Last updated 2 years ago
Operation stability after failures.
Protection against data corruption.
Cover large geographical areas.
Respond to a large number of requests.
Can lack consistency between replicates.