Skip to main content

Key 2014 Trends in Web and Mobile Performance

Sven Hammar

The key 2014 trends in web and mobile performance: a new faster Internet – with optimized protocols:

1. A new faster Internet

Internet giants like Google, AWS and Apple are investing in making the Internet faster. A faster web serves more content, adds and searches, which by end of the day, means revenues for companies like Google, Apple and many e-retailers etc.

Applications and the protocols need to be made more efficient to avoid a painfully (for users) slow web. So, in order just to keep up with the traffic, websites need to improve speed by 25 to 50 percent. HTML5 by itself is good, but the big upside comes with the use of the different binary protocols and content optimization tools.

By the end of 2014, the use of optimized protocols like WebSockets, SPDY, Protobuf, and content optimization will become mainstream.

2. Cloud downtime - online showstopper for business

With even giants like Amazon and Google experiencing web outages, we are likely to see more setbacks during 2014. The increasing traffic volume and much more complex applications will become a challenge even for the big websites. We will see some real and quite humiliating showstoppers in 2014 for online business.

E-commerce companies need to start preparing for 2014 with real outside testing failover between data center and vendors, recovery time, trigger validation, data consistency and fall-back procedure.

3. Overload traffic - CDN gets a new angle

Content delivery network (CDN) gets a new angle. Social media has brought a new level of risk to IT departments as a new type of traffic spike emerges. Now, in addition to traditional hacking, websites need to be aware of social media driven "attacks" that can change traffic levels of 100 Gb/s or more from real users. Regardless of whether the attack is a malicious hack or a Facebook post or an organized tweet – very few enterprise infrastructures can handle this load. Normal DDoS protection will not work. Only large CDN providers will be able to absorb the load without caving in.

4. Mobile hacking

With new and much improved services for mobile such as banking, gaming etc., hackers have found new targets. The combination of traditional web hacking and knowledge about apps and mobile operating systems will create a new battleground. There are no new crimes, only new venues. And with the explosive growth of mobile services, it would be naïve to think that this field will remain unobserved by the criminal hacker networks.

Hot Topics

The Latest

An overwhelming majority of IT leaders (95%) believe the upcoming wave of AI-powered digital transformation is set to be the most impactful and intensive seen thus far, according to The Science of Productivity: AI, Adoption, And Employee Experience, a new report from Nexthink ...

Overall outage frequency and the general level of reported severity continue to decline, according to the Outage Analysis 2025 from Uptime Institute. However, cyber security incidents are on the rise and often have severe, lasting impacts ...

In March, New Relic published the State of Observability for Media and Entertainment Report to share insights, data, and analysis into the adoption and business value of observability across the media and entertainment industry. Here are six key takeaways from the report ...

Regardless of their scale, business decisions often take time, effort, and a lot of back-and-forth discussion to reach any sort of actionable conclusion ... Any means of streamlining this process and getting from complex problems to optimal solutions more efficiently and reliably is key. How can organizations optimize their decision-making to save time and reduce excess effort from those involved? ...

As enterprises accelerate their cloud adoption strategies, CIOs are routinely exceeding their cloud budgets — a concern that's about to face additional pressure from an unexpected direction: uncertainty over semiconductor tariffs. The CIO Cloud Trends Survey & Report from Azul reveals the extent continued cloud investment despite cost overruns, and how organizations are attempting to bring spending under control ...

Image
Azul

According to Auvik's 2025 IT Trends Report, 60% of IT professionals feel at least moderately burned out on the job, with 43% stating that their workload is contributing to work stress. At the same time, many IT professionals are naming AI and machine learning as key areas they'd most like to upskill ...

Businesses that face downtime or outages risk financial and reputational damage, as well as reducing partner, shareholder, and customer trust. One of the major challenges that enterprises face is implementing a robust business continuity plan. What's the solution? The answer may lie in disaster recovery tactics such as truly immutable storage and regular disaster recovery testing ...

IT spending is expected to jump nearly 10% in 2025, and organizations are now facing pressure to manage costs without slowing down critical functions like observability. To meet the challenge, leaders are turning to smarter, more cost effective business strategies. Enter stage right: OpenTelemetry, the missing piece of the puzzle that is no longer just an option but rather a strategic advantage ...

Amidst the threat of cyberhacks and data breaches, companies install several security measures to keep their business safely afloat. These measures aim to protect businesses, employees, and crucial data. Yet, employees perceive them as burdensome. Frustrated with complex logins, slow access, and constant security checks, workers decide to completely bypass all security set-ups ...

Image
Cloudbrink's Personal SASE services provide last-mile acceleration and reduction in latency

In MEAN TIME TO INSIGHT Episode 13, Shamus McGillicuddy, VP of Research, Network Infrastructure and Operations, at EMA discusses hybrid multi-cloud networking strategy ... 

Key 2014 Trends in Web and Mobile Performance

Sven Hammar

The key 2014 trends in web and mobile performance: a new faster Internet – with optimized protocols:

1. A new faster Internet

Internet giants like Google, AWS and Apple are investing in making the Internet faster. A faster web serves more content, adds and searches, which by end of the day, means revenues for companies like Google, Apple and many e-retailers etc.

Applications and the protocols need to be made more efficient to avoid a painfully (for users) slow web. So, in order just to keep up with the traffic, websites need to improve speed by 25 to 50 percent. HTML5 by itself is good, but the big upside comes with the use of the different binary protocols and content optimization tools.

By the end of 2014, the use of optimized protocols like WebSockets, SPDY, Protobuf, and content optimization will become mainstream.

2. Cloud downtime - online showstopper for business

With even giants like Amazon and Google experiencing web outages, we are likely to see more setbacks during 2014. The increasing traffic volume and much more complex applications will become a challenge even for the big websites. We will see some real and quite humiliating showstoppers in 2014 for online business.

E-commerce companies need to start preparing for 2014 with real outside testing failover between data center and vendors, recovery time, trigger validation, data consistency and fall-back procedure.

3. Overload traffic - CDN gets a new angle

Content delivery network (CDN) gets a new angle. Social media has brought a new level of risk to IT departments as a new type of traffic spike emerges. Now, in addition to traditional hacking, websites need to be aware of social media driven "attacks" that can change traffic levels of 100 Gb/s or more from real users. Regardless of whether the attack is a malicious hack or a Facebook post or an organized tweet – very few enterprise infrastructures can handle this load. Normal DDoS protection will not work. Only large CDN providers will be able to absorb the load without caving in.

4. Mobile hacking

With new and much improved services for mobile such as banking, gaming etc., hackers have found new targets. The combination of traditional web hacking and knowledge about apps and mobile operating systems will create a new battleground. There are no new crimes, only new venues. And with the explosive growth of mobile services, it would be naïve to think that this field will remain unobserved by the criminal hacker networks.

Hot Topics

The Latest

An overwhelming majority of IT leaders (95%) believe the upcoming wave of AI-powered digital transformation is set to be the most impactful and intensive seen thus far, according to The Science of Productivity: AI, Adoption, And Employee Experience, a new report from Nexthink ...

Overall outage frequency and the general level of reported severity continue to decline, according to the Outage Analysis 2025 from Uptime Institute. However, cyber security incidents are on the rise and often have severe, lasting impacts ...

In March, New Relic published the State of Observability for Media and Entertainment Report to share insights, data, and analysis into the adoption and business value of observability across the media and entertainment industry. Here are six key takeaways from the report ...

Regardless of their scale, business decisions often take time, effort, and a lot of back-and-forth discussion to reach any sort of actionable conclusion ... Any means of streamlining this process and getting from complex problems to optimal solutions more efficiently and reliably is key. How can organizations optimize their decision-making to save time and reduce excess effort from those involved? ...

As enterprises accelerate their cloud adoption strategies, CIOs are routinely exceeding their cloud budgets — a concern that's about to face additional pressure from an unexpected direction: uncertainty over semiconductor tariffs. The CIO Cloud Trends Survey & Report from Azul reveals the extent continued cloud investment despite cost overruns, and how organizations are attempting to bring spending under control ...

Image
Azul

According to Auvik's 2025 IT Trends Report, 60% of IT professionals feel at least moderately burned out on the job, with 43% stating that their workload is contributing to work stress. At the same time, many IT professionals are naming AI and machine learning as key areas they'd most like to upskill ...

Businesses that face downtime or outages risk financial and reputational damage, as well as reducing partner, shareholder, and customer trust. One of the major challenges that enterprises face is implementing a robust business continuity plan. What's the solution? The answer may lie in disaster recovery tactics such as truly immutable storage and regular disaster recovery testing ...

IT spending is expected to jump nearly 10% in 2025, and organizations are now facing pressure to manage costs without slowing down critical functions like observability. To meet the challenge, leaders are turning to smarter, more cost effective business strategies. Enter stage right: OpenTelemetry, the missing piece of the puzzle that is no longer just an option but rather a strategic advantage ...

Amidst the threat of cyberhacks and data breaches, companies install several security measures to keep their business safely afloat. These measures aim to protect businesses, employees, and crucial data. Yet, employees perceive them as burdensome. Frustrated with complex logins, slow access, and constant security checks, workers decide to completely bypass all security set-ups ...

Image
Cloudbrink's Personal SASE services provide last-mile acceleration and reduction in latency

In MEAN TIME TO INSIGHT Episode 13, Shamus McGillicuddy, VP of Research, Network Infrastructure and Operations, at EMA discusses hybrid multi-cloud networking strategy ...