Facebook Tech Infrastructure Needs Constant Care
- 02 September, 2008 13:35
Started in a dorm room four years ago, the social networking site Facebook now claims to be the fourth most-trafficked site in the world. Ninety million active users pound on 10,000 servers every day, uploading millions and millions of pieces of information in a given month. For example, "friends," who socialize in 21 languages, add 500 million photos per month.
At last count, Facebook stored 6.6 billion photos total, more than any other photo site. Roughly 400,000 developers and entrepreneurs have built 25,000 applications for the platform and about 140 new applications are added per day. (For more on Facebook's application user interface appeal, see Why Microsoft Should Bring a Facebook-like Look to SharePoint).
Overall there are 25 terabytes of cached data available to help Facebook's 2,000 databases serve up user requests.
Yeah, the infrastructure fairly boils over with activity and Jonathan Heiliger is the lucky VP of technical operations who gets to stir the pot. Heiliger, who has run technology for several start-ups and advised venture capitalist firm Sequoia Capital, also directed site engineering for Wal-Mart's website. He joined Facebook in October 2007 to oversee its technology set-up, which many of its 600+ employees tinker with continuously. Whew! It's a good thing Heiliger lists as an interest (on his LinkedIn profile!) "anything 24 x 7."
CIO Senior Editor recently interviewed Heiliger to talk about his work at Facebook.
You've done a lot of startups in the past. What lessons from that experience do you bring to Facebook?
The decisions you make early on tend to leave a lasting impression. It's difficult to change the way a startup is started. One of the challenges or opportunities that drew me here was going from a purely engineering-driven culture-writing software for users [for] sharing information-to now operating this truly large infrastructure. Those are two very different things. [Early on] you make tradeoffs in IT to speed development that often can lead to disaster later when you have to operate five years later.
What was the first thing you wanted to accomplish when you got to Facebook?
I spent the first three months coming up to speed. It was the longest coming-up-to-speed process I'd been through because most of my prior experience was at much younger companies. When I joined Facebook, there were 300 employees. [In the past] typically, I was among the first 10 employees. I knew where the bodies were buried, what cultural challenges there were. At Facebook, I had to figure it out.
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
Why change management doesn’t work
Larry Page wants to see your medical records
Dual-Persona Smartphones Not a BYOD Panacea
After two-year hiatus, EFF accepts bitcoin donations again
CIOs struggle to deliver timely mobile business apps: survey
World Quality Report - The State of Quality 2012
The most comprehensive assessment of the current state of enterprise application quality and testing practices available from around the world. With our 1550 respondents, Capgemini, HP & Sogeti bring you the full report. Download today.
CSO Spotlight: Security-as-a-Service Gaining Popularity
Organizations that are looking for security features including identity management, encryption and access control — and at the same time want to take advantage of the cost and flexibility benefits of the cloud —might check into security-as-a-service offerings available now from several vendors. Download now to find out more.
Spear-Phishing Email: Most Favored APT Attack Bait
This research paper presents findings on APT-related spear phishing from February to September 2012. We analysed APT-related spear-phishing emails collected throughout this period to understand and mitigate attacks. The information we gathered not only allowed us to obtain specific details on spear phishing but also on targeted attacks. We found, for instance, that 91% of targeted attacks involve spear-phishing emails, reinforcing the belief that spear phishing is a primary means by which APT attackers infiltrate target networks.