Document includes analysis of technologies with consideration of the following:
- Data access patterns
- Download files
- Small data through API
- SQL like queries
- Security model concerns (via infrastructure or software)
- What already exists
- What is the complexity of adding new technologies to serve what we don't already (for example: taking on more technologies as a team)