cross pond high tech
159.8K views | +6 today
Follow
cross pond high tech
light views on high tech in both Europe and US
Your new post is loading...
Your new post is loading...
Scooped by Philippe J DEWOST
Scoop.it!

Microsoft's Kushagra Vaid joins OCP Board and Google takes a board seat — Open Compute Summit

Microsoft's Kushagra Vaid joins OCP Board and Google takes a board seat — Open Compute Summit | cross pond high tech | Scoop.it

Open Compute Project (OCP), the open source hardware group created by Facebook to share designs for hyperscale hardware to the data center community, has announced that Google has taken a seat on the board.

Google first joined the OCP in 2016, and has helped develop OCP technology designs, including the Open Rack standard, designed to deploy high density servers in a smaller footprint. OCP announced at its virtual Summit yesterday, that Google is now an Executive Member, which grants it a seat on the board of directors, to be occupied by Parthasarathy (Partha) Ranganathan.

Microsoft's Kushagra Vaid also joins the OCP board.

Philippe J DEWOST's insight:

Avec Open Compute, l'ensemble des designs de composants matériels d'un data center sont disponibles, sans licence, et certifiés. Depuis 7 ans.

Mais qui sont les constructeurs / opérateurs de Data Center européens membres d'OCP ?

No comment yet.
Scooped by Philippe J DEWOST
Scoop.it!

Open Hardware is about to radically flip both server & data center markets with huge amounts of certified, refurbished facebook servers available here and now

Open Hardware is about to radically flip both server & data center markets with huge amounts of certified, refurbished facebook servers available here and now | cross pond high tech | Scoop.it

Open Hardware is touted to propel 80% of Facebook Data Center infrastructure, saving them 2Bn$ in the process.

This market, triggered and until recently dominated by hyperscale customers, is growing 30% year on year while the OEM server market declines (-6% y/y).

As Facebook is about to upgrade thousands of OCP machines to keep up with their gigantic CPU power needs, they are expected to offload the previous generation on the market, with unbeatable price/quality ratios as these natively rugged machines will be refurbished, tested, certified before being delivered.

To keep costs at minimum, the sales process is performed 100% online, and the delivery operated by a long standing OCP partner : Horizon Computing Solutions is not only the only distributor of Open Hardware Technology ; they also completed the first Open IT Hardware Product with RuggedPOD, the most power efficent Data Center Worldwide with a PUE = 1.0

Want to test a 16 core Bi-Xeon server ? It will cost you less than $1000 and you can order here.

No comment yet.
Scooped by Philippe J DEWOST
Scoop.it!

Inside Facebook's plan to eat another $350 billion IT market

Inside Facebook's plan to eat another $350 billion IT market | cross pond high tech | Scoop.it
On an ordinary work day in mid-2016, a handful of Facebook engineers were sitting on the couches in a corner of the company's Menlo Park, California, headquarters when one of them tossed out a wacky idea.He suggested doing something that had never been done before and could potentially upend the $350 billion telecom market."It can't be so difficult to build our own system," the engineer said, referring to the telecom equipment that sends data across cables and wireless networks, and which the engineer suspected could be made to operate faster and cheaper than the pricey equipment sold by big vendors like Nortel, Huawei, Ericsson, Cisco or Juniper Networks.The engineer was suggesting building the telecom industry's first "white box" transponder, made with off-the-shelf parts such as chips from Broadcom and Acacia Communications, optical equipment from Lumentum, and software from one of the many new networking startups cropping up these days.Facebook's director of engineering Hans-Juergen Schmidtke, who was among those on the couch that day, was at first a naysayer."I was a little bit skeptical about it at the time," he recounted to Business Insider. As a former engineer at Juniper Networks, Schmidtke knew from experience that building telecom equipment systems was an expensive undertaking that involved hiring teams of specially trained engineers and sizeable R&D budgets. "Building a system ten years ago was like building a new company," Schmidtke said. Still, Schmidtke agreed to help this tiny group hack together a white box system at one of Facebook's famous hackathons. Three months later they had a working prototype. Six months later, on November 1, they announced it to the world as a real product called Voyager. The product’s unveiling sent shockwaves through the telecom industry, putting gear makers on notice that the lucrative market they controlled for decades was about to get turned upside down — and not necessarily to their advantage.While the effort is essentially a side-project for Facebook, a social networking company whose bread-and-butter business is online advertising, the stakes could not be higher for the telecom equipment companies which risk seeing their specialized products reduced to interchangeable commodities and their influence diminished. For the industry’s established companies, there’s unease about Facebook’s growing clout and its ultimate intentions. But in a sign of how serious Facebook’s foray is being taken, there’s already a recognition by some that the repercussions could be even more painful it they don’t adapt.Voyager has already been tested by Facebook and European telecom company Telia over Telia’s thousand-kilometer-telecom network. Plus, German telecom equipment maker ADVA Optical Networking is manufacturing the device and, as of a few weeks ago had nine customers trying it out for their telecom needs, a mix of big telecom companies and enterprises, it said. And Paris based telecom provider, Orange is also testing the device, working with Equinix and African telecom company MTN."We pulled it off essentially showing that when a few engineers can build a system within six months, the world has changed," Schmidtke said.One person told us that Schmidtke, who is insanely proud of Voyager, has become a star in his own corner of the tech world. When he and his team "go to conferences, they treat him like a tech celebrity, like a rock band," that person said.
Philippe J DEWOST's insight:
Fantastic read for any telecom engineer who wants to understand how a handful of determined engineers, when properly managed, can turn tables in a few months and displace a complete industry.Open Hardware is no longer a weak signal and has morphed into a powerful trend about to become a shockwave.To achieve such irony, very few people have realized that this game changer may be a fantastic opportunity for Europe, and that some core TIP players are totally unknown and unrespected French companies...
No comment yet.
Scooped by Philippe J DEWOST
Scoop.it!

Microsoft has developed its own Linux

Microsoft has developed its own Linux | cross pond high tech | Scoop.it
Microsoft has developed its own Linux distribution. And Azure runs it to do networking.

Redmond's revealed that it's built something called Azure Cloud Switch (ACS), describing it as “a cross-platform modular operating system for data center networking built on Linux” and “our foray into building our own software for running network devices like switches.”

Kamala Subramanian, Redmond's principal architect for Azure Networking, writes that: “At Microsoft, we believe there are many excellent switch hardware platforms available on the market, with healthy competition between many vendors driving innovation, speed increases, and cost reductions.”

(Translation: Microsoft partners, we mean you no harm.)

“However, what the cloud and enterprise networks find challenging is integrating the radically different software running on each different type of switch into a cloud-wide network management platform. Ideally, we would like all the benefits of the features we have implemented and the bugs we have fixed to stay with us, even as we ride the tide of newer switch hardware innovation.”

(Translation: Software-defined networking (SDN) is a very fine idea.)

But it appears Redmond couldn't find SDN code to fits its particular needs, as it says ACS “... focuses on feature development based on Microsoft priorities” and “allows us to debug, fix, and test software bugs much faster. It also allows us the flexibility to scale down the software and develop features that are required for our datacenter and our networking needs.”

ACS is designed to use the Switch Abstraction Interface (SAI), an OpenCompute effort that offers an API to program ASICs inside network devices.
Philippe J DEWOST's insight:

So bizarre it might sound, this isn't any surprise if you remember that Microsoft's online services require datacenters with cost equations that cannot afford Dell machines running Windows. Microsoft has been a very early and massive supporter of Open Compute and networking is the next logical step to combine software with bare metal...

No comment yet.
Scooped by Philippe J DEWOST
Scoop.it!

Open Compute EU Summit keynote - Philippe Dewost's light sources

Open Compute EU Summit keynote  - Philippe Dewost's light sources | cross pond high tech | Scoop.it

The first Open Compute Europe Summit took place in Paris on October 30 & 31st, 2014, on Ecole Polytechnique's campus in Palaiseau.

The european tech scene is catching up on OCP, with pioneers such as Telecity or Enter.it , and is federated by Splitted Desktop System's Jean-Marie Verdun.

Here is the keynote I delivered at government's request, explaining why France is Open (to) Compute (following my April post - in french).

Philippe J DEWOST's insight:

Most enjoyable standing ovations are the ones you call for those deserving real credit (at 29'30")

Scooped by Philippe J DEWOST
Scoop.it!

Laurent Bloch : « La France est en train de rater la troisième révolution industrielle »

Laurent Bloch : « La France est en train de rater la troisième révolution industrielle » | cross pond high tech | Scoop.it

.../... le commerce du contenu et des données n’est que la partie visible de l’iceberg, En dessous, il y a les matériels et les réseaux. On parle souvent d’Internet comme si c’était un espace totalement immatériel. C’est faux. L’entreprise Google est un géant industriel. Elle possède des millions de serveurs dans le monde entier, regroupés dans des data centers, qui sont des usines informatiques. Pour assurer son approvisionnement énergétique, Google rachète des centrales hydro-électriques.

Même chose pour les réseaux : Google et Facebook possèdent leurs propres câbles transatlantiques et leurs nœuds de communication. Leurs activités commerciales dépendent avant tout de leurs infrastructures matérielles.

Philippe J DEWOST's insight:

Un écho intéressant au petit déjeuner thématique co-organisé par la Caisse des Dépôts et la Mission Lemoine le 18 Juin dernier, avec la redécouverte tardive des sujets de "couches basses" (hardware, réseaux, cloud public) et en toile de fond la pub Pirelli : "sans maîtrise la puissance n'est rien"...

No comment yet.
Scooped by Philippe J DEWOST
Scoop.it!

Amazon joins other web giants trying to design its own chips

Amazon joins other web giants trying to design its own chips | cross pond high tech | Scoop.it

As demand for its cloud computing services continues to grow, sources say Amazon is trying to design its own server chips. Based on a job listing and a series of LinkedIn updates, it looks like it could be eyeing the ARM architecture for those chips.

The online retailer and cloud giant has hired several chip engineers who used to work at Calxeda, the former ARM-based server startup out of Austin, Texas that shut down last year, including the former Calxeda CTO. It also has a few job listings for its Silicon Optimization team based in Austin, Texas that call for microprocessor design expertise, including one for a “CPU Architect / Micro-Architect.”

Amazon declined to comment on its plans; actually, a spokeswoman said, “We don’t comment on rumors or speculation.” Don’t worry, we’ll make sure to ask Amazon’s CTO Werner Vogels (pictured) about these plans at our Structure event in June. However, several sources in the Austin chip community have been discussing the impact of Amazon’s decision to swoop in and recruit engineers after Calxeda shut down in December, curious about whether or not Amazon planned to follow other webscale businesses Google and Facebook in trying to build their own silicon.

 
Philippe J DEWOST's insight:

Hardware is not dead... Entering the hardware race yet requires muscles and above all talent. And as I pointed as early as 2 years ago, ARM is still an interesting option.

No comment yet.
Rescooped by Philippe J DEWOST from Digital Sovereignty & Cyber Security
Scoop.it!

Supermicro stock fell 50 percent after a bombshell Bloomberg report on How China Used a Tiny Chip to Infiltrate nearly 30 U.S. Companies

Supermicro stock fell 50 percent after a bombshell Bloomberg report on How China Used a Tiny Chip to Infiltrate nearly 30 U.S. Companies | cross pond high tech | Scoop.it

The attack by Chinese spies reached almost 30 U.S. companies, including Amazon and Apple, by compromising America’s technology supply chain, according to extensive interviews with government and corporate sources.

(from Bloomberg Business Week through Clément Epié)

-----------How the Hack Worked, According to U.S. Officials

① A Chinese military unit designed and manufactured microchips as small as a sharpened pencil tip. Some of the chips were built to look like signal conditioning couplers, and they incorporated memory, networking capability, and sufficient processing power for an attack.

② The microchips were inserted at Chinese factories that supplied Supermicro, one of the world’s biggest sellers of server motherboards.

③ The compromised motherboards were built into servers assembled by Supermicro.

④ The sabotaged servers made their way inside data centers operated by dozens of companies.

⑤ When a server was installed and switched on, the microchip altered the operating system’s core so it could accept modifications. The chip could also contact computers controlled by the attackers in search of further instructions and code.
-------------------------------------------

"In 2015, Amazon.com Inc. began quietly evaluating a startup called Elemental Technologies, a potential acquisition to help with a major expansion of its streaming video service, known today as Amazon Prime Video. Based in Portland, Ore., Elemental made software for compressing massive video files and formatting them for different devices. Its technology had helped stream the Olympic Games online, communicate with the International Space Station, and funnel drone footage to the Central Intelligence Agency. Elemental’s national security contracts weren’t the main reason for the proposed acquisition, but they fit nicely with Amazon’s government businesses, such as the highly secure cloud that Amazon Web Services (AWS) was building for the CIA.

To help with due diligence, AWS, which was overseeing the prospective acquisition, hired a third-party company to scrutinize Elemental’s security, according to one person familiar with the process. The first pass uncovered troubling issues, prompting AWS to take a closer look at Elemental’s main product: the expensive servers that customers installed in their networks to handle the video compression. These servers were assembled for Elemental by Super Micro Computer Inc., a San Jose-based company (commonly known as Supermicro) that’s also one of the world’s biggest suppliers of server motherboards, the fiberglass-mounted clusters of chips and capacitors that act as the neurons of data centers large and small. In late spring of 2015, Elemental’s staff boxed up several servers and sent them to Ontario, Canada, for the third-party security company to test, the person says.

Nested on the servers’ motherboards, the testers found a tiny microchip, not much bigger than a grain of rice, that wasn’t part of the boards’ original design. Amazon reported the discovery to U.S. authorities, sending a shudder through the intelligence community. Elemental’s servers could be found in Department of Defense data centers, the CIA’s drone operations, and the onboard networks of Navy warships. And Elemental was just one of hundreds of Supermicro customers.

During the ensuing top-secret probe, which remains open more than three years later, investigators determined that the chips allowed the attackers to create a stealth doorway into any network that included the altered machines. Multiple people familiar with the matter say investigators found that the chips had been inserted at factories run by manufacturing subcontractors in China.

This attack was something graver than the software-based incidents the world has grown accustomed to seeing. Hardware hacks are more difficult to pull off and potentially more devastating, promising the kind of long-term, stealth access that spy agencies are willing to invest millions of dollars and many years to get.

There are two ways for spies to alter the guts of computer equipment. One, known as interdiction, consists of manipulating devices as they’re in transit from manufacturer to customer. This approach is favored by U.S. spy agencies, according to documents leaked by former National Security Agency contractor Edward Snowden. The other method involves seeding changes from the very beginning.

One country in particular has an advantage executing this kind of attack: China, which by some estimates makes 75 percent of the world’s mobile phones and 90 percent of its PCs. Still, to actually accomplish a seeding attack would mean developing a deep understanding of a product’s design, manipulating components at the factory, and ensuring that the doctored devices made it through the global logistics chain to the desired location—a feat akin to throwing a stick in the Yangtze River upstream from Shanghai and ensuring that it washes ashore in Seattle. “Having a well-done, nation-state-level hardware implant surface would be like witnessing a unicorn jumping over a rainbow,” says Joe Grand, a hardware hacker and the founder of Grand Idea Studio Inc. “Hardware is just so far off the radar, it’s almost treated like black magic.”

But that’s just what U.S. investigators found: The chips had been inserted during the manufacturing process, two officials say, by operatives from a unit of the People’s Liberation Army. In Supermicro, China’s spies appear to have found a perfect conduit for what U.S. officials now describe as the most significant supply chain attack known to have been carried out against American companies.

One official says investigators found that it eventually affected almost 30 companies, including a major bank, government contractors, and the world’s most valuable company, Apple Inc. Apple was an important Supermicro customer and had planned to order more than 30,000 of its servers in two years for a new global network of data centers. Three senior insiders at Apple say that in the summer of 2015, it, too, found malicious chips on Supermicro motherboards. Apple severed ties with Supermicro the following year, for what it described as unrelated reasons.

In emailed statements, Amazon (which announced its acquisition of Elemental in September 2015), Apple, and Supermicro disputed summaries of Bloomberg Businessweek’s reporting. “It’s untrue that AWS knew about a supply chain compromise, an issue with malicious chips, or hardware modifications when acquiring Elemental,” Amazon wrote. “On this we can be very clear: Apple has never found malicious chips, ‘hardware manipulations’ or vulnerabilities purposely planted in any server,” Apple wrote. “We remain unaware of any such investigation,” wrote a spokesman for Supermicro, Perry Hayes. The Chinese government didn’t directly address questions about manipulation of Supermicro servers, issuing a statement that read, in part, “Supply chain safety in cyberspace is an issue of common concern, and China is also a victim.” The FBI and the Office of the Director of National Intelligence, representing the CIA and NSA, declined to comment.

The companies’ denials are countered by six current and former senior national security officials, who—in conversations that began during the Obama administration and continued under the Trump administration—detailed the discovery of the chips and the government’s investigation. One of those officials and two people inside AWS provided extensive information on how the attack played out at Elemental and Amazon; the official and one of the insiders also described Amazon’s cooperation with the government investigation. In addition to the three Apple insiders, four of the six U.S. officials confirmed that Apple was a victim. In all, 17 people confirmed the manipulation of Supermicro’s hardware and other elements of the attacks. The sources were granted anonymity because of the sensitive, and in some cases classified, nature of the information.

One government official says China’s goal was long-term access to high-value corporate secrets and sensitive government networks. No consumer data is known to have been stolen.

The ramifications of the attack continue to play out. The Trump administration has made computer and networking hardware, including motherboards, a focus of its latest round of trade sanctions against China, and White House officials have made it clear they think companies will begin shifting their supply chains to other countries as a result. Such a shift might assuage officials who have been warning for years about the security of the supply chain—even though they’ve never disclosed a major reason for their concerns.

Back in 2006, three engineers in Oregon had a clever idea. Demand for mobile video was about to explode, and they predicted that broadcasters would be desperate to transform programs designed to fit TV screens into the various formats needed for viewing on smartphones, laptops, and other devices. To meet the anticipated demand, the engineers started Elemental Technologies, assembling what one former adviser to the company calls a genius team to write code that would adapt the superfast graphics chips being produced for high-end video-gaming machines. The resulting software dramatically reduced the time it took to process large video files. Elemental then loaded the software onto custom-built servers emblazoned with its leprechaun-green logos.

Elemental servers sold for as much as $100,000 each, at profit margins of as high as 70 percent, according to a former adviser to the company. Two of Elemental’s biggest early clients were the Mormon church, which used the technology to beam sermons to congregations around the world, and the adult film industry, which did not.

Elemental also started working with American spy agencies. In 2009 the company announced a development partnership with In-Q-Tel Inc., the CIA’s investment arm, a deal that paved the way for Elemental servers to be used in national security missions across the U.S. government. Public documents, including the company’s own promotional materials, show that the servers have been used inside Department of Defense data centers to process drone and surveillance-camera footage, on Navy warships to transmit feeds of airborne missions, and inside government buildings to enable secure videoconferencing. NASA, both houses of Congress, and the Department of Homeland Security have also been customers. This portfolio made Elemental a target for foreign adversaries.

Supermicro had been an obvious choice to build Elemental’s servers. Headquartered north of San Jose’s airport, up a smoggy stretch of Interstate 880, the company was founded by Charles Liang, a Taiwanese engineer who attended graduate school in Texas and then moved west to start Supermicro with his wife in 1993. Silicon Valley was then embracing outsourcing, forging a pathway from Taiwanese, and later Chinese, factories to American consumers, and Liang added a comforting advantage: Supermicro’s motherboards would be engineered mostly in San Jose, close to the company’s biggest clients, even if the products were manufactured overseas.

Today, Supermicro sells more server motherboards than almost anyone else. It also dominates the $1 billion market for boards used in special-purpose computers, from MRI machines to weapons systems. Its motherboards can be found in made-to-order server setups at banks, hedge funds, cloud computing providers, and web-hosting services, among other places. Supermicro has assembly facilities in California, the Netherlands, and Taiwan, but its motherboards—its core product—are nearly all manufactured by contractors in China.

The company’s pitch to customers hinges on unmatched customization, made possible by hundreds of full-time engineers and a catalog encompassing more than 600 designs. The majority of its workforce in San Jose is Taiwanese or Chinese, and Mandarin is the preferred language, with hanzi filling the whiteboards, according to six former employees. Chinese pastries are delivered every week, and many routine calls are done twice, once for English-only workers and again in Mandarin. The latter are more productive, according to people who’ve been on both. These overseas ties, especially the widespread use of Mandarin, would have made it easier for China to gain an understanding of Supermicro’s operations and potentially to infiltrate the company. (A U.S. official says the government’s probe is still examining whether spies were planted inside Supermicro or other American companies to aid the attack.)

With more than 900 customers in 100 countries by 2015, Supermicro offered inroads to a bountiful collection of sensitive targets. “Think of Supermicro as the Microsoft of the hardware world,” says a former U.S. intelligence official who’s studied Supermicro and its business model. “Attacking Supermicro motherboards is like attacking Windows. It’s like attacking the whole world.”

Well before evidence of the attack surfaced inside the networks of U.S. companies, American intelligence sources were reporting that China’s spies had plans to introduce malicious microchips into the supply chain. The sources weren’t specific, according to a person familiar with the information they provided, and millions of motherboards are shipped into the U.S. annually. But in the first half of 2014, a different person briefed on high-level discussions says, intelligence officials went to the White House with something more concrete: China’s military was preparing to insert the chips into Supermicro motherboards bound for U.S. companies.

The specificity of the information was remarkable, but so were the challenges it posed. Issuing a broad warning to Supermicro’s customers could have crippled the company, a major American hardware maker, and it wasn’t clear from the intelligence whom the operation was targeting or what its ultimate aims were. Plus, without confirmation that anyone had been attacked, the FBI was limited in how it could respond. The White House requested periodic updates as information came in, the person familiar with the discussions says.

Apple made its discovery of suspicious chips inside Supermicro servers around May 2015, after detecting odd network activity and firmware problems, according to a person familiar with the timeline. Two of the senior Apple insiders say the company reported the incident to the FBI but kept details about what it had detected tightly held, even internally. Government investigators were still chasing clues on their own when Amazon made its discovery and gave them access to sabotaged hardware, according to one U.S. official. This created an invaluable opportunity for intelligence agencies and the FBI—by then running a full investigation led by its cyber- and counterintelligence teams—to see what the chips looked like and how they worked.

The chips on Elemental servers were designed to be as inconspicuous as possible, according to one person who saw a detailed report prepared for Amazon by its third-party security contractor, as well as a second person who saw digital photos and X-ray images of the chips incorporated into a later report prepared by Amazon’s security team. Gray or off-white in color, they looked more like signal conditioning couplers, another common motherboard component, than microchips, and so they were unlikely to be detectable without specialized equipment. Depending on the board model, the chips varied slightly in size, suggesting that the attackers had supplied different factories with different batches.

Officials familiar with the investigation say the primary role of implants such as these is to open doors that other attackers can go through. “Hardware attacks are about access,” as one former senior official puts it. In simplified terms, the implants on Supermicro hardware manipulated the core operating instructions that tell the server what to do as data move across a motherboard, two people familiar with the chips’ operation say. This happened at a crucial moment, as small bits of the operating system were being stored in the board’s temporary memory en route to the server’s central processor, the CPU. The implant was placed on the board in a way that allowed it to effectively edit this information queue, injecting its own code or altering the order of the instructions the CPU was meant to follow. Deviously small changes could create disastrous effects.

Since the implants were small, the amount of code they contained was small as well. But they were capable of doing two very important things: telling the device to communicate with one of several anonymous computers elsewhere on the internet that were loaded with more complex code; and preparing the device’s operating system to accept this new code. The illicit chips could do all this because they were connected to the baseboard management controller, a kind of superchip that administrators use to remotely log in to problematic servers, giving them access to the most sensitive code even on machines that have crashed or are turned off.

This system could let the attackers alter how the device functioned, line by line, however they wanted, leaving no one the wiser. To understand the power that would give them, take this hypothetical example: Somewhere in the Linux operating system, which runs in many servers, is code that authorizes a user by verifying a typed password against a stored encrypted one. An implanted chip can alter part of that code so the server won’t check for a password—and presto! A secure machine is open to any and all users. A chip can also steal encryption keys for secure communications, block security updates that would neutralize the attack, and open up new pathways to the internet. Should some anomaly be noticed, it would likely be cast as an unexplained oddity. “The hardware opens whatever door it wants,” says Joe FitzPatrick, founder of Hardware Security Resources LLC, a company that trains cybersecurity professionals in hardware hacking techniques.

U.S. officials had caught China experimenting with hardware tampering before, but they’d never seen anything of this scale and ambition. The security of the global technology supply chain had been compromised, even if consumers and most companies didn’t know it yet. What remained for investigators to learn was how the attackers had so thoroughly infiltrated Supermicro’s production process—and how many doors they’d opened into American targets.

Unlike software-based hacks, hardware manipulation creates a real-world trail. Components leave a wake of shipping manifests and invoices. Boards have serial numbers that trace to specific factories. To track the corrupted chips to their source, U.S. intelligence agencies began following Supermicro’s serpentine supply chain in reverse, a person briefed on evidence gathered during the probe says.

As recently as 2016, according to DigiTimes, a news site specializing in supply chain research, Supermicro had three primary manufacturers constructing its motherboards, two headquartered in Taiwan and one in Shanghai. When such suppliers are choked with big orders, they sometimes parcel out work to subcontractors. In order to get further down the trail, U.S. spy agencies drew on the prodigious tools at their disposal. They sifted through communications intercepts, tapped informants in Taiwan and China, even tracked key individuals through their phones, according to the person briefed on evidence gathered during the probe. Eventually, that person says, they traced the malicious chips to four subcontracting factories that had been building Supermicro motherboards for at least two years.

As the agents monitored interactions among Chinese officials, motherboard manufacturers, and middlemen, they glimpsed how the seeding process worked. In some cases, plant managers were approached by people who claimed to represent Supermicro or who held positions suggesting a connection to the government. The middlemen would request changes to the motherboards’ original designs, initially offering bribes in conjunction with their unusual requests. If that didn’t work, they threatened factory managers with inspections that could shut down their plants. Once arrangements were in place, the middlemen would organize delivery of the chips to the factories.

The investigators concluded that this intricate scheme was the work of a People’s Liberation Army unit specializing in hardware attacks, according to two people briefed on its activities. The existence of this group has never been revealed before, but one official says, “We’ve been tracking these guys for longer than we’d like to admit.” The unit is believed to focus on high-priority targets, including advanced commercial technology and the computers of rival militaries. In past attacks, it targeted the designs for high-performance computer chips and computing systems of large U.S. internet providers.

Provided details of Businessweek’s reporting, China’s Ministry of Foreign Affairs sent a statement that said “China is a resolute defender of cybersecurity.” The ministry added that in 2011, China proposed international guarantees on hardware security along with other members of the Shanghai Cooperation Organization, a regional security body. The statement concluded, “We hope parties make less gratuitous accusations and suspicions but conduct more constructive talk and collaboration so that we can work together in building a peaceful, safe, open, cooperative and orderly cyberspace.”

The Supermicro attack was on another order entirely from earlier episodes attributed to the PLA. It threatened to have reached a dizzying array of end users, with some vital ones in the mix. Apple, for its part, has used Supermicro hardware in its data centers sporadically for years, but the relationship intensified after 2013, when Apple acquired a startup called Topsy Labs, which created superfast technology for indexing and searching vast troves of internet content. By 2014, the startup was put to work building small data centers in or near major global cities. This project, known internally as Ledbelly, was designed to make the search function for Apple’s voice assistant, Siri, faster, according to the three senior Apple insiders.

Documents seen by Businessweek show that in 2014, Apple planned to order more than 6,000 Supermicro servers for installation in 17 locations, including Amsterdam, Chicago, Hong Kong, Los Angeles, New York, San Jose, Singapore, and Tokyo, plus 4,000 servers for its existing North Carolina and Oregon data centers. Those orders were supposed to double, to 20,000, by 2015. Ledbelly made Apple an important Supermicro customer at the exact same time the PLA was found to be manipulating the vendor’s hardware.

Project delays and early performance problems meant that around 7,000 Supermicro servers were humming in Apple’s network by the time the company’s security team found the added chips. Because Apple didn’t, according to a U.S. official, provide government investigators with access to its facilities or the tampered hardware, the extent of the attack there remained outside their view.

American investigators eventually figured out who else had been hit. Since the implanted chips were designed to ping anonymous computers on the internet for further instructions, operatives could hack those computers to identify others who’d been affected. Although the investigators couldn’t be sure they’d found every victim, a person familiar with the U.S. probe says they ultimately concluded that the number was almost 30 companies.

That left the question of whom to notify and how. U.S. officials had been warning for years that hardware made by two Chinese telecommunications giants, Huawei Corp. and ZTE Corp., was subject to Chinese government manipulation. (Both Huawei and ZTE have said no such tampering has occurred.) But a similar public alert regarding a U.S. company was out of the question. Instead, officials reached out to a small number of important Supermicro customers. One executive of a large web-hosting company says the message he took away from the exchange was clear: Supermicro’s hardware couldn’t be trusted. “That’s been the nudge to everyone—get that crap out,” the person says.

Amazon, for its part, began acquisition talks with an Elemental competitor, but according to one person familiar with Amazon’s deliberations, it reversed course in the summer of 2015 after learning that Elemental’s board was nearing a deal with another buyer. Amazon announced its acquisition of Elemental in September 2015, in a transaction whose value one person familiar with the deal places at $350 million. Multiple sources say that Amazon intended to move Elemental’s software to AWS’s cloud, whose chips, motherboards, and servers are typically designed in-house and built by factories that Amazon contracts from directly.

A notable exception was AWS’s data centers inside China, which were filled with Supermicro-built servers, according to two people with knowledge of AWS’s operations there. Mindful of the Elemental findings, Amazon’s security team conducted its own investigation into AWS’s Beijing facilities and found altered motherboards there as well, including more sophisticated designs than they’d previously encountered. In one case, the malicious chips were thin enough that they’d been embedded between the layers of fiberglass onto which the other components were attached, according to one person who saw pictures of the chips. That generation of chips was smaller than a sharpened pencil tip, the person says. (Amazon denies that AWS knew of servers found in China containing malicious chips.)

China has long been known to monitor banks, manufacturers, and ordinary citizens on its own soil, and the main customers of AWS’s China cloud were domestic companies or foreign entities with operations there. Still, the fact that the country appeared to be conducting those operations inside Amazon’s cloud presented the company with a Gordian knot. Its security team determined that it would be difficult to quietly remove the equipment and that, even if they could devise a way, doing so would alert the attackers that the chips had been found, according to a person familiar with the company’s probe. Instead, the team developed a method of monitoring the chips. In the ensuing months, they detected brief check-in communications between the attackers and the sabotaged servers but didn’t see any attempts to remove data. That likely meant either that the attackers were saving the chips for a later operation or that they’d infiltrated other parts of the network before the monitoring began. Neither possibility was reassuring.

When in 2016 the Chinese government was about to pass a new cybersecurity law—seen by many outside the country as a pretext to give authorities wider access to sensitive data—Amazon decided to act, the person familiar with the company’s probe says. In August it transferred operational control of its Beijing data center to its local partner, Beijing Sinnet, a move the companies said was needed to comply with the incoming law. The following November, Amazon sold the entire infrastructure to Beijing Sinnet for about $300 million. The person familiar with Amazon’s probe casts the sale as a choice to “hack off the diseased limb.”

As for Apple, one of the three senior insiders says that in the summer of 2015, a few weeks after it identified the malicious chips, the company started removing all Supermicro servers from its data centers, a process Apple referred to internally as “going to zero.” Every Supermicro server, all 7,000 or so, was replaced in a matter of weeks, the senior insider says. (Apple denies that any servers were removed.) In 2016, Apple informed Supermicro that it was severing their relationship entirely—a decision a spokesman for Apple ascribed in response to Businessweek’s questions to an unrelated and relatively minor security incident.

That August, Supermicro’s CEO, Liang, revealed that the company had lost two major customers. Although he didn’t name them, one was later identified in news reports as Apple. He blamed competition, but his explanation was vague. “When customers asked for lower price, our people did not respond quickly enough,” he said on a conference call with analysts. Hayes, the Supermicro spokesman, says the company has never been notified of the existence of malicious chips on its motherboards by either customers or U.S. law enforcement.

Concurrent with the illicit chips’ discovery in 2015 and the unfolding investigation, Supermicro has been plagued by an accounting problem, which the company characterizes as an issue related to the timing of certain revenue recognition. After missing two deadlines to file quarterly and annual reports required by regulators, Supermicro was delisted from the Nasdaq on Aug. 23 of this year. It marked an extraordinary stumble for a company whose annual revenue had risen sharply in the previous four years, from a reported $1.5 billion in 2014 to a projected $3.2 billion this year.

One Friday in late September 2015, President Barack Obama and Chinese President Xi Jinping appeared together at the White House for an hourlong press conference headlined by a landmark deal on cybersecurity. After months of negotiations, the U.S. had extracted from China a grand promise: It would no longer support the theft by hackers of U.S. intellectual property to benefit Chinese companies. Left out of those pronouncements, according to a person familiar with discussions among senior officials across the U.S. government, was the White House’s deep concern that China was willing to offer this concession because it was already developing far more advanced and surreptitious forms of hacking founded on its near monopoly of the technology supply chain.

In the weeks after the agreement was announced, the U.S. government quietly raised the alarm with several dozen tech executives and investors at a small, invite-only meeting in McLean, Va., organized by the Pentagon. According to someone who was present, Defense Department officials briefed the technologists on a recent attack and asked them to think about creating commercial products that could detect hardware implants. Attendees weren’t told the name of the hardware maker involved, but it was clear to at least some in the room that it was Supermicro, the person says.

The problem under discussion wasn’t just technological. It spoke to decisions made decades ago to send advanced production work to Southeast Asia. In the intervening years, low-cost Chinese manufacturing had come to underpin the business models of many of America’s largest technology companies. Early on, Apple, for instance, made many of its most sophisticated electronics domestically. Then in 1992, it closed a state-of-the-art plant for motherboard and computer assembly in Fremont, Calif., and sent much of that work overseas.

Over the decades, the security of the supply chain became an article of faith despite repeated warnings by Western officials. A belief formed that China was unlikely to jeopardize its position as workshop to the world by letting its spies meddle in its factories. That left the decision about where to build commercial systems resting largely on where capacity was greatest and cheapest. “You end up with a classic Satan’s bargain,” one former U.S. official says. “You can have less supply than you want and guarantee it’s secure, or you can have the supply you need, but there will be risk. Every organization has accepted the second proposition.”

In the three years since the briefing in McLean, no commercially viable way to detect attacks like the one on Supermicro’s motherboards has emerged—or has looked likely to emerge. Few companies have the resources of Apple and Amazon, and it took some luck even for them to spot the problem. “This stuff is at the cutting edge of the cutting edge, and there is no easy technological solution,” one of the people present in McLean says. “You have to invest in things that the world wants. You cannot invest in things that the world is not ready to accept yet.”

Bloomberg LP has been a Supermicro customer. According to a Bloomberg LP spokesperson, the company has found no evidence to suggest that it has been affected by the hardware issues raised in the article."

Philippe J DEWOST's insight:

Though the story is apparently still developing, a few conclusions may already be drawned :

 

1/ We (re)discover that China makes 90% of the world's PC

2/ As they learn fast and well, they gain not only understanding on how what they manufacture works, but also how to make it work differently by designing their own components (including processors in order to lower their dependency to Intel and US Tech)

3/ This revalidates that hardware design is a core industrial sovereignty constituent

4/ Europe has retreated very early from the field so we have absolutely no clue about what the technology we import actually does (beyond what it is supposed to do)

 

The only way out is to open source hardware and firmware excactly as it happened to Operating Systems. The proof that such option is viable came from Europe ; we need a Linus for hardware !

Philippe J DEWOST's curator insight, October 5, 2018 3:24 AM

Though the story is apparently still developing, a few conclusions may already be drawned :

 

1/ We (re)discover that China makes 90% of the world's PC

2/ As they learn fast and well, they gain not only understanding on how what they manufacture works, but also how to make it work differently by designing their own components (including processors in order to lower their dependency to Intel and US Tech)

3/ This revalidates that hardware design is a core industrial sovereignty constituent

4/ Europe has retreated very early from the field so we have absolutely no clue about what the technology we import actually does (beyond what it is supposed to do)

 

The only way out is to open source hardware and firmware excactly as it happened to Operating Systems. The proof that such option is viable came from Europe ; we need a Linus for hardware ! 

Scooped by Philippe J DEWOST
Scoop.it!

Orange, VCs Commit $113M to Network Startups as 'Black Box' Frustration Mounts

Orange, VCs Commit $113M to Network Startups as 'Black Box' Frustration Mounts | cross pond high tech | Scoop.it

Orange and four venture capitalist partners have promised to invest up to €100 million ($113 million) in telecom infrastructure startups over the next three to four years.

 

The funding will support startups challenging equipment incumbents like Ericsson AB (Nasdaq: ERIC), Huawei Technologies Co. Ltd. and Nokia Corp. (NYSE: NOK) as telcos embrace disruptive network technologies based on software, virtualization and open source code.

 

The news is the latest sign of Orange's desire to play a more influential role in the development of network technologies and reflects growing frustration with the traditional vendors.

It came as the French service provider said it would begin nurturing network startups for the first time in partnership with social media giant Facebook, which has also become more active in the networks sector over the past year.

 

The two companies already collaborate through the Telecom Infra Project, a Facebook-led initiative that was launched in early 2016 with a goal of more rapidly commercializing low-cost and innovative network technologies. (See Facebook: TIP Will Open Telecom Hardware.)

 

Four startups, chosen from a pool of 22 applicants, will receive support from Orange(NYSE: FTE) and Facebook and be invited to a TIP summit in California in November, where they will be able to meet operator members.

 

TIP now counts about 450 members including "all of the most important mobile operators" in the world, claimed Steve Jarrett, Facebook's head of infrastructure partnerships for Europe and the Middle East.

 

The winning startups are

  • Amarisoft, a developer of virtual radio access network technology,
  • Athonet, which specializes in mobile core "softwarization,"
  • Adipsys, whose systems are already helping Orange to manage WiFi hotspots, and
  • Horizon Computing, which claims to have made breakthroughs on reducing the costs of running data centers.

Orange Fab, the division that looks after all startup activities for the French telco, has launched a new program called Telecom Track to look after the startups from the network and infrastructure sector.

 

Startups will also be eligible to receive financial support from Orange Digital Ventures, the French operator's investment fund, as well as venture capital partners Iris Capital, Innovacom, Cathay Innovation and Breega Capital, although funding for the Telecom Track players is not guaranteed.

 

"Those who grow fast and strike partnerships and scale internationally will get the money," said Julien-David Nitlech, a partner at Iris Capital.

 

While €100 million ($113 million) may seem like a relatively small amount in the context of the broader network equipment market, the sudden willingness of venture capitalists to support new infrastructure players may alarm the established vendors.

 

"The market has historically not had a lot of venture financing," said Jarrett. "We hope to change that."

Facebook colleague Min Jun added: "We thought the investor community would need more convincing and we have seen major traction. Investors are saying we believe in this and will commit funds."

Facebook will not make any direct equity investments but says it is "conceivable" that it could acquire startups in the accelerator program.

By helping to reduce network costs, and making it easier to deploy networks in areas that currently lack connectivity, the social networking giant hopes to get more people online and using its services, it is widely assumed.

 

For Orange, the ultimate goal is a complete overhaul of the way it has traditionally built networks.

 

"We cannot be dependent on long standardization processes anymore," said Etienne Moreau, an investment manager at Orange Digital Ventures. "If we want to have control of our technology and be a software company we need to get into new technologies like white boxes and get rid of the black boxes we have sourced from equipment vendors."

With white boxes, telcos would run network software on commercial, off-the-shelf servers, instead of relying on the "black boxes" that combine proprietary hardware and software.

Orange has previously flagged its interest in white boxes and noted the challenge they pose to equipment suppliers such as Cisco Systems Inc. (Nasdaq: CSCO), which has come under pressure to adapt its own technology and business model accordingly. (See Orange Plots Mass Network-as-a-Service Rollout and Cisco Takes Bold Software Step to Counter White Box Threat – Report.)

 

Bertrand Rojat, the deputy vice president of Orange's Technocentre research-and-development unit, told Light Reading that, as well as forming a "commercial relationship" with startups, Orange was eager to make their technology available to some of its telco partners.

 

Besides other service providers involved with TIP, that could include the members of Go Ignite.

"That is an initiative between Orange, Deutsche Telekom, Telefónica and SingTel," he said. "If we have a startup that is good for one of us then it might be good for all of us."

Such moves could help the startup technologies to gain the scale they would need to be commercially viable in wide area networks.

Much like AT&T Inc. (NYSE: T) in the US, Orange appears to be stepping into roles that vendors have traditionally performed as it tries to seize control of network development and sever the ties that have previously bound it to a small number of big players.

 

Philippe J DEWOST's insight:

Extremely interesting post following Orange Fab's latest press release, as it delivers several key hints :

1/ It took Facebook and OCP (and then more recently TIP) for Telcos to finally realize that becoming a giant purchasing department and outsourcing infrastructure (and knowledge) to a handful of equipment vendors was not the only way. We are still very early but still, a few giants wake up.

2/ Open Source will redefine Hardware the same way it flipped Software ; only pending question is "Who will be the Red Hat of Open Hardware ?"

3/ #HardwareIsNotDead and Deep Tech is back with more and more VC's looking (back) into it !

Congratulations to Orange and Iris Capital for paving the way !

Scooped by Philippe J DEWOST
Scoop.it!

Orange s’associe à Facebook pour le lancement d’un accélérateur de start-up centré sur l’innovation des infrastructures réseau

Orange s’associe à Facebook pour le lancement d’un accélérateur de start-up centré sur l’innovation des infrastructures réseau | cross pond high tech | Scoop.it

Facebook et Orange, en tant que membres du Telecom Infra Project (TIP) lancent au sein de l’Orange Fab France un nouvel accélérateur « Telecom Track », conçu spécifiquement pour soutenir les start-up centrées sur le développement des infrastructures réseau.
Les start-up sélectionnées seront accompagnées par Orange et bénéficieront d'un accès à son réseau mondial de ressources ainsi que du soutien des Ecosystem Accelerator Centres du TIP (TEAC) et de Facebook.
Orange collabore avec le TIP* et Facebook afin de soutenir des start-up centrées sur l’innovation des infrastructures réseau en lançant le nouveau « Telecom Track » dans le cadre de son programme d'accélération Orange Fab en France. Ce partenariat recherchera les meilleures innovations et talents du secteur, soutiendra et conseillera les start-up avec l’aide des experts Orange, TIP et Facebook, et facilitera en parallèle la création de réseaux et les opportunités d’investissement internes et externes.

Le « Telecom Track » d’Orange Fab France

Le projet sera géré par Orange Fab France, le programme d’accélération d’Orange pour les start-up, depuis le site d’Orange Gardens, un éco-campus situé à Châtillon, près de Paris entièrement dédié à la recherche et à l’innovation. En contact direct avec les  meilleurs experts d’Orange et de ses partenaires, les start-up pourront aborder  les questions majeures relatives aux réseaux, allant de leur gestion jusqu’aux nouvelles technologies d’accès, et ce dans plusieurs régions.
Les start-up bénéficieront de tous les avantages du programme Orange Fab existant, au sein duquel elles participeront à des ateliers dédiés et des sessions de tutorat avec des spécialistes. Elles recevront un financement optionnel de 15 000 € et auront accès à un espace de travail sur le site d’Orange Gardens, où sont basées les équipes de recherche et d'innovation du Groupe. En complément du support du réseau mondial Orange Fab, les start-up pourront consulter également des experts de la communauté du TIP, des TEAC et de Facebook. Ce cadre leur permettra d’établir des connections privilégiées avec les équipes d’innovation, les partenaires d'investissement et les investisseurs en capital-risque qui pourront leur apporter une expertise plus poussée et des financements potentiels afin de lancer de nouveaux produits et services.

L’appel à projets démarre aujourd’hui et les candidats ont jusqu’au 14 mai 2017 pour soumettre leur candidature. Trois semaines plus tard, les start-up sélectionnées rejoindront le programme d’accélération et auront l’opportunité de participer en juin à un événement de lancement organisé par Orange qui réunira des cadres d’Orange, du TIP et de Facebook, ainsi que des partenaires et investisseurs en capital-risque. Une fois avancées dans le processus d’accélération, les start-up sélectionnées seront invitées à intervenir lors d'un événement des TEAC qui se tiendra à San Francisco à la fin de l’année.
Les candidats doivent être basés en France et les projets doivent être soumis sur le site www.orangefabfrance.fr

« Dans le cadre de l’évolution de notre réseau vers la 5G et les technologies futures, l’opportunité d’innovation au niveau des réseaux est énorme, et il est essentiel de soutenir les grands esprits et les talents qui développeront l’innovation dans le domaine des télécommunications », a déclaré Mari-Noëlle Jégo-Laveissière, Vice-présidente exécutive Innovation, Marketing et Technologies d’Orange. « Nous pensons que notre partenariat avec Facebook et le lancement du nouveau Telecom Track nous permettra d’encourager et de soutenir cette communauté de start-up qui a la possibilité de faire bouger les choses au sein de cet espace et de développer de nouvelles innovations dans les télécommunications. »
« Facebook est impatient de collaborer avec Orange et le TIP afin de soutenir cet accélérateur de start-up », a déclaré Jay Parikh, Directeur Ingénierie et Infrastructure chez Facebook. « En travaillant conjointement, nous espérons aider à identifier et soutenir l’innovation des infrastructures réseau des télécommunications tout en préparant la voie vers de futures découvertes. »  

L’engagement d’Orange Digital Ventures

Afin d’accélérer encore davantage le développement des start-up participantes, Orange Digital Ventures soutiendra ce nouveau « Telecom Track » et apportera des conseils pour le financement ainsi que des opportunités de création de réseau via Corporate Venture Capital (CVC) à travers ses partenariats d’investisseurs. Orange Digital Ventures contribue d’ores et déjà activement à la transformation du paysage des télécommunications à travers son portefeuille d’investissements, et pourra éventuellement contribuer au financement de certaines des start-up participantes.

*Orange fait partie du Telecom Infra Project (TIP), une initiative mondiale centrée sur l’ingénierie qui vise à transformer l’approche traditionnelle afin de construire et de déployer des infrastructures réseau de télécommunications.

Philippe J DEWOST's insight:

Enfin un opérateur télécom qui s'intéresse de plus près et de manière visible et assumée à l'Open Hardware, au projet OCP, et au Telecom Infra Project, et ce en s'appuyant sur des startups ! Il aura fallu 4 ans pour évangéliser et labourer le terrain.

En dehors d'Horizon Computing Solutions et AirLynx, quelles sont les autres startups à router vers Orange Fab et Orange Digital Ventures ?

Nous assistons à la fin du cycle des architectures hardware propriétaires ; qui sera le RedHat de cette nouvelle révolution ?

No comment yet.
Scooped by Philippe J DEWOST
Scoop.it!

Facebook’s cold storage system : the full-stack approach to efficiency

Facebook’s cold storage system : the full-stack approach to efficiency | cross pond high tech | Scoop.it

Two billion photos are shared daily on Facebook services. Many of these photos are important memories for the people on Facebook and it's our challenge to ensure we can preserve those memories as long as people want us to in a way that's as sustainable and efficient as possible. As the number of photos continued to grow each month, we saw an opportunity to achieve significant efficiencies in how we store and serve this content and decided to run with it. The goal was to make sure your #tbt photos from years past were just as accessible as the latest popular cat meme but took up less storage space and used less power. The older, and thus less popular, photos could be stored with a lower replication factor but only if we were able to keep an additional, highly durable copy somewhere else.

 

Instead of trying to utilize an existing solution — like massive tape libraries — to fit our use case, we challenged ourselves to revisit the entire stack top to bottom. We're lucky at Facebook — we're empowered to rethink existing systems and create new solutions to technological problems. With the freedom to build an end-to-end system entirely optimized for us, we decided to reimagine the conventional data center building itself, as well as the hardware and software within it. The result was a new storage-based data center built literally from the ground up, with servers that power on as needed, managed by intelligent software that constantly verifies and rebalances data to optimize durability. Two of these cold storage facilities have opened within the past year, as part of our data centers in Prineville, Oregon, and Forest City, North Carolina.

Philippe J DEWOST's insight:

Facebook adds 2 Bn pics every day : their full-stack approach on cold storage operating at 25% the power of conventional storage servers  is both fun and fascinating to read.

No comment yet.
Scooped by Philippe J DEWOST
Scoop.it!

OCP European Summit 30-31 October 2014, France Paris

OCP European Summit 30-31 October 2014, France Paris | cross pond high tech | Scoop.it
Philippe J DEWOST's insight:

Free Registration. Exceptional Networking. Engineering talks and hardcore hackathons. All wrapped in a #FrenchTech spirit. See you there ! #HardwareIsNotDead #OCP

No comment yet.
Scooped by Philippe J DEWOST
Scoop.it!

DigitalOcean's cloud surpasses Amazon Web Services in one category

DigitalOcean's cloud surpasses Amazon Web Services in one category | cross pond high tech | Scoop.it

Netcraft alluded to the growth in a blog post earlier this month. Netcraft’s most recent survey found that 818 sites jumped from Amazon to DigitalOcean, while 88 sites moved in the other direction.

The company has grown fast. Netcraft’s December 2012 survey put it behind more than 1,500 others in terms of how many web-facing computers it had. Now it’s in 15th place.

All that growth has had an impact on DigitalOcean’s physical infrastructure.

“We were adding four (data center) racks a month in the beginning of the year. Now we’re adding them at a two-day clip,” Mitch Wainer, a cofounder of DigitalOcean and its chief marketing officer, said in an interview with VentureBeat. “It’s really been crazy, and our poor director of operations is losing his mind.”

The company now operates around 6,350 physical servers, up from about 5,000 at the beginning of October, Wainer said. It’s still a tiny fraction of the biggest cloud providers — presumably Amazon, Google, Rackspace, and Microsoft — but clearly, the number is going in the right direction.

 
Philippe J DEWOST's insight:

Grow fast or die slow wrote McKinsey recently...

No comment yet.
Scooped by Philippe J DEWOST
Scoop.it!

Facebook's Open Compute guru Frank Frankovsky leaves to build optical storage startup

Facebook's Open Compute guru Frank Frankovsky leaves to build optical storage startup | cross pond high tech | Scoop.it

Frank Frankovsky, Facebook’s vice president of hardware design and supply chain optimization, who helped oversee the development and growth of the company’s custom server effort, has left the social networking company to form his own as-yet-unnamed startup that will focus on building optical storage for the enterprise.

In an interview, Frankovsky said he had resigned from Facebook last week to pursue this idea. Meanwhile, Jason Taylor, Facebook’s director of infrastructure, has assumed responsibility for the hardware design and supply chain teams at Facebook and will continue working with the Open Compute Project on Facebook’s behalf.

Taylor has been overseeing much of that work for the last year, according to Facebook, and he will also be joining the Open Compute Foundation board along with Bill Laing, corporate VP of Cloud and Enterprise at Microsoft. This brings the OCP Foundation board from five to seven participants. Frankovsky, who will remain chairman and president of the OCP board, will stay as an independent member.

Philippe J DEWOST's insight:

Hardware is not dead. It is just evolving #OCP

No comment yet.