Skip to content
FR EN

Handbook of Sustainable Design of Digital Services

MENU
← go back
Backend    ODD#9     ODD#12     ODD#13    

Is a VM necessary as opposed to a container solution ?

Advice 

Performance

C People

B Planet

B Prosperity

Difficulty

N/A

Priority

/

Récurrence

/

Tests

Is the Sustainable IT impact assessed for each solution?

Precisions

Virtual Machine virtualization techniques duplicate all operating systems and partition access to physical components. Other container-based techniques are more economical in terms of duplication and their proximity to the physical components allow better use and supervision of these resources.

Additional elements

Rule for assessing the level of compliance of the criterion

0 / 0

Life cycle

Déploiement

16 other criteria related to the recommendation: Use the technical components that improve the sustainable IT aspects, security and performance

Recommendation Essential

Quality

Is the documentation of the functionality available to enable its reuse ?

Advice

Performance

Is the web server used asynchronous and multi-threaded ?

Advice

Performance

Has the dependency tree of the integrated components been evaluated ?

Advice

Performance

Can dependencies be reduced by using an alternative component ?

Advice

Performance

Is the user informed of a processing in progress in the background ?

Advice

Performance

Has the integration of asynchronous processing been evaluated ?

Recommendation

Performance

Are unused resources freed up as quickly as possible ?

Recommendation

Performance

Does service availability require redundancy ?

Recommendation

Architecture

Do interactions between components benefit from caching mechanisms ?

Recommendation

Architecture

Are the browser caches not being blocked by the framework or technology used ?

Advice

Architecture

Is there a lighter framework / library that meets the functional need ?

Advice

Architecture

Is an Open Source solution available for the functional need ?

Advice

security

Are the versions of the components used tracked and deployed ?

Recommendation

security

Is the security implemented justified with regard to the operations carried out ?

Advice

Data processing

Is the level of logs adapted to the environment ?

Recommendation

Data processing

Are temporary files included in the "logrotate" ?