SlideShare a Scribd company logo
1 of 66
Download to read offline
Can Third-Party Scripts
Take Down Your
Entire Site?
Tammy Everts
O’Reilly Webcast – June 4, 2014
Conversions
Ad revenue
Page views
Visitor data
No need to re-invent the wheel
Quick and easy
Established
Support
Slide 2
Third-party calls can make up
>50% of page requests.
Slide 3
Steve Souders: http://www.fastly.com/blog/steve-souders-webperf-web-components/
Slide 4
Slide 5
Slide 6
Third-party scripts present risks to your pages
and to your users:
Outages
Slowdowns
Security (?)
Slide 7
Slide 8
Slide 9
Increase page weight
Increase number of hosts and connections
Introduce additional latency
Slide 10
Slide 11
832ms 1.788s918ms
Wait… what the heck is a
fourth-party call?
Slide 12
Slide 13
http://www.webperformancetoday.com/2011/07/14/fourth-party-calls-third-party-content/
Slide 14
1. Audit your third-party scripts.
• Identify all third-party scripts
• Know which pages they’re on
• Find out what performance best
practices, if any, each script uses
(e.g., deferral, async loading)
• Read the SLA for each provider (if they
have one)
Slide 16
Slide 17
http://www.webpagetest.org
Slide 18
http://www.webperformancetoday.com/2014/03/18/waterfalls-101-how-to-use-a-waterfall-chart-to-diagnose-
performance-pains/
Slide 19
Slide 20
Slide 21
2. Test for SPOFs.
The old, painful way:
http://www.webperformancetoday.com/2011/10/13/how-
vulnerable-is-your-site-to-third-party-failure/
Slide 23
Slide 24
The new, better way:
https://chrome.google.com/webstore/search/spof-o-matic
Slide 25
Slide 26
Slide 27
Slide 28
SPOF: 22.7s
Original: 3.5s
Slide 29
Slide 30
Slide 31
Slide 32
Slide 33
Original
SPOF
https://www.optimizely.com/security
Slide 34
Slide 35
Slide 36
Slide 37
Original
SPOF
Blackhole test results fall into one of three groups:
1. SPOF page loads SLOWER than original page
Fix: Deferral or async script
2. SPOF page loads FASTER than original page
Fix: Talk to provider about script hosting
3. SPOF page times out.
Fix: Same as #1
Slide 38
3. Before you add a new script, research
the provider.
• Response time and time to last byte
• RT and TTLB from multiple locations
• Average monthly downtime
• Do they use a CDN?
• If so, where are their caches located?
Slide 40
4. Read the provider’s
service level agreement.
An ideal third-party SLA should:
• Express monthly annual uptime guarantee as a percentage
(ideally, as close to 100% as possible)
• Explain how performance will be monitored and reported
• Describe the process for reimbursing site owners (if site owners
are paying for the service provided by the script) if uptime drops
below the SLA guarantee
Slide 42
5. Perform a cost-benefit analysis.
Slide 44
Slide 45
2-second slowdown = 14% conversion loss
But…
…if that same tool promises a 20% conversion increase,
that = a net gain of 6%
Slide 46
6. Be ready to say no.
Slide 48
7. Defer scripts whenever possible.
Slide 50
Pro: It’s a relatively easy fix.
Con: It won’t work for all content.
Slide 51
Slide 52
8. Use asynchronous scripts.
Slide 54
Slide 55
Slide 56
Pro:
Doesn’t block primary content.
Cons:
Can be tricky to program.
Can mess up onLoad and make it difficult
to see other problems.
http://www.stevesouders.com/blog/2009/04/27/loading-scripts-without-blocking/
Slide 57
Slide 58
http://calendar.perfplanet.com/2011/the-art-and-craft-of-the-async-snippet/
9. Monitor constantly.
RUM/APM
Tag management systems
SPOF-o-matic
No excuses.
Slide 60
10. Give feedback to providers.
Slide 62
Slide 63
11. Know when to pull the plug.
Slide 65
Tammy Everts
tammye@radware.com
webperformancetoday.com
twitter.com/tameverts
Slide 66
Questions?

More Related Content

Viewers also liked

Mobile Web Stress: Understanding the Neurological Impact of Poor Performance
Mobile Web Stress:  Understanding the Neurological Impact of Poor PerformanceMobile Web Stress:  Understanding the Neurological Impact of Poor Performance
Mobile Web Stress: Understanding the Neurological Impact of Poor Performance
Radware
 
Rowe rcs4000 rcs6000-rcs8000-rcs9000
Rowe rcs4000 rcs6000-rcs8000-rcs9000Rowe rcs4000 rcs6000-rcs8000-rcs9000
Rowe rcs4000 rcs6000-rcs8000-rcs9000
uzburo
 
Chi ha trasformato l’appello al popolo in una mozione di sfiducia alla democr...
Chi ha trasformato l’appello al popolo in una mozione di sfiducia alla democr...Chi ha trasformato l’appello al popolo in una mozione di sfiducia alla democr...
Chi ha trasformato l’appello al popolo in una mozione di sfiducia alla democr...
Carlo Favaretti
 

Viewers also liked (8)

Accu 15
Accu 15Accu 15
Accu 15
 
#ACCU2015 Conférence annuelle utilisateurs Claroline Connect 06 mai 2105 #ClaCo
#ACCU2015 Conférence annuelle utilisateurs Claroline Connect 06 mai 2105 #ClaCo#ACCU2015 Conférence annuelle utilisateurs Claroline Connect 06 mai 2105 #ClaCo
#ACCU2015 Conférence annuelle utilisateurs Claroline Connect 06 mai 2105 #ClaCo
 
Mobile Web Stress: Understanding the Neurological Impact of Poor Performance
Mobile Web Stress:  Understanding the Neurological Impact of Poor PerformanceMobile Web Stress:  Understanding the Neurological Impact of Poor Performance
Mobile Web Stress: Understanding the Neurological Impact of Poor Performance
 
Publier des videos sur Youtube
Publier des videos sur YoutubePublier des videos sur Youtube
Publier des videos sur Youtube
 
What Young Adults Need to Know About Money-03-16
What Young Adults Need to Know About Money-03-16What Young Adults Need to Know About Money-03-16
What Young Adults Need to Know About Money-03-16
 
Social media presence
Social media presenceSocial media presence
Social media presence
 
Rowe rcs4000 rcs6000-rcs8000-rcs9000
Rowe rcs4000 rcs6000-rcs8000-rcs9000Rowe rcs4000 rcs6000-rcs8000-rcs9000
Rowe rcs4000 rcs6000-rcs8000-rcs9000
 
Chi ha trasformato l’appello al popolo in una mozione di sfiducia alla democr...
Chi ha trasformato l’appello al popolo in una mozione di sfiducia alla democr...Chi ha trasformato l’appello al popolo in una mozione di sfiducia alla democr...
Chi ha trasformato l’appello al popolo in una mozione di sfiducia alla democr...
 

More from Radware

More from Radware (20)

Cyber Security Through the Eyes of the C-Suite (Infographic)
Cyber Security Through the Eyes of the C-Suite (Infographic)Cyber Security Through the Eyes of the C-Suite (Infographic)
Cyber Security Through the Eyes of the C-Suite (Infographic)
 
What’s the Cost of a Cyber Attack (Infographic)
What’s the Cost of a Cyber Attack (Infographic)What’s the Cost of a Cyber Attack (Infographic)
What’s the Cost of a Cyber Attack (Infographic)
 
DDoS Threat Landscape - Ron Winward CHINOG16
DDoS Threat Landscape - Ron Winward CHINOG16DDoS Threat Landscape - Ron Winward CHINOG16
DDoS Threat Landscape - Ron Winward CHINOG16
 
Radware Cloud Security Services
Radware Cloud Security ServicesRadware Cloud Security Services
Radware Cloud Security Services
 
Radware 2016 State of the Union: Multi Industry Web Performance (Desktop)
Radware 2016 State of the Union: Multi Industry Web Performance (Desktop)Radware 2016 State of the Union: Multi Industry Web Performance (Desktop)
Radware 2016 State of the Union: Multi Industry Web Performance (Desktop)
 
Radware Hybrid Cloud WAF Service
Radware Hybrid Cloud WAF ServiceRadware Hybrid Cloud WAF Service
Radware Hybrid Cloud WAF Service
 
The Expanding Role and Importance of Application Delivery Controllers [Resear...
The Expanding Role and Importance of Application Delivery Controllers [Resear...The Expanding Role and Importance of Application Delivery Controllers [Resear...
The Expanding Role and Importance of Application Delivery Controllers [Resear...
 
The Art of Cyber War [From Black Hat Brazil 2014]
The Art of Cyber War [From Black Hat Brazil 2014]The Art of Cyber War [From Black Hat Brazil 2014]
The Art of Cyber War [From Black Hat Brazil 2014]
 
Cyber Attack Survival: Are You Ready?
Cyber Attack Survival:  Are You Ready?Cyber Attack Survival:  Are You Ready?
Cyber Attack Survival: Are You Ready?
 
Radware ERT Threat Alert: Shellshock Bash
Radware ERT Threat Alert: Shellshock BashRadware ERT Threat Alert: Shellshock Bash
Radware ERT Threat Alert: Shellshock Bash
 
The Art of Cyber War: Cyber Security Strategies in a Rapidly Evolving Theatre
The Art of Cyber War:  Cyber Security Strategies in a Rapidly Evolving TheatreThe Art of Cyber War:  Cyber Security Strategies in a Rapidly Evolving Theatre
The Art of Cyber War: Cyber Security Strategies in a Rapidly Evolving Theatre
 
Emotional Engagement and Brand Perception
Emotional Engagement and Brand PerceptionEmotional Engagement and Brand Perception
Emotional Engagement and Brand Perception
 
InfoSecurity Europe 2014: The Art Of Cyber War
InfoSecurity Europe 2014:  The Art Of Cyber WarInfoSecurity Europe 2014:  The Art Of Cyber War
InfoSecurity Europe 2014: The Art Of Cyber War
 
OpenStack Networking: Developing and Delivering a Commercial Solution for Lo...
OpenStack Networking:  Developing and Delivering a Commercial Solution for Lo...OpenStack Networking:  Developing and Delivering a Commercial Solution for Lo...
OpenStack Networking: Developing and Delivering a Commercial Solution for Lo...
 
SecureWorld St. Louis: Survival in an Evolving Threat Landscape
SecureWorld St. Louis:  Survival in an Evolving Threat LandscapeSecureWorld St. Louis:  Survival in an Evolving Threat Landscape
SecureWorld St. Louis: Survival in an Evolving Threat Landscape
 
In the Line of Fire - The Morphology of Cyber-Attacks
In the Line of Fire - The Morphology of Cyber-AttacksIn the Line of Fire - The Morphology of Cyber-Attacks
In the Line of Fire - The Morphology of Cyber-Attacks
 
Survival in an Evolving Threat Landscape
Survival in an Evolving Threat LandscapeSurvival in an Evolving Threat Landscape
Survival in an Evolving Threat Landscape
 
In the Line of Fire-the Morphology of Cyber Attacks
In the Line of Fire-the Morphology of Cyber AttacksIn the Line of Fire-the Morphology of Cyber Attacks
In the Line of Fire-the Morphology of Cyber Attacks
 
In the Line of Fire-the Morphology of Cyber Attacks
In the Line of Fire-the Morphology of Cyber AttacksIn the Line of Fire-the Morphology of Cyber Attacks
In the Line of Fire-the Morphology of Cyber Attacks
 
Radware DefenseFlow-The SDN Application That Programs Networks for DoS Security
Radware DefenseFlow-The SDN Application That Programs Networks for DoS Security Radware DefenseFlow-The SDN Application That Programs Networks for DoS Security
Radware DefenseFlow-The SDN Application That Programs Networks for DoS Security
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Recently uploaded (20)

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 

Can Third-Party Scripts Take Down Your Entire Site?