Gartner: 10 Strategic Technology Trends for 2022

Gartner: 10 Strategic Technology Trends for 2022

Gartner has released its Top 10 Strategic Technology Trends for 2022 report. In it, the company identifies 10 key strategic technology trends that organizations should look out for in the next year. By strategic technology trend, researchers mean a trend that either has a breakthrough potential for moving from an experimental stage to a stage of wider application, or its growth is accompanied by a high degree of volatility (uncertainty), however, this does not prevent it from reaching peak popularity values ​​in five years.

“People-centered Intelligent Spaces are the framework used to organize and assess the impact of major strategic technology trends at Gartner for 2022,” said David Curley, Vice President and Fellow of Gartner. “Moving people to the center of technology strategy highlights one of the most important aspects of technology — how it affects customers, employees, business partners, society, or other key groups. We can say that all the actions of an organization are related to how they – directly or indirectly – affect people and groups. “

Smart spaces are based on a people-centered concept, he said. “Intelligent space is a physical environment in which people and technological systems interact in increasingly open, interconnected, coordinated and intelligent ecosystems. All of their elements, including people, processes, services and things, are shaping the digital universe, and with it a more immersive, interactive and automated experience, ”he added.

Top 10 Strategic Technology Trends for 2022:

1. Hyper-automation

Hyper Automation is a combination of multitasking machine learning (ML), batch software, and automation to get the job done. It deals with all the stages of automation itself (discovery, analysis, design, automation, measurement, monitoring and reassessment), but its main focus is on understanding the full range of automation mechanisms, as well as their relationship and how to coordinate them correctly. The emergence of this trend is associated with the growing popularity of RPA (robotic process automation), but the meaning of the term “hyper-automation” is broader – it means a combination of tools that help maintain object replication (synchronization of the contents of multiple copies of an object, for example, the contents of a database), in which not only RPA, but also human.

2. Multi-experience

Gartner predicts that by 2028, the user experience will undergo significant changes in how users perceive the digital world and how they interact with it. Interaction methods are changing due to interactive platforms, virtual, augmented and mixed reality. In the future, the combined shift in perception and interaction patterns will lead to multisensory and multimodal experiences. “The emphasis will shift from the technological literacy of people to technologies that will understand the behavioral motives of a person, guess his needs and desires. The burden of translating intent will shift from the user to the computer, ”said Brian Burke, vice president of research at Gartner.

3. Democratizing expertise

Democratization is about giving people access to technical expertise (such as ML and application development) or business expertise (such as sales or economic analysis) through a radically simplified method of delivering information without the need for intensive and costly training. Examples of democratization are “civic” professionals (for example, data processing laypersons or civic integrators) and the evolution of civic development models and no-code programming models.

According to Gartner forecasts, by 2023 the trend towards democratization of data and technologies will become more pronounced and will include four aspects: democratization of data and analytics (tools intended for data scientists will become in demand in the professional development community), democratization of development (AI tools will find application in special applications), democratization of design (the phenomenon of simplified low / no-code development technology will be developed in the form of automation of additional functions that will simplify application development and expand the capabilities of civilian developers) and democratization of knowledge (access to tools and expert systems will be obtained not only IT professionals, but also other categories of professionals, which will allow them, in addition to their own experience and knowledge, to apply specialized skills).

4. Human empowerment

Technology enriches the human experience by empowering it with enhanced cognition (cognitive experience) or physical benefits. Expansion of physical capabilities (physical augmentation) of people is provided through the use of wearable devices. Cognitive augmentation of human capabilities will occur both through access to information provided by traditional computer systems and through the emergence of a multifunctional interface in intelligent spaces.

The researchers believe that over the next 10 years, people will strive for personal development, increasing it through physical and cognitive enhancement. As a result, this will result in a new round of consumerization, as employees strive to use personal achievements to enrich and improve their office environment.

5. Transparency and traceability

Growing consumer concern over personal information control has forced organizations to recognize the importance of protecting and managing personal information. They are also prompted to do this by the steps of many states, which at the legislative level have toughened liability for violation of personal data processing procedures. Transparency and traceability are critical to meeting digital ethics and confidentiality requirements.

Gartner says the trend refers to a range of approaches, actions, supporting technologies and practices designed to meet regulatory requirements, ethics in the use of AI and other advanced technologies to address the growing distrust of companies. As organizations plan for transparency and trust programs, they need to focus on three areas: AI and ML; confidentiality, ownership and control over personal data; ethically justified actions of AI developers (adherence to Ethically Aligned Design, developed by the IEEE in 2016).

6. Edge Computing Gains Power

Currently, the main emphasis on edge computing is from the IoT side. It connects a huge number of connected devices, not only in the consumer space, but also in manufacturing or retail. The researchers anticipate Edge Computing will become the dominant technology for large-scale deployments of connected devices across virtually all industries in a wide variety of application scenarios. This is due to the fact that this technology is updated every year with new functions, specialized computing resources and operates with increasing amounts of data. Sophisticated peripherals such as robots, drones, autonomous vehicles and operating systems will further accelerate technology development.

7. Distributed cloud

A distributed cloud is the distribution of public cloud services across different locations while maintaining the responsibility of the service provider for their operation, management, updating and development. The technology implies a dramatic shift from a centralized to a distributed model, which will lead to a new era in cloud computing.

8. Autonomous things

In layman’s terms, autonomous things are AI-controlled physical devices that automate processes previously performed by humans. Examples of autonomous things are robots, drones, autonomous vehicles and devices. Due to the use of AI, the level of their automation goes beyond the rigid model of basic automation, therefore, the algorithms for the behavior of autonomous devices are more perfect, which ensures a natural interaction with the environment and people.

“As autonomous things proliferate, we expect a shift from single autonomous intelligent things to a swarm where they work together independently of or in contact with people,” Burke said. “For example, heterogeneous robots might be assembling. The use of an autonomous vehicle in the delivery market will allow the most efficient transportation of parcels to the target with their subsequent transfer to robots and drones that are on board and deliver them to the addressees.”

9. Practical blockchain

Blockchain is a promising technology, but its widespread adoption is hampered by a number of problems, including poor scalability and interoperability flaws. The potential of the technology is quite significant, so enterprises should immediately start experimenting with it, even if it does not promise a breakthrough in the near future. The potential of blockchain lies in providing trust and transparency between business ecosystems, potentially reducing costs, shortening transaction times, and improving cash flow. With these advantages, technology can reshape entire industries.

“Blockchain allows you to trace the history of assets from the moment of their origin, which significantly reduces the possibility of product substitution with counterfeit goods,” says Burke. – Asset tracking plays an important role in the supply of food, which allows you to quickly identify the source of contamination or individual parts throughout the supply chain, which is required for product recalls. Another area where blockchain has potential is identity management. In conjunction with the blockchain, smart contracts can independently initiate actions, for example, make a payment upon receipt of goods. “

10. AI security

AI and ML continue to penetrate software, business processes, engage in automation, improve the decision-making process and do much more, but at the same time they create problems for information security teams. Gartner predicts a significant increase in the number of potential attack points in smart spaces, which is associated with the increase in the use of IoT, cloud computing, microservices and connected systems. Thus, cybersecurity professionals need to focus on three key areas – securing AI-based systems, using AI to enhance protection, and preventing its malicious use.

 

Leave a Comment

Your email address will not be published. Required fields are marked *