Infrastructures Radar 2021

Infrastructure, Platforms, Servers, Networking, Datacenter, Appliances, …

Légende Legende

Conversational Platforms Conversational platforms support the development of conversational interfaces based on intent and entity recognition, context handling, exception handling, messaging platform connectors and monitoring/analytics.
Serverless Platforms This architecture allows to simply send code, based on handler templates, to a ‘Function Platform as a Service’ (FPaaS). It can then immediately be run without any server or middleware setup. Scalability, robustness, and many other non-fuctional requirements are handled by the platform.
Passwordless authentication ​Passwordless authentication refers to authentication methods in which a user logs in to a computer or application without entering (and remembering) a password or any other knowledge-based secret. The goal is to provide a higher level of security and convenience.
Blockchain Architecture & Infrastructure Architectural and infrastructural aspects need to be considered if a blockchain network is set up or when a blockchain-based application is launched. Of particular interest is EBSI, the European Blockchain Services Infrastructure.
Multiexperience Development Platforms Tooling set for developers (also ‘citizen developers’) with an integrated set of front-end development tools and back-end services to support mobile, modern web, wearable, conversational and augmented reality development, ensuring a consistent user experience across all those channels.
AI Paas AI Platform as a Service (PaaS) provides AI model building tools, APIs and associated middleware that enable the building/training, deployment and consumption of machine learning models running on prebuilt infrastructure as cloud services.
Distributed Cloud Implementation of public cloud services in the datacenter of an organization (or another physical location). As such, latency will be better (at the edge) and data remains on site. Operation, governance, updates and evolution of the services are the responsibility of the public cloud provider.
Container Orchestration Platform Containers have become the dominant means of deploying applications on Cloud infrastructure. As such, orchestration and management of containers has become crucial for maintainability and control, allowing an organization to effectively employ thousands of containers in production.
Containers Containers are the new Cloud: They are lightweight virtualizations, using far less resources than typical virtual machines for nearly the same level of isolation. They’re also more ‘single-purpose’ and ‘throw-away’. They are used extensively to support applications on Cloud Platforms.
API Gateways A platform to manage an organization’s APIs. They act as gatekeepers, controlling (and metering, billing) access and making centralized security policy encforcement possible, but also providing documentation and helping developers use the APIs
Low-code Platforms Platforms or frameworks on which developers, and sometimes also business stakeholders, can more rapidly build applications. Delivered through PaaS or as libraries, they are often characterized by the use of graphical programming methods, for GUI but also for the logic.
Biometrics Biometrics are metrics related to human characteristics (e.g. fingerprint, DNA, facial recognition). Biometrics authentication can be used as access control and finally finds acceptance as a strong authentication on mobile devices.
Distroless Container Images Minimal kernel and functionality needed to make a container work for the application it is supposed to support. Decreases weight and increases security.
PAM Privileged Access Management (PAM) refers to a class of solutions that help secure, control, manage and monitor privileged access to critical assets.
Desktop as a Service A service offering that deploys a virtualized desktop experience, delivered to a customer on demand from a remotely hosted location.
New Languages Some new upcoming programming languages have interesting properties regarding efficiency/security/robustness/scalability (Rust, Kotlin, WebAssembly, …) that might be useful in particular usecases.
Hardware Acceleration Use of specialized hardware to perform time-critical or high-throughput computations (e.g. GPGPU). Useful for big data analytics or highly parallellizable tasks, e.g. in context of machine learning / AI
SIEM In the field of computer security, security information and event management software products and services combine security information management and security event management. They provide real-time analysis of security alerts generated by applications and network hardware.
Network Digital Twin A digital copy of the company network, for monitoring, analysing the consequences of problematic alterations of the physical network, with roll-back mechanisms. As all (virtual) devices are stored in a database, lookup is very fast and efficient. For critical networks.