Microsoft's Photosynth wilts under pressure
Brand new photo-stitching service fades to black for hours before returning
Computerworld - Within hours of its launch, Microsoft Corp.'s new photo-stitching service went dark, overwhelmed by demand, the company said Thursday afternoon.
The Photosynth service was, however, back up and running by 7 p.m. EDT.
"We have been absolutely overwhelmed by demand, and have turned Photosynth.com into a special static/read-only mode for the moment," Microsoft said in a post to the Live Labs blog early Thursday afternoon.
In an update added to the blog at 4:50 p.m., Microsoft claimed it was close to resolving the outage. "We are nearly there and will be back up shortly," it said. Attempts to access Photosynth, however, continued to be met with the message, "The Photosynth site is a little overwhelmed just now," until shortly before 7 p.m.
At 6:40 p.m., Microsoft said it had restored the service. "Photosynth.com is back online. New synths are still turned off, but we will turn them back on shortly," the company said. Computerworld confirmed that the "Create your Synth" section of the site was live within about 15 minutes of that final message.
Photosynth, which automatically stitches together digital photos to create three-dimensional images, debuted late Wednesday. The technology used by the service -- users must connect to photosynth.com to upload photos, then manipulate them to create a 360-degree image -- was developed by Microsoft's Live Labs group, in collaboration with the University of Washington.
Microsoft acknowledged that the demand put on Photosynth had caught it by surprise. "Getting ready for the launch, we did massive amounts of performance testing, built capacity model after capacity model -- and yet, with all of that, you threw so much traffic our way that we need to add more," the company said.
Read more about Web Apps in Computerworld's Web Apps Topic Center.
- How Network Connections Drive Web Application Performance Users around the globe, on all sorts of devices, expect Web applications to function as seamlessly as desktop applications. This paper discusses the...
- Big Data, Big Mess: Sound Risk Intelligence Through Complete Context This paper examines the insecurity of the small businesses in the supply chain and offers tips to close those backdoors into the enterprise.
- Using Cyber Insurance and Cybercrime Data to Limit Your Business Risk This paper examines the challenges of understanding cyber risks, the importance of having the right cyber risk intelligence, and how to use this...
- 5 Tips to Secure Small Business Backdoors in the Enterprise Supply Chain This paper examines the insecurity of the small businesses in the supply chain and offers tips to close those backdoors into the enterprise.
- NSS Labs & Cisco Present: Evaluating Leading Breach Detection Systems Today's constantly evolving advanced malware and APTs can evade point-in-time defenses to penetrate networks. Security professionals must evolve their strategy in lockstep to...
- Will the Real Endpoint Threat Detection and Response Please Stand Up? This webinar explores new technologies & process for protecting endpoints from advanced attackers as well as the innovations that are pushing the envelope... All Web Apps White Papers | Webcasts