Approaches Radar 2017

 Methodology, Approaches & Architectural Styles

Légende Legende

Machine Learning Advanced machine learning can be used to automatically learn patterns from data and to use those patterns in behavior. Some techniques are: deep learning (neural networks), reinforcement learning, and natural language processing. A possible application is fraud detection.
API Economy API’s, to connect services within an application, across multiple systems, or even to 3rd parties, are becoming prevalent and push a new business model, centered around the integration of readily available data and services. They also help with loose coupling between components.
Bring Compute to Data New paradigm, implemented by (Big Data) analytics solutions: offloading front-end analytics or data integration tools in favor of having the calculations executed, as much as possible, by the (database) management systems in control of the data.
Data Tracking Anomalies Method to detect the causes of data quality problems in data flow between information systems and to improve them structurally. It has an important ROI and facilitates a “win win” approach between institutions.
Data-Centric Security Approach to protect sensitive data uniquely and centrally, regardless of format or location (using e.g.  data anonymization or tokenization technologies in conjunction with centralized policies and governance).
EDA An Event Driven Architecture can offer many advantages over more traditional approaches. Events and Asynchronous communication can make a system much more responsive and efficient. Moreover, the event model often better resembles the actual business data coming in.
Logical Data warehouse A data warehouse architecture that makes all types of data available for analytical tools in a transparent way. It hides, manages, and encapsulates the complexity and particularities of the underlying data source management systems, while Bringing Compute to the Data.
Microservices Independently maintainable and deployable services, which are kept very small (hence, ‘micro-‘), make an application, or even large groups of related systems, much more flexibly scalable, and provide functional agility, which allows a system to rapidly support new business opportunities.
SNA Social network analytics (SNA) is the process of investigating social structures (i.e., relations between people and other entities such as companies, addresses, …) by the use of network and graph theory, as well as concepts from sociology.
Visual Analytics Methodology and enabling tools allowing to combine data visualization and analytics. Allows rapidly exploring, analyzing, and forecasting data. This helps modeling in advanced analytics, and to make modern, interactive, self-service BI applications.
Advanced Persistent Threats New type of threats used to perpetrate a long-term computer attack on a well-defined target. Closely resembles industrial espionage techniques.
Analytics for Security Non-traditional methods improving analysis methods in the security technology of systems and applications (e.g. user behaviour analytics).
Collaborative MDM Collaborative and organized management of anomalies stemming from authentic sources, by their official users.
Complex-Event Processing A combination of Event Driven Architecture and Analytics solutions that allows for real-time responses to certain patterns of events coming into the system. Typically, CEP will use a stream of low-level events to generate some higher-level, more interesting events.
DevOps Cooperation between development and operations, and sometimes even integration of these teams (as opposed to the ‘over the wall’ approach), permitting faster delivery of higher quality software.
Differential privacy Differential privacy aims to provide means to maximize the accuracy of statistical database queries while minimizing the chances of identifying its records.
Digital Rights Management Technical measures allowing the digital management of document access rights and their protection (e.g. via access control or encryption).
Distributed Processing Spreading data and calculations over the available memory and computing power of several machines (nodes), such that queries, calculations, tranformations, etc. are delivered faster. Hadoop Ecosystems and MPP (Massively Parallel Processing) databases implement this.
Lean Process Management Lean management is a process optimization methodology that can be used to reduce ‘waste’ in administrative processes.
Mobile Development Set of techniques, tools and platforms to develop web based and platform-specific mobile applications.
Serverless Architecture This architecture allows to simply send code, based on handler templates, to a ‘Function Platform as a Service’ (FPaaS). It can then immediately be run without any server or middleware setup. Scalability, robustness, and many other non-fuctional requirements are handled by the platform.
NLP A technique to distill information from unstructured textual data, with the aim of using that information inside analytics algorithms. Used for text mining and sentiment analysis.
Data Virtualisation Methods and tools to access databases with heterogeneous models and to facilitate access for users using a virtual logical view.
Database Migration Databases migration and reengineering of legacy applications: concepts, best practices, methods and tools.
DQ for unstructured data Tools and management strategies that allow for sharing increasingly large unstructured data. Those tools use Text Mining, NLP, social data, …
E-mail Address Reliability Email address reliability in databases : concepts, tools and methods (including the use of Data Quality Tools) to improve and maintain email address quality.
Side Channel Attacks Type of attacks exploiting the physical weaknesses in the implementation of a system (e.g. power consumption, timing, hardware faults, EM waves, etc. ).
Novel Software Architectures Big Data, Cloud, Mobile, and the ever increasing need to integrate systems and handle more complexity, force us to look for new and better ways to build software.