Language Selection

English French German Italian Portuguese Spanish

Before Google became Google: The original setup

Filed under

Since it launched in 1998, Google has become one of the true giants of the Internet. These days, Google has data centers all around the world and hundreds of thousands of servers. The sheer size of Google today makes it very interesting to look back at its humble beginnings as a small research project called Backrub at Stanford University.

Back in early 1998, the entire search engine and website ran on this setup:

Closeups and hardware descriptions available here. Note the homemade Lego disk box…

more here

More in Tux Machines

Leftovers: OSS

  • What to expect from PentahoWorld 2015
    This time last year the Computer Weekly Open Source Insider blog reported on the inaugural PentahoWorld 2014 conference and exhibition.
  • Day 1 of PyCon India 2015
    Day one is the first day of main event. I was late to wake up, but somehow managed to reach the venue around 8:30am. Had a quick breakfast, and then moved into the Red Hat booth. Sankarshan, Alfred, Soni were already there. I don’t know the exact reason, but the booth managed to grab the attention of all the people in the venue. It was over crowded :) While the students were much more interested in stickers, and other goodies, many came forward to ask about internship options, and future job opportunities. Alfred did an excellent job in explaining the details to the participants. The crowd was in booth even though the keynote of day one had started. I missed most of keynote as many people kept coming in the booth, and they had various questions.
  • Windows 10: Microsoft's new browser is a FAILURE - find out why
    Microsoft tried to move users from its infamous Internet Explorer browser to a minimalist new web browser dubbed Edge following the launch of Windows 10. But new data has revealed that Windows 10 users are reluctant to make the transition.
  • Google open source project aims to speed up web
  • Google Seeks to Speed Up Mobile Web Browsing
    Google has announced a new project that could make a difference for mobile browsing. The company has launched the Accelerated Mobile Pages project (AMP), a fully open source initiative, with the underlying code available on GitHub.
  • Google wants to speed up the mobile web with AMP project
    Google has a plan to speed up mobile Web browsing. The recently unveiled AMP—Accelerated Mobile Pages—project is an open source initiative that restricts certain elements of HTML, CSS, and JavaScript to produce leaner Web pages "that are optimised to load instantly on mobile devices." How much quicker is "instantly"? According to Google, early testing with with a simulated 3G connection and a simulated Nexus 5 showed improvements of between 15 to 85 percent.
  • What's New This October in Open Source CMS
    A little love, please, for Miami-based dotCMS, maker of Java open source content management system (CMS) software. Just yesterday, it was chosen as one of the 20 Most Promising Open Source Software Solution Providers by CIO Review.
  • Deweloperzy NetBSD-7.0: Leonardo Taccari
    In the series of questions and answers from the NetBSD-7.0 developers, we will meet Leoardo Taccari, a recent NetBSD committer, who works with this system on his desktop and maintains in this field pkgsrc packages.
  • NetBSD 7.0 Operating System Brings Raspberry Pi 2 and Multiprocessor ARM Support
    The developers of the open source, BSD-based NetBSD operating system have had the great pleasure of announcing the release and immediate availability of the project's fifteenth major release.
  • New Version Of JPEG-Turbo Quietly Released
    While the Internet has been buzzing recently about the new FLIF image format, libjpeg-turbo developers released a new version of their JPEG library. Libjpeg-turbo 1.4.2 is the new release and it quietly made it out at the end of September. Libjpeg-Turbo 1.4.2 features at least five known bug fixes resulting in crashes and other problems.
  • Open data Incubator: ODINE selected its first round of start-ups
    Seven start-ups from UK, Italy, France, Estonia and Austria were selected to be part of the first round of companies benefiting from the Open Data Incubator for Europe (ODINE). This two-year programme awarded EUR 650 000 in total to the companies, which can receive up to EUR 100 000 each.
  • Eleven Open Source 3D Printer Hits Kickstarter (video)
    ISG3D has taken to Kickstarter this month to raise $11,000 to help take their open source 3D printer design into production. The Eleven 3D printer has been specifically designed to provide users with an affordable machine but offers an impressive 22 x 40 x 40 cm build area and is completely open source allowing for modifications and enhancements to be created.

Development News

  • Perl 6 is coming soon: What it will bring
    Perl 6, a long-awaited upgrade to the well-known scripting language, has gone into beta, with the general release planned for Christmastime. The upgrade went to beta late last month, Perl designer Larry Wall told InfoWorld on Wednesday, and the October monthly release will feature the first of two beta releases of the Rakudo Perl 6 compiler. There been having monthly compiler releases for years, but the language definition has now stabilized. Wall added, “At this point we're optimizing, fixing bugs, and documenting, and I feel comfortable saying we can take a snapshot of whatever we have in December and call it the first production release.”
  • PEAR 1.10 Released With PHP 7 Support
  • Couchbase Server 4.0 introduces SQL-based query language N1QL (Nickel)
    Couchbase Server 4.0 is designed to give software application development pros a route to building more apps on Couchbase.

Security Leftovers

  • Tor browser co-creator: Experian breach shows encryption may not be security panacea
    The Experian/T-Mobile hack may be more worrisome than Experian’s carefully worded description of it suggests, some security experts said Friday. One is the co-creator of the Tor secure browser, David Goldschlag, (now SVP of strategy at Pulse Secure). Goldschlag previously was head of mobile at McAfee, and also once worked at the NSA. I asked Goldschlag a simple question: “After the Office of Personnel Management and Experian hacks, is there reason to fear that hackers now have the means to steal actual financial information (credit card numbers, etc.) from banks or insurers?”
  • AV-TEST tests Linux security solutions against Linux and Windows threats
    To do so, it is often sufficient to copy files from a Linux environment to Windows.” it further adds. The most obvious mode of attack involves luring victims to install software or updates via third-party package sources. The team conducted test by running 16 different Anti-virus solutions and splitting test session into three distinct phases, The detection of Windows malware The detection of Linux malware and The test for false positives. Out of 16 antivirus solutions 8 detected between 95-99% of the 12,000 Windows threat used in the test: The Anti-virus solutions that helped in detection include Bitdefender, ESET, Avast, F-Secure, eScan, G Data, Sophos and Kaspersky Lab (server version).
  • had classic security blunder in authentication engine
    The cross-site request forgery vulnerability means that any user visiting a malicious page can have their accounts hijacked without further interaction. The since-patched hole existed in Microsoft and could have been spun into a dangerous worm, Wineberg says.
  • Meet the White Team, Makers of the Linux.Wifatch Viligante Malware
    However, Softpedia News noted that the Linux.Wifatch source code has not been released in its entirety. That’s likely because the White Team is worried that traditional cybercriminals would exploit the malware for more nefarious purposes. It also explains why it was a clandestine operation in which router owners weren’t aware their systems had been infected, even if it was only to defend them against black-hat attackers. Whether or not anyone appreciates the White Team’s form of vigilante security tactics, they may believe the work should serve as a warning to those who don’t follow basic data protection procedures, Hacked said. For example, there are still untold numbers of home routers that use default passwords and leave admin access wide open to malware and other threats.
  • Practical SHA-1 Collision Months, Not Years, Away
  • Search engine can find the VPN that NUCLEAR PLANT boss DIDN'T KNOW was there - report
    The nuclear industry is ignorant of its cybersecurity shortcomings, claimed a report released today, and despite understanding the consequences of an interruption to power generation and the related issues, cyber efforts to prevent such incidents are lacking. The report adds that search engines can "readily identify critical infrastructure components with" VPNs, some of which are power plants. It also adds that facility operators are "sometimes unaware of" them. Nuclear plants don't understand their cyber vulnerability, stated the Chatham House report, which found industrial, cultural and technical challenges affecting facilities worldwide. It specifically pointed to a "lack of executive-level awareness".