Home Application Delivery Application Acceleration & Optimization

Application Acceleration & Optimization

HTTP/2 Is Ready, But Are You Ready for It?

Shamus McGillicuddy is a Senior Analyst for EMA and is a featured guest blogger. The Internet Engineering Task Force (IETF) published HTTP Version 2 (HTTP/2)...

Do You Still Need Optimization After Migrating to HTTP/2?

There’s a lot of talk about HTTP/2. Why? Possibly because it promises to help alleviate some of the bottlenecks that come along with the...

Why Are Online Retailers Leaving Millions Of Dollars On The Table?

Online retailers are leaving millions of dollars – yes, millions – on the table.  Why is this? In the hyper-competitive world of online commerce sites,...

HTTP/2 Will Break Your Security – Here’s How to Fix it

Now that HTTP/2 is here and widely adopted by client browsers, many of the performance challenges that existed with HTTP1.1 are finally...

REPORT: State of the Union for Ecommerce Page Speed & Web Performance (Summer 2015)

In the hyper-accelerated world of technology, the modern consumer is bombarded with near-daily news of technological breakthroughs, OS updates, device refreshes and breakneck broadband...

The Internet has Upgraded to HTTP/2, but One Key Feature will Slow You Down

Imagine a world where smartphones were only upgraded every 15 years.  It is hard to imagine waiting that long for new hardware and new...

A Gateway to the New Internet: What to Know about HTTP/2 (And How to Use it Now)

Since HTTP 1.1 was introduced 17 years ago, the Internet has evolved.  This evolution introduced many changes, among them the development and delivery of...

Image Optimization: 10 Do’s & Don’ts for a Better User Experience

As website owners and designers, we want to provide the best user experience to our clients. This often involves massive graphical design with an...

11 Stats Showing Why You Should Care about Mobile Web Performance

A recent survey of 2300 CIOs from twenty-three different cities in the US found that one out of four have no mobile strategy. While there are many understandable reasons for this -- budget restrictions, lack of ownership, and simple inertia -- these reasons pale beside the potential losses incurred by not taking advantage of the wealth of opportunities that mobile presents. Today, I'd like to share a roundup of compelling reasons to make mobile a priority in 2015.

Want to Deliver the Best Possible User Experience in 2015? Consider These 8 Web Performance Resolutions.

In survey after survey, internet users say they want their online experience to be as safe, reliable, and fast as possible. That's why security, availability, and performance are at the core of everything we do at Radware. And that's why we've compiled this list of resolutions -- from managing page bloat to regaining control of rogue third-party scripts -- for site owners who want to deliver the fastest possible user experience to their audience.

Your Six Favorite Posts of 2014

During the past 12 months, we’ve worked to provide more than application delivery and security solutions.  Our goal was (and is)...

Every Day Is Cyber Monday. Is Your Site Delivering the Best Possible User Experience?

With the allure of Black Friday weekend fading, online retailers are discovering that every day is Cyber Monday. Online shoppers expect deep discounts, free...

Must Read

Application Security in the Microservices Era

As organizations break their applications down into microservices, the responsibility for securing these environments is shifting as well.

The Evolution of Application Development

Delivering and securing containers and microservices is relatively new. Though there may be a few hiccups, all will normalize to a strong, steady state.

Agile Security Is Now A Reality

Businesses are looking to optimize and accelerate their SDLC, in order to improve their operational efficiency and gain a competitive edge.

New DemonBot Discovered

Are you using Hadoop for data analytics? If so, know that a new bot is targeting Hadoop clusters with the intention of performing DDoS...

IDBA: A Patented Bot Detection Technology

Over half of all internet traffic is generated by bots — some legitimate, some malicious. Competitors and adversaries alike deploy “bad” bots that leverage different methods to achieve nefarious objectives. This includes account takeover, scraping data, denying available inventory and launching denial-of-service attacks with the intent of stealing data or causing service disruptions.