The Blog

Tools and tips plus the latest in tech

How to Use Bot Management for IAM Use Cases

How to Use Bot Management for IAM Use Cases

Bots are used in both security and nonsecurity attacks. Identity and access management leaders must build a strong business case for a bot management capability or their organizations will incur avoidable losses due to account takeovers and also be unprepared to manage the risks introduced by customers using AI agents.

Locality Sensitive Hashing

Locality Sensitive Hashing

An introduction to Locality Sensitive Hashing (LSH) and its application in load balancing, including consistent hashing and its use in CDNs and Google's Maglev for efficient server pool management.

The Death of JPEG-XL

The Death of JPEG-XL

We bid farewell to JPEG-XL after its abrupt deprecation by Google, reinforcing the tech giant's domineering influence over the web and sparking a call for resilient alternatives.

Google AMP

Google AMP

Google AMP has been controversial right from the get go. As part of its 'Page Experience Update' Google is removing its preferential treatment of AMP authored pages.

© PEAKHOUR.IO PTY LTD 2025   ABN 76 619 930 826    All rights reserved.