Using hybrid intelligent separation technology to automatically identify static resources and dispatch the nodes throughout the network. With intelligent routing, a variety of caching strategies and intelligent data compression functions, the optimal return path is selected intelligently in real-time to achieve the fastest response to requests.
Supporting full-link HTTPS encrypted transmission with neutral and reliable security capabilities. Providing a wealth of access control policies to fight against hijacking, tampering for security protection.
Providing end-to-end, high-service assurance solutions such as load balancing, flow control, origin switch in seconds, offline mode, and more. High availability and stability of business processes are assured.
Baishan’s optimized TCP provides fast and stable transmission of data to improve the acceleration experience through feature learning algorithms and slow-starting contracting strategies.
Baishan 24/7 technical support, combined with a sound operating security system, provides butler-style services, so customers can manage their business with ease.
DCDN uses technologies such as dynamic separation, intelligent routing, protocol optimization and weak network optimization, combining them with request consolidation, data compression, page redundancy optimization and other programs, to improve tranmission efficiency.
Master standby, round-robin, weights and other multi-origin load balancing methods are adopted, along with the file prewarm strategy, to greatly reduce the return traffic. This ensures service availability and stability, as well as reduces the cost for origin servers.
Supporting full-link HTTPS encryption, multi-certificate format, two-way authentication, and HTTP/2. Providing a variety of flexible access control strategies to meet the business need against link theft, hijacking and tampering.
Combining with full-link HTTPS encryption and technologies against link theft, hijacking and tampering to prevent issues such as ballot-stuffing, information leakage and server anomalies, to meet the enhanced security needs of the financial industry.