Trends Identified
Crypto Currencies
Example of Organizationsactive in the area:Example of Organizationsactive in the area: Bitcoin (Japan), Ripple (US), Litecoin (US).
2018
Table of disruptive technologies
Imperial College London
Cryptocurrencies and blockchain technology
In 2009, a person or persons going by the name of Satoshi Nakamoto proposed a public distributed ledger system which would rely on cryptography and self-interest to enable electronic transactions. This notable innovation, in the form of a system underpinned by incentives and mathematical proofs, would obviate the need for trust in any one actor or central institution as the basis for preventing fraud and ensuring that the ledgers were kept up to date. Within such a system, every participant therefore works to build a single public ledger of transactions and constantly verifies its validity. That ledger is known as the blockchain. The blockchain works through a competitive process whereby the first to successfully validate a block of transactions and broadcast the solution to the network wins a monetary reward. The proposed block is quickly and independently verified by every participant. If a majority of the network agrees that the block is valid, the block and the transactions it contains become part of the consensus blockchain (see figure A.2). The innovativeness of this system lies in the way in which the various parts combine to create the trust and guarantees that the traditional financial system derives from institutions and regulation. The incentives align the interest of participants towards contributing to the system’s security. In contrast, the traditional system relies on a complex armature of reporting, oversight and implicit or explicit guarantees, ultimately backed by the reputation of the central authority. As such, the blockchain technology presents the possibilit y— a first in the field of finance !— that trust in institutions backed by government can be replaced by trust in computer code.
2018
World Economic And Social Survey 2018: Frontier Technologies For Sustainable Development
United Nations
Cryptocurrency
Bitcoin may get all the ink, but there are plenty of other cryptocurrencies, and more to come. Evans says that the way they enable distributed value storage without needing central authority is valuable at a time when people have lost faith in institutions and seek more control over money without governmental intrusion.
2018
The Most Important Tech Trends Of 2018, According To Top VCs
Fast Company
Cryptographic technologies are ensuring data integrity
Regulations such as GDPR in Europe and the misuse of personal information on social media highlight the importance of trust in a system where data is shared between different parties. Yet data needs to be protected in a way that adds value to the end user. Financial firms’ data is often shared internally and externally. Many workflows are regulated, and firms must follow a proof of process when it comes to the custody and provenance of data. They must demonstrate to auditors, regulators and customers that systems are functioning as prescribed, workflows are completely auditable, repeatable and immutable, and measures are established to prevent security breaches. Data lineage, a data lifecycle that includes the data’s origins and where it moves over time, is becoming more critical and can become a competitive advantage. A recent trend is to leverage cryptographic libraries, public key infrastructure, blockchain and zero knowledge proofs to record who did what, when and where in workflows in an immutable, persistent, auditable and impermeable fashion. These technologies ensure integrity starting with the first person who enters data through all its transfers and transformations. Potential applications include managing the publication of earnings reports, anti-money-laundering and know-yourcustomer compliance, risk and surveillance. The technologies could also help to improve customer service. For example, money that is held captive on margin could be freed up by allowing a prime broker and executing broker to contribute data to a secure multiparty compute service that calculates a credit score. That could help to reduce the margin requirement. The technologies could be used to create a certificate authority in the cloud, so users could verify that the service that they are about to run came from the correct source and was unmodified in transit. Together, they could also be used as a formative technology to create a data marketplace where the fidelity, integrity and lineage is guaranteed. A zero knowledge proof is a severable technology, allowing for secure multiparty computation to occur. Let’s say two people each have a dataset that neither wants to share. But they would like a mechanism so they can contribute those datasets into a piece of compute that would transform it privately into a result that both people would find mutually beneficial. This technology would prevent data sharing, and the result would redact all information that would prescribe the origin, who owned it, or any details of it. One can imagine valuable use cases in research and development work across many industries and functions including healthcare clinical trials and supply chain management.
2019
NASDAQ DECODES: TECH TRENDS 2019 -The technology trends that are driving the world of markets forward
Nasdaq
Culture Remains a Hurdle
Bad news: If your company is battling culture issues in digital transformation, they will struggle even harder in 2018. As the pace of change continues to increase — and the number of new technologies continue to grow — it will become even more imperative that companies move fast while moving forward toward growth. Companies that don’t embrace agility, or fail to knock down silos, will have an even more difficult time next year. You often hear that a leopard can’t change its spots, well culture isn’t that permanent and successful transformation are nearly impossible in a resistant culture.
2016
Top 10 trends for digital transformation in 2018
Forbes
Cultured meat
Example of Organizationsactive in the area: Impossible Foods (US), Memphis Meats (US), Super Meat (Israel), Finless Foods (US), New Harvest (US).
2018
Table of disruptive technologies
Imperial College London
Cure for Ageing.
The development of a treatment that could prevent or cure the effects of ageing would have a significant impact on global society. Initial access to such an advance could be highly unequal and only be available to wealthier members of society, mostly in the developed world. The whole fabric of society would be challenged and new norms and expectations would rapidly develop in response to the change.
2010
Global strategic trends - out to 2040
UK, Ministry of Defence
Custom at all Costs - Playing new games with price
Price sensitivity remains a key and determining feature of the consumer landscape, and recent years have seen much price elasticity innovation to appeal to consumers (even the relatively well- off) engaged in a daily battle against unnecessary largesse in the aisles. In 2018 and beyond, anticipate further dismantling of RRP and a growing tendency to permit flexible, time-sensitive, lifestyle- and lifestage- personalised, progressive pricing models to differentiate and entice.
2018
Trending 2018
Foresight Factory
Custom cancer vaccines
The treatment incites the body’s natural defenses to destroy only cancer cells by identifying mutations unique to each tumor. Scientists are on the cusp of commercializing the first personalized cancer vaccine. If it works as hoped, the vaccine, which triggers a person’s immune system to identify a tumor by its unique mutations, could effectively shut down many types of cancers. By using the body’s natural defenses to selectively destroy only tumor cells, the vaccine, unlike conventional chemotherapies, limits damage to healthy cells. The attacking immune cells could also be vigilant in spotting any stray cancer cells after the initial treatment. The possibility of such vaccines began to take shape in 2008, five years after the Human Genome Project was completed, when geneticists published the first sequence of a cancerous tumor cell. Soon after, investigators began to compare the DNA of tumor cells with that of healthy cells—and other tumor cells. These studies confirmed that all cancer cells contain hundreds if not thousands of specific mutations, most of which are unique to each tumor. A few years later, a German startup called BioNTech provided compelling evidence that a vaccine containing copies of these mutations could catalyze the body’s immune system to produce T cells primed to seek out, attack, and destroy all cancer cells harboring them. In December 2017, BioNTech began a large test of the vaccine in cancer patients, in collaboration with the biotech giant Genentech. The ongoing trial is targeting at least 10 solid cancers and aims to enroll upwards of 560 patients at sites around the globe. The two companies are designing new manufacturing techniques to produce thousands of personally customized vaccines cheaply and quickly. That will be tricky because creating the vaccine involves performing a biopsy on the patient’s tumor, sequencing and analyzing its DNA, and rushing that information to the production site. Once produced, the vaccine needs to be promptly delivered to the hospital; delays could be deadly. —Adam Piore
2019
10 Breakthrough Technologies 2019 - How we’ll invent the future, by Bill Gates
MIT Technology Review
Cyber Intelligence
Protecting vital information assets demands a full-spectrum cyber approach In 2010, security and privacy graduated from IT department concerns. C-suites and boardrooms took notice of highly visible incidents, ranging from malwareinfected motherboards from top-tier PC manufacturers1 , to information theft from a leading cloud provider2 , to the manipulation of the underlying routing tables of the internet, redirecting traffic to Chinese networks3 . At the same time, the regulatory environment around sensitive data protection has become more rigorous, diverse and complex. Organizations are aware of the shifting threat profile and are working to deal with technical barriers as well as sophisticated criminal elements. Incidents are increasingly originating in the trust vector – due to inadvertent employee behavior via the sites they visit, the posts they access on social media sites or even the devices they bring with them to the workplace. A “protect-the-perimeter and respondwhen-attacked” mentality is no longer sufficient.
2011
Tech Trends 2011 The natural convergence of business and IT
Deloitte