The document discusses two fault tolerant mechanisms - Theft Induced Checkpointing (TIC) and Systematic Event Logging (SEL) protocols - that can be used to recover data in cluster computing environments in the event of crashes or failures. TIC is used to store information at periodic intervals and send it to receivers using SEL. Experimental results show that TIC has very low complexity and only requires rolling back crashed processes to the last checkpoint to recover lost information.