SlideShare a Scribd company logo
Company, Platform and
Solution Introduction
Akamai’s Origins
• Founded in 1998 by Dr. Tom Leighton and Danny Lewin
• Spawned from a research project at the MIT Cambridge (USA)
• Focused on the development of distributed algorithms for load
balancing, packet routing, server assignment and content caching
• The goal: Make the Internet faster, secure and more reliable

©2012 Akamai
The Internet: Simple on the Outside…

The Internet
Data center

End-User

©2012 Akamai
…But Complex on the Inside
Numerous Applications

Thousands of
networks

The Internet
Data center
Increasing
Threats
Billions of
Configurations

Millions of users
on myriad devices
©2012 Akamai
OUR MISSION: ACCELERATE INNOVATION
In a hyperconnected world you must master the trends of cloud, media,
mobile, while overcoming security threats.

CLOUD

MEDIA

MOBILE

SECURITY

©2012 Akamai
The Akamai Intelligent Plattform
A Global Platform:





130,000+ Servers
1,200+ Networks
2000 Locations
80+ Countries

Accelerating Daily Traffic of:
• 5+ Tbps
• 17+ million hits per second
• 30+ petabytes/day
• 10+ million concurrent streams

15–30+% of Daily Web Traffic
©2012 Akamai
Akamai in 60 Seconds
Delivering more Web Content than anyone in the world
CLOUD

MEDIA

MOBILE

SECURITY

10,380+ Hours
Saved by Akamai
vs. Public Internet

2,760,990+ News
Customer Page Views

311,000+ Mobile
Page Views

$11,000,000+
Commercial
Banking Transactions

4,800,000+
SureRoute Traces

3430 Hours of video
streamed

70,000+ Mobile
Apps Delivered

23,250,000+ Hits on
Akamai’s PCI
Delivery Network
©2012 Akamai
Akamai Today

2500
4000
1,12B
63,2%

Employees
Customer
Revenue
Market Share

©2012 Akamai
Top 100 Worldwide Global Brands trust Akamai

©2012 Akamai
Our Customers Extend Across All Industries
ENTERPRISE

COMMERCE

HIGH-TECH

MEDIA &
ENTERTAINMENT

PUBLIC SECTOR

©2012 Akamai
The Akamai Market Areas

CLOUD

MEDIA

MOBILE

SECURITY

Reduce costs, increase
agility & performance

Reach multi-devices,
scale & monetize

Performance &
personalization

Defend without
performance impact

“In a hyperconnected world you must master the trends of
cloud, media, mobile, while overcoming security threats.”
©2012 Akamai
We remove the complexities of technology so our customers can capture
the opportunity and meet the demands of the hyperconnected world.

©2012 Akamai

More Related Content

What's hot

Botnet and its Detection Techniques
Botnet  and its Detection Techniques Botnet  and its Detection Techniques
Botnet and its Detection Techniques
SafiUllah Saikat
 
Cyber Security Needs and Challenges
Cyber Security Needs and ChallengesCyber Security Needs and Challenges
Cyber Security Needs and Challenges
Happiest Minds Technologies
 
Phishing 101
Phishing 101Phishing 101
Phishing 101
Curtis Brazzell
 
Microsoft Office 365
Microsoft Office 365Microsoft Office 365
Microsoft Office 365
Novosco
 
Cyber Security For Organization Proposal PowerPoint Presentation Slides
Cyber Security For Organization Proposal PowerPoint Presentation SlidesCyber Security For Organization Proposal PowerPoint Presentation Slides
Cyber Security For Organization Proposal PowerPoint Presentation Slides
SlideTeam
 
Overview of Data Loss Prevention Policies in Office 365
Overview of Data Loss Prevention Policies in Office 365Overview of Data Loss Prevention Policies in Office 365
Overview of Data Loss Prevention Policies in Office 365
Dock 365
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
Jen Ruhman
 
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial InstitutionsCybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
Shawn Tuma
 
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Edureka!
 
How To Present Cyber Security To Senior Management Complete Deck
How To Present Cyber Security To Senior Management Complete DeckHow To Present Cyber Security To Senior Management Complete Deck
How To Present Cyber Security To Senior Management Complete Deck
SlideTeam
 
IT Security PowerPoint Presentation Slides
IT Security PowerPoint Presentation SlidesIT Security PowerPoint Presentation Slides
IT Security PowerPoint Presentation Slides
SlideTeam
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Stephen Cobb
 
Information security management iso27001
Information security management iso27001Information security management iso27001
Information security management iso27001
Hiran Kanishka
 
Security and compliance in Office 365 -Part 1
Security and compliance in Office 365 -Part 1Security and compliance in Office 365 -Part 1
Security and compliance in Office 365 -Part 1
Vignesh Ganesan I Microsoft MVP
 
7 cyber security questions for boards
7 cyber security questions for boards7 cyber security questions for boards
7 cyber security questions for boards
Paul McGillicuddy
 
Graph & Amazon Neptune: Database Week SF
Graph & Amazon Neptune: Database Week SFGraph & Amazon Neptune: Database Week SF
Graph & Amazon Neptune: Database Week SF
Amazon Web Services
 
Office 365 Sales Presentation
Office 365 Sales PresentationOffice 365 Sales Presentation
Office 365 Sales Presentation
Thomas Perdana
 
OrangHRM
OrangHRMOrangHRM
Cloud security
Cloud security Cloud security
Amazon WorkMail
Amazon WorkMailAmazon WorkMail
Amazon WorkMail
Amazon Web Services
 

What's hot (20)

Botnet and its Detection Techniques
Botnet  and its Detection Techniques Botnet  and its Detection Techniques
Botnet and its Detection Techniques
 
Cyber Security Needs and Challenges
Cyber Security Needs and ChallengesCyber Security Needs and Challenges
Cyber Security Needs and Challenges
 
Phishing 101
Phishing 101Phishing 101
Phishing 101
 
Microsoft Office 365
Microsoft Office 365Microsoft Office 365
Microsoft Office 365
 
Cyber Security For Organization Proposal PowerPoint Presentation Slides
Cyber Security For Organization Proposal PowerPoint Presentation SlidesCyber Security For Organization Proposal PowerPoint Presentation Slides
Cyber Security For Organization Proposal PowerPoint Presentation Slides
 
Overview of Data Loss Prevention Policies in Office 365
Overview of Data Loss Prevention Policies in Office 365Overview of Data Loss Prevention Policies in Office 365
Overview of Data Loss Prevention Policies in Office 365
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
 
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial InstitutionsCybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
 
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
 
How To Present Cyber Security To Senior Management Complete Deck
How To Present Cyber Security To Senior Management Complete DeckHow To Present Cyber Security To Senior Management Complete Deck
How To Present Cyber Security To Senior Management Complete Deck
 
IT Security PowerPoint Presentation Slides
IT Security PowerPoint Presentation SlidesIT Security PowerPoint Presentation Slides
IT Security PowerPoint Presentation Slides
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
 
Information security management iso27001
Information security management iso27001Information security management iso27001
Information security management iso27001
 
Security and compliance in Office 365 -Part 1
Security and compliance in Office 365 -Part 1Security and compliance in Office 365 -Part 1
Security and compliance in Office 365 -Part 1
 
7 cyber security questions for boards
7 cyber security questions for boards7 cyber security questions for boards
7 cyber security questions for boards
 
Graph & Amazon Neptune: Database Week SF
Graph & Amazon Neptune: Database Week SFGraph & Amazon Neptune: Database Week SF
Graph & Amazon Neptune: Database Week SF
 
Office 365 Sales Presentation
Office 365 Sales PresentationOffice 365 Sales Presentation
Office 365 Sales Presentation
 
OrangHRM
OrangHRMOrangHRM
OrangHRM
 
Cloud security
Cloud security Cloud security
Cloud security
 
Amazon WorkMail
Amazon WorkMailAmazon WorkMail
Amazon WorkMail
 

Viewers also liked

Better Than Best Effort at Bloomberg from ThousandEyes Connect
Better Than Best Effort at Bloomberg from ThousandEyes ConnectBetter Than Best Effort at Bloomberg from ThousandEyes Connect
Better Than Best Effort at Bloomberg from ThousandEyes Connect
ThousandEyes
 
入門:Single / Two Rate Three Color Marker (srTCM / trTCM)
入門:Single / Two Rate Three Color Marker (srTCM / trTCM)入門:Single / Two Rate Three Color Marker (srTCM / trTCM)
入門:Single / Two Rate Three Color Marker (srTCM / trTCM)
Kentaro Ebisawa
 
Intro to Single / Two Rate Three Color Marker (srTCM / trTCM)
Intro to Single / Two Rate Three Color Marker (srTCM / trTCM)Intro to Single / Two Rate Three Color Marker (srTCM / trTCM)
Intro to Single / Two Rate Three Color Marker (srTCM / trTCM)
Kentaro Ebisawa
 
A HEART-WARMING TALE ABOUT A COAT, AN EXCEPTIONALLY RESPONSIVE CEO AND THE FI...
A HEART-WARMING TALE ABOUT A COAT, AN EXCEPTIONALLY RESPONSIVE CEO AND THE FI...A HEART-WARMING TALE ABOUT A COAT, AN EXCEPTIONALLY RESPONSIVE CEO AND THE FI...
A HEART-WARMING TALE ABOUT A COAT, AN EXCEPTIONALLY RESPONSIVE CEO AND THE FI...
Huw Watkins
 
Leadership Insights From TED 2016: Dream
Leadership Insights From TED 2016: DreamLeadership Insights From TED 2016: Dream
Leadership Insights From TED 2016: Dream
TINYpulse Employee Engagement Surveys
 
Innovative Africa: The new face of Africa
Innovative Africa: The new face of AfricaInnovative Africa: The new face of Africa
Innovative Africa: The new face of Africa
Afrinnovator
 
(MBASkills.IN) Everyday Leadership
(MBASkills.IN) Everyday Leadership(MBASkills.IN) Everyday Leadership
(MBASkills.IN) Everyday Leadership
Sameer Mathur
 
CEO Experiences
CEO ExperiencesCEO Experiences
CEO Experiences
Thomas R. Scribner
 
From Brick Mortar To Online Click Organisation
From Brick Mortar To Online Click OrganisationFrom Brick Mortar To Online Click Organisation
From Brick Mortar To Online Click Organisation
Kartik Mehta
 
CEO GE Jeff Immelt Case Study
CEO GE Jeff Immelt Case StudyCEO GE Jeff Immelt Case Study
CEO GE Jeff Immelt Case Study
Mahammad Khadafi
 
Delta Airlines Case Study
Delta Airlines Case StudyDelta Airlines Case Study
Delta Airlines Case Study
Experian Hitwise
 
Going Native
Going NativeGoing Native
Going Native
Fjord
 
Delta airline
Delta airlineDelta airline
Delta airline
Nabduan Duangmanee
 
Delta airlines
Delta airlinesDelta airlines
Delta airlines
Dheeraj Polampally
 
Delta airlines presentation
Delta airlines presentationDelta airlines presentation
Delta airlines presentation
Sri Mukha Balaji
 
Delta Airlines Business Strategy
Delta Airlines Business StrategyDelta Airlines Business Strategy
Delta Airlines Business Strategy
Andrew Skurdal
 
Etail West 2013 Akamai CEO Tom Leighton_Final
Etail West 2013 Akamai CEO Tom Leighton_FinalEtail West 2013 Akamai CEO Tom Leighton_Final
Etail West 2013 Akamai CEO Tom Leighton_Final
Liz Bradley
 
Southwest Airlines : Case Study
Southwest Airlines : Case StudySouthwest Airlines : Case Study
Southwest Airlines : Case Study
Sarang Bhutada
 

Viewers also liked (18)

Better Than Best Effort at Bloomberg from ThousandEyes Connect
Better Than Best Effort at Bloomberg from ThousandEyes ConnectBetter Than Best Effort at Bloomberg from ThousandEyes Connect
Better Than Best Effort at Bloomberg from ThousandEyes Connect
 
入門:Single / Two Rate Three Color Marker (srTCM / trTCM)
入門:Single / Two Rate Three Color Marker (srTCM / trTCM)入門:Single / Two Rate Three Color Marker (srTCM / trTCM)
入門:Single / Two Rate Three Color Marker (srTCM / trTCM)
 
Intro to Single / Two Rate Three Color Marker (srTCM / trTCM)
Intro to Single / Two Rate Three Color Marker (srTCM / trTCM)Intro to Single / Two Rate Three Color Marker (srTCM / trTCM)
Intro to Single / Two Rate Three Color Marker (srTCM / trTCM)
 
A HEART-WARMING TALE ABOUT A COAT, AN EXCEPTIONALLY RESPONSIVE CEO AND THE FI...
A HEART-WARMING TALE ABOUT A COAT, AN EXCEPTIONALLY RESPONSIVE CEO AND THE FI...A HEART-WARMING TALE ABOUT A COAT, AN EXCEPTIONALLY RESPONSIVE CEO AND THE FI...
A HEART-WARMING TALE ABOUT A COAT, AN EXCEPTIONALLY RESPONSIVE CEO AND THE FI...
 
Leadership Insights From TED 2016: Dream
Leadership Insights From TED 2016: DreamLeadership Insights From TED 2016: Dream
Leadership Insights From TED 2016: Dream
 
Innovative Africa: The new face of Africa
Innovative Africa: The new face of AfricaInnovative Africa: The new face of Africa
Innovative Africa: The new face of Africa
 
(MBASkills.IN) Everyday Leadership
(MBASkills.IN) Everyday Leadership(MBASkills.IN) Everyday Leadership
(MBASkills.IN) Everyday Leadership
 
CEO Experiences
CEO ExperiencesCEO Experiences
CEO Experiences
 
From Brick Mortar To Online Click Organisation
From Brick Mortar To Online Click OrganisationFrom Brick Mortar To Online Click Organisation
From Brick Mortar To Online Click Organisation
 
CEO GE Jeff Immelt Case Study
CEO GE Jeff Immelt Case StudyCEO GE Jeff Immelt Case Study
CEO GE Jeff Immelt Case Study
 
Delta Airlines Case Study
Delta Airlines Case StudyDelta Airlines Case Study
Delta Airlines Case Study
 
Going Native
Going NativeGoing Native
Going Native
 
Delta airline
Delta airlineDelta airline
Delta airline
 
Delta airlines
Delta airlinesDelta airlines
Delta airlines
 
Delta airlines presentation
Delta airlines presentationDelta airlines presentation
Delta airlines presentation
 
Delta Airlines Business Strategy
Delta Airlines Business StrategyDelta Airlines Business Strategy
Delta Airlines Business Strategy
 
Etail West 2013 Akamai CEO Tom Leighton_Final
Etail West 2013 Akamai CEO Tom Leighton_FinalEtail West 2013 Akamai CEO Tom Leighton_Final
Etail West 2013 Akamai CEO Tom Leighton_Final
 
Southwest Airlines : Case Study
Southwest Airlines : Case StudySouthwest Airlines : Case Study
Southwest Airlines : Case Study
 

Similar to Akamai corporate presentation english

Akamai partner training by Malcolm Rowe
Akamai partner training by Malcolm RoweAkamai partner training by Malcolm Rowe
Akamai partner training by Malcolm Rowe
零壹科技股份有限公司
 
Akamai in a hyperconnected world
Akamai in a hyperconnected worldAkamai in a hyperconnected world
Akamai in a hyperconnected world
magda3695
 
Akamai in a hyperconnected world
Akamai in a hyperconnected worldAkamai in a hyperconnected world
Akamai in a hyperconnected world
magda3695
 
Hyperconnected Taiwan
Hyperconnected TaiwanHyperconnected Taiwan
Hyperconnected Taiwan
Vista Cheng
 
Atmosphere 2014: Helping the Internet to scale since 1998 - Paweł Kuśmierski
Atmosphere 2014: Helping the Internet to scale since 1998 - Paweł KuśmierskiAtmosphere 2014: Helping the Internet to scale since 1998 - Paweł Kuśmierski
Atmosphere 2014: Helping the Internet to scale since 1998 - Paweł Kuśmierski
PROIDEA
 
A non-technical introduction to Cloud Computing
A non-technical introduction to Cloud ComputingA non-technical introduction to Cloud Computing
A non-technical introduction to Cloud Computing
William Pourmajidi
 
Akamai
AkamaiAkamai
Akamai
Murli Jha
 
cloud security ppt
cloud security ppt cloud security ppt
cloud security ppt
Devyani Vaidya
 
Cloud Security
Cloud Security Cloud Security
Cloud Security
Devyani Vaidya
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
Devyani Vaidya
 
Cloud flare issa_annual_summit_june_5_2015
Cloud flare issa_annual_summit_june_5_2015Cloud flare issa_annual_summit_june_5_2015
Cloud flare issa_annual_summit_june_5_2015
ISSA LA
 
CoreSite: The Data Center as the On-Ramp to Cloud Enablement
CoreSite: The Data Center as the On-Ramp to Cloud EnablementCoreSite: The Data Center as the On-Ramp to Cloud Enablement
CoreSite: The Data Center as the On-Ramp to Cloud Enablement
RightScale
 
big data and cloud computing
big data and cloud computingbig data and cloud computing
big data and cloud computing
Mohamed Sharique Vellikan
 
Cloud asia 2012
Cloud asia 2012Cloud asia 2012
Cloud asia 2012
teknologiinformasi
 
Microsoft presentation
Microsoft presentation Microsoft presentation
Microsoft presentation
Pinar Ozduble
 
Security concerns of cloud migration and its implications on cloud-enabled bu...
Security concerns of cloud migration and its implications on cloud-enabled bu...Security concerns of cloud migration and its implications on cloud-enabled bu...
Security concerns of cloud migration and its implications on cloud-enabled bu...
Adewole Shitta-bey
 
Cloud Technology to Facilitate Growth
Cloud Technology to Facilitate GrowthCloud Technology to Facilitate Growth
Cloud Technology to Facilitate Growth
Iconnyx
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Shailaja Patil
 
Tom uk soti_final_without video.4.21.15
Tom uk soti_final_without video.4.21.15Tom uk soti_final_without video.4.21.15
Tom uk soti_final_without video.4.21.15
Liz Bradley
 
Get Your Head In the Clouds: The Use of Cloud Computing in the Practice of Law
Get Your Head In the Clouds: The Use of Cloud Computing in the Practice of Law Get Your Head In the Clouds: The Use of Cloud Computing in the Practice of Law
Get Your Head In the Clouds: The Use of Cloud Computing in the Practice of Law
SkyLaw Professional Corporation
 

Similar to Akamai corporate presentation english (20)

Akamai partner training by Malcolm Rowe
Akamai partner training by Malcolm RoweAkamai partner training by Malcolm Rowe
Akamai partner training by Malcolm Rowe
 
Akamai in a hyperconnected world
Akamai in a hyperconnected worldAkamai in a hyperconnected world
Akamai in a hyperconnected world
 
Akamai in a hyperconnected world
Akamai in a hyperconnected worldAkamai in a hyperconnected world
Akamai in a hyperconnected world
 
Hyperconnected Taiwan
Hyperconnected TaiwanHyperconnected Taiwan
Hyperconnected Taiwan
 
Atmosphere 2014: Helping the Internet to scale since 1998 - Paweł Kuśmierski
Atmosphere 2014: Helping the Internet to scale since 1998 - Paweł KuśmierskiAtmosphere 2014: Helping the Internet to scale since 1998 - Paweł Kuśmierski
Atmosphere 2014: Helping the Internet to scale since 1998 - Paweł Kuśmierski
 
A non-technical introduction to Cloud Computing
A non-technical introduction to Cloud ComputingA non-technical introduction to Cloud Computing
A non-technical introduction to Cloud Computing
 
Akamai
AkamaiAkamai
Akamai
 
cloud security ppt
cloud security ppt cloud security ppt
cloud security ppt
 
Cloud Security
Cloud Security Cloud Security
Cloud Security
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Cloud flare issa_annual_summit_june_5_2015
Cloud flare issa_annual_summit_june_5_2015Cloud flare issa_annual_summit_june_5_2015
Cloud flare issa_annual_summit_june_5_2015
 
CoreSite: The Data Center as the On-Ramp to Cloud Enablement
CoreSite: The Data Center as the On-Ramp to Cloud EnablementCoreSite: The Data Center as the On-Ramp to Cloud Enablement
CoreSite: The Data Center as the On-Ramp to Cloud Enablement
 
big data and cloud computing
big data and cloud computingbig data and cloud computing
big data and cloud computing
 
Cloud asia 2012
Cloud asia 2012Cloud asia 2012
Cloud asia 2012
 
Microsoft presentation
Microsoft presentation Microsoft presentation
Microsoft presentation
 
Security concerns of cloud migration and its implications on cloud-enabled bu...
Security concerns of cloud migration and its implications on cloud-enabled bu...Security concerns of cloud migration and its implications on cloud-enabled bu...
Security concerns of cloud migration and its implications on cloud-enabled bu...
 
Cloud Technology to Facilitate Growth
Cloud Technology to Facilitate GrowthCloud Technology to Facilitate Growth
Cloud Technology to Facilitate Growth
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Tom uk soti_final_without video.4.21.15
Tom uk soti_final_without video.4.21.15Tom uk soti_final_without video.4.21.15
Tom uk soti_final_without video.4.21.15
 
Get Your Head In the Clouds: The Use of Cloud Computing in the Practice of Law
Get Your Head In the Clouds: The Use of Cloud Computing in the Practice of Law Get Your Head In the Clouds: The Use of Cloud Computing in the Practice of Law
Get Your Head In the Clouds: The Use of Cloud Computing in the Practice of Law
 

Recently uploaded

Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
Pixlogix Infotech
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Zilliz
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 

Recently uploaded (20)

Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 

Akamai corporate presentation english

  • 2. Akamai’s Origins • Founded in 1998 by Dr. Tom Leighton and Danny Lewin • Spawned from a research project at the MIT Cambridge (USA) • Focused on the development of distributed algorithms for load balancing, packet routing, server assignment and content caching • The goal: Make the Internet faster, secure and more reliable ©2012 Akamai
  • 3. The Internet: Simple on the Outside… The Internet Data center End-User ©2012 Akamai
  • 4. …But Complex on the Inside Numerous Applications Thousands of networks The Internet Data center Increasing Threats Billions of Configurations Millions of users on myriad devices ©2012 Akamai
  • 5. OUR MISSION: ACCELERATE INNOVATION In a hyperconnected world you must master the trends of cloud, media, mobile, while overcoming security threats. CLOUD MEDIA MOBILE SECURITY ©2012 Akamai
  • 6. The Akamai Intelligent Plattform A Global Platform:     130,000+ Servers 1,200+ Networks 2000 Locations 80+ Countries Accelerating Daily Traffic of: • 5+ Tbps • 17+ million hits per second • 30+ petabytes/day • 10+ million concurrent streams 15–30+% of Daily Web Traffic ©2012 Akamai
  • 7. Akamai in 60 Seconds Delivering more Web Content than anyone in the world CLOUD MEDIA MOBILE SECURITY 10,380+ Hours Saved by Akamai vs. Public Internet 2,760,990+ News Customer Page Views 311,000+ Mobile Page Views $11,000,000+ Commercial Banking Transactions 4,800,000+ SureRoute Traces 3430 Hours of video streamed 70,000+ Mobile Apps Delivered 23,250,000+ Hits on Akamai’s PCI Delivery Network ©2012 Akamai
  • 9. Top 100 Worldwide Global Brands trust Akamai ©2012 Akamai
  • 10. Our Customers Extend Across All Industries ENTERPRISE COMMERCE HIGH-TECH MEDIA & ENTERTAINMENT PUBLIC SECTOR ©2012 Akamai
  • 11. The Akamai Market Areas CLOUD MEDIA MOBILE SECURITY Reduce costs, increase agility & performance Reach multi-devices, scale & monetize Performance & personalization Defend without performance impact “In a hyperconnected world you must master the trends of cloud, media, mobile, while overcoming security threats.” ©2012 Akamai
  • 12. We remove the complexities of technology so our customers can capture the opportunity and meet the demands of the hyperconnected world. ©2012 Akamai

Editor's Notes

  1. To meet the Expectation of our Hyperconnected world you must master the trends of cloud, media, mobile, while overcoming security threats.Businesses and consumers no longer go online; they arealwaysonline. Keeping today’s hyperconnected users close to thecontent and delivering the quality experience they crave presentsenormous opportunities for new business models and revenue streams.To realize it, companies must overcome the challenges of technology toinnovate and deliver – fast.Adapt content for multiple devicesBalance the tradeoffs in delivering a personalized experience without impacting performanceManage security and maintaining costs can slow businesses down.  Delivering or consuming applications in the cloud, adapting rich media content for mobile devices and delivering a personalized experience without impacting performance, managing security and maintaining costs is a delicate balancing act – one with rich rewards for businesses who manage the tradeoffs. And by all accounts, the growth is projected to continue through the rest of the decade, as we see more users, on multiple devices, connecting at higher speeds, consuming heavier content and conducting more transactions.MORE Internet Users: 2005: 1.09B (eTForecasts); 2010: 1.7B;(Internet World Stats); 2015: 2.89B;(eTForecasts); 2020: 5B(National Science Foundation)MORE Devices: 2005: 2B (IDC); 2010: 5B (IMS Research); 2015: 15B (Cisco); 2020: 50B (Ericsson)MORE Mobile Internet Users: 2009: 24%; 2011: 34%; 2013: 42%; 2015: 46% (percentage of total Internet users connecting to the Internet via mobile device)--IDCHIGHEROnline Ad Spend:$18.7B (Zenith Optimedia);$68.4B (eMarketer);$132.1B(eMarketer);$307.25(eMarketer)HIGHER eCommerce Spend (B2C):$417B (IDC);$572B (Goldman Sachs);$1.4B (Cisco);$2.5T (Goldman Sachs)
  2. $11,000,000+ Commercial Banking Transactions20,000,000+ Visitors on Cyber Monday>$200B commerce revenue enabledannually