Download as pdf or txt
Download as pdf or txt
You are on page 1of 6

Look Out

Tech Trends Radar

Which technologies will power


your business tomorrow?
“Welcome to our latest Tech Trends Radar, powered by the Atos Expert Community!
Technology and its role within our lives is evolving at speed. As society is shaken
by major external events, it becomes ever more important to understand and
anticipate the world of tomorrow. We are here to help you on this journey. Designing,
developing and delivering the secure and decarbonized digital solutions that will
keep your business successful and sustainable in a changing world.”
Sophie Proust
Group Chief Technology Officer, Atos

Autonomous

Look Out Technology Radar:


Vehicles
Quantum
Computing
Brain-Computer
Interface Neuromorphic
Computing
key technologies set to impact
Smart
Machines Biocomputer you in the coming years.
Invisible
Immersive Computing
Experience

Digital Swarm
Twin Privacy-Enhancing Computing
Technologies Computing
memory

Cognitive Self-Adaptive
Computing Security
Exascale
Smart
Contracts
Want to know more? Examine
Internet of
Things Edge
Natural
User Interfaces H/W Accelerators 2.0
the Look Out Trends Radar
3D
Computing
IoT
Insight
Continuous
Authentication
Radar online to get deeper
Security
Printing Platforms
Cloud security Context Aware
insights into these strategic
5G
computing
QUIC
technologies and understand
Deep DevOps
Advanced
LPWAN
Location-Based
the steps you should take today
Learning Automation
Multi-Cloud
Services (NG)
for success tomorrow:
atos.net/lookout
Wearable Ambient
Virtual Assistants
Computing Working
Blockchain
Experience
Containers
Wireless Power
SDx Open Source
Hardware

2020 2021 2022 2023 +


© Atos 2020 All rights reserved.
Mainstream Early adoption Adolescent Emerging Source : Atos industry and technology experts

Time of impact Business Impact Maturity

2020 Look today at how solutions could Transformational Likely to require radical Mainstream There’s a clear need and many
address your needs. changes within organizations. clients are implementing solutions.

2021 Consider potential solutions by running High Will have a high impact at work and in Early adopter Clients are starting to look for
pilots, for example. people's home lives. solutions.

2022 Understand now. Consider potential Medium Will impact organizations' processes Adolescent Discussed more widely by
implications and how these could be & services or affect users' & consumers' lives. analysts and thought leaders.
addressed in your strategic technology
planning. Low Will impact specific processes & services Emerging Mainly seen in academia and a
or affect some aspects of users’ & consumers’ small number of specialized markets.
2023+ Follow for now. Watch how it's evolving. lives.

1
3D Printing Autonomous Vehicles Cognitive Computing
3D printing (3DP), or additive manufacturing, Autonomous vehicles is an emerging field Cognitive computing can be seen as an
is an innovative approach to manufacturing arising from the interaction of transportation integration of algorithms and methods
3D objects, materializing them from virtual vehicles and robotic capabilities, such as from diverse fields such as Artificial
designs created using CAD (Computer Added environmental sensors, context awareness Intelligence (AI), machine learning, Natural
Aided Design) programs. It can be used and autonomous decision-making using Language Processing (NLP) and knowledge
to create almost any shape or geometry, Artificial Intelligence. These self-driving representation to enhance human
extending from nanoscale to complete vehicles rely on these technologies to drive performance on cognitive tasks. It is able
buildings. To create the objects, the 3D printer themselves while recognizing and responding to learn and understand natural language
superposes layer upon layer of material using to their surrounding environment. as well as reason - and even interact more
various additive processes and not remove naturally with human beings than traditional
material as in traditional manufacturing Biocomputer programmable systems. Cognitive computing
methods. These layers may use different Biocomputers are computers that use systems can supplement human work in
materials, such as concrete, polymers, metals, biological materials such as DNA and proteins three capabilities: increased engagement,
paper, or even foodstuffs. to perform computational calculations that improved evidence-based decision-making,
involve the storage, retrieving and processing and discovery of insights hidden in massive
5G of data. They leverage the capabilities of living amounts of data.
5G represents the next generation of beings, relying on nanobiotechnology to
communication networks and services. It engineer biomolecular systems that provide Computing memory
is not intended to be only an evolution of the computational functionality. Computing memory represents a new
legacy communication technologies but also approach to solving the limitations of classical
a novel approach to fulfilling the requirements Blockchain (Von Neumann) computing architectures. In
of future applications and scenarios. 5G Blockchain is protocol. It’s pure software that this model, certain computational tasks are
requirements are based on three main public takes the form of distributed ledgers, using performed in place in a specialized memory
key infrastructures: cryptographic techniques to store a list of unit called computational memory. This co-
• Enhanced mobile Broadband records – or blocks – immutably, ordered existence of computation and storage at the
communications chronologically. It is a new model where trust nanometer scale could enable ultra-dense,
is established by design in a peer-to-peer low-power, and massively parallel computing
• Massive machine type communications network without the need for a trusted third systems. Resistive memory devices, where
• Ultra-low latency communications. party. Blockchains can be of various forms information is represented in terms of atomic
or flavors: private or public, permissioned or arrangements within tiny volumes of material,
permissionless. are poised to play a key role as elements of
Advanced Automation such computational memory units.
Advanced Automation uses bots, RPA, AI- Brain-Computer Interface
based tools (such as Arago HIRO) and other The brain-computer interface (BCI) is a direct Containers
technologies to offer an automatic and timely communication pathway between the brain A lightweight virtualization technology
response to incoming events or requests. and an external device based on neural that provides applications with an isolated
It aims to ensure reliable 7x24 availability of activity generated by the brain. While many environment inside a single operating system
IT-services combined with a further cost- approaches use invasive devices, the most instance, containers provide users and
reduction for these services. Depending on promising initiatives are based on non- applications running inside them with the
the use case and position along the service- invasive approaches. Electroencephalogram illusion and experience of running on their
chain, different solutions are available, from (EEG) devices record brain activity. EEG’s fine own dedicated machine.
the administration of the IT-hard/software temporal resolution, ease of use, portability
itself through the processing of data to the and low set-up cost has made it the most Context-Aware Computing
end-user experience. widely studied potential candidate for a non- Context-aware computing consists of
invasive interface. applications and services that take advantage
Ambient Working of contextual data about a person or object
Experience Cloud Security to anticipate the user’s needs proactively. It
Today’s further adoption of digital working As Cloud adoption and Multi-Cloud deduces context from the interactions among
solutions, particularly through the rapid deployments spread exponentially, the data before triggering actions based on
adoption of Cloud productivity and organizations are faced with challenging that contextual information to serve up the
collaboration platforms, has enabled questions like which type of Cloud to most appropriate content, product or service.
experiences to flow freely across devices as consume? Do I migrate to the Cloud by
well as non-device interface and enabled consuming a Cloud’s Infrastructure (IaaS)? In short it greatly improves how computers
the portability of the user persona across Do I transform my solutions by operating and software understand the situation user’s
multiple create and consume device types. them on a Cloud’s Platform (PaaS)? Do I are in.
This will further evolve into a new ubiquity. move my software to a Cloud’s Software
Personal devices won’t be a requirement in as a Service (SaaS) offering? Or, do I go Continuous
order to have a productivity or collaboration as far as containerizing my needs (CaaS). Authentication
experience; instead the facilities in which we Whichever Cloud offering is chosen, there are Continuous authentication exploits behavioral
interact, such as the conference room, will unmanaged security risks and data exposure. (passive) biometrics (a form of biometrics
identify users, meeting attendees and owners The mitigation of these is known as Cloud that exploits dynamic human characteristics)
of Cloud-stored content. They will also provide Security. Organizations will need solutions to establish that an individual is who they
fully integrated virtual assistant functionality for a single pane of glass security operation say they are. Well-known examples include
and immersive collaboration experiences in their Cloud and hybrid environment. voice, typing style, mouse use, heart rate and
based on tools, content management, Artificial Solutions vary from simple usage monitoring walking pace. Like all biometrics, continuous
Intelligence (AI) and Internet of Things (IoT) and security exposure rating to very specific authentication enables multi-factor
experiences built into the space. enterprise security policy enforcement. authentication when combined with other
Compliance with data privacy regulations and security mechanisms such as smart cards.
other legal rules will also require better Cloud
security testing and continuous compliance
monitoring/control.
Look Out Trends Radar 2
Look Out
Tech Trends Radar

Deep Learning located closer to the edge of the network,


Swarm is several autonomous instances of
is physically located in a private or public
Cloud or in a physical data center, beyond
Deep Learning is a branch of Machine
an application working in collaboration and the simple and often not realistic vision of a
Learning, common Artificial Intelligence
auto-organization. central and homogeneous data lake. It also
techniques used for Big Data processing
promotes access to insights in a way similar to
with algorithms that provide the ability to
automatically learn and improve the outcome Exascale the access to raw data. Examples include the
Exascale supercomputers refer to High- combination of streaming analytics analyzing
from experience without being explicitly
Performance Computing (HPC) systems data in motion in real time to accelerate
programmed. Deep Learning algorithms
capable of at least one billion billion time-to-insight; distributed analytics analyzing
are based on artificial neural networks
calculations per second (one exaFLOPS) — a data in situ within a distributed architecture;
inspired by the way animal brains analyze
thousand-fold increase over today’s petascale and prescriptive analytics, which makes
and process information with their neurons.
supercomputers. It provides a major step predictions based on its Big Data analysis and
They transform data in more abstracted
forward in addressing the new challenges of then suggests decision options.
representations that are facilitating decision
making. ‘Deep’ refers to the large number of the 21st century at a time when all sectors
layers through which the data is transformed, (but particularly industry, academia and Internet of Things
the level of abstraction improving along science) are demanding increasingly powerful The Internet of Things represents a
the number of layers the data is processed computing systems for resolving problems ubiquitous communication network that
through. The process by which a Deep involving ever-growing volumes of data. effectively captures, manages and leverages
Learning algorithm learn is called ‘training’ data from billions of real-life objects and
and the process by which it runs in H/W Accelerators 2.0 physical activities. Networks of spatially
production is called ‘inference’. In short, the With Moore’s Law in serious jeopardy, distributed sensors and actuators (nodes),
training phase is based on a trail-and-error general-purpose computing devices are no each with a transceiver and a controller
process to set and improve the parameters of longer sufficient to satisfy highly demanding for communicating within a networked
the layers, while during the inference, the data applications. Hardware accelerators are environment, detect and monitor events
is passing through the layers parametrized highly specialized computing devices (sensors) or trigger actions (actuators). Each
with the value obtained from the training. targeting a narrow field of computing. has a unique identifier and the ability to
Lastly, this couple composed of an algorithm They have a long history behind them, transfer data over a network without human-
and its set of parameters resulting from its starting from numeric co-processors and to-human or human-to-computer interaction.
training is called ‘model’. including consolidated technologies, such as
encryption accelerators, GPUs or FPGAs, that IoT devices range from human interaction
DevOps are gaining importance recently in scenarios devices, autonomous devices, as well
DevOps is a fundamental shift in the culture such as Deep Learning or Blockchain. as Industrial connected objects (IIoT) or
and philosophy for how to build and operate However, as other computing trends advance, Operational Technology (OT) devices.
software that encourages teams to focus the field keeps evolving to provide custom
on business value, work collaboratively, hardware for specific workloads where Invisible Computing
deploy software more frequently in smaller general-purpose computers are less efficient. Due to their nature, computing devices
increments, and build reliable solutions. New neural accelerators, new neuromorphic have long been at the center of our attention.
Furthermore, DevOps requires continuous processors and new specialized Artificial Smartphones, tablets, our laptops and
improvement across all of these dimensions. Intelligence (AI) components are clearly a desktops all take up a huge percentage of
trend on the roadmap of Intel, IBM, nVidia, our focus and mental reasoning capacity.
Digital Twin AMD and even governments such as China, However, with the rise of technologies like
A digital twin is a digital replica of a physical USA or the EU, so we could talk about speech recognition, chatbots, XR (AR/VR/MR)
asset, process, system or service across its ‘Hardware Accelerators 2.0.’ and advanced machine learning, the long-
lifecycle. This virtual representation of the kept promise of devices that deeply
physical world is, in essence, a simulation Immersive Experience and naturally integrate into our everyday
that extends the 3D renderings of computer- An immersive experience is one that is lives finally becomes within reach. In time,
aided design (CAD) models, asset models and designed to allow users to disconnect from this will result in IT becoming invisible and
process simulations used by engineers for the real world, in full or in part, and lose ready-to-hand.
decades with real-time information gathered themselves in a simulated environment.
from sensors in the field. In that way, digital The best fictional example of an immersive IoT Security
twins promote understanding, identify technology is the holodeck in the popular Trusted IoT devices are software-powered
problems, help develop new opportunities Star Trek science-fiction series. We now are objects and connected machines that are
and plan for the future. fairly close to developing the majority of made secure and trustworthy in order
the technologies needed for creating fairly to protect data and process availability,
Edge Computing complete simulated environments: virtual integrity and confidentiality. IoT devices
The growth of IoT and the emergence of reality, augmented reality, 3D displays, haptic range from human interaction devices such
ever-richer Cloud services together call for devices and even holographic user interfaces. as smartphones and payments terminals;
data to be processed at the edge of the autonomous devices such as smart homes
network. Also referred to as fog computing, Insight Platforms and smart machines; as well as Industrial
mesh computing, dew computing and Insight platforms (aka data fabrics) are connected objects (IIoT) or Operational
remote Cloud, Edge computing moves the third generation of business analytics Technology (OT) devices used as a control
applications, data and services away from platforms, after the Business Intelligence system for a power station or the control
the centralized model of Cloud computing to and Big Data phases. They represent a network for a rail system. Trusted devices rely
a more decentralized model that lies at the combination of new and existing technologies on high-security design, hardened software
extremes of the network. Edge computing is that collect and analyze massive data sets and hardware, and intensive certification
related to the concept of Swarm computing, from connected environments in real time, processes provided by trusted third parties
though control is handled in radically different rapidly transforming that data into actionable (notably leveraging ‘common criteria’ norms).
ways. While Edge is an application that is split, (prescriptive) insights. Their objective is to
spread and orchestrated over several devices provide a holistic view of data, whether it

3 #LookOutTrends
Location- Based Services change, fault-tolerance, and to incorporate
learning and self-development capabilities
to TCP+TLS+HTTP2 but a new multiplexed
and secure transport built on top of UDP.
NG to computation to contrast the traditional QUIC provides multiplexing and flow control
The ability to know the exact position of Von Neumann computing architecture. equivalent to HTTP/2; security equivalent to
a person, device or item along with the Since the original works pioneered by Carver TLS; and connection semantics, reliability and
capability to represent it in its surroundings Mead in 1980, the concept has evolved to congestion control equivalent to TCP.
opens a myriad of uses. This information integrate hybrid analog/digital structures,
becomes richer when we know the relative
positions of items with respect to each other,
event driven, distributed, fault tolerant, SDx
and massively parallel computing with the Software-defined anything/everything (SDx) is
their orientation and speed. promise to outperform existing most powerful an approach that replaces legacy — and often
computers yet remaining energy efficient. specialized — hardware controlled by physical
LPWAN mechanisms with software running on
Low-power WAN (LPWAN) is a wireless wide Open Source Hardware commodity hardware platforms. The concept
area network technology that interconnects The open source hardware model extends may be applied to a wide variety of aspect of
low-bandwidth, battery-powered devices with the ideas and methodologies popularized an IT system including networking, compute,
low bit rates over long ranges. Created for in open source software development to storage, management, security and more.
machine-to-machine (M2M) and Internet of hardware development. Documentation —
Things (IoT) networks, LPWANs operate at a
lower cost with greater power efficiency than
including schematics, diagrams, list of parts Self-Adaptive Security
and related specifications — are published With the growth of Cloud, APIs and the IoT,
traditional mobile networks. They are also able with open source licenses so other teams can cybercrime is constantly increasing in volume,
to support a greater number of connected modify and improve them, based on specific sophistication and impact. Cyber-defense
devices over a larger area. Most LPWANs needs. These are sometimes combined strategies have evolved toward new self-
have a star topology where, similar to Wi-Fi, with more traditional open source software, adaptive security principles. This approach
each endpoint connects directly to common such as operating systems, firmware or moves the emphasis from protection to
central access points. development tools. For instance, both Linux real-time detection and response, which
and Android operating systems are being adapts defenses immediately. Technologies
Multi-Cloud used in embedded devices. and processes incorporate Security
The new computing continuum will be a Operation Centers (SOC), which rely on new
heterogeneous environment based on the
decentralization and federation of diverse
Privacy-Enhancing generation Security Information and Event
computing entities and resource typologies.
Technologies Management (SIEM) technologies enhanced
Privacy-enhancing technologies (PETs) refer with machine learning and prescriptive
These will include multi-Cloud (and Cloud analytics. Self-adaptive security also relies on
to technologies involved in protecting or
federation) models with their diverse, new generations of context-aware security
masking personal data (whether employees,
decentralized and autonomic management technologies that dynamically adapt to
customers or citizens) to achieve compliance
and hybrid Cloud models that cross threats.
with data protection legislation and sustain
boundaries between internal and external
customers’ trusted relationships. PETs not only
Cloud services or between public, private and
community providers. Then, Cloud Service
protect very sensitive data (such as credit card Smart Contracts
information, financial data or health records), Used extensively and exclusively within
Integration (CSI) provides a flexible means
they also shield the very personal information blockchain, smart contracts are digital
for assembling these various Cloud-based
(including purchasing habits, interest, social peer-to-peer contracts written into lines
elements in support of business process that
connections and interactions) that digital of programming code. They are executed
transverse IT domains.
users are keen to allow some services to automatically to enforce a contract. Smart
leverage, but only provided some privacy is contracts allow business rules agreed by the
Natural User Interfaces respected. parties to be embedded across a distributed,
A natural user interface (NUI) is a system decentralized blockchain network and
designed to make human-computer
interaction feel as natural as possible. It is the
Quantum Computing executed as part of a ledger’s transactions,
Quantum physics bring a new computing ensuring transparency and mitigating any
outer layer of software that allows the human- conflict. A contract in its simplest form is
paradigm that is much richer than, while
to-computer interaction to be more similar a piece of software program/code and
complementary to, the famous Boolean
to the human-to-human interaction, and associated data that are stored in a block that
computing that is the foundation of computer
allows users to manipulate the contents and is part of a Blockchain network to perform
science. Built over the basic element of the
communicate with the computers in more a tasks such as store data, send data, manage
qubit, the so-called ‘Quantum computer’ uses
direct way using more natural movements, another contract with one or more parties,
quantum-mechanical phenomena to execute
actions, gestures or voice commands. NUIs or even provide function or service to other
operations on data. A theoretical concept
use a variety of technologies to interpret contracts.
born in the early 1980s, Quantum computing’s
human actions to control a computer system.
first technological implementations were
They process a large amount of data from
sophisticated sensors, such as webcams,
demonstrated 15 years later. Since then, the Smart Machines
Quantum computer has not yet reached the The term smart machines refers to systems
extracting meaningful signals or features,
mainstream, though tremendous advances embedded with cognitive computing
which they use to control a system in a natural
have been emerging on both the hardware capabilities. Their combination of AI and
manner.
and application sides. robotics allows them to make decisions and
solve problems without human intervention.
Neuromorphic Computing QUIC AI provides adaptability and capability to
Neuromorphic Computing refers to QUIC is an experimental protocol, created by process complex situations. Robotics provides
computational paradigms inspired by the Google and standardized in 2016 through the capacity to perform physical actions.
way human brain processes information and IETF. The name stands for ‘Quick UDP Smart machines perform activities and tasks
hence it is intended to mimic neuro-biological Internet Connections’, which is due to the traditionally conducted by humans, boosting
architectures similar to those of nervous fact it allows the fast and easy sending of efficiency and productivity. They come in
systems of living beings to provide new ways simple packets over the connectionless User different shapes and sizes: autonomous
of information representation, adaptation to Datagram Protocol (UDP). It’s very similar vehicles, self-flying drones, warehouse robots
and even robotic pizza ovens!

Look Out Trends Radar 4


Look Out
Tech Trends Radar

Swarm Computing
Swarm computing is the emergent collective
intelligence of groups of simple agents
having characteristics of self-healing, self-
configuration and self-optimization. It is
a group of similar elements (the swarm)
behaving through mutual interaction to
achieve an outcome as a collectivity. Learning
from nature in the man-made world, swarm
computing combines IoT, local networking
and Cloud capabilities to create on-demand,
autonomic and decentralized computing.
While Edge computing is the initial step
towards the decentralization of computing,
swarm computing will consolidate this trend
by exploiting IoT devices’ increasing rich
computing, co-operative intelligence and
intelligence close to it’ source. Combining
complex multi-Cloud architectures with Edge
computing will enable swarm computing
scenarios to develop. Swarm instances will be
temporal infrastructures created on demand
in response to specific needs.

Virtual Assistants
Virtual assistants are software agents that
perform services or tasks on our behalf. They
understand queries and can answer them
in a natural language. They exploit artificial
intelligence, natural-language processing,
machine learning, voice processing and
reasoning and knowledge representation to
make human-machine interactions simpler,
more natural and more appealing.

Wearable Computing
Miniature electronic devices with integrated
sensing, computing and communication
capabilities that are worn on the body. They
leverage the wearer’s context — detected by
embedded sensors — to deliver either general
or specific services that enable the wearer to
act in real time based on the information they
provide. Although most popular wearables
today are smart watches and bracelets, smart
clothes are going to grow in the coming years
and we will also have specific wearables that
can be found in different places of our body:
headbands and helmets, contact glasses,
earphones, globes, digital pens, jewelry, and
even tatoos.

Wireless Power
Wireless power describes the transmission
of electrical power without solid wires, using
electromagnetic fields instead. There are two
types of wireless power: near-field charging,
which uses inductive or capacitive charging,
and far-field or radiative charging, which uses
beams from electromagnetic devices.

5
About Atos
Atos is a global leader in digital transformation
with 110,000 employees and annual revenue
of € 12 billion. European number one in
cybersecurity, cloud and high performance
computing, the group provides tailored
end-to-end solutions for all industries in 73
countries. A pioneer in decarbonization
services and products, Atos is committed to a
secure and decarbonized digital for its clients.
Atos operates under the brands Atos and
Atos|Syntel. Atos is a SE (Societas Europaea),
listed on the CAC40 Paris stock index.

The purpose of Atos is to help design the


future of the information space. Its expertise
and services support the development of
knowledge, education and research in a
multicultural approach and contribute to the
development of scientific and technological
excellence. Across the world, the group
enables its customers and employees, and
members of societies at large to live, work
and develop sustainably, in a safe and secure
information space.

Find out more about us


atos.net
atos.net/career

Let’s start a discussion together

Atos, the Atos logo, Atos|Syntel, and Unify are registered


trademarks of the Atos group. February 2021. © 2021 Atos.
Confidential information owned by Atos, to be used by the
recipient only. This document, or any part of it, may not be
reproduced, copied, circulated and/or distributed nor quoted
without prior written approval from Atos.

CT-210202-CK-Look-Out-Tech-Trends

You might also like