Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

Malaysia 2015: Akamai, Juniper, Xchanging, Oracle, EMC, Jabra

AvantiKumar | Jan. 8, 2015
Part four of this special interview series, featuring insights from industry leaders on Malaysia's ICT sector in 2015, focuses on Big Data Analytics & IoT.

Computerworld Malaysia presents, in completely random order, extracts of interviews and commentaries from industry leaders, which include some of the key challenges and opportunities for the ICT sector in Malaysia in 2015.

Though industry drivers are more interconnected than ever, the responses have been loosely grouped into 'episodes' with the following themes: National Enterprise & Talent; App Development, Mobile & Social; Cloud, Networking & Data Centres; Big Data Analytics & IoT; and Cybersecurity.

Rick Lanman - Akamai 

Rick Lanman, Regional Manager, ASEAN, Akamai Technologies (pic), picked out trends within the broader internet framework:

One of the main highlights in our industry this year was the fact that smart devices and Web technology were used to consume a lot of media and to complete a lot more work. Akamai streamed a number of major worldwide events both in 2013 and in 2014, but the FIFA World Cup 2014 was by far the biggest sporting event in terms of Internet traffic that we have seen at Akamai.  The highest traffic of 6.9Tbps was recorded during the Argentina versus Netherlands game.

What we saw through all the events that we streamed and especially the World Cup is that audiences have started consuming more media through various mobile devices because people want to watch high quality, live coverage of events from wherever they are.

The low point was the size and volume of DDoS attacks this year.  In Q3 2014, Akamai mitigated 17 attacks of greater than 100 Gbps each, with the largest totalling 321 Gbps. Attackers have been deploying new methods of attack and have upgraded older methods, resulting in four times the number of attacks in Q3 2014 than in the same corresponding in the previous year.  The attackers have also started seeking to control devices such as routers and Internet of Things (IoT) devices, for example, smart thermostat systems and smart washer/dryers.

We saw strong growth across multiple sectors like commercial and financial services in Malaysia, and a good adoption from new customers.  In terms of solutions, security remains a key focus of our customers and prospects in Malaysia, with organisations also continuing to look at delivering web and application performance through the Akamai platform.

As our business continues to grow in the region, I expect to see stronger adoption in the enterprise sector.  Cloud adoption continues to gain momentum in Malaysia and with that, application performance and security become the key areas of concern for CIOs and CTOs.  The opportunity we have seen in the last 12 months for Malaysian organizations to expand their businesses internationally and consolidate their infrastructure will enable these businesses to benefit across multiple aspects of the Akamai platform.

The trends we expect to shape our business this year:

1. Secure and superior web experience will become essential
As cloud matures, we expect a lot more internal and external applications to be built on this platform, and the consumption of media through mobile devices to continue to grow at a rapid rate.  This will create a demand for a better and instant end user experience regardless of the device they are using, the network, browser type or the type of content they are accessing.  To meet this demand, organizations will need to look into adopting the 'situational performance' approach to web experience, which tightly integrates delivery, acceleration, and optimization technologies and enables real-time web experience optimization based upon the requirements of any given and unique situation.

If a company is not optimising its site for a specific context, whether it is the user's device, location, or intent, it is at a disadvantage to its competitors and risks a loss of revenue.  

At the same time, as more content moves to the cloud and paid video streaming becomes a significant revenue generator, there will be many more attempts to subvert those streams through:

  • Link Sharing - Unauthorized users obtaining access to premium/paid content and bypassing a content publisher's business model.
  • Deep Linking - A hacker decompiles a media player and posts the hidden links on his own site to monetize the content.
  • Player Hijacking - Theft of a media player, followed by copying it to a different website, thereby bypassing attributions to the origin site.
  • Stream Ripping - Theft of the actual content from a stream while it is being delivered to client systems.
  • Stealing from Cache - Theft of the content from a browser, media player cache or disk.
  • Content Tampering - Modification of the actual content such as replacing or injecting unwanted advertisements into a video stream.


1  2  3  4  5  6  Next Page 

Sign up for Computerworld eNewsletters.