|Blockchain & Smart Contracts
|Blockchain & smart contracts offer autonomous (shared) storage and autonomous computation in a network. Hence, no one can change the data or influence the computation. This offers new possibilities for distributed trust and to simplify existing applications & architectures.
|Hadoop Ecosystems implement Big Data distributed storage (HDFS), access (Hive, Impala), distributed computing (MapReduce, Spark), transfer (Sqoop, Kafka, Flume), configuration, monitoring, and management modules, in one integrated environment consisting of several nodes.
|Oauth / OpenID Connect
|Standards for authentication / authorization relevant in the domains of mobile applications and REST architectures.
|Cloud Access Security Broker
|On-premises or cloud-based security policy enforcement point, placed between cloud service consumers and cloud service providers to combine and interject enterprise security policies as the cloud-based resources are accessed.
|Methods for continuous verification whether the same specific person who logged into a device is still using it.
|Digital Mail Room
|A service in which all arriving (postal) mail and digital mail is analyzed, categorized, and sent to the appropriate division or person.
|Databases based on and/or oriented towards graphs, with nodes (entities) connected through edges (relations). They are very useful in graph analytics, but could also serve in miscellaneous production systems.
|Cryptography is a powerful toolbox but awareness of its potential is yet small. Examples are elliptic curve cryptography (as an alternative to RSA), format preserving encryption, authentic encryption and ring signatures.
|Post Quantum Cryptography
|Cryptographic algorithms thought to be secure against an attack performed by a quantum computer.
|Virtual assistants are computer programs that automatically reply to questions or utterances. The basic channel of communication is a conversational interface, that accepts chat or speech. Possible applications are: website guidance, helpdesk assistance, or simplification of procedure.
|Generic service encompassing batch signing, workflow, long term validity, mobile signing, client-side versus server-side signing, etc.
|GIS for Analytics
|Analytical software that integrates with GIS. Allows to represent the results of the analytical software geographically.
|Privacy Measurement Tools
|Such tools would allow citizens to be informed about the state of their privacy by a simple number or a set of numbers. A related challenge is assessing the impact of a certain query on the citizen’s privacy. This problem is hard and research is mainly at the academic level.
|Runtime Application Self Protection
|Runtime Application Self Protection is a security technology that is built or linked into an application or application runtime environment, and is capable of controlling application execution and detecting and preventing real-time attacks.
|The automatic processing and analysis of data from internal and external social media to extract useful information. Most of Big Data Analytics solutions have connectors to exploit these kinds of resources.
|Augmented & Virtual Reality
|UI technologies offering an immersive experience, using altered or completely simulated environments in which the users senses virtual entities. Hyped in 2016, yet deployment options in the public sector are not readily apparent. Potential uses in (explorational) Analytics.
|Enterprise Mobile Platforms
|These environments offer facilities to build and manage mobile applications. They offer support for integration, security (e.g. using MDM), mobile middleware, etc.
|In analogy with microservices on the server side, micro front-ends allow the piecemeal development and deployment of an end-user application. The success of this technology will be determined by the quality of the frameworks/platforms combining these ‘pieces’.