Chena Lee

23%
Flag icon
For example, the replica can be chosen based on a hash of the user ID, rather than randomly.
Designing Data-Intensive Applications: The Big Ideas Behind Reliable, Scalable, and Maintainable Systems
Rate this book
Clear rating
Open Preview