The Computing Series

The Four-Step Method (Ch 14)

Step Action Input Output
1 Identify Archetype (F6) System description, alert, README A1–A6 classification
2 Apply Review Questions (F5) The seven questions in order Established facts + gaps
3 Name Tradeoffs (F4) Hypothesis about failure or design AT1–AT10 tradeoff name
4 Map Failure Modes (F3) Confirmed hypothesis FM1–FM12 name → prevention pattern

Use: Incident response (5 min), architecture review (30 min), system onboarding (3 days). Same steps, different depth.


Read in the book →