Anda di halaman 1dari 28

Tech trends

Technologies that will Impact your


Business

Smart Machines

Advanced Robotics
Quantum
Computing
Maturity
Brain-Computer Interface
Mainstream
Autonomous Memristors 5G Early adoption
Vehicles
Cognitive Computing Biocomputer Adolescent
Swarm Computing Emerging

Internet of Everything

Self-Adaptive Security
3D Printing Exascale
Privacy-Enhancing
Technologies
Ubiquitous PIM

SDx
Blockchain
Insight Immersive Fabric-Based Computing
Platforms Experience
Wearable Computing Virtual Assistants
Deep Natural User
Interfaces Context Broker
Learning Semantic
Technologies
Digital Workplace
Edge Computing Distributed
Web-scale Trusted Devices Social Networks
Computing
Wireless Power
LPWAN
WebRTC
In-Memory Computing Location-Based Plastic Transistors
Cloud Service Services NG
Containers
Integration
Advanced Data Visualization IPv6
Biometrics Digital Signage
NFC Open Source Hardware

2016 2017 2018 2019+


Atos 2016. All rights reserved.

Time of impact Business Impact Maturity


2016 Look today at how solutions could Transformational Likely to require Emerging Mainly seen in academia and a
address these needs. transformational changes within small number of specialized markets.
2017 Consider potential solutions by organizations. Adolescent Discussed more widely by
running pilots, for example. High Will have a high impact at work and in analysts and thought leaders.
2018 Understand now. Consider potential people's home lives. Early adopter Clients are starting to look
implications and how these could be Medium Will impact organizations' for solutions.
addressed. processes & services or affect users' & Mainstream There's a clear need and
2019+ Follow for now. Watch how it's consumers' lives. many clients are implementing solutions.
evolving. Low More likely to require minor
improvements than radical changes.

The radar diagram provides a pictorial view of our findings, allowing you to quickly understand how disruptive emerging technology is
likely to be and the actions you might consider taking. Polar co-ordinates depict the likely time to impact your business along with the
potential size of the impact, while colors represent the current maturity of each topic.

160 #AscentLookOut
Tech trends

Each trend has been analyzed from three perspectives: potential size of impact on your business;
likely time to impact your business and maturity.

3D Printing enhancing precision lifecycle maintained.


Concept Improves after sales maintenance by Issues may arise relating to the
Definition making replacements immediately intellectual property of models and CAD
Also referred to as additive manufacturing, available designs.
3D printing is a manufacturing approach Lowers the investment barrier for people 3D printing could mean countries
that materializes 3D objects from virtual needing to manufacture small series of international trade strategies for goods
designs created using CAD (Computer objects become difficult to enforce.
Added Aided Design) programs. The size of Allows individuals to design and share Tracing the use of raw materials in
objects that can be printed extends from objects in the same way they share specific value chains will likely become
nanoscale to buildings. content within the Creative Commons more complex with 3D printing.
movement or software pieces in the open
source movement
To create parts the 3D printer superposes 5G
layer upon layer of material using various Concept
additive processes until the entire object Evolution
Definition
is created. Each layer is effectively a thinly 3D printing was initially dedicated to
5G represents the next generation of
sliced horizontal cross-section of the prototyping in the manufacturing industry
communication networks and services. It is
eventual object. during the early stages of product
not intended to be an evolution of legacy
development.
communication technologies, but a novel
Applications A drop in the price of 3D printers, the
approach for fulfilling the requirements of
Rapid prototyping making fabricating a appearance of open hardware initiatives
future applications and scenarios. As such,
part or model, often designed using CAD and the general Do It Yourself movement
legacy 4th generation LTE technologies
tools, quick and easy spread 3D printing to the open source
continue to evolve in parallel.
Rapid manufacturing inexpensive and makers communities.
production of a small number of parts CAD object design libraries are starting
Applications
Mass customization manufacturing to appear, allowing people to share,
Connecting trillions of smart devices on
unique objects personalized directly by customize and print their own objects at
the Internet of Things (IoT)
users through a web-based interface home.
Providing massive broadband access
Maintenance creating parts for vehicles, Amazon and other players have
for high quality TV or video streaming to
aircraft, machinery and more opened a 3D printing store online with
mobile devices, video conferencing and
Casting creating foundry patterns for commercial 3D printers and scanners,
other applications
casting parts printer filaments, CAD software and more.
Enabling extreme real-time applications
Retail allowing consumers to purchase Advances in 3D printing means
including augmented reality
and download a product design to print composite objects made of multiple
Delivering ultra-reliable applications
at home materials can also be printed.
including e-health and energy services,
Healthcare creating bespoke Research into new materials with high
manufacturing control and connected
replacement knees, hips, ears, blood mechanical properties, such as steel or
vehicles
vessels, heart valves and other body parts titanium, has opened new uses in new
Providing life-line communications
Pharma creating personalized pills sectors, such as aerospace where SpaceX
including emergency calls during a
created the first 3D printed rocket parts.
natural disaster
Trajectory Progress is also being made in printing
Enabling vehicle communications
Impact bio-materials as well as other materials
improving traffic safety, assisting drivers
Alters the product supply chain, such as concrete, glass, plastic, metal,
with real-time traffic conditions, enhancing
eliminating the need for both component ceramic and foodstuffs.
vehicle reliability and more
and end product transportation Progress is also being made toward high-
May spawn a new wave of manufacturing volume printing.
Trajectory
relocation across the globe as Complementary 3D scanning technology,
Impact
components can be created anywhere which collects data on shape and size of
Offers high levels of network flexibility
Simplifies customization while reducing objects, is making it easier to create initial
and dynamic network reconfiguration
material waste and accelerating lead designs.
based on analytics enabled by Software-
times Defined Networking (SDN) and Network
Allows vehicle and aircraft manufacturers Issues
Function Virtualization (NFV)
to create lightweight parts to help 3D printing systems will need to be linked
Delivers higher levels of security and
improve fuel efficiency to current manufacturing systems to
improved user privacy control
Helps reduce the cost of cast parts while ensure end-to-end visibility of the product
Expected to cut network latency to

Ascent Look Out 161


Tech trends

around one to two milliseconds, enabling more natural ways to understand patterns will be democratized through mainstream
innovations such as the connected car and relationships in complex data sets. solutions.
Expected to improve wireless capacity Many solutions also enable interaction with Data sets are no longer static and, as
1,000-fold and, as such, deliver the these data sets (manipulating the data and such, being able to visualize and explore
capacity needed for mobile video changing viewpoints, for example), allowing real-time (or quickly evolving) data sets is
streaming, video conferencing and more us to explore them in more depth, reveal useful and sometimes necessary.
Projected to save up to 90 percent on hidden relationships, find relevance among The paradigm of the data warehouse
energy, mainly from the radio access a large number of variables and more. is progressively becoming obsolete: as
network the volume of available data increases,
Forecast to connect more than seven We also need a means to explore the rather than digging into three years, three
trillion wireless devices serving over massive volumes of near instantaneous months or even three days of historical
seven billion people in the IoT data provided by our increasingly data, we will need to explore massive
Accelerates new service time-to-market, connected world. With a growing number amounts of nearly instantaneous data.
potentially reducing the average creation of data sets no longer static, advanced
time cycle from 90 hours to 90 minutes dataviz solutions enable the visualization Issues
and exploration of rapidly-evolving real-time High interactivity visualization can be
Evolution data sets. quite complex, demanding very specific
Current research is focused on the 5G knowledge.
networks architecture, functionality and In some cases, visualization can go Even as tooling improves, data
capabilities. beyond the 2D screen, providing a 3D visualization is still relatively low-level and
First 5G deployments are expected representation within augmented and/or often requires some degree of coding.
around 2020. reality environments or even immersive Badly used or understood, visualization
In the meantime, legacy 4th generation 'caves'. can provide incorrect outcomes and
LTE technologies are continuing to evolve, misdirection.
offering a fully IP-based, integrated system Applications
providing high speeds indoors and Scientific computing
Advanced Robotics
outdoors, with premium quality and high Engineering
Concept
security. Finance
Definition
LTE-A (LTE Advanced), for example, offers Health
The field of robotics is gathering a lot
increased speeds, performance and Pharmaceuticals
of momentum, thanks to advances in
capacity along with higher densities than Big Data projects
artificial intelligence (AI) and computer
its predecessor. Social network diagrams
vision (artificial vision computer systems
Geographical diagrams
implemented in software and/or hardware
Issues
that are able to perceive, process and
Various regions around the world Trajectory
understand visual data such as images and
are currently competing to lead 5G Impact
videos).
standardization activities. Improves decision-making, particularly in
5G must accommodate a wide range enterprises
Today's advanced intelligent robots are
of use cases from diverse verticals, Extends the work done by the Data
autonomous and able to make informed
each with advanced requirements Scientist
decisions around their own actions. They're
around latency, resilience, coverage and
also increasingly connected, able to interact
bandwidth. Evolution
with their environment and other smart
These use cases need to be considered Initially, visualizations were limited to
machines as part of the Internet of Things.
in the early phases of the standardization specific types of business charts provided
Not necessarily humanoid, today's robots
process and, as such, non-Telco by productivity and Business Intelligence
are mostly machines or even vehicles, such
companies (automotive, IT services, (BI) solutions.
as autonomous cars.
consumer goods, health and others) need Big Data increased the need for intuitive,
to be included too. visual ways of traversing content. As such,
Applications
5G is a combination of diverse many of today's BI products now include
Industrial processes such as for
technologies, the maturity of which will be advanced data visualization capabilities.
repetitive tasks or precise guidance
varied when 5G is first deployed. Open source data visualization tools are
Services and knowledge workers
progressing quickly, but often basic and
including at work, in public or in
less user-friendly.
hazardous environments
A Data visualization could evolve
significantly with advances in human-
Surveillance particularly in harsh or
dangerous environments
computer interfaces. Immersive systems
Fire prevention including detection and
Advanced Data Visualization that include advanced 3D graphics, for
extinguishing
Concept instance, are already being employed
Industrial inspection such as network
Definition in the astronomy and health science
repairs
As the volume of data grows, we need fields as well as for analysis of complex
Cleaning, sorting and delivery of mail,
ways to easily grasp its implication. Visual economic data, such as on the stock
for example
representations (data visualization market.
Robotic doctors allowing doctors to
technologies or dataviz) are one of the In time, advanced data visualization tools

162 #AscentLookOut
Tech trends

diagnose, and even operate on patients Issues Agricultural transport such as for crop
from a remote location The media's portrayal of robots often monitoring and cattle control
Care including of elderly people presents a distorted view of the truth. Military transportation and surveillance
Autonomous vehicles such as self- "Moravec's Paradox" is still true: robots especially in dangerous environments
driving cars are very good at complex tasks, but fail
Spacecraft including planetary (sometimes quite miserably) in day-to-day Trajectory
navigation tasks, such as climbing stairs or opening Impact
Agriculture including sheep-shearing doors. Reduces the number of accidents caused
Social, entertainment, sports or even Staff may resist as robots' role moves by human error
teaching from facilitating human labor to Optimizes the number of vehicles on the
supplanting it. road
Trajectory Connected robots, like other connected Accelerates point-to-point logistics
Impact devices, are raising concerns around Minimizes risk in military and other
Improve safety by replacing workers privacy. dangerous scenarios
in dangerous activities, such as fires or In personal scenarios, such as situations Extends transport to those unable to
nuclear power plant accidents relating to health and finances, people drive, including children, seniors and
Increase efficiency with AI systems prefer a human touch. individuals with disabilities
recognizing, learning and optimizing Badly designed smart machines that Makes expensive services, such as aerial
otherwise imperceptible mathematical don't function as expected could photography, affordable
patterns to maximize efficiency and potential bring about serious unwanted Offers alternative to current means of
minimize cost consequences. transportation
Maximize productivity as robots do Industry experts and scientists are Opens up new opportunities for novel
not tire and can, therefore, maintain concerned about the consequences of services based on collaborative uses
a consistent level of performance reaching the Technological Singularity Expected to have transformational
indefinitely the point where machines would be more impact in automotive, insurance, energy,
Reduce cost as the only outlays required intelligent than humans. health, defense and city planning
are the initial purchase price and Projected to have greatest impact
subsequent maintenance once vehicles are fully automated as
Autonomous Vehicles
Enhance flexibility by rapidly adapting to mutualization will be much easier
Concept
constantly changing work environments
Definition
Improve customizability by taking the Evolution
Autonomous vehicles is an emerging
form factor most suited to the job The long-term goal is for fleets of
field arising from the interaction of
autonomous vehicles to complement or
transportation vehicles and robotic
Evolution even replace traditional, human-manned
capabilities that include environmental
Robotics has a long history, mainly vehicles.
sensors, context awareness and
related to factory automation. Though still very active in their R&D
autonomous decision-making using
Advances in AI, improved connectivity phase, these companies are already
artificial intelligence. These self-driving
and distributed computing models (cloud) testing autonomous vehicles.
vehicles rely on these technologies to
brought new life into the field. The main R&D focus is around helping
enable them to drive themselves while
Robots are becoming smarter, moving drivers reach their designated destination
recognizing and responding to their
beyond doing repetitive tasks in factory effortlessly, though they also want to
surrounding environment.
scenarios to making informed decisions ensure drivers feel satisfied and safe.
around their actions. Governments are beginning to play a
Major players in this space include both
Many large planes are now essentially more active role, crafting regulations and
automotive and technology companies,
robots, flying themselves with pilots only providing funding for R&D.
who are both competing and/or
really needed to reassure passengers. Wide adoption is predicted to be around
collaborating.
Japan has historically pushed robotics to 2020, but that may be a bit optimistic.
compensate for both a lack of workforce
Applications
and increasing dependence as its Issues
Personal transport including the
population ages. Cost: Sensors used in autonomous
autonomous (and semi-autonomous) cars
New entrants, including Google with its vehicles, such as the LIDARs that
created by Google and Tesla
expertise in AI, are betting on advanced illuminate the surroundings with a laser
Industrial surveillance and transport
robotics. and analyze the reflected light, are still
especially in harsh, wide or difficult to
New use cases, military drones for expensive.
access environments such as mines,
instance, are becoming increasingly Complex environments: The variability
pipelines or traffic jams
important and their profile is rising. of conditions (weather, environment and
Urgent, specialized transport including
We may one day see a war fought by other actors) is extraordinarily complex.
aerial drones for search and rescue
robot armies. Testing: Tests are very promising, but
Unmanned parcel delivery drones such
The future will likely see robots gain social have mostly been carried out under
as those created by Amazon and Google
intelligence, artificial emotions and more controlled conditions.
High-volume logistics including
natural interaction. Safety: Safety requirements are very high
autonomous lorry platoons with just one
since human lives are at risk.
driver controlling several vehicles
Regulations: Regulations for autonomous

Ascent Look Out 163


Tech trends

vehicles are almost non-existent. Creating Evolution Applications


them will be a complicated process. Less than a decade ago, the California Identifying and authenticating individuals
Ethics: As with all fields related to artificial Institute of Technology invented a basic since biometrics are unique
intelligence and robotics, ethics play an logic gate inside living yeast cells using Enabling multi-factor authentication
important role where machines make RNA molecules (molecules that, like DNA, when combined with other security
tricky decisions that may put lives in carry genetic information). mechanisms such as smart cards
danger. The IMEC world-renowned Offering an alternative or complementary
nanoelectronics research center in security mechanisms such as
Leuven, Belgium, is directing research into fingerprint recognizers in smartphones

B biochips.
A few years ago, Stanford University
Enhancing consumer device security
particularly for smartphones
made the final component needed Providing strong security in defense or
Biocomputers to build biocomputers available by homeland security scenarios including
Concept developing the first biological transistor, detecting suspects at borders and crowd
Definition called transcriptor, using DNA and RNA. control
Biocomputers are computers that use In February 2016, parallel computation
biological materials such as DNA and was achieved in protein filaments with Trajectory
proteins to perform computational biological agents. Impact
calculations that involve the storage, Biocomputers may offer some interesting Enables strong authentication since
retrieving and processing of data. They applications in the future. biometrics are unique and difficult to
leverage the capabilities of living beings, reproduce
relying on nanobiotechnology to engineer Issues Provides advantages over passwords
biomolecular systems that provide the Today, biocomputers are still a very for access control and security systems
computational functionality. prospective field of research. since biometrics dont require any
Despite being able to execute a high memorization
Applications number of multiple parallel computations,
Performing living processes based the DNA-computer biocomputing Evolution
on complex biomolecular interactions approach has a slow processing speed Some biometric systems, including
involving biomolecules coded by our with a response time that may be hours fingerprint scanners, have a long history
DNA or days, rather than milliseconds. behind them.
Providing advanced bio-templates for Biocomputing results are much harder Advances in both sensors and
bacterial and viral analysis sparking to analyze than results from a digital recognition software meaning false
other biomechanical technologies since computer. non-match rates (that disturb legal users)
it's currently the only self-replicating There is growing public concern around and false match rates (that are a security
computing technology we know of biocomputers' relationship with genomics risk) are improving though there's a
Executing calculations that require and, as such, the potential for biological trade-off between cost, response time,
extreme parallelism which can be catastrophes. convenience and reliability.
achieved by billions of molecules Local use of biometric systems in trusted
interacting simultaneously with each Biometrics personal devices is now more acceptable.
other Concept Also driven by the reducing cost of
Solving problems that cannot be Definition biometric systems combined with their
deterministically solved in polynomial Biometrics refers to the detection and integration with authentication and
time measurement of specific measurable authorization standards in software,
DNA shows promise as a mechanism for human characteristics. These can be biometrics are gaining popularity in end
long-term storage of information used, with a certain degree of certainty, to consumer devices.
differentiate individuals. Accuracy can be Advances in artificial vision are improving
Trajectory further improved by combining several biometrics based on pictures or video
Impact different biometric mechanisms into including facial recognition.
May offer an alternative to silicon-based multimodal biometric systems. Behavioral or passive biometrics exploits
systems potentially faster, smaller dynamic characteristics including
and more energy efficient for some Well-known examples include fingerprints, keystrokes, mouse moves and even
specialized problems retinal blood vessels, iris recognition and complex body movements such as gait
Potentially offering massive parallelism, voice recognition, though there are many enabling continuous authentication.
massive storage and high levels of other human characteristics that can be Future trust and compliance models
artificial intelligence alongside low waste used to identify an individual and may be will likely leverage a combination of
and low energy usage useful in certain situations. These include biometric-based security and new smart
May also provide a whole new field of heart rate and walking pace. And while phones capabilities in the never-ending
innovation in healthcare and life sciences DNA provides the ultimate biometric, DNA quest to ease access control.
such as detecting cancerous activity analysis currently takes too long to make it
within a cell and releasing an anti-cancer a viable option at this moment in time. Issues
drug upon diagnosis Biometrics requires specialized
equipment for capturing the biometric
characteristics.

164 #AscentLookOut
Tech trends

Accuracy rates vary substantially or insurance Brain-Computer Interface


among different biometric mechanisms Disrupts domains where a trusted third Concept
and performance varies among large party was required Definition
populations. A small proportion of users Enables the emergence of industries The brain-computer interface (BCI) is a
face recurrent difficulties. where a central ledger was needed but direct communication pathway between
As such, biometrics is best suited impossible to put in place the brain and an external device based
as a complement to conventional on neural activity generated by the brain.
authentication methods. Evolution While the majority of approaches use
Applicability for identification is more Blockchain became well-known for invasive devices, the most promising
limited since determining who a person is its use as a public ledger for Bitcoin initiatives are based on non-invasive
and checking that it is one given person is transactions and supporting various other approaches. Here, electroencephalogram
difficult because of the tolerances needed. cryptocurrencies. or EEG devices record the brain activity.
Mistrust is still strong because it's very Its application has now widened to
personal and you can't change it like you include diverse applications in almost all EEG's fine temporal resolution, ease of use,
can a password. domains. portability and low set-up cost has made it
In addition, privacy concerns may lead to Organizations, mostly industry but also the most widely studied potential candidate
user acceptance or regulatory issues. some governments, are investing heavily for a non-invasive interface.
Biometrics may raise ethical and in building proofs of concept for specific
social implications for Corporate Social use cases. Applications
Responsibility imperatives. Ethereum, a platform that enables Initially, simple detection of specific
Biometric systems can be tricked. Facial the creation and automation of smart external signals and very basic interaction
recognition systems can be fooled by contacts, is an example of one of the with objects
using 2D or 3D masks, for instance. Anti- more sophisticated implementations. Today, mainly used for assisting,
spoofing technologies are emerging to Blockchain technology company R3 augmenting or repairing human cognitive
address this problem. is leading a consortium of 40 banks in or sensory-motor functions for
testing the use of blockchain solutions to controlling prosthetics, for instance
Blockchain facilitate the trading of debt instruments. Also gaming where crude EEG devices
Concept The Hyperledger Project, a collaborative are already available as gaming controls
Definition effort created to advance blockchain Later, providing more advanced
Blockchain is a form of distributed database technology, aims to identify and address communications including speech
that uses cryptographic techniques to important features for a cross-industry recognition focused on basic phonemes
ensure records are stored sequentially and open standard for distributed ledgers. and language patterns
tamper-proof. Blockchain protocols are evolving to In the future, enabling communication,
extend functionality, address security risks interactions with computing devices and
Public, private or community, blockchains and increase capacity. more
provide an alternative to a centralized
ledger maintained and controlled by a Issues Trajectory
single entity. In doing so, they enable a new Blockchains, including Bitcoin, still Impact
model that allows trust to be established in remain widely experimental and lack a Allows people to interact with computers
a peer-to-peer network without needing a retrospective view. and devices without actions or
trusted third party. Blockchain cryptography is currently movements
not post-quantic and could therefore be Offering a completely new
Applications threatened by quantum computing. communications channel especially
Financial applications including book- Security depends on the diversity and non-invasive technologies and
keeping, cryptocurrencies and securing independence of a blockchain's nodes. As more advanced interactions (mainly
transactions such, a single player controlling a majority communication)
Non-financial applications including of nodes could theoretically circumvent Impacting almost all aspects of man-
(to some degree) managing intellectual some security mechanisms. machine interfaces in both our personal
property (anteriority), digital identities, The 'proof of work' uses a considerable and professional lives
electronic health records, along with amount of computing power and energy,
voting, supply chain authentication and though more energy-efficient alternatives, Evolution
smart contracts such as 'proof of stake' or 'proof of burn', First invented in 1924, research labs have
are being sought and explored. since pursued EEG-based BCI extensively.
Trajectory Improvements are needed to ensure During the 1970s, research used
Impact the volume of transactions required primates while invasive methods allowed
Changes the value chain by removing for mainstream applications can be prosthetics mechanisms to be controlled.
gateways and intermediary processes effectively handled. Advances in neuroimaging resolution and
in favor of direct trusted transactions Different blockchains may be required for EEG capabilities have allowed devices to
between users including merchants, different use cases. be controlled more precisely.
services providers and customers Initial consumer devices were crude
Challenges industries where a central and mainly used for gaming and stress
ledger was mandatory such as banking control.

Ascent Look Out 165


Tech trends

Recent advancements showed that collaboration between MES/MOM, ERP federation services will ensure
EEG-based BCI can accomplish tasks on a and PLM systems seamless authentication and access
similar level to invasive BCI. Industry helping gas companies, control for information and services.
It could eventually become one of the for instance, optimize extraction by They will use characteristics belonging
most advanced method for interacting enabling tight integration between the to the information requester such as
with computers and devices. gas turbine manufacturers PLM cloud age, organization or citizenship while
service, the companys own private asset ensuring that proprietary or personal
Issues management cloud service and a sub- information is not spread unnecessarily.
Invasive methods require complex surface analysis cloud service
medical procedures and may have Enhancing information services Issues
undesired side-effects. Ensuring a allowing organizations to augment their Compatibility across services is
permanent connection with specific areas own services with public third-party still an open issue, compromising
of the brain is difficult as the connection services, such as weather or traffic further advance of inter-cloud service
may decay, for example. Business continuity reducing the cost provisioning. Cloud market leaders are
Non-invasive EEG is still at the early of disaster recovery while enhancing yet to widely adopt any standardization
stages of research. flexibility and the agility efforts, but multi-cloud may be the market
Brain activity is permanent and, as such, force that pushes that adoption, breaking
it's not easy to isolate significant signals. Trajectory down current vendor lock-in.
Non-invasive techniques will require Impact Multi-cloud environments increase the
additional effort. Helps companies balance functionality, complexity of service level agreements
The brain is incredibly complex (more flexibility and investment protection since providers rely on diverse services
than 100 billion of neurons) and analyzing Reduces cost by eliminating the need from a more complex cloud ecosystem.
patterns based on electric signals is for hardware to absorb peak demands, Existing contracts will need to be
really challenging and compounded with reducing overall management cost and analyzed and extended so chains of
individual differences. energy consumption contractual relationships can be
Longer term, there may be ethical risks Accelerates computing resource delivery automatically established across multiple
such as the potential for mind-reading while improving resource availability and and heterogeneous cloud providers.
and mind-control. optimizing resource utilization Multi-cloud environments will need virtual
Helps small and medium cloud networks to be set up across multiple
companies handle peak-loads, acquiring cloud providers. Yet poor network

C additional capacity as and when needed


Brings workloads closer to where
performance is a roadblock for wider
cloud adoption, while cloud federation
demand is, eliminating unnecessary requires extensions to the concept,
Cloud Services Integration latency techniques and primitives of cloud
Concept Ensures compliance with national networking.
Definition regulations when customers have specific The constant changes in security
The new computing continuum will be restrictions about the legal boundaries in parameters enabled by dynamic multi-
a heterogeneous environment based on which their data and application can be cloud management models is amplifying
the decentralization and federation of hosted current security concerns.
diverse computing entities and resource
Evolution
typologies. These will include multi-cloud Cognitive Computing
(and cloud federation) models with their Simple multi-cloud capabilities were first
Concept
diverse, decentralized and autonomic made available through APIs.
Definition
management and hybrid cloud models These are now evolving into a global-
Cognitive computing can be seen as an
that cross boundaries between internal and scale service-based architecture.
integration of algorithms and methods
external cloud services or between public, ServiceNow played a key role in showing
from diverse fields such as artificial
private and community providers. industry how the various service
intelligence, machine learning, natural
providers can be brought onto a single
language processing and knowledge
Cloud Service Integration (CSI) provides platform.
representation that enhances human
a flexible means for assembling these With private cloud now becoming
performance on cognitive tasks. Breaking
various cloud-based elements in support mainstream, companies are looking at
traditional boundary between neuroscience
of business process that transverse IT hybrid cloud models.
and computer science, cognitive
domains. Compute workloads are deployed In the longer term, the majority of
computing is able to learn, to understand
across multiple cloud environments to companies are likely to adopt a multi-
natural language, as well of reasoning up
provide an optimal delivery model. cloud strategy with services from multiple
to interacting more naturally with human
providers.
beings than traditional programmable
Applications The future will see a wider variety of
systems.
Global business enabling the dynamic service delivery venues available, allowing
coordination of computing loads across users to schedule and automate delivery
Cognitive computing systems have three
geographies of their workloads to the most suitable
main types of capability:
Integrated manufacturing supporting clouds.
Systems with engagement capabilities
information transparency and Trusted Information Brokers the
change the way humans and systems
evolution of todays cloud-ready identity

166 #AscentLookOut
Tech trends

interact, extending human capabilities by reasoning abilities analogous to the Applications


providing expert assistance. human brain Offering end-to-end application
Systems with evidence-based, decision- management, from prototyping and
making capabilities continually evolve Evolution development to production
through new information, outcomes and Computers using artificial intelligence Porting workloads across service
actions. have been a field of academia and providers
Systems with discovery capabilities research labs since the 1960s. Encapsulating solutions
uncover insights that even the most But the world lacked the digital Enabling software-defined everything
brilliant human beings might not discover, infrastructure, algorithms and knowledge solutions
finding connections by understanding bases to underpin such systems until Delivering adaptive applications or
the vast amounts of information available recently: Infrastructure-as-Code where workloads
around the world. -- The scale of computing power and react and reconfigure themselves to
storage has now reached critical scale. accommodate changes in the underlying
Applications -- Huge new sources of structured and infrastructure
Applications of Cognitive Computing are unstructured digital data are available Enabling software componentization for
multiple and will continue to expand: for algorithms to ingest, analyze, and solution architectures, including micro-
Expert assistance solving tasks or compare. services
long-term projects, answering questions, -- Artificial intelligence improvements
making suggestions, revealing patterns. in voice, text and vision can all be Trajectory
Examples include personal assistants. leveraged by new sensors that create Impact
Intuitive communication understanding even more context and data that can Allows applications to be pre-packaged
a person's real intent, attitude, meaning, be symbolically processed and acted in ready-to-use and easy-to-deploy
emotions and mood to suggest effective upon. containers
communication strategies in digital -- Software is everywhere and mobility Improves service delivery (greater
experiences. Examples include marketing opens opportunities for highly flexibility, maintainability, reliability, fault
and sales campaigns, TV advertising, contextual software. tolerance and security), opening the door
political campaigns and matching the The full scope of the processes and to concepts such 'Zero Downtime' and
call agent to the caller's personality in call domains that will be impacted by '100% SLAs'
centers. cognitive computing is still elastic and Reduces cost and enhances capacity
Accessibility for the impaired emergent. management through workload
specialized devices with embedded As an expert assistant, cognitive consolidation and improved resource
software responding to simple intuitive computing may one day act virtually utilization
gestures such as finger pointing and autonomously in various problem-solving Facilitates interoperability among cloud
reading signs, papers, books, labels and scenarios. offerings
products. Plays a key role in enabling the
Intelligent narratives providing Issues cloud-native approach for deploying
automated, yet natural language, Cognitive computing requires unique applications on cloud
insightful summaries out of complex skills, such as natural language processing Integrates well with emerging
information. Examples include natural and machine learning. architecture (micro-services) and
language explanations of analytical Systems will be limited to the expertise development (DevOps) models
conclusions. and data they are exposed to. Cuts the cost of testing and quality
Predictive customer engagement Concerns have been raised around assurance processes
leveraging knowledge bases linked to privacy breaches and machines replacing Improves troubleshooting capabilities
CRM systems to understand customers' the human workforce.
data, discover patterns, infer relationships, Enterprises are not yet ready for Evolution
anticipate customer needs and actions computer systems as partners. The base technology has existed for
and, thereby, predict the optimal Business and the end user must be many years in Unix-based operating
engagement strategy. trained on what to expect from the world systems, such as Linux or Solaris.
of cognitive computing where failure is Containers gained visibility in the
Trajectory accepted and learnt from, for instance. market through Docker, which provides
Impact a lightweight alternative to virtualization
Redefines the nature of the relationship Containers technology that is very well integrated
between people and their increasingly Concept with development tools and cloud
pervasive digital environment Definition deployments.
May allow machines to take over Containers are a lightweight virtualization Containers are becoming the preferred
mundane activities, transforming jobs, technology that provides applications model for software packaging and
companies, industries, markets and with an isolated environment inside distribution.
economies a single operating system instance. The container market is gaining a
May open the door for new opportunities Containers provide users and applications certain degree of standardization and
and business models around cognitive running inside them with the illusion interoperability.
modelling, human touch interpretation and experience of running on their own
and more dedicated machine.
Paves the way for smart machines with

Ascent Look Out 167


Tech trends

There are many innovation activities in Administrative functions such as


the field, including:
-- Advanced workload scheduling
privacy and user preference management
Business support including D
-- Trusted containerized computing transactions, metering and payments
-- Native support in embedded devices Deep Learning
-- Optimized base operating system for Trajectory Concept
containers Impact Definition
-- Integration with other cloud Increases the agility, relevance and Deep Learning is a branch of machine
technologies precision of IT services learning with its roots in neural networks
Drives revenue generation and where multi-layered neural network
Issues increases customer loyalty through algorithms attempt to model high-level
The technology ecosystem is still young IT-enabled business models that include abstractions in data.
and experiencing extreme volatility in its subscriptions, advertising and more
evolution: Enhances user experiences by ensuring Currently most applications use supervised
-- (Too) many tools with diverse and personalized services are more learning, where a network is trained with a
questionable maturity degrees relevant, particularly when combined large set of labeled data examples for each
-- Standardization and interoperability with advanced analytics such as category (for example, an image of a cat is
activities are still limited recommendation algorithms labelled cat) to produce a model that can
-- Support for some legacy technologies Enables the introduction of context- then be used for mapping new samples.
is limited enriched services in mobility and the Unsupervised learning, on the other hand,
-- Stronger security models needed Internet of Things (IoT) where information is where machines identify objects, text or
The transition and transformation from push is favored over pull and end-device images without having been specifically
virtualization to containerization will processing might be limited trained on a related dataset.
require changes in processes, practices, Increases the potential for economic
skills, culture and organizational growth in domains such as smart cities, Some Deep Learning models build multi-
boundaries. smart manufacturing, smart agrifood, dimensional spaces from texts. Here the
smart energy and domotics network discovers hidden semantic
relations between words and places them
Context Broker according to their proximity. For example,
Evolution
Concept
Context brokers are expected to play in a word space created from historical
Definition
a key role in the future IoT landscape, books it would determine that King -
Context brokers collect and store diverse
assisting enterprises looking to enter the Male + Female = Queen. Other models
data, then leverage analytics to deduce
mobility space, in particular providing the follow patterns learned from examples to
context from the interactions among
answer to complexities around sourcing generate text or optimize a sequence of
the data before triggering actions based
and federating content. actions to achieve a goal.
on that contextual information. In doing
Their central position and access to
so they effectively empower data by
diverse information creates significant Applications
extracting its meaning in relation to other
potential for combining with leading-edge Image and speech recognition such as
pieces of data, bringing the full potential to
analytics algorithms. voice commanded systems, self-driving
data that might otherwise be leveraged in
Investment in accelerator programs such cars, face recognition, video surveillance,
isolation.
as FIWARE is expected to boost potential image tagging and visual diagnosis
for the creation of many of the key Text recognition including automatic
Context brokers play a critical role in the
technologies needed to support a broad translation, sentiment analysis, keyword
delivery of context-enriched services, which
context broker uptake. extraction, summarizing text, automatic
use information about a person or object
question-answering machines and
to proactively anticipate the users needs
Issues information retrieval
and serve up the most appropriate content,
Users may have different needs in a Action planning including generating
product or service.
similar situation according to their state marketing planning
of mind and, as such, determining what Gaming such as chess or Go
Applications
is most relevant to them is extremely Robotics helping robots learn about
Acquiring context-related information
difficult. objects without human assistance, for
from multiple sources including
Acceptance and usage will depend on instance
smartphones, sensors, the connected car
assurances around personal privacy and Fraud and security primarily detecting
and objects in your home and office
protection against information leakage. anomalous behaviors
Reasoning-based actions analyzing
Distributed yet correlated events can
context and acting based on the results,
be difficult to associate, such as those Trajectory
such as a map inside an electric vehicle
coming from multiple devices controlled Impact
prioritizing gas stations that have electric
by the same person for instance. Has enabled significant progress in
charging points
The quality and complexity of the data challenges such as large-scale image
Marketing serving up relevant offers
analyzed may vary since it comes from processing and automatic speech
based around the customer's current
multiple data sources and in diverse recognition
context
formats. Outperforms all previous techniques for
Current solutions lack real-time image and speech recognition, allowing
aggregation and filtering.
168 #AscentLookOut
Tech trends

thousands of categories to be recognized Modern team collaboration around Evolution


quickly with unprecedented accuracy documents and projects Traditional tools were purely focused on
Provides very efficient approach for Events coming from existing business the internal or external collaboration while
Natural Language Processing and text or office applications such as scheduled unified communications (UC) tools did
mining such that it is likely to replace meetings, incoming orders or new sales not address team collaboration around
other rules-based techniques leads documents and vice versa.
Offers a breakthrough approach to Established messaging and UC
understanding and planning It may also include enterprise social applications evolved while new native
networking, shared drives, conferencing, digital workplace products began to
Evolution note taking, presentations, task emerge.
A breakthrough in neural network management and content management. UC solutions and team collaboration
algorithms in the mid-2000s made Though there are, in actual fact, many solutions converged, driven by increasing
building and training very large and different capabilities and functionalities frustration with email.
multi-layered networks in a massively available in such collaboration and Some UC vendors are already offering
parallelized form possible. communication environments. Every day digital workplace solutions.
Neural networks were then combined new relevant technologies and solutions Digital workplace solutions could benefit
with other machine learning and artificial appear. from other emerging technological areas
intelligence techniques to perform such as:
complex tasks. Applications -- Exascale computing sharing real-
Deep learning models were pre-trained Fields of application are broad, but time simulations, for instance
to reduce initial investment in terms of include the examples below -- Big Data analytics analyzing existing
sample and setup times for initial models Connecting internal employees to solve data and sharing dashboards among
for new applications. a specific problem, managing specific the team, for instance
Computer architectures were then internal projects, documents and -- Deep Learning and artificial intelligence
optimized based on single precision workflows and converging knowledge finding related data, images and text
graphics processing units and field- across functional areas similar to features or problems defined
programmable gate arrays. Building communities for partners, by the team, for instance
A Google Deep Learning program beat a customers or on-demand workers and The architecture of the digital workplace
human champion at the game of Go. simplifying collaboration with peers, is still evolving, moving from centralized
customers and partners systems with light clients toward more
Issues Improving customer experience intelligence at the workplace itself.
Demand very specialized and scarce within customer support, marketing The development of cloud and mobility
resources. engagement and partner enablement has led to the new architecture evolving
Black boxes that provide answers but and driving insights from customer-facing once more.
don't give hints about the reasoning teams
behind the result. Handling time-critical team working Issues
Different problems need different tasks effectively including emergency Change management is vital in new
algorithms, so it is not always easy to calls within next generation 112 and 911 collaboration initiatives, to ensure the
reuse them. solutions adoption needed to deliver return on
Over reliance may give a false sense Helping to save lives and rebuild investment.
of security, and create problems with communities in severe disaster scenarios Knowledge workers have a tendency to
incorrect results. Making Homeland Security more resist change for change's sake, but will
Results may lead to undesirable social effective happily embrace change that makes their
outcomes: encouraging discrimination Providing intelligent assistance jobs easier and their results better.
against specific populations, for instance. Enhancing virtual reality applications External collaboration and communication,
Enabling the practical application of along with the massive number of
Digital Workplace sensing devices collaborator tasks, may need personalities
Concept and shared data to be validated.
Definition Trajectory Standards need to be defined to address
The digital workplace is a combination of Impact issues such as privacy and ethics,
asynchronous messaging, real-time voice Provides a single tool for collaboration particularly for emergency applications.
and video communications, screen shares, and communications, bringing
content and context. Those elements of conversations and content together in Digital Signage
content and context are provided through one place Concept
documents, pictures, URLs, sound and Improves productivity and enables Definition
video. contextual communications Digital signage uses electronic technologies
Significantly reduces the burden of email to display information or deliver content.
At its very simplest, the digital workplace by moving email out of workflows Content can be adapted to context, such as
can be seen as the merge of three areas Drives deeper customer insight, seamless whether there are people watching or just
into a single workplace experience: interaction and innovation across the passing, and the signage can interact with
Unified communication (UC) around entire customer experience ecosystem users, through a touch interface or a motion
voice and video detection system, for example.

Ascent Look Out 169


Tech trends

Applications Digital signage is moving into the cloud server administrator. Their peer-to-peer
Advertising including offering and the Internet of Things (IoT). It will operating model and focus in privacy
promotions and encouraging return visits soon be able to interact with beacons, means they tend to be focused in specific
Entertainment at theme parks, sensors and wearables. scenarios.
museums, cinemas and more Artificial intelligence and Deep Learning
Displaying information such as news, are being explored to allow digital signage Applications
weather, directions, traffic, pricing, to help and interact with users better. Privacy-oriented communities of interest
menus, programs and even emergency Transparent screens that include LCD Ephemeral or temporal communities
information displays are emerging. When the screen Inter-organizational communities
Improving visibility including offering is turned off, the glass looks like a window;
the shopper all variants of an article in the turn on, the image appears. Trajectory
virtual store Glasses-free 3D and holographic images Impact
Enhancing the retail experience are emerging, but with limited traction so Eliminate the risk of being locked into an
allowing the user to try new garments far. integrated solution
virtually (when combined with Screens that are bendable and can, to a Provide better control on the data
augmented reality) certain degree, be adapted to different exposed through social networks,
Providing information in kiosks and shapes are a subject of intense research. enhancing data security and privacy
vending-machines These flexible screens rely largely on Make creating business revenue difficult
existing OLED (organic light emitting since personal data is owned by the end-
Trajectory diode) or AMOLED (active matrix light user
Impact emitting diode) technologies.
Offers a more flexible alternative to signs Evolution
and posters Issues Domination of integrated social networks
Increases the effectiveness of signage The domain is still young. What effective such as Facebook led to worries about the
Improves the user experience through digital content looks like and what the control of personal data and the monetary
the interactivity it provides key success factors are is not yet fully interest of social networking companies.
Makes an entertainment experience understood. Startups, such as Diaspora, proposed
more exciting Equipment is more expensive than distributed models, standards and
Can be updated easily and instantly, and conventional displays; although cost has protocols to guarantee data ownership
managed remotely and centrally to be balanced with benefits. to users, evolving established standards
Allows content to be dynamically adapted Delivering a multi-channel experience in the digital identity, instant messaging,
to the context and the audience increases implementation and integration telecommunications and web worlds.
Enables richer, immersive user risk and complexity. However, these initiatives struggled to
experiences through advanced multi- Rich content and rich immersive and grow significantly to compete with the
touch, 3D rendering engines and responsive user experiences add established giants.
responsive designs additional complexity and cost. Diaspora, for instance, still exists as a not-
The growing variety of devices and for-profit, open source project.
Evolution their diverse form-factors and operating
Early digital signage used video systems is also increasing complexity. Issues
projection or LED walls to deliver digital DSNs are still heavily influenced by their
content but was costly and there were Distributed Social Networks background and lacking in maturity and
issues with visual quality. Concept standards.
Digital signage moved from simple Definition Knowledge sharing and the sense of
information displays to interactive and Distributed social networks (DSNs) refer to discovery, the most important elements of
immersive devices. social networking platforms developed by social networking, have been exchanged
Large flat, high-definition screens (plasma, social network initiatives and operated in a for privacy.
LCD) have boosted use of digital signage. federated and distributed mode. Many such The censorial workload users encounter
Kiosks and digital signage are converging projects are federated under the federated doesn't facilitate inclusion.
and quickly becoming an integral part social web banner. Where large communities do exist,
of the omni-channel digital experience, migration from existing networks is likely
particularly within retail. Critical social networks functions (such as to be slow.
Convergence with mobile applications personal information sharing, messaging, There is additional competition coming
and augmented reality will provide an relationship management and content from emergent communication
even more interactive and personalized sharing) are enabled by emerging open technologies, such as messaging
user experience as rich and interactive standards and protocols. platforms.
content becomes increasingly important. Legislation around consumer privacy
Analytic capabilities are being Although DSNs may have similar use might make existing social networks
incorporated. These measure the clicks, cases to centralized social networks, they adjust their attitude, eliminating the need
navigation and interactions that help have a stronger emphasis on privacy and for DSN.
retailers maximize impact and improve control of personal data. Many try to ensure Finding a healthy DSN business model is
the user journey. (personal) data is owned by the end-user not easy since personal data cannot easily
rather than under control of the system/ be harvested and used to make money.

170 #AscentLookOut
Tech trends

Trajectory a thousand-fold increase over today's


E Impact
Brings computation and storage closer
petascale supercomputers. It provides a
major step forward in addressing the new
to the source of the data, ensuring the challenges of the 21st century at a time
Edge Computing results of analytics and other processing when all sectors (but particularly industry,
Concept are rapidly available and highly accessible academia and science) are demanding
Definition to the systems that need most them increasingly powerful computing systems
The growth of the Internet of Things Addresses latency issues detected in that may leverage cognitive computing for
(IoT) and the emergence of ever-richer large Internet of Things (IoT) scenarios resolving problems involving ever-growing
cloud services together call for data to Conserves bandwidth and reduces volumes of data.
be process at the edge of the network. privacy and security risks by eliminating
Edge computing is also referred to as unnecessary network transmission as Exascale is believed to be the order of
fog computing, mesh computing, dew an increasing number of 'things' and processing power of a neural network as
computing and remote cloud. It moves connected devices generate growing big as the human brain and, as such, is the
applications, data and services away from volumes of data target power of the Human Brain Project.
the centralized model of cloud computing Lightens the load of centralized cloud
to a more decentralized model that lies at servers Applications
the extremes of the network. Expected to enable a broad spectrum Smart cities with high-quality urban
of use cases and applications for which services managing city-level traffic,
Ubiquitous (and sometimes autonomous) traditional cloud computing is not monitoring the motion of citizens around
devices including the laptops, sufficient city, providing data-driven real-estate
smartphones, tablets and sensors that valuations, monitoring disease spread and
may not be continuously connected to the Evolution more
network communicate and cooperate Networks were combined with typical Climatology delivering finer-grained
among themselves and with the network cloud principles to create decentralized and more reliable predictions and
to perform storage and processing tasks and dispersed cloud platforms. understanding the exact location and
without the intervention of third-parties. Growing volumes of IoT-created data time of severe weather phenomena
are increasingly being stored, processed, Environment-friendly engines
Edge computing covers a wide range analyzed and acted upon close to, or at simulating combustion chamber
of technologies: from wireless sensor the edge, of the network. performance with more precision
networks and mobile data acquisition to Edge currently relies on specific vendor during the design phase to reduce CO2
distributed peer-to-peer ad-hoc networking solutions. emissions, fuel consumption and noise
and processing and more. levels
Issues Genomics including enabling predictive
Applications Applications written for an edge scenario diagnosis, more efficient treatments and
Connected vehicles with their wide will often need to work on heterogeneous customized dosing
variety of interactions and connections environments. Oil and gas exploration using
(including car-to-car, car-to-infrastructure Data reported from different things simulations to predict whether oil wells
and wireless and mobile networks) may come in a variety of formats. will fulfill expectations more accurately
Industry 4.0 ensuring smart factory Standardization is needed to enable before drilling begins, for instance
initiatives are scalable interoperability among devices and Agriculture reinventing to meet 21st
Smart cities allowing cities to scale sensors within both edge and traditional century demand by developing precision
data-driven citizen services cloud environments. agriculture and reducing pesticide use
Smart home releasing the burden on The potentially thousands, or even while taking into account climate change,
internet bandwidth as a growing number millions of small devices and sensors, ground quality alteration and plant
of smart devices share more and more in edge computing set-ups will require behavior
information a new style of device management. Astrophysics such as gaining a better
Online shopping manipulating the This may potentially need to be understanding of our solar system and
frequently changing shopping cart closer decentralized and able to scale to degrees universe and calculations for future space
to the consumer unprecedented in today's existing cloud missions
Mobile commerce such as mobile architectures.
business models for finance, advertising Envisaged as multi-tenant, edge Trajectory
and retail, bringing affordable scale to computing set-ups will require specific Impact
potentially computationally-intensive isolation mechanisms to avoid security Helps resolve challenges brought about
analytics and privacy concerns. by demands for intensive computing and
Mobile healthcare including health analysis of massive datastreams
monitoring services and patients records Exascale Enables the resolution of complex
management systems Concept problems that are currently impossible to
Resource-intensive end-user applications Definition solve within a reasonable time
including augmented reality, mobile Exascale supercomputers refer to high Increases productivity and
gaming, media streaming, home performance computing (HPC) systems competitiveness by easing time-
multimedia sharing that are capable of at least one billion billion constrained processes and speeding up
calculations per second (one exaFLOPS) decision-making

Ascent Look Out 171


Tech trends

Allows products to be designed faster Evolution


and more efficiently
Helps with anticipating multi-dimensional F Fabric-based computing is initially
being developed alongside specific
phenomena such as climate change by architectures to address performance or
allowing them to be simulated to a finer Fabric-Based Computing point issues.
level of detail Concept The Open Compute Project, which
Will also advance consumer electronics Definition aims to generate cost-effective generic
and business information technologies As the server landscape becomes hardware for large users, is leveraging
through its innovations in power more software-defined, the fabric-based fabric-based approaches.
efficiency and reliability computing model comprises a mesh of
interconnected nodes that work together Issues
Evolution to form a fabric that appears unified when Fabric-based computing requires radical
Exascale is vital for helping to resolve viewed from a distance. architectural changes to the data center
challenges in research, applied science, including higher switching speeds on
industry and society. The nodes consist of loosely-coupled the physical level and networks defined
Large countries have set ambitious goals virtualized storage, networking, processing by software.
to become leaders in exascale, building and memory functions alongside Operating systems and hypervisors need
large dedicated research programs and peripherals, each of which can scale to be able to fully leverage the scalability
associating high performance computing independently of all other nodes. These and the granularity of fabric-based data
(HPC) vendors resources can be repurposed easily or even centers.
In Europe, the European Commission automatically. Datacenter infrastructure Application development frameworks will
is supporting several exascale projects management (DCIM) layers, and potentially need to be fabric-aware.
under its Horizon 2020 program. applications, dynamically negotiate their Current solutions are largely proprietary,
These are aligned with the Strategic resource requirements with the datacenter with limited hardware interoperability and
Research Agenda proposed by the services provisioning layer. customized management interfaces.
European Technology Platform for High Standards are required to prevent fabrics
Performance Computing (ETP4HPC) and In contrast to grid computing, fabric from becoming the new mainframes,
pioneered by Bull, the technology brand solutions are not aimed at a specific with vertical silos and a significant cost of
from Atos. Bull announced the first open scenario. change.
exascale-class supercomputer range (Bull
sequana x1000) at the end of 2015. Applications

I
In the US, exascale research is supported Enabling the fully software-defined data
by a National Strategic Computing center with its improved agility and
Initiative (NSCI). reduced time-to-execution
In Japan, the RIKEN Advanced Institute Addressing the sometimes near-real-time Immersive Experience
for Computational Science is planning an demands of Big Data and contextual Concept
exascale system for 2020. smart mobility Definition
China has also strong ambitions in An immersive experience is one that is
exascale Trajectory totally absorbing, that allows users to
Impact disconnect from the real world and lose
Issues Provides a fully-meshed physical network themselves in a simulated dimension.
Exascale is dependent upon a new upon which the software-defined data Immersive experience technologies
generation of supercomputers for tackling center can define its services encompass a wide range of devices that
its four main challenges: Provides the high levels of granularity assist in making the experience more
-- Power consumption needs to be needed to adjust resources to perfectly absorbing and, by doing so, make the
reduced. match requirements technologies more invisible to the user.
-- Compute will need to be able to cope Aims to address problems that inhibit These include:
with massive data pools, rising from full-scale virtualization of the entire data 3D displays display devices that create
petabytes to exabytes. center the perception of depth
-- Application performance, with a tens Reduces the number of physical changes Haptic devices which add the sensation
of millions-way parallelism, needs to required and decouples them from of touch
be accelerated. service provisioning Holographic user interfaces laser-based
-- Systems will experience various kinds Allows deployments and configuration volumetric displays where users interact
of faults several times a day because changes to be executed in near real time with holographic images
of their massive number of critical Means IT resources can be rapidly Virtual reality (VR) digital simulations of
hardware and software components. aligned to changing business demands real world environments
Self-healing system (resiliency) are Optimizes performance and power
required. consumption Applications
A new generation of massively parallel Expected to increase overall resource Entertainment including movies, TV
software is also needed to extract more utilization to over 80 percent on average and gaming
parallelism, handle increasingly hybrid Reduces cost through better resource Health used by surgeons and
configurations and support greater utilization and automation radiologist and to ease remote operations
heterogeneity.

172 #AscentLookOut
Tech trends

Maintenance assisting engineers in instead of hours/days such as connected performance computing.


their diagnosis living, e-commerce, CRM and ERP Among them, bullion servers from
Marketing for demonstrations Providing intensive analytics in Atos are recognized today as the most
GUI 3D applications and websites domains such as Business Intelligence, powerful x86 servers in the world in terms
Natural interfaces for user input and Big Data and insight platforms for CRM, of speed and memory.
feedback Industry 4.0, smart cities, supply chain
Visualizing data planning and security intelligence Insight Platforms
Conferencing Providing complex event processing in Concept
domains such as High Frequency Trading, Definition
Trajectory predictive monitoring, intelligent metering Insight platforms are the third generation
Impact and fraud and risk management of business analytics platforms, following
Enables a more natural interaction with Edge computing leverages in-memory the first generation (Business Intelligence),
computing devices computing platforms to enable local IoT which focused on performance-tracking,
Transforms computing devices into data to be analyzed in real time, which in and the second generation (Big Data
information appliances, which give the turn allows decisions to be made in the analytics), which focused on behavioral
user a more positive feeling moment. analysis.

Evolution Trajectory This combination of new and existing


The first haptic input devices were Impact technologies collects and analyses massive
created a while ago, but with no true Drives business transformation and data sets from connected environments in
purpose. opens up new opportunities real time, rapidly transforming that data into
The first generation of consumer virtual Provides faster processing for ever- actionable (prescriptive) insights. Examples
reality products are now available, but increasing data volumes include:
it will take a little time for these to be Boosts performance by enabling low Streaming analytics analyzing data in
integrated into work activities. latency application messaging, mixing motion in real time to accelerate time-to-
As information appliances, solutions will transactions and analytics on same data insight
become more invisible over time. set, shortening batch processing and Distributed analytics analyzing data in
Next-generation haptic feedback systems delivering real-time contextual event situ within a distributed architecture
will make VR more realistic (and thus correlation and processing Prescriptive analytics which makes
immersive). Frees organizations from non-productive predictions based on its Big Data analysis
The display (VR) and input (haptics) will activities such as data consolidation and and then suggests decision options
become increasingly attached to the reconciliation
human body. Enhances agility, enabling companies to Applications
Eventually these may be superseded by operate in real time Industry 4.0, smart cities, smart utilities,
cybernetic implants. Simplifies next generation digital connected healthcare and smart grid
processes including unified data collecting and analyzing data from billions
Issues analysis of sensors to proactively improve user
Immersion levels will be limited by the Accelerates processes, up to 1000x faster experience, optimize assets value and life,
quality of the information available. with deeper analytics for immediate create new services and reduce risks
New conceptual thinking is needed to insights to actions Secure operations collecting and
identify fitting immersive experiences. Boosts strategic decision-making, making analyzing data from all IT and security
High levels of computing power it easier to leverage predictive tools that components to detect threats and attacks
are required to drive high-definition can detect trends and simulate outcomes and execute defensive measures on the
immersive displays. fly
Evolution Defense and homeland security
In-Memory Computing SAP has taken the strategic decision to collecting and analyzing data from
Concept move all its applications to its SAP HANA diverse sources to make and execute the
Definition in-memory platform. optimal tactical and strategic decisions
In-memory computing is a computing style Others are progressively following suit for Retail and marketing collecting and
where the central memory of the computer strategic, time-sensitive applications. analyzing data about customer needs,
or networked computers running Open source solutions are emerging in desires and behaviors to proactively
applications acts as the primary data store this space, Alluxio for instance. improve user experience and create new
for the potentially multi-terabyte data services
sets used by those applications. These Issues
applications then use traditional hard-disk In-memory computing enabled Trajectory
drives to persistently store in-memory data applications are hardware intensive, Impact
to enable recovery, manage overflows requiring new generation ultra-high Enables intelligent automation that is able
situations and transport data to other memory capacity servers to handle to sense, predict and adapt to people,
locations. massive data volumes with perfect quality business and things in real time
of service and security. Allows analytics to be linked to business
Applications Leading servers vendors are innovating outcomes
Providing near real-time access to to support this move, leveraging Are expected to be the cornerstone of
information (not only data) in seconds technologies often derived from high the Internet of Things (IoT) and at

Ascent Look Out 173


Tech trends

the heart of future digital strategies, as Sensors and actuators vary in size and Companies must decide what data to
organizations' digital nervous systems price, with some available on a microscopic store and how to store it, ensuring they
scale. As such, they can be embedded into have sufficient storage for both personal
Evolution many different objects and deployed in data (consumer-driven) and Big Data
At an early stage of their development, many different environments including (enterprise-driven).
insight platforms are considered a critical adverse environments in remote locations. IoE will significantly increase demand
technology for the future. Sensors may include capabilities such on datacenter resources and may
For prescriptive analytics in particular as GPS, RFID, Wi-Fi or internet access. even mean data processing, network
they will increasingly leverage the Some are even capable of detecting the connectivity and network bandwidth
learning capabilities of cognitive approximate location of other nodes. need to be re-architected.
computing. Examples include heart monitoring
These platforms are expected to be implants, biochip transponders on farm IPv6
embedded within large-scale solutions, animals, electric clams in coastal waters, Concept
such as IoT and Industry 4.0, while also automobiles with built-in sensors or field Definition
available as customizable platforms. operation devices that assist fire-fighters in IP (Internet Protocol) is the main
Both independent software vendors and search and rescue. communication protocol underlying
Open Source communities will provide networks such as the Internet. IPv6 (version
components, while integrated solutions Applications 6) was designed in the 1990s as the
will come from integrators and SaaS Automating operations successor to IPv4.
providers. Monitoring asset health, wear and location,
traffic or the environment IPv6 includes adjacent features, such as
Issues Enhancing healthcare address assignment, network renumbering
A broad set of capabilities are needed for Providing surveillance and security, and auto configuration. It addresses some
building these platforms: including early warning systems of the shortcomings of IPv4 by providing
-- Advanced ability to collect, aggregate Acquiring information about movements support for multicast, manages of mobile
and clean data from billions of sensors and/or terrain parameters data traffic more efficiently. Additionally,
in real time Managing energy or water usage IPv6 embeds several configuration and
-- Extreme computing power to analyze discovery mechanisms that were added to
and create meaning from Exabytes Trajectory IPv4 after its standardization.
of information on the fly or for rapid Impact
simulation Provides large amounts of data for analysis, Applications
-- Advanced algorithms for automated enabling businesses to make better- Real-time networking as required by
or human decision-making informed decisions. autonomous vehicles, remote tele-surgery,
-- Real-time orchestration of prescriptive Ensures data availability by automatically industry automation, video-streaming and
insight to action, strong embedded rerouting data in the event of a node failure voice over IP, overcoming the artificial
security to optimize availability. bottleneck imposed by IPv4on many of
Large enterprise platforms will often Enables numerous value-adding services these use cases
need to be customized for corporate and across healthcare, retail, city management Mobility providing unlimited scaling at
government specific processes. and more. routing level, with 5G mandating IPv6 as
critical
Internet of Everything Evolution Internet of Everything providing nearly
Concept The concept of the IoT first became unlimited addressing
Definition popular in the late 1990s as a follow-up of A platform for innovation since it
The Internet of Everything (IoE) is a ubiquitous computing. performs better, is simpler and easier to
ubiquitous communication network The development and cost reduction deploy than IPv4
that effectively captures, manages and of wireless and mobile networks and
leverages data from billions of real-life low-power micro-controllers, which Trajectory
objects and physical activities. It extends progressively made it possible to connect Impact
the Internet of Things (IoT) by also anything to the internet, brought the IoT Allows more connected objects to
including people, processes, locations and to life. connect to one another outside the span
more. While it was initially most closely associated of a local area network
with machine-to-machine in manufacturing, Is vital for the sustainability of the internet,
Networks of spatially distributed energy and utility industries, its now covers mobile internet and IoT-related business:
sensors and actuators (nodes), each a much broader, nearly universal scope. -- A 128-bit address space means the
with a transceiver and a controller for Projections predict 100 trillion connected number of possible IP addresses
communicating within a networked devices in the world by 2030. As such, increases from a few billion with IPv4
environment, detect and monitor events broader adoption of IPv6 is required to to 340 trillion trillion trillion addresses
(sensors) or trigger actions (actuators). overcome the IPv4 addresses scarcity. (36 trailing zeros).
Each has a unique identifier and the ability -- Addressing is basically free, which
to transfer data over a network without Issues is particularly important for IoT
human-to-human or human-to-computer Security, privacy and trust must be deployments where the number of
interaction. considered in developing IoT/IoE objects to address may be very large.
solutions.

174 #AscentLookOut
Tech trends

Includes hierarchical addressing, IPsec wide array of sources, including global buildings. Integration with indoor
authentication and security, and improved positioning satellites, beacons, Wi-Fi positioning is required to ensure
ability to carry multimedia data. hotspots, remote sensors and visible light continuous positioning.
Simplifies administration and eliminates communication (VLC) sources such as Li-Fi. Accurate indoor positioning requires
the need for workarounds such as Visualization technologies allow companies specific equipment.
Network Address Translation (NAT). to extract insights from this spatial data. Spatial analytics consume a vast amount
of computing resources.
Evolution The most basic use cases push content When it comes to targeted marketing,
IPv4 was deployed in 1981 and IPv6 in or activate or deactivate functionality insights such as past behaviors,
1999. based on geofences or address lists. More preferences, needs and situations are
The IPv4 address space became advanced spacial (3D) analytics uses a needed to deliver relevant messages to
completely allocated in February 2011. users or an objects exact geographical individual customers, however, the more
Tunneling mechanisms and gateways position to deliver contextualized accurate the technology, the lower its
were standardized by the Internet information and services reach.
Engineering Task Force (IETF) to bypass In addition, smart contextual messages
IPv4 limitations and deal with the IP Applications can be difficult to deliver at scale.
address shortage. Identifying and understanding assets and Proximity-based marketing and in-store
Migration to IPv6 has started in many customers anything from simple store location tracking are already raising
different areas, mainly on central locators to real-time displays of delivery privacy concerns.
infrastructures, though the uptake of pure driver locations or dense pipe networks
IPv6 is taking longer than expected. Securing sensitive data through LPWAN
The fraction of IP traffic using IPv6 is still geofences Concept
significantly lower than IPv4: around 26 Enabling local experiences such as Definition
percent of US applications are IPv6 native triggering an offer when a customer Also referred to as ultra-narrowband,
and 10 percent of Facebook's global traffic enters a store Low-Power Wide-Area Network (LPWAN)
uses IPv6, for instance. Studying sound propagation, lighting wireless communication technology has a
Some of the networking community are (shades) or rain flow low power requirement and a long range,
advocating a global switch. but a low data rate.
The number of applications is growing, Trajectory
increasing the need for the IPv6 protocol. Impact LPWAN was designed to enable objects
Improves customer intimacy as that don't have a powerful source of energy
Issues customers come to expect contextual to be connected, primarily to the Internet
The transition, which was announced products and services based on their of Things (IoT). After all, most objects
in 1995 and supposed to last until year current location connected to the IoT only need to transfer
2000, has been much slower than Drives innovation beyond the industries small amounts of data, such as commands
expected. that have traditionally used GIS and statuses, and that operation only
Although support for IPv6 in major Increases brand preference by delivering requires a small amount of power.
operating systems facilitates this personalized customer experiences
transition, many legacy devices cannot be Increases revenue by enabling more Applications
updated to support IPv6 and will not be effective marketing that influences Metering gas and water in particular
replaced overnight. purchasing decisions Monitoring including waste, parking,
Technologies such as Carrier-Grade land, livestock, forests and pipelines
NAT and recent regulatory moves are Evolution Tracking items such as containers,
helping IPv4 survive, thus harming the Big Data technologies have made the bicycles, pets, indoor assets
deployment of IPv6. storage and processing of large spatial Fault signaling such as with smart
data sets economically feasible and home appliances and alarms
scalable. Control street lighting and plant
Cloud has made augmenting solutions machinery for instance
L with location-based context simpler.
New tools are making spatial analytics Trajectory
more widely available. Impact
Location-Based Services NG The popularization of smartphones, as Allows millions of objects to be
Concept well as glasses and other wearables, will connected at low cost
Definition strengthen this market. Are a simpler and more effective
Geographical information systems solution for IoT than traditional cellular
(GIS) capture, store, analyze and display Issues networks, which were designed for high
information referenced according to its Location technologies in general, and performance data transfer
geographical location. The next generation beacons in particular, are immature.
takes the third dimension into account. This Traditional location technologies only Evolution
3D (spatial) representation provides a much provide a sufficient level of accuracy Early LPWAN adopters first appeared in
more realistic representation of the world. on the third dimension when they are 2014.
combined. Country and global-sized networks are
Spatial data can be gathered from a GPS is generally unusable within already being deployed.

Ascent Look Out 175


Tech trends

Waste monitoring and telemetry systems, Could outperform traditional computers and finger
whose refresh period is between one at a fraction of the energy cost as Haptics digital feedback mimicking
and four measures per day, are already compact neuromemristive systems physical sensations
working with LPWAN solutions from LoRa Adaptive interfaces/emotion tracking
or Sigfox. Evolution changing layouts and elements in
Remote surveillance operators have First coined in 1971 as a name for a response to the changing context or
started using LPWAN to monitor alarm theoretical passive electrical component needs of the user
systems as a more reliable alternative to to supplement the resistor, capacitor and Relational awareness devices that, as
GSM. inductor. an agent for the user, are aware of where
Although expanding quickly, geographical The first physical example was created the user is in relation to other people
coverage is still limited. in 2008, paving the way for concrete Affordances providing a digital
LPWAN is expected to become applications. representation of a physical object that
mainstream around 2017. Experimental organic neural networks allows the user to take advantage of all
based on polymeric memristors are being the things they already knows about how
Issues created. to use that object
There are currently multiple LPWAN 3D displays display devices that create
standards and this is impacting Issues the perception of depth
interoperability. Memristors are still experimental. Holographic user interfaces laser-based
For the IoT to really take off, LPWAN volumetric displays where users interact
modem cost needs to drop below $1, with holographic images
provisioning below $2 and data cost to
zero. N Physical controls where physical inputs
are translated into digital outputs

Natural User Interfaces Applications

M Concept
Definition
Voice control using language to access
a large set of commands
Natural user interfaces (UI) are systems Conversational agents allowing users
Memristors designed to make human-computer to interact without prior knowledge of a
Concept interaction feel as natural as possible. systems commands
Definition This wide range of technologies allows Audio channels opening up novel
Memristors are non-linear, passive electric the user to leverage everyday behaviors, channels for data transmission
components that have a resistance that intuitive actions and their natural abilities Collaboration allowing multiple users to
varies according to the history of the to control interactive applications. These controlling the interface simultaneously
flow of electric charge through them. The might include touch, vision, voice, motion Utilizing three dimensions providing
component's resistance reflects this history, and higher cognitive functions such as a more direct connection to content by
hence its name combining "memory" and expression, perception and recall. taking advantage of depth in movement
"resistor". Monitoring physical movements
Some natural user interfaces rely on helping systems (and users) understand
Memristor-based memory is non-volatile, intermediary devices while other more more about themselves in order to learn
with a density higher than 100 terabytes advanced systems are either unobtrusive and adapt
per cubic centimeter, high speeds and low or even invisible to the user. The ultimate Audio security providing identification
power requirements. goal is to make the human-computer and authentication through voice
interface seem to disappear. Examples signatures
Applications include: Visual security providing identification
Providing advanced memory technology Augmented reality adding an additional and authentication through visual images
such as non-volatile random access intelligence layer on top of natural life Biometric security providing
memory Virtual reality providing an immersive identification and authentication through
Delivering fast, compact and low-power digital representation of a real or other biometrics
neuromimetic elements since memristors imaginary environment
function using a continuous range while Mixed reality merging of real and virtual Trajectory
transistor-based logic only knows zeros worlds to produce environments where Impact
and ones physical and digital objects co-exist and Reduces complexity for users with user
Implementing neuroplasticity by forming interact in real time interface design incorporating more and
neuromemristive systems, a variant of Neuro interfaces enabling a direct more of the components needed to make
neuromorphic computers communication pathway between the user interfaces as natural as possible
brain and an external device based on Decreases the level of user training
Trajectory neural activity generated by the brain needed, with training mainly focused
Impact Virtual retinal displays images on domain knowledge rather than
Allow neural networks to move from broadcast directly onto the retina, interacting with the interface
computer simulations and onto their own effectively augmenting the real world Allows computers and human beings
physical implementations Body monitoring reading body to interact in diverse and robust ways,
Have a longer term potential in language with gestures beyond the hand tailored to the abilities and needs of an
neuromorphic systems individual user

176 #AscentLookOut
Tech trends

Enables complex interactions with digital check-out coupled with short lifecycles, may lead
objects in our physical world to infrastructure assets being refreshed
Trajectory without NFC as the primary mobile
Evolution Impact strategy.
The first attempts at natural user Standardizes and facilitates the
interfaces aim to provide an alternative integration of contactless communication
to a command-line interfaces (CLI) and
graphical user interfaces (GUI).
in end-user electronic devices:
-- Extending the functionality of those O
Attention later turned to developing products
user-interface strategies using natural -- Making them interoperable with Open Source Hardware
interactions with the real world. existing contactless infrastructure Concept
Touch and voice recognition are now Dematerializing tickets, coupons, badges Definition
increasingly appearing next to the more and cards The open source hardware model extends
traditional mouse and keyboard. Making payment more convenient, with the ideas and methodologies popularized
Interfaces have also begun to incorporate NFC wristbands gaining popularity in in open source software development to
gestures, handwriting and vision. micro-payments and tap-to-pay travel hardware development. Documentation
May allow technology companies to including schematics, diagrams, list of parts
Issues disrupt the payment/transaction value and related specifications are published
We don't yet have the complex chain with open source licenses so other teams
technologies needed to make truly natural Could enhance privacy in the future can modify and improve them, based on
and seamless interfaces. smartphone applications specific needs.

NFC Evolution These are sometimes combined with


Concept Nokia introduced a NFC capable phone more traditional open source software,
Definition in 2006. such as operating systems, firmware or
Near field communication (NFC) allows Google produced its first Android NFC development tools. For instance, both Linux
devices, such as smartphones and phone in 2010. and Android operating systems are being
wearables, to communicate wirelessly with Google Wallet, an app that used NFC to used in embedded devices.
tags, cards or other devices over a very make mobile payments, first appeared in
short distance. It provides a natural and September 2011. Applications
intuitive way for devices to interact with Google announced support of Host Prototyping new devices, such as
objects from the real world. Smartphones Card Emulation (HCE) in Android in 2013, internet-connected sensor devices
significantly increase the potential of NFC. enabling secure mobile payment and Avoiding vendor lock-in
access solutions. Maintaining systems long term, over
Applications Visa and MasterCard added their support decades, through leveraging hardware
NFC devices: for HCE in 2014, leading to wider adoption design availability
NFC tags enabling access, providing of NFC by banks. Providing server and network
related information or initiating a Apple entered the market in 2014, with infrastructures for internet-scale data
transaction, for instance Apple Pay appearing later that year. centers, mainly driven by the Open
Smart posters offering a coupon or NFC-enabled payments are gaining Compute Project
opening a website, for instance increased traction, providing a solid Fostering the adoption of industrial
Contactless or dual-interface smart cards foundation for NFCs growth. vendors' core technology standards while
delivering file/product updates NFC technology has been integrated into attracting an ecosystem of partners
NFC electronic shelf labels which are wearables, tablets, industrial handheld Accelerating innovation
a key enabler of the connected store computers and more. Popularizing the distributed fab lab model
NFC-enabled user devices, such as Non-payment NFC applications are proposed by MIT
smartphones or wearables: expected to thrive, particularly in retail.
Ticketing acting as a (wireless) badge, Trajectory
coupon or ticket Issues Impact
Payments and micro-payments Industry-wide standards are only just Supports hardware innovation and
through swipe to pay beginning to emerge. standards development
Data exchange by tapping to exchange Lack of consistency across device types Enhances long-term maintenance
data, such as electronic business cards means a solution may not perform capabilities
Loyalty such as picking up information consistently. Enables the creation of low-cost devices
and rewards Two different security models (SE and and infrastructures
Security enabling building access, for HCE) exist and devices may need to Offers alternatives for commercial
instance support both. data center server and networking
Printing such as transferring pictures to Trusted Service Management (TSM) infrastructure
a printer is needed to ensure applications from Allows enterprises to build materials
Retail providing access to deals, different issuers (including Telcos, banks, dedicated to their needs, while fostering
product information, inventory and more, transport companies, governments and collaborative developments from an open
and enabling digital shopping carts and cities) coexist securely. community of contributors
A lack of maturity and consistency,

Ascent Look Out 177


Tech trends

Evolution Printable computer circuits users are keen to allow some services to
Initially primarily initiated by the open Transparent circuits leverage, but only provided some privacy is
source community. Wearable computing respected.
Traction in the enterprise world from Smart bandages
both industrial users and hardware RFID tags As such, PETs reach beyond the
vendors is increasing. Plastic solar cells technologies traditionally dedicated to
Interest is expanding across diverse preserving data confidentiality (such as
industries including processors, servers, Trajectory access control and encryption); they also
3D printing and prototyping, ambient Impact encompass technologies and techniques
information devices, mobile phones, Provides the flexibility that allows for ensuring data usage is limited to the
notebooks and robotics. computing abilities to be added to purposes intended or protected, including
There is a great deal of interest in dynamic environments including clothes, homomorphic encryption, data masking,
emerging countries. tight enclosures and organic tissues anonymization and pseudonymization.
Open source hardware is expected to Integrates easily with other additive
continue to evolve in three directions: manufacturing methods, such as 3-D Applications
-- Supporting hardware innovation and printing Commerce, finance, Telco, public services
standards development Enables the low-cost volume fabrication and healthcare any domains where
-- Guaranteeing long-term maintenance that is essential for widely distributed customers leave sensitive personal data
capabilities solutions such as RFID tags Social media and networks along with
-- Creating low-cost devices and collaborative services also domains
infrastructures, including network Evolution where customers share selected data to a
infrastructures Basic R&D around organic electronics selected audience
began during the last quarter of the 20th Personal employee data
Issues century.
Business models are adapted to core OLED screens and printed RFID Trajectory
technologies, where users and vendors tags are widely deployed today and Impact
have a mutual interest in sharing popular in consumer devices, including Gives individuals the confidence to share
innovation, fostering standards and smartphones and e-readers. or trade access to their personal data for
minimizing cost. Other organic electronic technologies digital services
Certification, which beyond small project look very promising for cheap and Enables new data monetization business
communities, is required for many uses durable solar energy panels. models while ensuring compliance to
security or radio electric interference various data protection legislations
certification, for instance Issues Mitigates the financial and legal risk linked
Fabrication occurs in small batches Poor electronic efficiency, when to regulation violation
in small projects making for low cost- compared with traditional electronics, Supports Corporate Social Responsibility
efficiency. may impact some use cases.
Intellectual property issues could block In some domains, including health-related Evolution
some developments. devices, safety issues may limit adoption. Early work started in the mid-1970s, with
For the technology to really take off it the birth of the concepts of anonymity
needs to be properly integrated with and unlinkability.

P other emergent fabrication technologies,


such as 3D printing in a print-your-own-
electronics model.
Privacy homomorphism technologies
were introduced at that time, but had
many limitations and vulnerabilities.
Plastic Transistors A breakthrough fully homomorphic
Concept Privacy-Enhancing encryption (FHE) scheme was proposed
Definition Technologies in 2009.
Plastic transistors reflect the advances Concept More recently, business focus has been
in material sciences that provide us with Definition on mechanisms for digital identity
alternatives to traditional electronics. Based Privacy-enhancing technologies (PETs) management with privacy respect.
in organic polymers that have electronic refer to technologies involved in protecting Today, simplified schemes (somewhat
properties, these include OLED (organic or masking personal data (whether homomorphic encryption-SHE) allow
light-emitting diodes). employees, customers or citizens) to efficient evaluation of some simple and
achieve compliance with data protection specific logic functions.
These materials are easily printed over legislation and sustain customers' trusted The domain is evolving along with the
different types of substrates, allowing relationships. concept of the personal data economy'.
complex circuitry to be printed on flexible
plastics something that is not possible PETs not only protect very sensitive Issues
with traditional electronics. data (such as credit card information, The notion of privacy is a culturally
financial data or health records), they evolving one and boundaries are moving
Applications also shield the very personal information between generations.
Flexible displays (including purchasing habits, interest, social The notion of consent is essential, but
Conductive ink connections and interactions) that digital may not be sufficient over time since
the data you accept to share today may

178 #AscentLookOut
Tech trends

reveal embarrassing in the long run. Accelerates machine learning and


As a result, the domain is evolving around
two contradictory trends:
prescriptive analysis
Threatens to break several existing S
-- Some players are arguing that the cryptography standards
very concept of privacy is dead in a May introduce a general uncertainty SDx
digital world. around the safety of currently safe Concept
-- Nevertheless, public authorities are encryption algorithms Definition
frequently pushing new regulations Software-defined anything/everything
to (such as the European 'right to be Evolution (SDx) is an approach that replaces legacy
forgotten') protect customers and The theoretical basis of quantum and often specialized hardware
citizens. computing was established in the last controlled by physical mechanisms with
quarter of 20th century. software running on commodity hardware
The first real quantum computing devices platforms. The concept may be applied to

Q
were invented around the millennium. a wide variety of aspect of an IT system
The first commercial systems based on including networking, compute, storage,
quantum technology (D-Wave) reached management, security and more.
Quantum Computing the market around 2010.
Concept Though the current practical Applications
Definition implementation of quantum computers Software-defined networking (SDN)
Quantum computers are computation is limited to a few dozens or hundreds of where a programmable remote controller,
systems that use quantum-mechanical qubits, rapid development is underway. which is decoupled from the physical
phenomena (such as superposition Big internet companies (such as Google) network devices, forwards the data
entanglement) to execute operations on recently began testing quantum-based through the network.
data. Built over the basic element of the technology. Software-defined compute (SDC or
qubit (which is in a quantum superposition The U.S. National Security Agency, China virtualization) decouples CPU and
of states, hence having multiple values and other governments are ramping up memory resources from physical
simultaneously), quantum computing's their quantum safe projects. hardware to create isolated software
main advantage is its ability to execute Quantum computing (and other containers (virtual machines) that can be
some types of quantum algorithms quantum technologies) is expected run simultaneously in the same physical
exponentially faster than the best possible to become a flagship project for the server.
classical computing alternative. European Union. Software-defined storage (SDS or
Atos is among the very few companies storage virtualization) decouples
These algorithms are currently undergoing in the world to work on quantum storage functions (including backup and
rapid development and could potentially computing, targeting both Big Data and recovery) from storage hardware with
one day break significant aspects of security applications. software automating and optimizing the
current technologies limitations in provisioning of the storage resources.
combinatory analysis. Applications range Issues Software-defined datacenter (SDDC)
from decryption to operational research, Quantum computing poses a threat has all resources (including CPU, memory,
optimization, simulation (with quantic to conventional information security storage and security) virtualized and
models) and Big Data analysis (neural systems, requiring the development of delivered as a service.
networks). quantum safe cryptography before the Network Function Virtualization (NFV)
widespread use of quantum computers. combines SDC, SDS and SNS as a solution
Applications Kasperskys Labs has dubbed the found within the Telco industry.
Breaking cryptographic standards unpreparedness for quantum attacks as
emerging quantum safe cryptography the Cryptopocalypse. Trajectory
aims to overcome this threat, deriving Trained resources are scarce in this very Impact
new cryptographic methods able to resist complex field and often unconcerned Raises the level of automation possible in
attacks by quantum computers about quantum computing's impact on infrastructure management.
Trading in the financial sector business or society. Optimizes resource usage by making
Recognizing patterns in defense, Quantum programming languages are resources easier to manage
homeland security, Telco, utilities and still very basic and require a different way Enhances performance by enabling
insurance of thinking. dynamic, on-demand (re)allocation of
Speeding up lead compound discovery Quantum logic is hampering resources
in the pharmaceuticals industry development on an engineering level. Allows spurious changes of the resources
Accelerating simulations in the chemical The technology currently requires low state to be reacted to automatically,
industry and quantum physics temperatures, physical isolation and other improving availability
technical complexities that are currently Reduces complexity and errors since
Trajectory more expensive than the computing itself. there is no need to understand details
Impact There is uncertainty over the future around the underlying hardware
Allows hugely enormous, complex performance of the wide variety of Improves visibility of the status of
problems to be solved in a reasonable competing quantum computing resources, enabling the development
amount of time architectures. of more sophisticated control functions,
services and applications

Ascent Look Out 179


Tech trends

Allows traditional distributed control to Information and Event Management (SIEM) monitored and reacted to.
become logical and centralized technologies enhanced with machine Seamless communication between
Cuts cost by improving resource learning and prescriptive analytics. security devices is needed to ensure
utilization, opening up commodity Self-adaptive security also relies on new contextual information is shared across
hardware options and reducing system generations of context-aware security internal silos to enable the automated
maintenance time and effort technologies (including Identity and Access configuration changes that strengthen
Reduces time-to-market for new products Management, network security, device and security and block attacks before they
and services smart machine security) that dynamically happen.
adapt to threats. Self-adaptive security often relies on
Evolution human intelligence for confirming
Standardization efforts are already Applications adaptive actions on the fly after
widespread and expected to continue to Protecting information systems automated risk detection. This is vital for
evolve. belonging to boundaryless corporations avoiding any overreaction to false positive
The SDN evolution, for example, and open business ecosystems signals, which may impact the business
is mainly being driven by the ONF Offering better protection against the in unexpected ways (see Amplified
(Open Networking Foundation) while latest generations of threats, including Intelligence in the CxO agenda).
being embraced by the IETF (Internet Advanced Persistent Threats (APTs) The increased focus on rapid detection
Engineering Task Force) and the Adapting security strategies to the and response should not lead to
ETSI (European Telecommunications specific business challenges of individual decreased protection levels. Protection
Standards Institute). organizations within diverse industry levels should, instead, be more targeted
Related efforts are ongoing within contexts and more reactive. As such, end-to-end
industry and the open source community security, 'Zero trust' security architectures
(OpenDaylight and OpenNFV for SDN, for Trajectory and very high security zones for critical
instance) Impact applications (such as 'Application
Companies are tending generally Mitigates attacks (including hacktivism, Resource Islands') are often set up to
deploying open implementations and cybercrime from mafias, fraud, industrial complement self-adaptive security.
specifications that may then become espionage and cyberwar attacks) before
candidates for de facto standards. they significantly threaten the availability, Semantic Technologies
data integrity and confidentiality of Concept
Issues systems Definition
The transition from legacy systems to Facilitates forensics by enabling effective Semantic technologies encompasses
SDx can be complex. and accurate aggregation of evidence a diverse set of technologies aimed at
The centralized logic has the potential to helping machines to make sense of large or
become a single point of failure. However, Evolution complex data sets without being supplied
solutions that distribute this logically Experts estimate that detection and any knowledge about that data. In essence,
centralized control do exist. response share will move from less than they bring structure and meaning to
A change in a management policy might 30% of IT security budgets today to 75% information, often by providing machine-
result in temporary loops or errors that by 2020. readable metadata that is associated with
then lead to failures. Ongoing research Open platforms are being developing humanly readable content specifying its
aims to tackle this issue. that will facilitate 2-way communication meaning.
among multi-vendor security products.
Self-Adaptive Security Self-adaptive security depends on the Applications
Concept convergence between security and Natural-language processing (NLP)
Definition Big Data technologies, with the notable processing unstructured text content
With the growth of cloud, APIs and the addition of machine learning to traditional Data mining technologies uncovering
Internet of Things (IoT), cybercrime SIEM technologies (see 'Insight Systems'). patterns (trends and correlations) within
is constantly increasing in volume, Solutions are rapidly increasing the large sets of data
sophistication and impact. As a result, the number of data sources (including the Artificial intelligence systems using
paradigm of security must change. After Dark Net) they are leveraging well reasoning models to answer complex
the perimeter security of the 90s (which beyond classical security sensors and questions
emphasized network defenses) and the devices to analyze suspicious behaviors Classification technologies employing
in-depth security of the 2000s (which and foresee or detect attacks. heuristics and rules to categorize data
emphasized multiple protection layers), Self-adaptive security is becoming Semantic Web allowing programs to
cyber defense strategies now evolved increasingly verticalized, taking into fetch specific information and answer
toward new self-adaptive security principles. account industry-specific risks in finance, non-obvious queries
This pre-emptive approach to security manufacturing, utilities and other Linked Data a subset of the Semantic
moves the emphasis from protection to domains. Web and way of publishing data so they
real-time detection and response that are interlinked and more useful, enabling
adapts defenses immediately. Issues automatic reading by computers
Self-adaptive security requires strong Semantic data integration enhancing
Technologies and processes incorporate and business-driven Governance, analysis and decision making by
Security Operation Centers (SOC), Risk and Compliance analysis to help combining heterogeneous data sources
which rely on new generation Security systems understand what really must be

180 #AscentLookOut
Tech trends

Semantic search technologies allowing Discarding spurious information in autonomously thanks to cognitive
people to locate information by concept ontologies is difficult. computing, advanced algorithms and
Data providers usually generate revenue artificial intelligence.
Trajectory from advertisements that have to be seen Over time, more machines will enter our
Impact by human beings so may have no interest lives and they will become better, faster
Enable semantics-based technology in providing semantically-enriched and cheaper, according to Moores law.
automation by providing that meaning information. Advances in artificial intelligence, speech
explicitly, so machines don't need to A means for automatically establishing recognition and machine learning mean
derive it from within the data correspondences between vocabularies knowledge work can now be automated.
Help humans and machines understand is needed for when different data sources Machines will make increasingly
and communicate with each other at use different concept definitions. significant business decisions over which
the same level as people do among The Semantic Web is still unrealized humans have decreasing control.
themselves due to the size and complexity of the As such, smart machines have the
Allow technology to automatically use ambition. potential to significantly impact the
services on behalf of a user business dynamics of at least one-third of
Bring enterprise data integration to the Smart Machines the industries in the developed world in
next level by integrating heterogeneous Concept the future.
sources and augmenting corporate data Definition
with publicly available databases Smart machines refer to systems Issues
Give computers a better way to represent, embedded with cognitive computing CIOs must make the business aware
exchange and manipulate knowledge capabilities that are able to make decisions of the risks and opportunities as smart
Increase agility by dealing with and solve problems without human machines work more autonomously in
knowledge instead of just data intervention. They perform activities and support of business goals.
Allow computers to learn by themselves tasks traditionally conducted by humans, There are real concerns that smart
(machine learning) boosting efficiency and productivity. machines will replace both white and
Make data collected for a given purpose blue collar jobs in industries ranging
usable in other contexts Applications from manufacturing and warehousing to
Autonomous robots or vehicles shipping.
Evolution reshaping transportation, logistics, The impact on society will need to be
The RDF (which stores the semantic distribution and supply chain understood and appropriate action
metadata) and OWL (which defines management may need to be taken in areas such as
the ontologies which, in turn, specify Expert systems emulating the decision- taxation.
information meaning and relationships) making capabilities of a human to solve
were introduced and later standardized. problems that typically require expert Swarm Computing
The SPARQL semantic query language input in sectors such as automotive, Concept
was introduced and later standardized. consumer electronics, healthcare and Definition
Tim Berners-Lee published his thoughts industrial Also known as swarm intelligence or hive
on Linked Data on the W3C website Intelligent virtual assistants such as computing, swarm computing refers to
The Semantic Web at a global scale is avatars, which provide information and massively distributed, self-organizing
still a dream, but related ideas, concepts, service assistance to customers systems of agents that work collaboratively
standards and technologies are being Sensors collecting data about our towards a defined outcome. Each agent
used on smaller scale to provide physical environment without direct within the system has a simple set of rules
semantically-enriched services. human intervention to follow and only interacts with its local
Companies are providing commercial environment. The aggregate behavior
support for semantic solutions and using Trajectory of the agents leads to the emergence of
them in production. Impact intelligent global behavior.
Existing and legacy SQL-based data Increase efficiency and productivity
integration solutions are being turned into Raise earnings and profit margin potential With the number of nodes comprising the
a semantic data cloud. Offer a viable alternative to unskilled labor Internet of Everything (IoE) predicted to
Standardization efforts for while augmenting demand for skilled rise and many individual nodes likely have
transformations (RDB2RDF) are enabling labor limited compute capabilities, each would
more valuable information to be retrieved Complement tasks that cannot be be complimented by connection to other
out of the existing data maze by substituted by computerization objects in a community thus creating an
combining it with other data sources. IoE swarm.
Companies are increasingly providing Evolution
semantic search engines heavily based Prototype autonomous vehicles, Applications
on NLP. advanced robots, virtual personal Optimizing logistic chains and
assistants and smart advisers already transportation
Issues exist. Controlling driverless vehicles, optimizing
Ontologies are not easy to design and The explosive growth of sensor-based journey times and road usage
their relevance can always be debated. data will provide them with more context Coordinating the operation of complex
Gaining consensus around ontologies is about the physical world. infrastructures such as smart cities and
difficult, even in very specific fields. They will evolve to work more distributed power grids

Ascent Look Out 181


Tech trends

Predicting the behavior of complex under the primary control of different strengthening of objects on the Internet
systems, such as transport or logistic individuals or organizations. of Things (IoT) that are involved in critical
networks Communication protocols need to be processes.
Providing surveillance in military standardized to enable flexible and The next evolution is focusing on
scenarios dynamic interaction. securing smart, autonomous machines.
Delivering sensor network security There is a possibility that non- After all, as we become increasingly
Managing crowds deterministic behaviors, including reliant on robot surgeons, smart cars
Enabling opportunistic collaboration unexpected or out of control emergent and autonomous drones, absolute trust
Managing the economics of participation behaviors, may emerge. becomes vital.
by helping to engage resources, -- Swarm viruses, where swarm behaviors
encourage contribution and optimize are influenced adversely by rogue Issues
services components, may also emerge. These Most trusted devices require a
would have huge implications in use combination of hardware and software
Trajectory cases such as driverless vehicles. security since software security alone
Impact increases the risk of hijacking.
Creates a dynamic eco-systems of cyber- Establishing trust in today's increasingly
physical devices, each adding to the
collective capability and insight T connected world requires the successful
integration of secure elements (Secure
Allows operations and interactions to IoT) and management of huge numbers
adapt according to context Trusted Devices of identities (Next Generation Identity &
Improves efficiency and reliability of Concept Access Management and Big Data).
service provision through: Definition It may also require embedded contextual
-- Enabling ad-hoc collaborations, which Trusted devices are terminals and software- intelligence so that hacking attempts can
help built service networks powered objects and machines that are be detected and appropriate counter
-- Optimizing delivery schemes and made secure and trustworthy in order measures (such as the auto-destruction
communication patterns, which allow to protect data and process availability, of sensitive information) can be taken
information and services to be shared integrity and confidentiality. They include automatically
and exchanged human interaction devices such as
-- Creating reliability and dependability smartphones, payments terminals as well
from volatile resources, which help
manage uncertainty
as autonomous devices such as smart
homes and smart machines. U
Allows work to be distributed across
simpler devices (or robots) Trusted devices rely on high security Ubiquitous PIM
Complements other forms of artificial design, hardened software and hardware, Concept
intelligence and intensive certification processes Definition
Provides a significant step toward provided by trusted third parties (notably Currently most people use more than four
massively distributed computing models leveraging 'common criteria' norms). different information silos to store, manage
and transfer their personal information
Evolution Applications including Google, Outlook, Facebook,
The notion of swarm computing first Securing human communications and Twitter, WhatsApp, local drives, USB disks,
emerged in the 1990s. interactions with digital systems OneDrive, Dropbox and more.
Research into algorithms and simulations Ensuring the protection of critical
began shortly afterwards. infrastructures and automated process Ubiquitous Personal Information
Swarm computing was first use for including smart grid, connected Management (PIM) is a new approach
logistics and simulations. healthcare, smart cities and transports to storing personal information where all
In time, the miniaturization of mobile information is stored in a unified storage
hardware made swarms of micro-robots Trajectory system but still accessible and consumable
feasible Impact by multiple applications. The types of
Currently, swarm computing is closely Provides trusted terminals and smart information most suited to ubiquitous PIM
linked with robotics, the Internet of Things machines secured by design and with a approaches include messages (email, social
(IoT) and distributed cloud models. trustworthiness level depending on risk network posts, public website responses),
In the long-term, nano-robots swarms and process criticality that people can contacts, documents (texts, pictures, video)
may, for example, prove useful in rely on and calendars.
medicine. Mitigates risk of hacking and fraud at
a time when cybercrime is becoming Applications
Issues commonplace Enterprise Social Networks allowing
Agent-based programming is complex all applications to use the same storage
and skilled practitioners are not easy to Evolution layer and exchange/share all information
come by at this present time. Defense grade technologies have already needed
Integrating swarms with other centralized been introduced into civil terminals, Collaboration providing diverse
control mechanisms is also complex. notably secure smartphones for collaboration tools access to the same
Security is a huge concern, especially governments and CxOs. information, with each tool tailored to
if individual robots within a swarm are The major trend today is the

182 #AscentLookOut
Tech trends

the user's level of expertise and personal of our increasingly complex digital lives in
preferences
Business communications unifying V the future
May, in that case, transform customer
communications so users only need to engagement models with organizations
focus on the dialog and not worry about Virtual Assistants needing to interact with customers
the technology Concept through their assistant rather than
Definition directly; this would mean interactions
Trajectory Virtual assistants are software agents that need to be clear and concise and
Impact perform services or tasks on our behalf. would be significantly less susceptible to
Reduces complexity and eliminates They understand queries and can answer emotive advertising
vertical information silos them in a natural language. They exploit
Increases usability by making information artificial intelligence, natural-language Evolution
more relevant and consistent across a processing, machine learning, voice In the 2000s, search engines evolved to
multitude of applications processing and reasoning, and knowledge include more context, refining results to
Cuts energy consumption as information representation to make human-machine make them more relevant.
no longer needs to be copied around and interactions simpler, more natural and more Natural Language Processing (NLP)
kept in sync appealing. systems evolved to allow users to interact
Unlocks individuals from reliance on with a computer in conversational
multiple dedicated social networks, The tasks and services they perform rely language.
collaboration and communication tools on written or spoken user input, context More computing power became
Allows individuals to select the networks awareness and access to a variety of available, meaning natural language could
and tools that suit them best online sources, such as weather or traffic be processed cost-effectively.
Opens the door to a broad range of novel conditions, news, stock prices, schedules The rise of virtual assistants such as
products and services and retail prices. Siri signaled search evolving toward a
Is aligned with the Internet of Things (IoT) more personalized, interactive service
Applications and a gradual shift to an ecosystem of
Evolution Administrative assistance such as services mediated by a powerful software
Local file systems with applications began in-the-moment advice, querying and assistant.
sharing more and more information. reminding, supporting both personal and The virtual assistant will next be brought
Mixed local and cloud-based storage business events into the cloud, making it present on
solutions emerged, with some sharing Ongoing expert assistance including multiple devices: on users' bodies and in
information, but more of them longer-term projects or expert work their offices, homes and vehicles.
exchanging it. where their learning capabilities mean Future assistants will be able to detect
Mixed local, cloud and ubiquitous the more context they're exposed to, the exactly where users are.
PIM storage solutions then started to better their assistance becomes Advances in sensors (for example,
appear, initially combining contacts, Customer service assistance including microphones, cameras, accelerometers
communication, collaboration and in retailing, banking, insurance and and GPS in smart phones) will provide
documents through adapters telecommunications where they additional context for that assistant to
Soon, applications will leverage global supplement or supplant human leverage.
ubiquitous storage, with information customer-service representatives Virtual assistants are also learning how
exchange between ubiquitous PIMs Data mining of large structured and to detect emotions via voice analysis or
standardized unstructured data sets discovering facial expressions, whether the user was
In the future, people will no longer need patterns and anomalies, proactively moving, stationary or in a vehicle.
to worry about their information and a identifying problems, spotting Real-time learning capabilities will ensure
whole new domain of IT applications will opportunities and supporting decision- assistants remain current, as long as they
start to flourish. making have access to relevant data sets, or allow
Predictive expert assistance them to branch out into new fields.
Issues anticipating events and taking action
An enormous amount of work that needs before events occur Issues
to be done to realize ubiquitous PIM, Virtual personal shopping assistants The increasing fragmentation and
but only a few groups and individuals learning, predicting and serving complexity of our personal data reduces
are working on new ways to store consumers' tastes, needs and desires to the level of assistance a virtual assistant
information. help optimize their purchases can currently provide.
In fact, there are huge gaps in the Ubiquitous Personal Information
theoretical know-how needed. Trajectory Management (PIM) will help them
This current situation will remain Impact interpret all our digital information, but
unchanged until the fragmentation of the Decrease cost and increase efficiency they currently need adapters to connect
current data exchange systems become and customer satisfaction in customer to diverse data silos such as Outlook,
more evident. service desks while unifying corporate Gmail, Microsoft Live, Facebook, Twitter,
image across different channels LinkedIn and even local file systems.
Enhance application usability and The user needs to feel in control (for
improves information access tasks instance of where their data is used and
Are expected to manage more and more by whom) and to be able to trust the

Ascent Look Out 183


Tech trends

assistant to act in their best interest. -- Direct interaction with smart objects Spending on wearable technology is
Virtual assistants that are helping users initiating cloud-based services projected to reach nearly $20 billion in
purchasing things online will have the -- Information simplifying access to 2018.
power to boost certain firms and deprive resources and sharing knowledge Wearables may become a fully-integrated
others. Industry specific part of our personal and professional
The on-going obsolescence of the -- Healthcare training doctors, lives in the long term, providing a more
human worker by computers and assisting surgery, monitoring patients' discrete alternative to mobile while also
artificial intelligence applications may and doctors' health, recording enhances mobile with additional insight.
lead to society raising concerns about treatment, supporting and monitoring Some see wearables as the next step
virtual assistants as they become more medication regimes toward ambient computing.
advanced. -- Retail sharing product information,
merchandising, warehousing and Issues
stock management Interaction is tuned to the device's size,

W
-- Military and homeland security purpose and ergonomics.
monitoring activities, recording Devices would benefit from being able
operations, navigation and identity to automatically account for wider
Wearable Computing recognition environmental surroundings.
Concept -- Transport navigation, tracking, But advances in wearables depends
Definition measuring drivers' health on other technological advances
Miniature electronic devices with integrated -- Sport monitoring vital signs, including in sensors, displays, batteries,
sensing, computing and communication comparing results, adjusting to communications and augmented reality.
capabilities that are worn on the body. They environment and recording activities The effects of materials on the human
leverage the wearers context detected organism (allergic reactions, for instance)
by embedded sensors to deliver either Trajectory and radiation must be manageable.
general or specific services that enable Impact Power management and heat dissipation
the wearer to act in real time based on the In combination with cognitive computing, is challenging in such small devices.
information they provide. has the potential to enhance human Energy along with a failover strategy
abilities may need to be available during a
Although most popular wearables today Allows customer service representatives complete usage cycle in some use cases.
are smart watches, wearables can be found to understand individual's desires and In critical situations, such as medical
in different places of our body: tastes tasks, wearables and their users must
Attached to our wrist such as smart Enables the Body Area Network concept abide by legal constraints.
watches, bracelets and wrist bands enhancing the overall picture of the Wearables need to be transparent on
Around the head including headbands wearers context while the wider IoT information transmission, storage and
and helmets amplifies the devices knowledge of the processing, particularly where data is
In front of the eyes such as glasses, wearer shared with a wider ecosystem.
contact lenses, bio-augmentation Improves performance and cuts cost in
Around the ears as earphones field service and assisted maintenance Web-scale Computing
Implanted or embedded chips Opens up new business opportunities: Concept
including hearing aids -- Delivering health insights for Definition
On or in the hands such as gloves or marketers to tap into Also known as web-scale computing,
digital pens -- Offering incentives in exchange for hyperscale is a large, distributed, grid
Smart clothing and textiles including wearable usage and data computing environment that can scale-
bandages, t-shirts, jackets, socks, bras, -- Connecting mobile payments and out efficiently as data volumes and
belts and shoes customer loyalty workload demands increase sometimes
Embedded in jewelry including rings -- Addressing novel customer problems exponentially. Compute, memory,
and earrings that were previously out of reach of networking, and storage resources are
On the skin as tattoos the brand added quickly and cost-effectively.

Applications Evolution Often built with stripped down commercial


Cross industry Wearables were initially used in military, hardware, hyperscale optimizes hardware.
-- Security enhancing authorization, healthcare and medicine. Potentially millions of virtual servers may
authentication and tracking They are now focused mainly on well- work together to accommodate increased
-- Field services and maintenance being and activity monitoring for the B2C computing demands without, however,
integrated with SCADA to help with market. requiring additional physical space, cooling
trouble shooting, for instance Interest is broadening to new domains or electrical power.
-- Payments and expenses improving in the B2B market where smart watches,
mobile capabilities digital badges and smart bands are likely With hyperscale, total cost of ownership
-- Training providing support and to be of most interest initially followed by (TCO) is then typically measured in terms
recording and sharing activities smart glasses, emerging intelligent textiles of high availability and the unit price for
-- Condition monitoring collecting and embedded accessories. delivering an application and/or data.
health or environmental information Shipments of wearables are expected to
reach more than 60 million by 2017.

184 #AscentLookOut
Tech trends

Applications WebRTC Evolution


Enabling cloud, distributed storage Concept WebRTC was initially born in 2011 as a
and more across the web giants' large Definition free, open project sponsored by Google
distributed sites A collaborative effort by IETF and W3C, for enabling RTC communications in
Supporting businesses that must handle WebRTC is a free, open web standard that different browsers.
extremely high volumes of data and/ enables platform-independent, web-based, Firefox, Opera and other browsers began
or process millions of transactions plugin-free Real Time Communications to support WebRTC just over a year later.
with minimal downtime including (RTC) through standard browsers and on WebRTC is supported by almost all
banks, retail, mining and oil exploration, mobile devices. major desktop and mobile browsers
healthcare and pharmaceuticals and used by a growing numbers of
Supporting emerging technologies In essence, the WebRTC standard defines consumer services, such as Facebook
such as cognitive computing and the media processing software for voice and Messenger, and modern enterprise
Internet of Everything video embedded in browsers. It's extensible collaboration services (such as Unify's
and provides a standard API that aligns Circuit) to implement voice and video
Trajectory with HTML5 along with a mechanism for communications.
Impact passing session data between parties in WebRTC is part of HTML5 and, as such,
Provides the robust and agile communications sessions. it's expected to be widely supported
environment needed to support going forward.
tomorrow's intensive data processing, Commercial implementations are available Potentially five billion devices could
allowing organizations to maximize the and differentiate themselves through be WebRTC-enabled by 2018, with
value of their growing volumes of data defining signaling or collaboration models embedded devices leading novel
Offers a common, scalable platform that and enabling multi-participant sessions. WebRTC-based applications.
easily adapts to the ever-shifting business Peer-to-peer WebRTC-based video
and technology landscape Applications services will commoditize quickly.
Delivers space and power savings Browser-to-browser communication WebRTC is expected to replace existing
through its containerized data center including voice, video chat, conferencing, protocols in the long term.
units screen sharing, customer engagement, Enterprise grade multi-participant
Requires fewer commercial servers, entertainment, gaming and file transfer WebRTC and integrated collaboration
cutting hardware and administration cost and sharing services will remain compelling for the
Has the potential to transform how Enterprise communication such as next five years.
modern enterprises consume and click-to-call, contact centers, unified
manage IT communications and modern team Issues
collaboration The WebRTC 1.0 standard has not been
Evolution Education and training including virtual finalized yet with the community divided
Public cloud giants such as Google, classrooms and synchronous learning over some aspects of it.
Facebook and Amazon first developed Distributed messaging and coordination The lack of standards for some higher-
the technology to sustain their dramatic allowing humans and machines can level services could lead to compatibility
growth rates and deliver the agility they interact in a more natural and transparent and/or interoperability issues and
required without compromising service way market fragmentation, while offering
availability or quality. differentiation for commercial products.
Soon other organizations also began Trajectory Adoption has been slowed by lack of
to take advantage of that open source Impact support from some major browsers.
software. Simplifies deployment and reduces Integration with other non-web based
Hyperscale is now being explored by cost of browser-based communication RTC communication platforms requires
other types of businesses, including those solutions by eliminating the need for additional software.
with smaller and traditional enterprise IT proprietary plug-ins and apps WebRTC could lead to new kinds of
environments. Standardizes underlying transport security threats that might require new
Further technological advances are protocols and security mechanisms and innovative approaches.
paving the way for faster, cheaper and Allows any connected device with a
bigger hyperscale systems. WebRTC-enabled browser to become a Wireless Power
It is anticipated that hyperscale may communication device Concept
eventually be adopted by around half Makes voice and video more readily Definition
global enterprises. available in browser-based applications Wireless power describes the transmission
Enhances customer engagement and of electrical power without solid wires,
Issues increases revenues by opening the door using electromagnetic fields instead. There
Hyperscale modifies the IT roles and skills to rich interactions are two types of wireless power: near-field
needed by an organization. Allows humans and machines to interact charging that uses inductive or capacitative
Any serious growth in computing in a more natural and transparent way charging and far-field or radiative charging
including hyperscale may challenge Opens the door to new services that that uses beams from electromagnetic
energy resources. Telco carriers who are threatened by devices.
over-the-top voice services can actively
participate in Applications
Wearables including smart watches

Ascent Look Out 185


Tech trends

Health devices including hearing aids


and pacemakers
Electric transportation including cars
and buses
Customer gadgets including
smartphones and tablets
Industry including assets in factories
and warehouses

Trajectory
Impact
Allows electrical devices to be powered
where interconnecting wires are
inconvenient, hazardous or simply not
possible
Solves energy storage issues for the
electric car, while increasing its range and
reliability
Opens the door to a uninterrupted,
pervasive computing environment where
energy availability is critical

Evolution
Induction charging is not a new
technology, but its usage is restricted to
very few devices.
The technology has been evolving to
provide higher levels of charge, at greater
distances.
Standardization seems to be improving,
with the most important standards
converging in the AirFuel Alliance.
The explosion of wearables and
sensor networks, and their limited
energy capacities, has made wireless
power transmission a more interesting
proposition.
Increasing capacities are taking it to
wider domains, including transportation
(for electric vehicles) and healthcare (for
medical devices).
Tests are underway with special road
lanes wirelessly transferring power to
electric cars while they drive.

Issues
Energy efficiency needs to be optimized
further by eliminating potential energy
losses.
Energy management would benefit from
being simplified.
There are currently several standards,
limiting interoperability.
Security concerns are limiting its use in
certain environments.
Social fears are limiting its uptake, though
concerns about its impact on health have
no scientific base.

186 #AscentLookOut
Tech trends

Ascent Look Out 187

Anda mungkin juga menyukai