Tech & Tools Radar 2022

Technologies & Tools (Programming Languages, Database Technology, Frameworks, Libraries… )

Légende Legende

Privacy Enhancing Technologies (PET) Technologies to maximize the usability and usefulness of data consumed by applications, software, and information systems and minimize the amount of personal data used in these applications. PETs strive to maximize data security. Examples are pseudonymization and differential privacy.
Event-Driven APIs Asynchronous Communication & EDA become ever more important; see also the reactive movement. Now standards and technologies are appearing to formalise this paradigm, such as AsyncAPI.
Virtual Assistants Reply automatically to questions or utterances, using a conversational interface as basic channel, that accepts chat or speech. Possible applications are: website guidance, helpdesk assistance, querying analytics systems (conversational analytics), or simplification of procedures.
Advanced Cryptography Advanced cryptography is cryptography that goes beyond the well known crypto work horses such as digital signatures. It allows to reconcile functional requirements with strong security and privacy requirements, which is would otherwise be impossible or at least very complex.
Container VM Containers are not perfectly isolated, virtual machines are too heavyweight. Container VM technology aims to bridge the gap by making very lightweight but well isolated vm’s, perfectly suited to run a container. Useful for multitenant Kubernetes and FPaaS platforms.
Hadoop Ecosystems Hadoop Ecosystems implement Big Data distributed storage (HDFS), access (Hive, Impala), distributed computing (MapReduce, Spark), transfer (Sqoop, Kafka, Flume), configuration, monitoring, and management modules, in one integrated environment consisting of several nodes.
Graph DB Databases based on and/or oriented towards graphs, with nodes (entities) connected through edges (relations). They are very useful in graph analytics, but could also serve in miscellaneous production systems.
Quantum Resistant Cryptography Cryptographic algorithms considered secure against an attack performed by a quantum computer. Most relevant are the NIST standardization procedure and lattice-based crypto
Deep Learning Important focus area of AI. Architectures such as Recurrent/Convolutional Neural Nets, GANs, etc. learn hierarchical representations of the data, corresponding to different levels of abstractions, largely from the raw data. Toolkits include TensorFlow, Caffe, Keras,…
Micro Frontends In analogy with microservices on the server side, micro front-ends allow the piecemeal development and deployment of an end-user application. The success of this technology will be determined by the quality of the frameworks/platforms combining these ‘pieces’.
GIS for Analytics Analytical software that integrates with GIS (Geographical Information Systems). Allows to represent the results of the analytical software geographically.
SOLID Solid lets people store their data securely in decentralized data stores called Pods. All data in a pod is accessible via the Solid Protocol. When data is stored in someone’s pod, they control who and what can access it.
Federated ML Methods to train ML models on distributed systems where also the training data is distributed, locally stored on separate nodes, and cannot be exchanged. Tech aspect of Edge AI.
Trusted Execution Environments A trusted execution environment (TEE) is an area on the main processor of a device that is separated from the system’s main operating system (OS). It ensures that data is stored, processed and protected in a secure environment.
Robotic Process Automation Robotic Process Automation is a process automation technology in which software robots can take over keyboard/mouse and other controls to simulate the work of human workers, enabling automation without altering existing systems.
Cloud Access Security Broker On-premises or cloud-based security policy enforcement point, placed between cloud service consumers and cloud service providers to combine and interject enterprise security policies as the cloud-based resources are accessed. This point could do encryption and/or pseudonymization.
Virtual/Augmented/Mixed Reality UI technologies offering an immersive experience, using altered or completely simulated environments in which the user senses and interacts with virtual entities. Potential uses in public sector could be (explorational) Analytics and field work (inspection).
NewSQL NewSQL Databases combine the scalability and performance of NOSQL DB’s with the ACID principles of RDBMS. Like the traditional DB’s, they support the relational model and SQL. This makes them more suited to replace these DB’s in older applications being re-engineered to increase resilience.
Blockchain & Smart Contracts Blockchain & smart contracts technology enable a reduction or even elimination of central or intermediary parties. Storage & computation are performed by multiple parties in a network. A verification mechanisms guarantees the correct application of the rules & tamper-proofness of the data.
Responsible AI AI systems do not always behave as expected and can be deleterious for people. Responsible AI consists in a set of tools and methodologies that allows to develop compliant, explainable, accountable and secure AI.
Graph-based machine learning Graphs are a powerful way of representing entities and their interactions, their representation power are combined with machine learning to make better predictions.
Quantum computing Quantum computing is based on quantum-mechanical phenomena. It might in the future allow more powerful simulations and analysis than today. Its fundamentals are strongle deviating from the ones in classical computers. This is reflected in new programming languages such as Q#.
Diagrams as Code Several interesting tools now exist to define your diagrams along with your code and then to generate them graphically, allowing the diagrams to be kept more consistent with the code, to be versioned, and to be managed more efficiently.
Quantum Cryptography Quantum cryptography is the science of exploiting quantum mechanical properties to perform cryptographic tasks. The best known example of quantum cryptography is quantum key distribution which offers an information-theoretically secure solution to the key exchange problem.
Developer portal Developer portals around a large software catalog standardizes tooling and deployment across projects, enabling developers to work cross-project easily, deal with inter-project dependencies, and reduce fragmentation. Ex:
Neuro-symbolic AI Deep learning algorithms are efficient at extracting complex features but provide no explanation for predictions and required a lot of data for training. Symbolic AI is based on handcrafted rules and requires few data. Neuro-symbolic AI aims at combining the strength of both approach.