I'd like to learn more about their DDOS, network-level, and cross-datacenter protections. They have to deal with so much volume and so many integrations that there's probably some lessons they learned there on dealing with issues. I'd also be interested in how their filesystem or data-processing tech with built-in integrity and availability mechanisms factor into it. They might leverage it in interesting ways like they do with F1 RDBMS.