Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Google's Four Minute Blackout Examined
Threaded  |  Newest First  |  Oldest First
JerryJ
50%
50%
JerryJ,
User Rank: Apprentice
8/19/2013 | 5:01:48 PM
re: Google's Four Minute Blackout Examined
The response to this outage seemed to be all about the impact to Google's reputation and finances. Is nobody else concerned that we have become so dependent on a single provider? Setting any discussion of monopolies aside, the real concern here should be, what impact a much longer term Google outage, say a few days or weeks, have on the global economy. "That's huge"' might be an understatement.
gev
50%
50%
gev,
User Rank: Moderator
8/19/2013 | 5:14:01 PM
re: Google's Four Minute Blackout Examined
During Sandy our access to gas was interrupted for about a week. At the same time, we had no electicity and very limited internet access.
Let me assure you that the lack of internet access pales in comparison with the lack gas in your car, and inability to start your furnace without electricity.
Just saying to keep things in perspective.
TerryB
50%
50%
TerryB,
User Rank: Ninja
8/19/2013 | 6:06:49 PM
re: Google's Four Minute Blackout Examined
Funny how you equate "internet access" to Google being available. I didn't even know Google was down until I read this. But when users ask me if our Corp proxy server supplied internet service is down, I always try to access Google homepage to verify (just because such a lightweight, fast loading page). Based on this, I better start trying Bing also to verify if internet access is really down. :-)
moarsauce123
50%
50%
moarsauce123,
User Rank: Ninja
8/20/2013 | 11:56:06 AM
re: Google's Four Minute Blackout Examined
If 40% of all Internet traffic goes to Google then equating Google with the Internet is not that far fetched. Rather scary!
JerryJ
50%
50%
JerryJ,
User Rank: Apprentice
8/19/2013 | 6:25:38 PM
re: Google's Four Minute Blackout Examined
I understand and empathize with the enormous personal and business impact of Sandy. And although millions were impacted, the impact was geographically constrained. This was a 40% drop in Internet traffic globally. I don't know the statistics, but I'm guessing that the traffic on the Internet from Google searches is but a small fraction of the total. If true, that means there was a very large number of people and businesses without email, office productivity services like Docs, and more. Like Charlie Babcock, I'd like to know more. A lot more.
cbabcock
50%
50%
cbabcock,
User Rank: Apprentice
8/19/2013 | 6:10:48 PM
re: Google's Four Minute Blackout Examined
I would like to know more. Granted it was a short term incident. But it affected all Google services, except search: Maps, Gmail, Docs, Drawings, Sites, Analytics.
OtherJimDonahue
50%
50%
OtherJimDonahue,
User Rank: Apprentice
8/19/2013 | 7:27:17 PM
re: Google's Four Minute Blackout Examined
"Somebody in Mountain View probably unplugged something, then plugged it back in," he said.

That's an OK explanation when something happens in my home. But inside Google? Not so much.
Thomas Claburn
50%
50%
Thomas Claburn,
User Rank: Ninja
8/19/2013 | 8:18:23 PM
re: Google's Four Minute Blackout Examined
I'd be very worried if indeed there were some single system, without any kind of backup or failover, that could be unplugged, shutting down everything. I'm sure there's more to it.
Zman7
50%
50%
Zman7,
User Rank: Apprentice
8/20/2013 | 4:47:08 AM
re: Google's Four Minute Blackout Examined
The other majority of the world who aren't nerds didn't even notice because it was Friday afternoon and they were at happy hour having fun.
moarsauce123
50%
50%
moarsauce123,
User Rank: Ninja
8/20/2013 | 11:55:06 AM
re: Google's Four Minute Blackout Examined
Welcome to the cloud! Just imagine you build your business 100% in the cloud and lose transactions for a four minute period. That is real cash going somewhere else. The cloud can be just one option in a mix of different models.


Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-5615
PUBLISHED: 2020-08-04
Cross-site request forgery (CSRF) vulnerability in [Calendar01] free edition ver1.0.0 and [Calendar02] free edition ver1.0.0 allows remote attackers to hijack the authentication of administrators via unspecified vectors.
CVE-2020-5616
PUBLISHED: 2020-08-04
[Calendar01], [Calendar02], [PKOBO-News01], [PKOBO-vote01], [Telop01], [Gallery01], [CalendarForm01], and [Link01] [Calendar01] free edition ver1.0.0, [Calendar02] free edition ver1.0.0, [PKOBO-News01] free edition ver1.0.3 and earlier, [PKOBO-vote01] free edition ver1.0.1 and earlier, [Telop01] fre...
CVE-2020-5617
PUBLISHED: 2020-08-04
Privilege escalation vulnerability in SKYSEA Client View Ver.12.200.12n to 15.210.05f allows an attacker to obtain unauthorized privileges and modify/obtain sensitive information or perform unintended operations via unspecified vectors.
CVE-2020-11583
PUBLISHED: 2020-08-03
A GET-based XSS reflected vulnerability in Plesk Obsidian 18.0.17 allows remote unauthenticated users to inject arbitrary JavaScript, HTML, or CSS via a GET parameter.
CVE-2020-11584
PUBLISHED: 2020-08-03
A GET-based XSS reflected vulnerability in Plesk Onyx 17.8.11 allows remote unauthenticated users to inject arbitrary JavaScript, HTML, or CSS via a GET parameter.