You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository was archived by the owner on Apr 29, 2020. It is now read-only.
Copy file name to clipboardexpand all lines: OPEN_PROBLEMS/MUTABLE_DATA.md
+14-1
Original file line number
Diff line number
Diff line change
@@ -125,7 +125,9 @@ Mutable Data is a fundamental building block for creating applications. Improvin
125
125
### What defines a complete solution?
126
126
> What hard constraints should it obey? Are there additional soft constraints that a solution would ideally obey?
127
127
128
-
A complete solution should repetably demonstrate that it can sustain the load under multiple network conditions for use cases that in the following categories:
128
+
We are led to believe that a complete solution for the Mutable Data Open Problem is not only one, but a set of solutions that are capable of adjusting for the type of use case.
129
+
130
+
Rach of the solutions proposed should present and repetably demonstrate how it handles the most typical use cases and how they handle different loads under multiple network. And overview of these typical use cases are:
129
131
130
132
- writers (i.e. publishers) to readers (i.e. consumers)
131
133
- 1 to many - Blog
@@ -137,6 +139,17 @@ A complete solution should repetably demonstrate that it can sustain the load un
137
139
138
140
More use cases defined at https://github.com/libp2p/research-pubsub/blob/master/USECASES.md
139
141
142
+
In addition, a solution should also contemplate answers to the following questions:
143
+
144
+
- What are the guarantees that users can expect?
145
+
- Does the system rely in a centralized compontent for it to work?
146
+
147
+
Additionally, we leave here a set of questions to spark the thinking:
148
+
149
+
- What form do Access Control and/or Capabilities take in a context non mediated by a centralized point?
150
+
- Should the system allow for these Access Control and/or Capabilities to be mutable, transferable or revocable?
151
+
- What kind of cryptography needs to exist for access and revocation to happen?
0 commit comments