Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

It's not just failuers. It's also the rolling upgrades and the perforomance profile.

Lack of a clearly defined protocol is a leaky abstraction.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: