actions including caching, redirectio...

Read More

What is Continuous Integration and Delivery (CI/CD)?

Definition CI/CD is a set of methods that enables application developers to deliver code changes more frequently to customers through the use of automation. Overview The acronym CI/CD refers to two separate concepts that are generally used together: ...

Read More

What is an Internet Exchange Point (IXP)?

Definition An Internet exchange point is a physical access point that Internet service providers (ISPs) and content delivery networks (CDNs) connect to for the purpose of exchanging traffic. Overview An Internet exchange point is a colocation designe...

Read More

What is a Web Application?

Definition A web application is a computer program that utilizes web browsers and web technology to perform tasks over the Internet. Overview Millions of businesses use the Internet as a cost-effective communications channel. It lets them exchange in...

Read More

What is DDoS

Overview As DDoS attacks become more sophisticated, the threats they present become more prevalent and dangerous. Just recently the DNS service Dyn suffered an unprecedented coordinated worldwide attack. There are a few specific types of DDoS attacks...

Read More

What is Cross-Site Scripting?

Overview Dynamic websites use scripts like JavaScript, PHP and .NET to improve the user experience. Whenever a web browser gets a <script> directive in an HTML space like a search, login, or comments field, it automatically executes the script....

Read More

What is Cross-Site Request Forgery?

Overview A cross-site request forgery (CSRF) attempts to execute an action rather than trying to steal personal data. Once an attack is executed there is no way for the attacker to directly monitor the result so attackers often execute multiple forge...

Read More

What is Binary Hardening?

Overview Binary hardening is a web security technique for analyzing or manipulating binary files to protect against exploits. Binary planting continues to persist as one of the most crippling types of attacks on applications. Even though its prevalen...

Read More

What is Anycast?

Definition Anycast is a routing methodology that sends packets to one node out of a group of potential nodes. Overview Most of the Internet follows a unicast addressing approach in which an IP address links to one particular server, work station, or ...

Read More

What is a Network Backbone?

Definition A network backbone connects multiple networks together, allowing them to communicate with each other. Overview Discrete networks have several ways of “talking” with each other. If you have two separate networks, say between two...

Read More

What is an Autonomous System Number (ASN)?

Definition An autonomous system number is a unique identifier that is globally available and allows its autonomous system to exchange routing information with other systems. Overview An autonomous system (AS) is a group of IP prefixes with a clearly ...

Read More

Edge Container Use Cases

The container revolution has changed the way developers package and run applications. Containerized applications can be anywhere, at any scale. The only limiting factors are the speed of light and the capacity of the cloud. Edge computing offsets the...

Read More

What is Load Balancing?

Overview Two of the most critical requirements for any online service provider are availability and redundancy. The time it takes for a server to respond to a request varies by its current capacity. If even a single component fails or is overwhelmed ...

Read More

What is Serverless Architecture?

Definition Serverless architecture is a software design pattern in which long-lived server processes are replaced with a combination of third-party cloud services and event-driven ephemeral functions. Overview As technology evolves and the market dem...

Read More

What is Cache Hit Ratio?

Overview Web caching provides significant benefits when the requested assets are served from a nearby server. The cache hit ratio depends on the effectiveness of the caching system and is influenced by factors such as the cache policy, the number of ...

Read More

What is Cache Poisoning?

Overview Caching web content improves performance on both the server and client side. Unfortunately, the HTTP protocol used in the caching mechanism only performs integrity checks on the server side. This lack of authentication, including flaws in we...

Read More

What is Content Caching?

Introduction Page load time is a key performance indicator for any web service and directly impacts conversions and UX. If a website or application is only available from a single origin server, users can face delays of hundreds of milliseconds or mo...

Read More

What is Critical Rendering Path?

Overview Displaying web pages fast enough to meet user expectations is still a major challenge. Content caching, low-latency web hosting, image optimization, and other techniques can decrease page load time significantly, but not always fast enough. ...

Read More

What is Dynamic Analysis?

Overview Dynamic analysis finds vulnerabilities in a runtime environment. Automated tools analyze the input and output of an application for potential threats like SQL injection. Tools can also search for other application-specific issues and analyze...

Read More

What is HSTS?

Overview Delivering web pages and data over HTTP connections exposes users to security risks. Because servers are usually not connected directly to each other, they must pass their requests and responses through a series of network routers. These rou...

Read More

What is Defense in Depth?

Overview Defense in depth adheres to the concept that multiple defense mechanisms are more difficult to defeat than a single solution. Although strong, a single fortress wall may still become compromised. Multiple varied defenses allow for the failur...

Read More

What is Infrastructure as Code?

Definition Infrastructure as Code (IaC) is a combination of standards, practices, tools, and processes to provision, configure, and manage computer infrastructure using code and other machine-readable files. Overview For a long time, manual intervent...

Read More
Request Demo

Have questions? Chat now with the live chat button on this page or request a demo from our edge experts.

Request a Demo
Get an Advantage

Stay informed of the latest edge news, updates and solutions.

Subscribe