ISA relies on the Object Oriented paradigm. Let me now join OO with our wishes. Some guidances emerge . The first one is, not surprisingly, “Everything in ISA is an Object”!
Continue reading Object Oriented GuidelinesIntrinsic securisation
Wish N°3 – Intrinsic securisation : Authentication and crypting have to be incorporated at the lowest level of abstraction and absolutly sure.
Think and design ISA to be durable for several decades. The main design patterns should be incorporated as much as possible. This architecture should not limit itself in changes that it can elaborate to have good performances. And this in both dimensions hardware and software. Remain native : It is the condition to do at best of the possible. Define a solid base and then incorporate an extension mechanism.
Continue reading ISA Wish N°6 – Modern, performant and durableOne of firsts motivation of ISA is to unify the architecture and to make it simple in order to eliminate useless “expertise”.
ISA makes a break with the existent. Thus this architecture is free to make its choices. In other words, compatibility with actual IT is not a concern for ISA. This primary option eliminates the niches for geeks and experts.
Statics and dynamics have pros and cons :
➽ Static often offers the efficiency, an easiest use and the robustness.
➽ Dynamics offers simplicity and flexibility.
An ideal architecture shouldn’t have to choose. It has to incorporate gracefully both statics and dynamics in an unified world.
The first benefit to incorporate security in the lowest layers of ISA is that its safety is generalized every where ISA is deployed, and at anytime. This is a very important advantage when comparing to security problems recurrently occuring on all runtime environments (operating systems, browsers, etc.)
Continue reading ISA Wish N°3 – Intrinsic securisationHaving defined the scope of the Ideal Software Architecture (ISA), it’s time first to make a list to Santa Claus of what will be nice to have in computer science. Wish N°1 – Plug and play generalized. An old dream to begin, connect a computing unit as easily as we connect any device, like a …
Continue reading ISA Requirements