Push application logic to the edge with ready-to-deploy code examples, structured tutorials, and API documentation.
Solve problems faster with code samples developed by Fastly’s experts. Copy the code, customize it to meet your needs, and deploy it to your configuration.
There are near-infinite ways to build custom solutions and applications on Fastly's powerful, programmable edge.
Use the flexible and powerful Varnish Configuration Language to create logic at the edge.
Use dictionaries to handle redirected URL mappings at the edge.
Play with the Fastly platform without logging in.
Right now, complex problems and use cases are being explored and solved on our new serverless compute environment. Powered by WebAssembly and with 100x faster startup times than other serverless offerings, developers are doing more at the edge with unprecedented power, flexibility, and scale.Stay in the know
The edge of the network is an exciting, new frontier. Read the latest about the evolving protocols and experimental technologies shaping the future of the internet.
The basic concept of performing authentication and then using identity data to make authorization decisions is something that applies to a large majority of web and native apps. Doing this at the edge offers some very significant advantages to both developers and end users.
Authentication is one of the most obvious uses for edge computing. Understanding who your users are as early and as close as possible to their location yields powerful customizations and speedy responses. But there's more than one way to think about how to apply an authentication scheme at the edge.
Many companies are still relying on legacy rules-based web application firewalls that can make scaling difficult and, in some cases, cause more problems than they solve with false positives. A next-gen approach is needed. In this post, we’ll compare legacy versus next-gen WAFs to see what truly sets them apart.