Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I believe it's based on BigTable.

There doesn't seem to be a published article that I can find on the exact internals, so I'm basing it off discussions on the protocol mailing lists.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: