Trends Identified
Data and analytics
Analysis of data to create real-time change
2016
Disruptive technologies barometer
KPMG
Data and AI
Data and AI, which include both advanced analytics and artificial intelligence
2019
Tech for good
McKinsey
Data analysis systems for low- and high-molecular marker molecules
Systems to analyse data on low- and high-molecular marker molecules are hardware and soft ware systems offering highperformance analysis of proteins, nucleic acids and lowmolecular metabolites using miniaturised mass spectrometers. The unique feature of these systems lies in their ability to quickly identify the structure of molecules, which makes these technological solu tions highly in demand in biochemical diagnostics.
2016
Russia 2030: science and technology foresight
Russia, Ministry of Education and Science of the Russian Federation
Data + decisions = differentiation
Insightful analytics can help organizations discover patterns, detect anomalies, improve data quality and ultimately take effective action. But as analytics tools have been incorporated into standard offerings from software vendors, it is becoming clear that the real advantage in analytics is gained before the analysis begins—in data collection; and after it ends—in decision making. Analytical maturity varies widely across companies and across industries: some organizations are already integrating analytical decision making into their business processes, while others are still working at basic measurement and collection. In the next phase, what may truly differentiate an organization is whether turning information into action becomes part of its DNA.“Everything elastic” is proving to be a durable concept, whose influence is spreading thanks to the technological developments sketched above. Business executives—and CIOs in particular—should consider reshaping their thinking in line with this concept. The idea of elasticity—scalable, infinitely flexible, adaptive—may be integrated into the very fabric of the business. Only then will high performance be achievable in this new market place.
2010
Accenture technology vision
Accenture
DARQ Power
Understanding the DNA of DARQ.New technologies are catalysts for change, offering businesses extraordinary new capabilities. Distributed ledger technology, artificial intelligence, extended reality, and quantum computing will be the next set of new technologies to spark a step change, letting businesses reimagine entire industries.
2019
Accenture Technology Vision 2019- The Post-Digital Era is Upon Us ARE YOU READY FOR WHAT’S NEXT?
Accenture
Dark analytics - Illuminating opportunities hidden within unstructured data
Across enterprises, ever-expanding stores of data remain unstructured and unanalyzed. Few organizations have been able to explore nontraditional data sources such as image, audio, and video files; the torrent of machine and sensor information generated by the Internet of Things; and the enormous troves of raw data found in the unexplored recesses of the “deep web.” However, recent advances in computer vision, pattern recognition, and cognitive analytics are making it possible for companies to shine a light on these untapped sources and derive insights that lead to better experiences and decision making across the business.
2017
Tech trends 2017 - the kinetic enterprise
Deloitte
Cyberspace
From a national defence perspective, a number of underlying themes emerge. Offensive cyberspace capabilities will be used to penetrate and attack electronic-rich systems, networks and infrastructure. Recognition of malign intent and attribution will often be difficult. As civilian and military environments become increasingly dependent on integrated networks, and with space-based assets exclusively relying on the electromagnetic spectrum to receive or transmit data, the impact of cyber-attacks is likely to range from incremental to catastrophic.
2010
Global strategic trends - out to 2040
UK, Ministry of Defence
Cybersecurity technologies and processes are helping to combat unabated threats
Advances in technology reduce the risk of a bad actor penetrating systems, but the threat is still there, and is not going away. To this end, cybersecurity remains in the limelight, and with newer regulatory disclosure requirements, 2019 could be a tumultuous year. Over the past few years, several high-profile events caused by cyberattacks and geopolitical tensions have elevated the threat of cyber warfare. Significantly, public perspective has shifted from identity theft to general privacy and the misuse of personal information obtainable on social media. With increased public awareness, there is also concern about breach fatigue: people could become so accustomed to cybersecurity events that they lower their defense against them. Training, engaging and testing employees is the cornerstone of any cybersecurity strategy. This helps to breed a culture of security so people do not fall victim to phishing or violate policies by clicking on links embedded by hackers. From a technology perspective, employees are being empowered to operate securely without impacting their productivity. Newer authentication technologies such as YubiKey, one-touch single sign on and one-touch multifactor authentication are driving down the poor user experience associated with legacy security products. With YubiKey, the user inserts a USB device into a port and presses a button to send a code to the service that the user is authenticating. Some apps on iOS and Android offer a similar experience where the user receives prompts during the authentication process. The user clicks allow, and if that device is trusted, the authentication succeeds. Another notable trend is security feature development being moved toward the beginning of the development lifecycle instead of tacking it on at the end, known as “shift left”. This is being driven partially by the adoption of the development and operations (DevOps) model, in which there is an agile relationship between product development and IT operations. Another driver is the use of application containers and container automation, which provides isolated environments for running software services and the means to maintain security governance with fewer costly and time consuming manual reviews. Ultimately, the time to remediation for vulnerabilities is being reduced dramatically, making it easier for organizations to maintain a secure posture on their network perimeter.
2019
NASDAQ DECODES: TECH TRENDS 2019 -The technology trends that are driving the world of markets forward
Nasdaq
Cybersecurity
With the increased connectivity and use of standard communications protocols that come with Industry 4.0, the need to protect critical industrial systems and manufacturing lines from cybersecurity threats increases dramatically. As a result, secure, reliable communications as well as sophisticated identity and access management of machines and users are essential.
2015
Nine Technologies Transforming Industrial Production
Boston Consulting Group (BCG)
Cybersecurity
The increase in connectivity between companies and consumers as well as within organizations, production facilities, transportation systems, defense systems, etc. means that cybersecurity is critically important. Once closed systems are now open, increasing vulnerability and placing ever higher-value assets and processes at risk, leading to an annual growth in the market for cybersecurity of 5 to 10 percent until 2025 (see Exhibit 4). Our survey revealed widespread and growing concern on this topic, and many companies are starting to bring in the skills they need for tackling cybersecurity concerns. Some even see cybersecurity as a battleground for competitive advantage and differentiation.
2018
Disruptive forces in the industrial sectors - Global executive survey
McKinsey