Do interactions between components benefit from caching mechanisms ?
What caching mechanism is implemented for the interactions between components?
The reduction of the volumes of exchanges, of operations of calculations, processing, and access to data is an axis of optimization of the consumption of resources. The implementation of caching mechanisms reduces the costs of repetitive operations. Caching of data may occur at different levels (computers) in a software system. The closer the cache is to the requestor that it is to serve, the smaller the volume of data in transit and the length of the path taken by the data. The closer the cache is to the data source, the more it can be shared by a large number of users, but the data will still be exchanged, only the processing and collection operations will be reduced.
Technical documenation mention cache strategy for each flow. Cache management tools are used to validate efficiency (CHROME: network enable-disable cache)
Rule for assessing the level of compliance of the criterion
Formalized = 100 ; Planned = 75 ; Identified = 50 ; Ignored = 0 / 100
16 other criteria related to the recommendation: Use the technical components that improve the sustainable IT aspects, security and performance
Is the documentation of the functionality available to enable its reuse ?
Is the web server used asynchronous and multi-threaded ?
Has the dependency tree of the integrated components been evaluated ?
Can dependencies be reduced by using an alternative component ?
Is the user informed of a processing in progress in the background ?
Has the integration of asynchronous processing been evaluated ?
Are unused resources freed up as quickly as possible ?
Is a VM necessary as opposed to a container solution ?
Does service availability require redundancy ?
Are the browser caches not being blocked by the framework or technology used ?
Is there a lighter framework / library that meets the functional need ?
Is an Open Source solution available for the functional need ?
Are the versions of the components used tracked and deployed ?
Is the security implemented justified with regard to the operations carried out ?
Is the level of logs adapted to the environment ?
Are temporary files included in the "logrotate" ?