What are the Identity axiom consequences ? Here is a list of studied subject by this post: Addressing, Unitarity, Uniqueness, Ubiquity, Versioning.
Continue reading The Identity axiomProcess
In the perspective to give a basement to ISA, here is an exploration of pros and cons of major paradigms (No paradigm, Object Oriented, Sets (Relational) and Functional). To sum up the OO paradigm is retained for ISA. It is this approach that has made me discover the “Atom Oriented” possible paradigm.
Continue reading Available paradigms overviewHave an underlying paradigm to help building ISA is a mean to promote coherence and consistency.
In this way it is easier to follow all the previously expressed wishes. It also gives guidelines for choosing among solutions in particular on reuse of an existing one.
Doing nothing is always the best option when acceptable. So optionally if an existing technology is a good candidate to be an ISA part and that it meets all the requirements above, then it should be retained.
This post is also the opportunity to initiate the building process of ISA.
One of firsts motivation of ISA is to unify the architecture and to make it simple in order to eliminate useless “expertise”.
ISA makes a break with the existent. Thus this architecture is free to make its choices. In other words, compatibility with actual IT is not a concern for ISA. This primary option eliminates the niches for geeks and experts.
The first benefit to incorporate security in the lowest layers of ISA is that its safety is generalized every where ISA is deployed, and at anytime. This is a very important advantage when comparing to security problems recurrently occuring on all runtime environments (operating systems, browsers, etc.)
Continue reading ISA Wish N°3 – Intrinsic securisation