Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

How do you go from "have a separate access method that doesn't depend on your main system" to "turtles all the way down"? The secondary access is allowed to have dependencies, just not on your network.


And if the secondary access fails, then what? Backup systems are not reliable 100% of the time.


Then you were 1-FT, which is still worlds better than 0-FT.

"Don't put two engines on the plane because both of them might fail" is not how fault tolerance works.


I worked with a guy who was an amateur pilot, and he had an opinion about dual engine planes. He said the purpose of the second engine was to get you to the scene of the crash.


Then you're SOL. What's your point? The backup might fail, so don't have a backup? I don't understand what you're trying to say.


You should read the post I was responding to and consider the context instead of taking mine in a vacuum. You completely missed the point.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: