Skip to content
This repository was archived by the owner on Apr 29, 2020. It is now read-only.

Commit 6dca8f4

Browse files
committed
update the solution bit
1 parent 2ed3045 commit 6dca8f4

File tree

1 file changed

+14
-1
lines changed

1 file changed

+14
-1
lines changed

OPEN_PROBLEMS/MUTABLE_DATA.md

+14-1
Original file line numberDiff line numberDiff line change
@@ -125,7 +125,9 @@ Mutable Data is a fundamental building block for creating applications. Improvin
125125
### What defines a complete solution?
126126
> What hard constraints should it obey? Are there additional soft constraints that a solution would ideally obey?
127127
128-
A complete solution should repetably demonstrate that it can sustain the load under multiple network conditions for use cases that in the following categories:
128+
We are led to believe that a complete solution for the Mutable Data Open Problem is not only one, but a set of solutions that are capable of adjusting for the type of use case.
129+
130+
Rach of the solutions proposed should present and repetably demonstrate how it handles the most typical use cases and how they handle different loads under multiple network. And overview of these typical use cases are:
129131

130132
- writers (i.e. publishers) to readers (i.e. consumers)
131133
- 1 to many - Blog
@@ -137,6 +139,17 @@ A complete solution should repetably demonstrate that it can sustain the load un
137139

138140
More use cases defined at https://github.com/libp2p/research-pubsub/blob/master/USECASES.md
139141

142+
In addition, a solution should also contemplate answers to the following questions:
143+
144+
- What are the guarantees that users can expect?
145+
- Does the system rely in a centralized compontent for it to work?
146+
147+
Additionally, we leave here a set of questions to spark the thinking:
148+
149+
- What form do Access Control and/or Capabilities take in a context non mediated by a centralized point?
150+
- Should the system allow for these Access Control and/or Capabilities to be mutable, transferable or revocable?
151+
- What kind of cryptography needs to exist for access and revocation to happen?
152+
140153
## Other
141154

142155
### Existing Conversations/Threads

0 commit comments

Comments
 (0)