Feeds

Facebook reveals plan to WIRE THE PLANET

Do as we do in the data centre to serve the unconnected masses … bitch

Securing Web Applications Made Simple and Scalable

Facebook and fellow internet.org members Qualcomm and Ericsson have released a white paper that offers a blueprint for a massively scaled-up internet.

Titled “A Focus on Efficiency” and available here as a PDF, the paper's premise is that internet.org members want to make sure the five billion folks currently offline get the chance to access the internet in coming years, but that “the current global cost of delivering data is on the order of 100 times too expensive for this to be economically feasible”.

To fix that up, the paper says we need to reduce the “underlying costs of delivering data” and use less data “by building more efficient apps”.

The paper says the first challenge can be addressed if everyone builds data centres just like Facebook's, which means using outside air for cooling, adopting the tenets of the Open Compute project and adopting projects like the Group Hug modular servers plan.

The paper also suggests wiser uses of networks, explaining that Facebook has adopted the WebP image format and uses it wherever possible because it produces images that require less storage space, and therefore less bandwidth, than older formats. Promoting adoption of WebP and other such formats is suggested as a way to improve online services.

But the paper squibs it on issues such as the chattiness of current dominant networking protocols, which consume a lot of resources. Instead it focuses on how Facebook works to build better client applications, especially on Android.

The descriptions of those efforts are often interesting, such as the one below explaining how Facebook has tackled battery life issues:

The high cost of waking a phone’s radio to fetch data comes from network inactivity timers on the device. These timers keep the radio in high energy state for fixed period of time regardless of the size of data packets to be transferred. Also, these timers vary by network operators. Thus, the same phone can have very different impact on battery performance across different network operators. Consequently, it is critical to wake the radio as seldom as possible and send as much network traffic each time as possible, while maintaining the feeling of freshness and recency in the UI. One way we’ve tackled this is by pre-fetching multiple images at a time that your friends have posted instead of waking up the radio separately for each image fetch.

The paper then trails off into thinly veiled promotions for Qualcomm and Ericsson before concluding that if we all work together we really can scale this internet thing to all the deserving folks who need it without burning up the planet feeding data centres. ®

The Essential Guide to IT Transformation

More from The Register

next story
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
FLAPE – the next BIG THING in storage
Find cold data with flash, transmit it from tape
Seagate chances ARM with NAS boxes for the SOHO crowd
There's an Atom-powered offering, too
Intel teaches Oracle how to become the latest and greatest Xeon Whisperer
E7-8895 v2 chips are best of the bunch, and with firmware-unlocked speed control
Gartner: To the right, to the right – biz sync firms who've won in a box to the right...
Magic quadrant: Top marks for, er, completeness of vision, EMC
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.