- Published on
Developer
- Published on
Learn how we built a super simple microservice for managing firewall lists.- Published on
Learn about Snitch, an internal microservice we built for monitoring and failover.- Published on
How does cache prefetching work in practice?- Published on
Learn about My Idlers, an open-source web application for keeping track of your VPS infrastructure.- Published on
- Published on
Learn about Anycast, a popular high-level internet routing practice using BGP.- Published on
Learn about multi-tier caching and it's benefits in the context of content delivery- Published on
Three easy ways to self-host NextJS in less than ten minutes- Published on
Analyzing and comparing five popular operating systems for web hosting.- Published on
Compare a quick list of the pros and cons of short-life 90-day SSL certificates.- Published on
Another QUIC Advantage, Preferred address, allows the server to notify the client to connect to a different server or socket.- Published on
Learn about implementing your Caddyfile with imports, allowing you to structure and reuse parts of your configuration.- Published on
Learn how to use Caddy server as a high-performance load balancer for your web application. Discover health checks and failover features built-in to Caddy.- Published on
Learn more about how a CDN works and get into some of the technical details around the design and implementation options you have when choosing a CDN.- Published on
Learn how you can use xcaddy to build custom Caddy binaries with non-standard modules to bring new features to your web server.- Published on
Learn about Caddy server, the open-source powerhouse web server that makes up our edge network. Get started with Caddy server in no time.- Published on
Learn about configuring Caddy to use Named Routes instead of Snippets- Published on
Caddy v2.8 is officially out and is filled with new features, bug fixes, and performance improvements. We're already running v2.8 across our network!- Published on
We've designed a full Caddyfile based on an ad agency scenario to give you an example of how to use Caddy at scale- Published on
What's Edge? Why are we still using this same term more than 30 years after it's invention? Has it's meaning changed? Let's dig in.- Published on
Learn about configuring Caddy to rewrite URIs and perform HTTP redirects- Published on
Learn about configuring Caddy to use OpenTelemetry for tracing- Published on
Discover how CDNs are essential components for powering the metaverse and virtual reality platforms, as well as the advantages and challenges of integrating them into existing systems.- Published on
Learn about how the world wide web came to be. Discover the different people who invented the modern internet, and enjoy some web nostalgia!- Published on
Learn about how a CDN impacts the greater internet. Discover more about our web acceleration platform and how it increases site performance.- Published on
Is it time for another new JavaScript framework?- Published on
Discover the advantages and tips for making the most out of serverless architecture in backend development projects to maximize potential and achieve success.- Published on
What's the difference between on-prem and bare metal deployments? Learn about the benefits of cloud bare metal vs. the costs of on-prem hardware.- Published on
Get an in-depth look at how containerization and microservices can help build secure, scalable, and cost-effective applications, as well as best practices for development.- Published on
Get an in-depth look at the intersection of CDN and compliance regulations and learn best practices for setting up a secure, reliable CDN that meets all applicable standards.- Published on
Discover how the emergence of 5G technology can revolutionize business operations, create economic opportunities, and enhance consumer experiences in this insightful blog post.- Published on
Learn how advancements in CDN architecture help mitigate outages, maximize uptime and availability, and reduce financial costs associated with downtime.- Published on
Learn how to protect your business from DDoS attacks by understanding different types of threats, utilizing cloud-based solutions, and implementing best practices for a robust defense.- Published on
Learn how to optimize your website's performance and speed up page loading times with tips on how to identify issues, optimize media and images, handle high traffic loads, utilize caching, and more.- Published on
In this article, we'll explore various load balancing techniques and algorithms, including round robin and least connections. We'll also touch briefly on IP hashes and the important of load-balancing.- Published on
In this article, we'll explore the best practices for optimizing website speed and performance to maximize user engagement and conversion rates.- Published on
When CDNs first came about, cache purges could take hours. Now, state of the art CDN providers offer instant cache purging. In this article, we'll learn more about how that works and why it's so important.- Published on
Learn how to leverage the power of a content delivery network (CDN) to improve website performance, reduce page load times, and maximize SEO rankings.- Published on
Logging is an essential part of your security posture - but it's not as simple as flipping a switch. Learn about the importance of external log streaming for forensic analysis.- Published on
Discover how automated cache invalidation can help keep website content and assets fresh and up-to-date, while reducing server load and improving performance metrics.- Published on
Ensure privacy and trust in your content network with SSL encryption. Learn about the different types of SSL certificates available and how they can be used with a CDN for maximum security.- Published on
Protect your online services with these three key DDoS mitigation techniques - implementing a web application firewall, rate limiting and class of service, and using a content delivery network - to help keep your networks safe from malicious attackers.- Published on
Get a step-by-step guide to installing Apache, ModSecurity, and the Core Rule Set on your Debian server for an extra layer of security against potential online threats.- Published on
Discover why implementing the OWASP Core Rule Set (CRS3) with Microsoft IIS is powerful and read step-by-step instructions to do just that in this tutorial.- Published on
Get an in-depth look into the five most common web application attacks and learn about the preventive measures you can take to protect against them.- Published on
Learn how to identify, troubleshoot and prevent error messages from occurring when accessing a website, with comprehensive guidance from this helpful guide.- Published on
Protect your website from common threats such as Cross-Site Scripting and SQL Injection with the OWASP Core Rule Set (CRS), an open source project that provides comprehensive web application security.- Published on
Discover the features and benefits of Logstash, a powerful open-source data collection engine designed to help organizations quickly and efficiently aggregate and process data from multiple sources.- Published on
Protect your website from DDoS attacks with a Content Delivery Network (CDN), and learn the different types of CDN services available and the common benefits of utilizing a CDN for protection.- Published on
Discover how media companies can reduce latency and improve web acceleration with a high-performance CDN solution, allowing them to deliver content faster and more reliably to a global audience.- Published on
Learn how Content Delivery Networks (CDNs) can help optimize software update distribution, reduce costs, and improve performance for businesses and users alike.- Published on
HTTP serves as the bedrock for data communication on the web, powering everything from your favorite social media platforms to complex web acceleration platforms.- Published on
In this post we're taking a deep dive into the complicated Social Media environment that the public faces in 2023.- Published on
One of the most crucial tools in your web security arsenal is a web application firewall (WAF), acting as a virtual shield for your applications, blocking unauthorized access while allowing legitimate traffic to flow freely.- Published on
Email spoofing is a digital impersonation tactic often used in phishing and spam campaigns. DNSSEC provides safeguards to protect you from e-mail spoofing.- Published on
In this article, we'll take a look at the advantages of using a Google Fonts alternative and provide a comprehensive guide on how to get started hosting your own.- Published on
Stay ahead of the game and harness the power of HTTP3 for a faster, more secure, and efficient online experience.- Published on
Learn all about caching reverse proxies and how they can improve website performance and speed up delivery to clients.- Published on
A CDN not only speeds up your website's loading time but also offers a myriad of benefits that directly and indirectly contribute to your website's performance, security, and user experience.- Published on
Slow websites can frustrate users, leading to lower engagement and lost sales opportunities. That's where the power of Content Delivery Networks (CDN) and the strategic use of edge servers come into play.- Published on
The global e-commerce market size is rapidly growing, and with it, competition is intensifying. For every online store striving to grab a piece of this lucrative pie, standing out is crucial. Here is where the magic of Search Engine Optimization (SEO) comes into play.- Published on
A well-structured, persuasive, and intuitive landing page can significantly boost conversion rates, leading to higher revenue, enhanced brand recognition, and ultimately, business growth.- Published on
What is Zstd compression? How can it be used on the web? What benefits does it bring to servers and clients? Learn how Zstd has been brought to the web.- Published on
When it comes to successful online ventures, community is king. A strong, engaged, and loyal community can propel your brand to new heights. From loyal customers who sing your praises to an engaged audience that participates actively in your online discussions, a strong community can be your most powerful asset.- Published on
This article will shed light on the importance of SSL, and how using a Content Delivery Network (CDN) can enhance both your website's speed and security. We aim to help business owners, system engineers, IT professionals, and anyone interested in improving web security and trust online.- Published on
The digital world is ever-evolving, and as developers, staying ahead of trends is crucial for maintaining a competitive edge. In recent years, one of the most transformative shifts in the application landscape has been the rise of Progressive Web Apps (PWAs).- Published on
In this article, we'll explore web acceleration best practices and share tips and tricks to put your website into overdrive.- Published on
In this blog post, DNS will take center stage as we unveil what it is, how it works, and why it’s pivotal in the smooth functioning of the internet.- Published on
In this blog post, we will dive into what web accessibility entails, its importance, and practical tips on building websites that cater to all users, including those who use special software and tools to access your page.- Published on
In this article, we’ll explore the mechanics of 5G and how its high-velocity influence is reshaping the web landscape.- Published on
In this blog post, we'll explain what microservices architecture is, explore its benefits, and discuss how it can revolutionize your web development efforts.- Published on
In this blog post, we will talk about how to build an infrastructure that can handle traffic spikes and how CDN services can help.- Published on
Is AI going to impact web development and hosting? In what ways can AI change or speed up the development process? Learn more about the tools that out now.- Published on
This article takes you through the nitty-gritty of HTTP/3, and why it’s a game changer for web development and hosting.- Published on
Today, let’s unravel the magic behind internet routing, focusing on the star players – Border Gateway Protocol (BGP) and Peering.- Published on
The internet term conundrum continues! In today's post, I want to efficiently cover all of these terms and explain their importance and role in transporting data across the internet.- Published on
This blog post will discuss load balancing strategies for highly available web applications and how Content Delivery Networks (CDNs) contribute to high availability.- Published on
In this article, we will explore the interworkings of fiber optics and how they provides high-speed internet connectivity.- Published on
Five reasons your website feels slow.- Published on
Get an in-depth look at the rise of low-code/no-code platforms, their advantages and disadvantages, and discover tips on how to leverage them for successful application development projects.