The first benefit to incorporate security in the lowest layers of ISA is that its safety is generalized every where ISA is deployed, and at anytime. This is a very important advantage when comparing to security problems recurrently occuring on all runtime environments (operating systems, browsers, etc.)
Continue reading ISA Wish N°3 – Intrinsic securisationDistribution
Wish N°2 – Distribution : Distributed computing and storage have to be at the heart of ISA in order to adhere to the reality.
The world, the universe is not centralized. They don’t have center. Any attempt to ignore this fact in an ideal architecture will fail.
Distributed computing and storage have to be at the heart of ISA in order to adhere to the reality.
An other aspect of distribution paradigm, implies that the data and treatments are scaling horizontally. Taking advantage of all 4 dimensions of our universe.
Having defined the scope of the Ideal Software Architecture (ISA), it’s time first to make a list to Santa Claus of what will be nice to have in computer science. Wish N°1 – Plug and play generalized. An old dream to begin, connect a computing unit as easily as we connect any device, like a …
Continue reading ISA Requirements