www.computerweekly.com Open in urlscan Pro
2606:4700::6812:1dda  Public Scan

Submitted URL: https://e.zmp.techtarget.com/click?EZmlvbmEudGF5bG9yQGViZ2FtZXMuY29t/CeyJtaWQiOiIxNjg4NDMwNzE4NDY4Mzc3NWVhYTc0MTY2IiwiY3QiOiJ...
Effective URL: https://www.computerweekly.com/news/366542232/How-Fastly-thinks-differently-about-CDNs-and-the-edge?utm_campaign=20230703_How+F...
Submission: On July 04 via api from US — Scanned from DE

Form analysis 1 forms found in the DOM

GET https://www.computerweekly.com/search/query

<form action="https://www.computerweekly.com/search/query" method="get" class="header-search">
  <label for="header-search-input" class="visuallyhidden">Search the TechTarget Network</label>
  <input class="header-search-input" id="header-search-input" type="text" name="q" placeholder="Search Computer Weekly">
  <button aria-label="Search" class="header-search-submit"><i class="icon" data-icon="g"></i></button>
  <ul class="ui-autocomplete ui-front ui-menu ui-widget ui-widget-content ui-corner-all" id="ui-id-1" tabindex="0" style="display: none;"></ul>
</form>

Text Content

3
Trending Now

2023 IT Priorities APAC ReportDownload NowView All3
X
3Hello, these 3 documents have been trending and as a member they are free to
you.
 * 
   2023 IT Priorities APAC ReportDownload Now
 * 
   Innovation Awards APAC 2023 - Transportation: Transdev Sydney FerriesDownload
   Now
 * 
   4 Things You Need to Know Now about Edge ComputingDownload Now




Search the TechTarget Network
Join CW+
Login Register Cookies
 * News
 * In Depth
 * Blogs
 * Opinion
 * Videos
 * Photo Stories
 * Premium Content
 * Webinars
 * IT Salary Survey infographic

RSS
 * IT Management
    * IT leadership & CW500
    * IT architecture
    * IT efficiency
    * Governance
    * Innovation
    * Legislation & regulation
    * Operations & support
    * Project management
    * Strategy
    * Supplier management
    * Business issues
    * Sponsored Communities

 * Industry Sectors
    * Healthcare IT
    * Charity IT
    * Business services IT
    * Financial services IT
    * Government & public sector IT
    * Leisure & hospitality IT
    * Manufacturing IT
    * Media & entertainment IT
    * Retail IT
    * SME IT
    * Telecoms & internet
    * Transport & travel IT
    * Utilities IT
    * IT suppliers

 * Technology Topics
   Datacentre View All
    * Clustering for high availability and HPC
    * Containers
    * Converged infrastructure
    * Datacentre backup power and power distribution
    * Datacentre capacity planning
    * Datacentre cooling infrastructure
    * Disaster recovery/security
    * Green IT
    * Performance, monitoring and optimisation
    * Systems management
    * DevOps
    * IaaS
    * Server and Operating Systems
    * PaaS
    * Virtualisation
    * SaaS
    * Desktop virtualisation platforms
   
   Enterprise software View All
    * AI and automation
    * Blockchain
    * Business applications
    * Business intelligence
    * Cloud applications
    * Collaboration
    * CRM
    * Database
    * ERP
    * Financial applications
    * HR software
    * Middleware
    * Microservices
    * Windows
    * Mobile
    * Open source
    * Operating systems
    * SOA
    * Software development
    * Software licensing
    * Virtualisation
    * Web software
   
   IT in Europe and Middle East View All
    * IT in France
    * IT in the Nordics
    * IT in Benelux
    * IT in Germany
    * IT in Italy
    * IT in Poland
    * IT in Russia
    * IT in Spain
    * IT in the Middle East
    * IT in Turkey
   
   Information Management View All
    * Big data
    * Business intelligence and analytics
    * BPM
    * Content management
    * Database management
    * Quality/governance
    * Data warehousing
    * MDM/Integration
   
   IT in Asia-Pacific View All
    * IT in ASEAN
    * IT in Australia & New Zealand
    * IT in India
   
   Internet View All
    * Cloud
    * E-commerce
    * Internet infrastructure
    * Social media
    * Web development
   
   IT skills View All
    * Diversity in IT
    * Training
    * Jobs
    * Management skills
    * Technical skills
   
   Hardware View All
    * Chips & processors
    * Printers
    * Storage
    * Data centre
    * Mobile
    * Networking
    * PC
    * Servers
   
   IT security View All
    * Antivirus
    * Secure Coding and Application Programming
    * Continuity
    * Cloud security
    * Data Breach Incident Management and Recovery
    * Endpoint and NAC Protection
    * Cybercrime
    * IAM
    * Risk management
    * Network Security Management
    * Data protection
    * Compliance Regulation and Standard Requirements
    * Security policy and user awareness
    * Web Application Security
   
   IT services View All
    * Cloud
    * Consultancy
    * Outsourcing
    * Hosting
    * Offshore
    * Startups
   
   Mobile View All
    * Laptop
    * Mobile software
    * Mobile networking
    * Smartphone
    * Tablet
   
   Networking View All
    * Datacentre networking
    * Internet of Things
    * Mobile
    * Network hardware
    * Network monitoring and analysis
    * Network routing and switching
    * Network security strategy
    * Network software
    * Software-defined networking
    * Telecoms networks and broadband communications
    * Unified communications
    * VoIP
    * WAN performance and optimisation
    * Wireless
   
   Storage View All
    * Cloud storage
    * Containers and storage
    * Backup
    * Compliance and storage
    * Disaster recovery
    * Flash and SSDs
    * Hyper-convergence
    * Object storage
    * Disk systems
    * Software-defined storage
    * Storage switches
    * Storage management
    * Storage performance
    * Virtualisation and storage
   
   Please select a category
    * Datacentre
    * Enterprise software
    * IT in Europe and Middle East
    * Information Management
    * IT in Asia-Pacific
    * Internet
    * IT skills
    * Hardware
    * IT security
    * IT services
    * Mobile
    * Networking
    * Storage

 * Follow:
 * 
 * 
 * 

 * ComputerWeekly.com.br
 * ComputerWeekly.de
 * ComputerWeekly.es
 * LeMagIT.fr
 * MicroScope.co.uk


 * Home
 * Cloud computing software

Sergey Nivens - stock.adobe.com

Sergey Nivens - stock.adobe.com

News


HOW FASTLY THINKS DIFFERENTLY ABOUT CDNS AND THE EDGE




FASTLY IS COUNTING ON ITS DEVELOPER CHOPS AND DIFFERENT APPROACHES TOWARDS
SECURITY AND OTHER AREAS TO COMPETE WITH ITS RIVALS

 * Share this item with your network:
 * 
 * 
 * 
 * 
 * 

 * 
 * 
 *  * 
    * 
    * 
    * 


By
 * Aaron Tan, TechTarget

Published: 19 Jun 2023 12:45

Fastly may have set up a team to run its Asia-Pacific (APAC) business just under
a year ago, but the company’s founder Artur Bergman believes the content
delivery network (CDN) supplier’s developer roots will give it an edge over
rivals.



Like other CDN players, Fastly has branched out to offer edge compute and
security services to help enterprises speed up and run applications at edge
locations while fending off cyber threats, including distributed denial of
service (DDoS) attacks.

But it thinks differently in those investments, focusing on efforts to scale its
points of presence (POPs) both horizontally and vertically, preventing data
leakages and supporting the WebAssembly language that brings new capabilities
and additional security features to cloud-native developers.

In an interview with Computer Weekly in Singapore, Bergman, who is also Fastly’s
chief architect, discusses the company’s competitive play, its investments in
APAC and new capabilities that customers can expect next year.

Tell us more about Fastly, its focus on developers and how it is competing
against Cloudflare, Akamai and others in the market.

Bergman: We founded the company in 2011, but our story goes back to 2008 when I
was CTO of a company called Wikia, which is now Fandom. We built wikis and we
wanted our wikis to run fast around the world.

The content of wikis doesn’t change very often, but when a user edits a wiki,
the content has to change immediately. We wanted to cache the content at the
edge, but none of the providers could guarantee fast cache invalidation. So, we
ended up building our own small CDN.

In 2011, I left Wikia to start Fastly and Wikia became our anchor customer. The
idea was that we should be flexible enough so that no one should feel the need
to build their own CDN. We should provide enough control to our customers so
that they can treat the edge as their own.

From day one, we also had this dream of delivering full compute at the edge, but
it took us 10 years to get to a point where we had the network and the
technology to be able to deliver a solid compute environment at the edge, which
we did in 2021.

We were developers but our competitors were not developer friendly at all – and
they still kind of aren’t. We wanted to integrate the edge with our application
to get the maximum benefit. We also focused on small files. Back then, CDNs were
either optimised for a few files or large videos, but not billions of small
files like user-generated content. We also went into API [application
programming interface] caching, which was extremely important because most of
those were small files. We built a different architecture to enable that.

> We want to be an amazing platform for people to build applications and
> innovate on the edge. A lot of investments are now going into the compute
> platform and supporting more languages and databases Artur Bergman, Fastly

Our first customers were high-tech customers, but we soon expanded our reach to
publishers who produced segmented or small videos that worked well with our
architecture, notably through request collapsing, a kind of global application
level multicast. So, regardless of the number of requests you get for a new
object, we only go back to the origin once. We also looked at e-commerce which
drove us to invest more in security. That led to the Signal Sciences acquisition
to beef up our security story.

What about the larger enterprise space now that you’ve got a security portfolio
in the fold? What sorts of workloads are enterprises running on your platform?

Bergman: We’ve been in the enterprise space for a long time, and most of our
revenue comes from enterprise customers. It’s been the case for the past seven
years.

Enterprises use us for communications between their end-users or devices and
central systems. End-users can be people, but also IoT [internet of things]
devices that make API calls. The workloads are diverse in what they’re
processing, but it’s fundamentally data that’s going from the cloud or
datacentres to devices and end-users.

Besides caching and serving images, we also host dynamic content which our
customers update using our APIs. In the e-commerce space, this could be caching
information on pricing and availability, so when the price is changed, we’ll
update the cache.

That means your application can be fast around the world. It doesn’t matter
where your datacentre is. The data relevant to the users in a region will be
cached in that region so you get as many interactions as possible, and you don’t
have to go back to the datacentre.

From a security point of view, we took a different path. The worst thing our
customers can do to themselves is have a bug that leaks data between users. To
prevent that, we spin up a sandbox per request and when the request is over, we
tear the sandbox down.

We also ended up investing in the WebAssembly language. We started the Bytecode
Alliance for server side WebAssembly, but we also wanted to support multiple
languages as enterprises have a list of languages they use. That means we’ve had
to reduce the cold startup time. Some of our competitors’ cold startup time is
500ms to one second but ours is 50 microseconds so customers don’t have to worry
about memory safety and the memory guarantee is part of that.

How is Fastly helping customers to mitigate DDoS attacks and doing things
differently when it comes to DDoS mitigation?

Bergman: We do a fair amount of DDoS mitigation, and we use our network to our
advantage. We have powerful machines that can handle large amounts of inbound
traffic, and we have multiple levels where we try to discard or queue bad
traffic. Customers can also tap WAF [web application firewall] functionalities
for higher level application protection.

And so, there are two levels of protection – the first is when there’s so much
traffic that we’re fending off in volumetric attacks and the second is when
you’re trying to defend against, say, a denial of inventory attack, which has
less traffic, so it doesn’t hit the lower level. We have an edge rate limiter
that customers can use to protect against those attacks. We also have managed
security services with a security operations centre that identifies new threats
and tracks what’s going on to protect our customers.

> From a security point of view, we took a different path. The worst thing our
> customers can do to themselves is have a bug that leaks data between users. To
> prevent that, we spin up a sandbox per request and when the request is over,
> we tear the sandbox down Artur Bergman, Fastly

How is Fastly building up its infrastructure footprint in terms of its POPs
across the world? Could you talk about your strategy in that regard?

Bergman: We have a different POP strategy. Having more POPs is not always better
because of the caching ratio and massive data. We also want our POPs to scale
horizontally like everyone else, but we also want our machines to scale
vertically.

Today, we have 99 POPs across 35 countries and our strategy has been to combine
where we think our customers want us to be and where we should be because we
have a lot of traffic in a certain location. We’ve had a POP in Singapore for a
long time, but it primarily serves customers outside Singapore. We also built
POPs in Tokyo and Hong Kong pretty early, as well as Australia and New Zealand.

When we enter a market, we decide – depending on the opportunity and the traffic
– how many POPs we should have and where to place them. We’ve tried to choose
the most connected buildings and locations. The POPs themselves are designed
differently – we have our own SDN [software defined networking] controller. We
use Arista switches that run our own software and it’s a very flat architecture.

And then we have really powerful servers. The current generation servers each
have 400Gbps NICs [network interface cards], a terabyte of RAM, 50TB or so of
SSDs [solid state drives] and 64 cores. Our machines can push a lot of traffic
so it’s really useful in cases of traffic spikes or DDoS attacks. Each
individual machine has all the capacity, but we also have a lot of storage –
some of our biggest POP machines might cache 300 million objects.

Talk to us about your business in the Asia-Pacific region and where you see
opportunities.

Bergman: We’ve had POPs in the region but until recently, we didn’t have a team
here. We were planning to start a team and invest in this region at the end of
2019, then Covid-19 hit so it was impossible to expand to new markets. The team
here was started less than year ago and we now have seven people in various
functions including technical operations, customer support and engineering.
We’ve also added POPs in nine new locations in APAC in the past year and a half,
with significant infrastructure upgrades in Australia and Japan.

From my conversations with potential customers, APAC is a highly connected
market and as customers try to be more global, it’s important that their
applications can scale. We also see a lot of opportunities in countries such as
Indonesia and Malaysia.

You mentioned some of the security capabilities that Fastly had acquired. What
is the thinking around evolving the platform? What sorts of new capabilities are
you looking at?

Bergman: We want to be an amazing platform for people to build applications and
innovate on the edge. A lot of investments are now going into the compute
platform and supporting more languages and databases. We have our global key
value store, and we want to integrate with more data stores.

We also launched our observability capabilities at the end of last year. We have
a privileged view of the internet, and we see so much of the traffic. In the
past, customers use Fastly to see what’s happening and how they’re doing but
they had to do all the work like pull together log files and build their own
dashboards. With observability, we are extending that by collecting more data
and giving our users visibility over what’s happening on their network.

With regard to security, we believe our products have to enable developers and
product engineering teams to deliver features to end-users, and modern security
organisations see themselves as neighbours to allow developers to move faster.
And so, we see the security components of our platform as something that enables
companies to get stuff done.

In November 2022, we also announced a project that lets you spin up Fastly on a
cloud provider or in your on-premise datacentre, giving you access to our
security, compute, observability and caching features no matter where you need
them. There’s been a lot of interest from customers and that’s coming next year.



READ MORE ABOUT CDNS AND EDGE CLOUD

 * Akamai marks foray into cloud computing with a distributed cloud computing
   platform that is touted to make it easier for enterprises to get applications
   and data closer to their customers.
 * Cloudflare co-founder Matthew Prince talks up what has changed since the
   company’s first business plan was written in 2009.
 * Zscaler’s head in Asia-Pacific and Japan talks up the company’s growth
   momentum in the region and what it is doing to address areas where it can do
   better.
 * Toffs Technologies is eyeing second- and third-tier cities in Asia as it
   bolsters its infrastructure and experiments with the use of home networks as
   content delivery networks.



READ MORE ON CLOUD COMPUTING SOFTWARE

 * CDN (CONTENT DELIVERY NETWORK)
   
   
   By: Kinza Yasar

 * HOW TO BUILD AN SD-WAN RFP TO EVALUATE VENDORS
   
   
   By: Robert Sturt

 * AI SWEDEN CONNECTS THE DOTS TO KEEP THE COUNTRY COMPETITIVE
   
   
   By: Pat Brans

 * COMPARING WEB BROWSER PRIVACY AND SECURITY FEATURES
   
   
   By: Gary Olsen

Latest News
 * OneWeb expands commercial service across Europe, US
 * Next-generation mobile lands on Channel Islands with Jersey Telecom
 * BlackCat gang claims cyber attack on Barts NHS Trust
 * View All News

Download Computer Weekly
 * In The Current Issue:
   * Rishi Sunak calls for urgency in building out UK tech
   * Keir Starmer calls for AI job loss discussion
   * CTO interview: Europe benefits from energy gains in AMD chips
   Download Current Issue

Latest Blog Posts
 * SASE Delivery - Is A PoP always a PoP? What to look for... – Networks
   Generation
 * Top Of The SASE PoPs – Networks Generation
 * View All Blogs

Related Content
 * Handling Slow Disks in Heterogeneous SSD Deployments – Storage
 * ClearSky Data adds NAS storage as a service – Storage
 * Private CDN services fill specific needs for some ... – Networking



Latest TechTarget resources
 * CIO
 * Security
 * Networking
 * Data Center
 * Data Management

CIO
 * Tech integration partnerships can help boost IT productivity
   
   Enterprise Strategy Group's Doug Cahill discusses survey results that show
   using integrated technologies from multiple vendors ...

 * 8 blockchain-as-a-service providers to have on your radar
   
   You don't have to build your blockchain project from the ground up. These
   cloud-based service providers can provide the necessary...

 * Ultimate guide to digital transformation for enterprise leaders
   
   This in-depth guide explains what digital transformation is, why it is
   important and how enterprises can successfully transition ...

Security
 * TSMC partner breached by LockBit ransomware gang
   
   A cyber attack against Chinese systems integrator Kinmax led to the theft of
   TSMC proprietary data, which LockBit threatened to ...

 * AI helps humans speed app modernization, improve security
   
   Enterprises are looking at AI-driven approaches to help human teams modernize
   and accelerate application development to refactor ...

 * Quishing on the rise: How to prevent QR code phishing
   
   A monthslong quishing campaign demonstrated how cybercriminals are using QR
   codes to trick users. Here's what enterprise security...

Networking
 * Prosimo offers free multi-cloud connectivity
   
   The new MCN Foundation can find and connect to public clouds and provide
   visibility. The company's full-stack product powers the ...

 * Cisco to add SamKnows broadband visibility to ThousandEyes
   
   SamKnows data in ThousandEyes will let enterprises monitor the broadband
   connections of employees working from home. The ...

 * 10 edge computing quiz questions
   
   Edge computing isn't new, but it has grown in popularity due to 5G and the
   influx of IoT devices. This quiz covers edge computing...

Data Center
 * Reimaging, innovating, securing cloud-native at SUSECON 2023
   
   At SUSECON 2023, SUSE announced cloud-native AI-based observability with Opni
   and alluded to more announcements this year. ...

 * Data center tiers and why they matter for uptime
   
   Organizations should consider data center tiers of colocation providers or
   for their own data centers based on their uptime needs...

 * Explore Red Hat's bring-your-own-subscription model for RHEL
   
   Many organizations use pay-as-you-go models with public cloud providers to
   run their Red Hat products in the cloud. Explore how ...

Data Management
 * Grow data trust to avoid customer and corporate consequences
   
   A lack of data trust can undermine customer loyalty and corporate success. To
   avoid the consequences, understand the effects of ...

 * Databricks introduces Delta Lake 3.0 to help unify data
   
   As part of the open source community developing the data storage platform,
   the vendor unveiled the platform's latest iteration ...

 * Use knowledge graphs with databases to uncover new insights
   
   Knowledge graphs work with graph databases to offer different data storage
   options than a traditional database, particularly in ...

 * About Us
 * Editorial Ethics Policy
 * Meet The Editors
 * Contact Us
 * Our Use of Cookies
 * Advertisers
 * Business Partners
 * Media Kit

 * Corporate Site
 * Contributors
 * Reprints
 * Answers
 * E-Products
 * Events
 * In Depth
 * Guides

 * Opinions
 * Quizzes
 * Photo Stories
 * Tips
 * Tutorials
 * Videos
 * Computer Weekly Topics

All Rights Reserved, Copyright 2000 - 2023, TechTarget

Privacy Policy
Cookie Preferences
Do Not Sell or Share My Personal Information


Close