Critical.
Authoritative.
Strategic.
Subscribe to CIO Magazine »

NLA web services traffic rises above 2.5 billion in 2009

The National Library of Australia (NLA) has more than doubled its web services traffic to reach more than 2.5 billion hits in 2009.
National Library of Australia assistant director-general of information technology, Mark Corbould

National Library of Australia assistant director-general of information technology, Mark Corbould

The National Library of Australia (NLA) has more than doubled its web services traffic to reach more than 2.5 billion hits in 2009.

Speaking at the CIO Summit 2010 in Sydney, NLA assistant director of general information technology, Mark Corbould, attributed a lot of the organisation’s success to the use of open source solutions.

In 2006 across all of its online assets including the public catalogue and the Trove search engine, the NLA had half a billion web server requests. This jumped in 2008 to over one billion and last year hit more than 2.5 billion.

“We are now probably the highest ranked cultural institution in Australia in terms of our web presence,” Corbould told the summit attendees.

In April the NLA unveiled its Trove search engine that was built on an open source platform.

The search engine provides access to more than 90 million items about Australians and Australia, sourced from more than 1000 libraries and cultural institutions across the country.

Courbold said for an organisation that costs roughly $70 million a year to run with 450 staff and 10 per cent of its budget going towards IT, there was little chance of securing a commercial software licence to do what the NLA does.

The Trove project’s team of five developers used SOLR 1.4, which internally uses Lucene 2.9, for the main bibliographic search database and the web page archive, and MySQL 5 for managing all data relationships.

“The overpowering characteristic was that it was the only one we could afford,” Courbold said.

The project team also opted for Jetty as a web server, Nginx as the HTTP front-end/reverse proxy, Java Server Pages (JSP) for the newspapers part of the site, and Restlet and FreeMarker for the remaining portions of the service.

Additionally, one of the main steps taken was to use Solid State Disks (SSDs) – four Intel X-M25 160GB drives in each machine – for the Lucene indices to achieve the necessary performance. Trove issues more than 8000 IOPS (input/output operations per second) to the SSDs, which the team says would be expensive to achieve with even the fastest SAN setup.

“A lot of what we do is not well supported by the mainstream market,” Courbold told the CIO summit.

“When you want to harvest the web or when you want to integrate access to varieties of collections we have the market place doesn’t service us well.”

(See the CIO Summit 2010 in pictures)

Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.

More about: Intel, MySQL, National Library of Australia
References show all
Comments are now closed.
Related Coverage
Related Whitepapers
Latest Stories
Community Comments
Tags: open source, National Library of Australia, CIO Summit 2010, Trove
Latest Blog Posts
Whitepapers
  • IBM X-Force Threat Intelligence
    In the second half of 2013, the advancement of security breaches across all industries continued to rise. Within this report, we’ll explain how more than half a billion records of personally identifiable information (PII) such as names, emails, credit card numbers and passwords were leaked in 2013 - and how these security incidents show no signs of stopping.
    Learn more »
  • Information Management
    Valuable data can be a needle in a haystack, but by leveraging the value in existing information assets, organisations can generate real and achievable gains in revenue generation, IT investments and productivity gains. This whitepaper discusses how Information Management (IM) is a multi-faceted discipline that can be employed to meet or exceed your business objectives.
    Learn more »
  • The F5 DDoS Protection Reference Architecture part 3 of 3
    This whitepaper is the third in a three-part series on distributed denial of service attacks (DDoS) and multi-tier DDoS protection. This section refers to case studies of different approaches to deploying protection architecture, including an enterprise customer scenario, an FSI customer scenario and an SMB customer scenario. The paper explains how these options should provide the flexibility and needed to combat the modern DDoS threat.
    Learn more »
All whitepapers
rhs_login_lockGet exclusive access to Invitation only events CIO, reports & analysis.
Latest Jobs
Salary Calculator

Supplied by

View the full Peoplebank ICT Salary & Employment Index

Recent comments

Computerworld
ARN
Techworld
CMO