Skip to content

Instantly share code, notes, and snippets.

Keybase proof

I hereby claim:

  • I am chrisastall on github.
  • I am chrisastall (https://keybase.io/chrisastall) on keybase.
  • I have a public key whose fingerprint is D7A9 D933 87CD 4FE8 DDDF 9E25 1B21 2FDD ECB4 E10E

To claim this, I am signing this object:

Internet Scale Services Checklist

A checklist for designing and developing internet scale services, inspired by James Hamilton's 2007 paper "On Desgining and Deploying Internet-Scale Services."

Basic tenets

  • Does the design expect failures to happen regularly and handle them gracefully?
  • Have we kept things as simple as possible?