This is an interesting thread on Inrupt’s Backend-for-Frontend (BFF) blog posting and I’ve learned a bit from the dialog (and I’m still digesting some of the finer points).
In reading the BFF blog I find is useful to consider the source: a company providing enterprise-grade software tools. I believe the intended audience is corporate technology and purchasing decision makers. The article’s bullet points appear to be targeted toward enterprise integration pain-points.
“…see the need for this pattern in large enterprises, especially those with existing infrastructure that are creating a managed ecosystem of applications and Pods. This pattern helps these organizations deploy Solid in a way that better fits their existing technology governance and security policies, and it allows for simpler integrations.”
Please also consider, for most enterprises, end-users don’t own the data. The enterprise owns the data and more specifically, the data is dispersed in line-of-business applications that are controlled and managed by the different business groups in the organization.
In the Inrupt BFF scheme, I see Solid client apps and Pods playing a vital role in facilitating systems integration with a uniform approach to data integrity, data security, and control of data flow built using technology based on a standard protocol. That’s a pretty big deal!
“…We also see the need more generally for server-side agents to have access to Pods to perform calculations on the users behalf, including in the emerging realm of machine learning for personal AI assistants. It is not expected (nor most times even feasible) to execute massive computations in resource-constrained environments like a web browser. In such cases, processes that run algorithms on data from Pods, potentially many Pods, are better done in the backend, reserving the frontend for data visualization and decision making.”
In the enterprise, the trend I have observed is to eliminate storage of business data on end-user devices (i.e., minimize threat exposure and loss of intellectual property by reducing the attack surface). Line-of-business app computing may still be done on end-user devices, but these tend to be hold-over users or in organizations that have considerable lag in upgrading computing infrastructure.
In the United States, the article is on-point that government institutions:
“…need to cater for an extremely wide array of devices, both new and very old, to ensure they meet their commitment to provide services to all citizens”
Indeed, government internal infrastructure may also be quite old.
Years ago, I participated in a group that was developing a tool for submitting data to a regulatory agency using XML. When the tool was presented to the business stakeholders it was rejected due to the complexity and the cost of adaptation. When I first started attending the CG meetings I wondered if Solid would have the same fate.
Inrupt’s positioning of its’ tech to enterprises looks like a smart business strategy and, if successful, should be good for Solid and the community since increased adaptation will set Solids’ place in the web and create more opportunities for those with skills in Solid.