Trends Identified
IT unbounded - The business potential of IT transformation
As organizations modernize their IT operating and delivery models, some are creating multifunctional teams and breaking down silos across IT. They are also looking beyond organizational boundaries to explore the open talent market and to form new types of relationships with vendors, incubators, and academics. Finally, with technology dominating strategic business priorities, some companies are educating executives and staff to increase awareness and understanding of both core and emerging technologies. For many, embracing this multifaceted approach may require adjustments to org models, IT processes, and supporting systems. The good news is that irrespective of an organization’s legacy footprint, there are systematic approaches that can make the task more manageable. And the outcome may justify the effort: Services become “unbounded” and more efficient, transforming the IT organization.
2017
Tech trends 2017 - the kinetic enterprise
Deloitte
IT Security Will Respond Rapidly, Progressively—and in Proportion
There is no such thing as watertight IT security. Yet for years, business and technology leaders have acted as if the only alternative to a “fully secure” state is an unacceptable “fully breached” state. This “fortress mentality” is outdated— and no longer realistic or practical. Leading security specialists are devising reflex-like systems whose responses step up with the severity of the breach. In extreme cases, counterattacks may even become part of an organization’s repertoire of responses. We believe that new security solutions and architectures will, like human reflexes, respond instinctively to the growing speed, scale, and variety of attacks. This implies that for the first line of defense, people will not be part of the decision loops; the speed and frequency of attacks dictate that human responses must make way for automated capabilities that detect, assess, and respond immediately. And the increasing “attack surface” – across more devices, more systems, more people, more business partners, and broader physical infrastructure— supports the case for automated capabilities that detect, assess, and respond to external threats immediately.
2011
Accenture Technology Vision 2011
Accenture
Is the influencers marketing boom sustainable?
Influencer marketing has become the industry’s hot go-to strategy – just take a look at the host of celebrities on your social media feeds encouraging you to visit this hotel and try that beauty product. Many brands have invested heavily, attracted by the opportunity to amplify their content and organically build new relationships. But is this buzzworthy trend all that it’s cracked up to be and, importantly, is it set to be a sustainable strategy for brands?
2018
Trends 18
GlobalWebIndex
IPv6 (and this time we mean it)
The backbone of the Internet is straining. And we’re running out of time. Internet Protocol (IP) is how we connect to anyone and anything on the Internet. Every participating device, application, or service has a distinct address – a way to identify itself and communicate with other devices, applications, and services. Today’s IP standard, IPv4, dates back to the 1970s. It allowed for 4.3 billion unique IP addresses, which was more than sufficient to meet the computing demands of the time. Fast forward to 2013, with more than a billion personal computers in use1, a billion smartphones2, many times as many corporate desktops, laptops, network equipment, and servers, and a growing number of non-traditional sensor and actuator devices, including cars, thermostats, aircraft engines, elevators, and vending machines. IP addresses have become a scarce resource, already exhausted in some regions: Asia Pacific (APNIC) ran out in April 2011; Europe (RIPE) in September 2012; and IPv4 in North America (ARIN) will likely be fully assigned by spring 20145.
2013
Tech Trends 2013 Elements of postdigital
Deloitte
IoT-based Context-aware Dimming Technology
Dimming technology that enhances utilization and energy efficiency, mimics sunlight, and assists in customized health care, through automatic control of the direction and brightness of lighting by sensing outdoor conditions
2017
10 emerging technologies in 2017
South Korea, Korea Institute of S&T Evaluation and Planning (KISTEP)
IoT software
Emerging platforms, standards & analytics
2018
Corum Top Ten Disruptive Technology Trends 2018
Corum
IoT Security (IoT: Internet of Things)
(Definition) Technology that fosters a safe IoT environment by preventing and managing diverse types of infringement and security threats to IoT devices, networks, and the service platform of IoT(Application) Management of malware and hacking of IoT devices; safe data communication between IoT devices and anomaly detection; authentication/privacy protection and security solutions suitable for IoT service environments
2016
KISTEP 10 Emerging Technologies 2016
South Korea, Korea Institute of S&T Evaluation and Planning (KISTEP)
IoT becomes BIoT
Combining IoT with blockchain —or BIoT—ushers in a whole host of new services and businesses. For example, BIoT can be used to track shipments of pharmaceuticals and to create smart cities in which connected heating systems better controls energy use and connected traffic lights better manage rush hour.
2017
4 Technology Trends That Will Transform Our World in 2018
Fortune
IoT
The Internet of Things (IoT) promises a hyper-connected, digitally responsive society that will have a profound impact on all sectors of the economy and society. While it has great potential to support human, societal and environmental development, several safeguards need to be put in place to ensure data protection and security.
2016
OECD Science, Technology and Innovation Outlook 2016
OECD
IoT
Network of objects — devices, vehicles, etc. — embedded with sensors, software, network connectivity, and compute capability, that can collect and exchange data over the Internet. IoT enables devices to be connected and remotely monitored or controlled. The term IoT has come to represent any device that is now “connected” and accessible via a network connection.
2016
Tech breaktroughs megatrend
PWC