Infrastructures Radar 2018

Infrastructure, Servers, Networking, Datacenter, Appliances, …

Légende Legende

Blockchain Architecture & Infrastructures To bring a blockchain application live, we also need to consider architectural and infrastructural aspects
Analytical DBMS DBMS optimized for the execution of analytical queries (rather than transactions). The type may be Relational or NoSQL (Column-store, Key-Value, Document, Graph, …). Many are able to execute advanced analytics algorithms in-database (cf. ‘Bring Compute to the Data’).
Containers Containers are the new Cloud: They are lightweight virtualizations, using far less resources than typical virtual machines for nearly the same level of isolation. They’re also more ‘single-purpose’ and ‘throw-away’. They are used extensively to support applications on Cloud Platforms.
Mobile Strong Authentication As the eID is only partially compatible with smartphones and tablets, a different strong authentication mechanism is needed. Additionally, this alternative solution should be very user-friendly in a mobile context.
MPP databases Massively Parallel Processing databases. An MPP database is a database that is optimized to be processed in parallel for many operations to be performed by many processing units at a time.
Software defined anything (SDx) Instead of physical hard-wiring of system components, all infrastructure and platforms become virtualized, and configurable via software, enabling enormous flexibility in the datacenter.
Biometrics Biometrics are metrics related to human characteristics (e.g. fingerprint, DNA, facial recognition). Biometrics authentication can be used as access control and finally finds acceptance as a strong authentication on mobile devices.
Contactless technologies Transmission technologies not requiring physical contact between transceivers, such as, NFC, RFID, Bluetooth Low Energy, and most techniques used in IoT devices.
IoT architecture & platforms These systems allow user-friendly management of IoT endpoints, and include dataflow control and security.
DataFlow Architecture The flow of (incoming) data, and not an application’s or cpu’s regular control flow, govern the architecture and runtime of a system. This an entirely new paradigm, even driven by new hardware, as opposed to the traditional way of working with fluxes.