Stateless computing can help ensure that events like WikiLeaks never reoccur. The key to securing information is to make it physically impossible for people to download it. Then, they cannot remove it from a secure location and share it with others who should not see it.
What makes stateless computing unique is that all data and applications remain on the server. Nothing is downloaded or saved to the desktop, not even IP addresses.
So, if the network used by the army private who gave information to WikiLeaks had been stateless, he never would have been able to burn information onto the CDs he used to sneak material out of the office.
"Stateless Computing" refers to computing devices that do not store any unique software configuration or state within them. Any configuration necessary comes from outside the device - the device being used solely for its computational resources.
To put it simply, devices that save state need to be maintained - stateless devices do not. Devices that save state can introduce security holes in your network - stateless devices may not.
IT professionals will welcome the reduced downtime, ease of maintenance, and network security that come with stateless devices. Money managers will embrace the vastly reduced total cost of ownership of the network at large and the dramatic impact of money spent on the performance of the network as a whole.
See below for more reasons why we say:
Keep it Simple. Keep it Stateless. Keep it Symbio.