Lusis Payments | Innovative Global Payments Software and Services
FR (+33) 1 55 33 09 00  -  USA ​(+1) 415 829 4577 - CA ​(+1) 416 979 7800 - UK (+44) 20 3398 5582
  • Home
  • TANGO
  • AI FRAUD
  • SOLUTIONS
    • TANGO VIDEOS
    • LITERATURE
  • BENCHMARKS
    • USER PROFILES
  • ABOUT
    • PARTNERS >
      • HPE GreenLake
    • VIDEO
    • EVENTS
    • PRIVACY
  • WEBCAST
  • Contact
    • CAREERS >
      • JOBS-UK
      • JOBS-FRANCE
      • JOBS-NA
      • JOBS-LA
      • JOB APPLICATION
  • NEWS
    • Market Insights

MISSION CRITICAL

8/26/2025

 
Picture
Mission-critical systems are not software like any other. Most software may fail. Some even incorporate failure or inaccuracy as a standard mode of operation, such as the overbooking systems of transport companies. For years, TGV passengers have practiced the fantasies of overbooking without it bothering them too much. It is usual for a certain online sales or music site to be unavailable for a few seconds or even minutes, it does not bother anyone. If a payroll application makes late transfers, who will be sorry about it, except the unfortunate employees?

The situation is quite different for mission-critical systems. They cannot be unavailable or even provide a degraded service. Any failure will be detrimental to the company that provides the service, to its customers and to the operator's supplier. Any failure will cause damage in terms of image, business, market share or sometimes much more. For mission-critical systems you must always be thinking in worst case scenario and not best case scenario.

This is why high availability is at the heart of the design and implementation of these systems. To be achieved, it requires not only solid skills from software providers but also a culture shared with operators that can be banking industry or others.

Rather than dealing with countless individual cases, it may seem useful to ask what are the principles on which a high availability system should be based, the foundations of its principles and the reasons for their effectiveness. Working on this list will make it possible to simply discriminate between architectures that can provide high availability and those that need to be eliminated and to quickly reject baroque or mannerist architectural creations by neo-experts.

I see seven of them and I think that with these simple principles, we can work seriously:
Picture
​A SPOF, a Single Point Of Failure, is a single piece of software or hardware architecture whose failure will lead to the failure of the entire system. Under Murphy's law, all SPOF will eventually fail! The mission-critical system vendor must therefore ruthlessly eliminate all possible SPOFs. There is no need to go further, and it is enough to eliminate single databases even managed by a large Cloud specialist, even opaquely distributed on multiple machines, even guaranteed by a cryptic service level agreement, this single database is a SPOF and vulgarly, a nest of annoyances. 

An object is said to be symmetrical if it can be superimposed on itself by the application of a transformation of space other than identity. Behind all symmetry is a property of invariance. In our field, it is a question of distributing service requests on subsystems that can be substituted for each other, the idea being that the service will be provided in the same way regardless of the subsystem that carried it out. If one disappears, it doesn't matter for the quality of service. Technically speaking, the N subsystems need to have the same information to make a decision, which means they need to inform each other about what they've done. Symmetry can be mirror (normal/dual, Active/active), trial (normal/dual/trial, Active/active/active), quadral, etc. Theoretically there is no limit, except common sense: an Active/Passive system is not a symmetrical system. There will always be a time when the passive becomes active and this transition will not be without "friction", with friction often being an untested procedure or an individual, which will endanger the quality of service. And here again, let us remember this good Murphy and his law. Of course, symmetry, the substitutability of any subsystem by another, is also much simpler than non-symmetry. This choice of simplicity is based on another general principle that is in line with the same interest: KISS, as in Keep It Simple and Stupid. "Active/Active" contrary to what some people may believe, is much simpler than Active/Passive.
​
Picture
​The invariance of operation over time is the fact that the system will work in the same way, in the same mode, always. It will work like a perpetual calendar watch. There will not be 30 days of operation in one mode A and two hours of operation in another mode B and back. For the same reason as before, going from mode A to mode B and back will not be without friction, which will inevitably lead to quality-of-service problems. The invariance of the functioning in time is obviously a type of symmetry (translational symmetry in time). 

Performance predictability is the ability to predict the performance of a system with a margin of error small enough not to lead to adverse consequences. It is essential for supervising systems, for detecting damage, for anticipating the actions to be taken before failures occur. Here again, it is a problem of invariance and therefore of symmetry. Using multi-AZ architecture (where services are spread over several different geographical areas) means that the path of a transaction will not necessarily be the same from one time to the next, fast at one time, slow at another, the speed of light being non-negotiable. For the same reasons, shared resources must be avoided, even for things as simple as a Local network connection. Mission critical systems can’t share resources, otherwise the response time is not predictable. Losing the predictability of performance means losing the basics of its SLA and an essential means of detecting potential failures.

Operation must be as simple as possible. A nuclear submarine carries a miniaturized nuclear power plant that provides the electricity that runs its engines and allows it to produce its oxygen. It is a very complex technology, developed by remarkable engineers. However, it is operated by normal people, by well-thought-out computer systems and by procedures books. If you had to take high-level engineers on board to operate nuclear submarines, they would all have been at the bottom of the water for a long time. No engineer of great talent will agree to spend six months underwater in a confined space, at least we can consider that there will not be enough candidates. Mission-critical systems are the same thing, they must be designed and set up by people of a certain talent but operated by normal people, without the need to resort to the former, who will never be there, according to Murphy's law, when they are needed. Implementing this principle is far from straightforward, but it is an essential guide. The Build phase should produce an artifact that will make the Run phase simple.

The fewest different software or technology providers. Behind the management of a mission-critical system, there is a management of responsibility. If the system is produced by a chain of different technologies, there will be not only the problem of coordination and the strength of the chain as defined by its weakest link, but also the problem of responsibility. This principle is less strong than the previous ones and is a pragmatic application aimed at eliminating unnecessary links and keeping the technical architecture and the structure of responsibilities as simple as possible, it is also an application of the KISS principle explained above. It is by virtue of this principle that we prefer the cross-notification of information rather than the synchronization of databases themselves (and no, it's not the same thing) which moreover makes it easy to make multipolar systems (Dual, trial, "quadral", etc...). 

Security and securitization is now also a topic for high availability as the number of hackers’ assaults is regularly increasing. Although the main objective of these assaults is not related to service availability, they are, however, presenting a threat to it. Therefore, all connections and access must be properly secured by certificates, double authentication and so on, bearing in mind that, if a security checking can protect a system against attack, it can also be a threat to its availability. Changing a certificate for instance must be properly planned and coordinated otherwise it will cause an outage. 

As can be seen, however independent, these seven principles dialogue with each other and reinforce each other. Analyzing architecture through these saves time and above all, avoids disappointments. 

Now, after "On-demand" fashion and its underlying religious conviction that it was no longer necessary for the developer to worry about the performance of his software, after the micro-service and the belief in the harmlessness of virtualization, which ignored the fact that all micro-services were always carried out somewhere and that the speed of light remained constant, it is the Cloud idol that combines the two with an irrational overconfidence in infrastructure and brings a bunch of nonsense rarely equaled. 

In these turbulent waters, having a few principles validated by a long and successful experience is not useless.


Comments are closed.

    lUSIS nEWS

    The latest company and industry news from Lusis Payments.

    Archives

    December 2025
    August 2025
    May 2025
    March 2025
    January 2025
    December 2024
    August 2024
    June 2024
    April 2024
    March 2024
    January 2024
    December 2023
    November 2023
    October 2023
    June 2023
    March 2023
    February 2023
    January 2023
    November 2022
    October 2022
    August 2022
    July 2022
    June 2022
    April 2022
    March 2022
    January 2022
    December 2021
    November 2021
    October 2021
    September 2021
    August 2021
    June 2021
    May 2021
    April 2021
    December 2020
    November 2020
    October 2020
    June 2020
    April 2020
    March 2020
    January 2020
    August 2019
    July 2019
    April 2019
    March 2019
    February 2019
    January 2019
    November 2018
    October 2018
    August 2018
    July 2018
    June 2018
    May 2018
    February 2018
    November 2017
    September 2017
    July 2017
    June 2017
    May 2017
    April 2017
    July 2016
    June 2016
    April 2016
    March 2015
    February 2015
    January 2015
    December 2014
    September 2014
    August 2014
    July 2014
    November 2013
    October 2013
    September 2013
    December 2011

    Categories

    All
    10k TPS
    2017
    2018
    2019
    2020
    2021
    2022
    2023
    2024
    2025
    4500 TPS
    AETFI
    AGILITY
    Apple Pay
    Article
    Artificial Intelligence
    ATM
    ATM Machines
    Atm Software
    BACK OFFICE
    Banking
    Bank Of America
    Base24
    BAYESIAN MODEL
    BENCHMARK
    Blockchain
    Blog
    CANADA
    Case Study
    Cash Recycling
    CIBC
    Cloud
    Cloud Strategy
    Credit Card
    Crypto
    Cyber Security
    DCC
    DEMPSTER-SHAFER MODEL
    Direct Service Access
    DYNAMIC CURRENCY CONVERSION
    EUROPE
    Financial Industry
    Fraud
    FRAUD DETECTION
    Fraud Prevention
    Global
    GREENLAKE
    Happy Holidays
    HP
    HPE
    HP NonStop
    INTERNATIONAL
    ISSUER
    LATIN AMERICA
    Legacy Replacement
    Lusis Payments
    Mastercard
    Mexico Office
    Microservices
    MIGRATION
    Mission Critical
    Mobile Payments
    NEWS RELEASE
    Nonstop
    North America
    Partnership
    Payments
    Payments Industry Partners
    Payments Infrastructure
    PCI
    Performance
    Philippe Preval
    Pivotal Payments
    POS
    PSD2
    Real Time Payments
    Retail
    Retail Payments
    SBS
    Security
    SOPRA BANKING
    Spanish
    SQL
    Tandem User Group
    TANGO
    TANGO Cloud
    Tango V7
    TANGO V8
    TEAM
    Technical Bootcamp
    The Connection
    Toronto
    Toronto Office
    User Profile
    Venmo
    Whitepaper
    Year End
    Zelle

    RSS Feed

lusis payments processing
LUSIS SOLUTIONS​ FOR
Payments Processing
Payments Hub/Switch
ATM Management
Legacy Payment Replacement
Card Management
Apple Pay
Dynamic Currency Conversion
Mobile Payments
Loyalty Card
Artificial Intelligence
​FRAUD


LUSIS LITERATURE

PRIVACY POLICY

​LUSIS EVENTS
LUSIS NEWS
-Reflecting on 2025: Growth, Innovation, and Global Success
-Mission Critical
​-Navigating the Future of Payments: How Lusis Payments Empowers Innovation in 2025
- Lusis Payments Welcomes Mark Schermann as Global Head of Sales
- Transforming the Payments Industry with Tango V8
-Lusis Payments' TANGO: Leading the Way into 2025
-Season's Greetings from Lusis Payments
-Revolutionizing Currency Conversion: Lusis Payments' Dynamic Currency Conversion (DCC) Solution
-Navigating the Future of Payments: 
Mastercard and Lusis Payments Forge a New Path

-Revolutionizing Banking Operations: The Unmatched Appeal of Lusis Payments' TANGO Platform
-Redefining ATM Management: Introducing Lusis Payments ATM Software Powered by TANGO
-Fraud Prevention Technology on the HPE NonStop Platform
-Celebrating Success and Wishing You a Merry Christmas and Prosperous New Year!
- Transforming Banking Landscapes: The Rise of White Label ATMs
-Using HPE NonStop SQL/MX in Modern Computing
- Sopra Banking Software and Lusis Payments Join Forces 
- Mastercard broadens availability of its services with Lusis Payments Partnership
- Creating Enhanced Payments Agility
- Happy New Year! 2022 Highlights
- Banking on the Cloud
- Enriching the Branch Experience
- NEW: TANGO V8.1 with Cloud-Native Support
- A Reflection on Payments Fraud - 2022 and Beyond
- Is a revolution in consumer-centric payments inevitable?
- Changing the Payment Card Monopoly: What Does it Take?
- Is Russian software trustworthy?
- A Lusis Payments Reflection on 2021 ​
- Payments Q & A with Dave Smith
- Can financial services institutions rise to the challenge of FinTech?
- Infrastructure Decision Making - Five Key Principles
​- Preparing Your Payments Infrastructure for the Next Decade: A Guide for Financial Services Institutions
- Play to Win with TANGO for Retail Payments
- TANGO: Fast-Track to Cloud Payments
- Next Generation ATM Services
- Leading ATM Processor Chooses TANGO
- A new TANGO Benchmark on NonStop
​- Why Companies are choosing TANGO to replace their Legacy Systems
​
- HPE GreenLake for Financial Payment Systems in Partnership with Lusis Payments​
- Leading Global Bank relies on TANGO for superior agility & impressive cost savings
​- Bayesian and Dempster-Shafer models for combining multiple sources of evidence in a fraud detection
- HPE NonStop for Lusis TANGO
- Cover story in "The Connection" magazine
   Tango V8 – An Implementation of Micro services 

- Fighting Fraud with the Latest Technologies TANGO AIF
- Lusis Payments Announces N American Support Center
- Research Chair: AI Applied to the Detection of Payment Fraud and Trading

- Lusis named Best Electronic Payment Systems
- Article:  A SME in the Big Leagues

​- ​TANGO 10K TPS in the Cloud
- Lusis Makes Strides to Revolutionize Payments Technology
- Lusis Leverages the Power of Artificial Intelligence
​- New Security Requirements for ATM and POS Introduced by PCI-PIN V3PIN V3: TR34 - TR31
​- TANGO - Stress Test on  HPE NonStop L-Series

- A Comparison of Machine Learning Techniques for Fraud Detection
HOME   |   TANGO   |   SOLUTIONS   |   BENCHMARKS   |   ABOUT   |   WEBCAST   |   NEWS  
© 2025 Copyright Lusis Payments  
Lusis Payments, Lusis,  and TANGO  are trademarks or registered trademarks of Lusis SA. Other parties’ trademarks referenced are the property of their respective owners.
  • Home
  • TANGO
  • AI FRAUD
  • SOLUTIONS
    • TANGO VIDEOS
    • LITERATURE
  • BENCHMARKS
    • USER PROFILES
  • ABOUT
    • PARTNERS >
      • HPE GreenLake
    • VIDEO
    • EVENTS
    • PRIVACY
  • WEBCAST
  • Contact
    • CAREERS >
      • JOBS-UK
      • JOBS-FRANCE
      • JOBS-NA
      • JOBS-LA
      • JOB APPLICATION
  • NEWS
    • Market Insights
Proudly powered by Weebly