Skip to content
FR EN

Handbook of Sustainable Design of Digital Services

MENU
← go back
Backend    ODD#9     ODD#12     ODD#13    

Is the user informed of a processing in progress in the background ?

Advice 

Performance

B People

B Planet

B Prosperity

Difficulty

N/A

Priority

/

Récurrence

/

Tests

Is there a list of treatments that do not require an immediate outcome?

Precisions

Some processing is invisible from the user's point of view, but may produce delays in response that are not recognised by the user and may lead to repeat operations. The multiplication of unnecessary processing requests degrades Sustainable IT performance.

Additional elements

Rule for assessing the level of compliance of the criterion

0 / 0

Life cycle

Utilisation

16 other criteria related to the recommendation: Use the technical components that improve the sustainable IT aspects, security and performance

Recommendation Essential

Quality

Is the documentation of the functionality available to enable its reuse ?

Advice

Performance

Is the web server used asynchronous and multi-threaded ?

Advice

Performance

Has the dependency tree of the integrated components been evaluated ?

Advice

Performance

Can dependencies be reduced by using an alternative component ?

Advice

Performance

Has the integration of asynchronous processing been evaluated ?

Recommendation

Performance

Are unused resources freed up as quickly as possible ?

Advice

Performance

Is a VM necessary as opposed to a container solution ?

Recommendation

Performance

Does service availability require redundancy ?

Recommendation

Architecture

Do interactions between components benefit from caching mechanisms ?

Recommendation

Architecture

Are the browser caches not being blocked by the framework or technology used ?

Advice

Architecture

Is there a lighter framework / library that meets the functional need ?

Advice

Architecture

Is an Open Source solution available for the functional need ?

Advice

security

Are the versions of the components used tracked and deployed ?

Recommendation

security

Is the security implemented justified with regard to the operations carried out ?

Advice

Data processing

Is the level of logs adapted to the environment ?

Recommendation

Data processing

Are temporary files included in the "logrotate" ?