Deterministic Deployments, Part 3: Other Approaches