Skip to content
FR EN

Handbook of Sustainable Design of Digital Services

MENU
← go back
Backend    ODD#9     ODD#12     ODD#13    

Are the versions of the components used tracked and deployed ?

Advice 

security

B People

B Planet

B Prosperity

Difficulty

N/A

Priority

/

Récurrence

/

Tests

How often are components updated?

Precisions

Capitalising on deployed best practice is a guarantee of environmental and operational efficiency. As technical advances are rapid, it is important to rapidly deploy all the environmental benefits that could be integrated into a component.

Additional elements

Rule for assessing the level of compliance of the criterion

0 / 0

Life cycle

Maintenance

16 other criteria related to the recommendation: Use the technical components that improve the sustainable IT aspects, security and performance

Recommendation Essential

Quality

Is the documentation of the functionality available to enable its reuse ?

Advice

Performance

Is the web server used asynchronous and multi-threaded ?

Advice

Performance

Has the dependency tree of the integrated components been evaluated ?

Advice

Performance

Can dependencies be reduced by using an alternative component ?

Advice

Performance

Is the user informed of a processing in progress in the background ?

Advice

Performance

Has the integration of asynchronous processing been evaluated ?

Recommendation

Performance

Are unused resources freed up as quickly as possible ?

Advice

Performance

Is a VM necessary as opposed to a container solution ?

Recommendation

Performance

Does service availability require redundancy ?

Recommendation

Architecture

Do interactions between components benefit from caching mechanisms ?

Recommendation

Architecture

Are the browser caches not being blocked by the framework or technology used ?

Advice

Architecture

Is there a lighter framework / library that meets the functional need ?

Advice

Architecture

Is an Open Source solution available for the functional need ?

Recommendation

security

Is the security implemented justified with regard to the operations carried out ?

Advice

Data processing

Is the level of logs adapted to the environment ?

Recommendation

Data processing

Are temporary files included in the "logrotate" ?