Resilient computing systems can withstand powerful threats and recover from attacks quickly. The question that many are asking themselves today is how to apply this level of resilience to real-time computing scenarios, or other equally extreme use cases.