Академический Документы
Профессиональный Документы
Культура Документы
Look Out
Trends 2016+
Market Context
10 Focus On: Reinventing Business in the Digital Age
14 Megatrends: Socio-Cultural, Economic and Political
24 CxO Agenda
Market Views
38 Aerospace 98 Healthcare
44 Automotive 104 Homeland Security
50 Banking 110 Insurance
56 Chemicals 116 Media
62 Cities 122 Oil and Gas
68 Consumer Packaged Goods 128 Pharmaceuticals
74 Defense 134 Retail
80 Discrete Manufacturing 140 Telco
86 Education 146 Travel, Transport and Hospitality
92 Government 152 Utilities
Tech Trends
160 Technologies that will Impact your Business
Introduction
Welcome to our latest edition of new business models as well as secure and future, enabled by technology. It will help
Ascent Look Out. It provides an in-depth agile operations. you make informed strategic decisions and
analysis of the emerging trends, business take the bold steps needed to stay ahead.
needs and technologies that will drive As such, our Ascent initiatives, which After all, today’s increasingly digital world
innovation in your industry and your own include Ascent Look Out, are designed to means you must embrace the full power of
business in 2016 and beyond. share innovation and thought leadership technology to fundamentally change your
with our partners and clients across all business.
As digital business empowerment takes industries and the business technology
center stage, your business of tomorrow spectrum. Delivered by our market and technology
will need to become radically different experts across the globe, it uncovers
to your business of yesterday. And our By blending business knowledge with hundreds of insights and innovations
responsibility at Atos, as trusted partner technology know-how, Ascent Look Out across 20 markets – critical trends that lie at
for that digital journey, is to ignite your systematically explores the key the intersection of technology, people and
imagination, sparked by our vision of a transformation challenges that will face any business that make progress possible.
future enabled by technology. business seeking to make digital second
nature. We hope you will enjoy the read and the
We will help ensure digital becomes second journey ahead with us, exploring the new
nature and is fully integrated throughout This sixth edition offers a clear, independent and stimulating opportunities that will drive
your business – from providing a seamless and authoritative cross-sector insight, your digital transformation in 2016 and
customer experience through to enabling painting a picture of your businesses in the beyond.
4 #AscentLookOut
Introduction
We’ve now entered the age of operations and routes to market. healthcare providers, amongst others,
face the seemingly opposing forces
digital disruption PA: We talk about that in the ‘Focus On’ of ‘maximizing process efficiency’ and
section, where we reveal five golden rules ‘personalizing user experience’.
Philippe Vannier: Patrick, so how should
for reinventing business in the digital age.
we introduce Ascent Look Out 2016+?
One is the horizon scanning that allows you Unlocking your potential
to systematically investigate tomorrow’s
Patrick Adiba: We could start by saying
trends and explore future possibilities. through innovation
that the speed at which technology is
impacting our lives is accelerating. PA: The next step is to work with the wider
PV: What’s more, horizon scanning within
an Innovation Value Web – with partners, ecosystem to come up with novel ideas
PV: Indeed, it’s radically reshaping the very that match these opportunities and threats
customers and peers – helps you unlock
nature of business, dramatically challenging with solutions built on new and emerging
novel ideas for that additional competitive
established business models across all technologies.
edge.
markets.
PA: Such as the partnerships with financial PV: Yes. Take the insight platforms
PA: Just look at the connected car. It will described in the Tech Trends section.
institutions that are allowing oil and gas
completely disrupt both the automotive Healthcare providers are using cognitive
companies to offer credit management in
market and adjacent businesses. computing to rapidly transform increasing
gas stations?
volumes of data into actionable insights.
PV: Have you seen how car manufacturers
are already offering new infotainment and Uncovering new opportunities PA: Behind the scenes, powerful high
maintenance services, thanks also to 5G, & preparing for uncertainties performance – soon ‘exaFLOPing’ –
the IoT, NFC and cognitive computing? computing systems perform complex
PV: Ascent Look Out begins our horizon simulations and analyses. These are vital for
PA: It will also significantly impact the scanning process with the megatrends: the anticipating diseases as well as delivering
insurance industry and our cities too. We’re social, economic and political waves that the customized dosing that offers more
already seeing usage-based insurance impact both our business and personal effective treatment.
models and smart traffic management. lives.
No matter how big or how small, how young or how well-established, every business and every
government organization is facing four key transformation challenges, whatever its industry
sector and geography. Ascent Look Out will help you recognize, understand and address the new
opportunities and novel threats brought by each of these key transformation challenges. We begin
by introducing Customer Experience, Business Reinvention, Operational Excellence and Trust and
Compliance.
Discover how the rise of digital technology increasingly important. A happy customer
has raised customer expectations for high will remember the experience they had,
quality and convenient service to new not what they bought, and come back time
heights across all industries. Note also how and time again for more of the same.
today's customers' elevated desire for that
personal touch is contrasted by a desire to And in return for that good experience,
Customer Experience do as much as possible for themselves. customers are happy to become your
social advocates, reviewing your products
To do this, customers need constant access and services while ‘liking’ your digital pages
Daniel Cohen to information and applications – from any in their multitude of social forums. So when
Head of location and on any device at any time. The potential new customers do their research,
Financial Services & technology has to deliver a consistent and that favorable evidence shines through
Insurance seamless service across all their favorite brightly. It could make all the difference to
channels – both physical and virtual. your ongoing success.
Our markets are constantly evolving. revenue models. You will find that this
Businesses are continually improving their data is also key to the multi-sided business
practices, not just doing things differently models that are driving innovation and
to drive efficiency but realizing the potential collaboration across markets.
of technology to do completely different
things. But digital is not a specific application or
Business Reinvention technology; it’s a cultural change. The
Business Reinvention is about full impact on business transformation is
understanding the value and insights that only felt when the supporting business
Bruno Fabre are so often locked up in transactional processes allow new business models
Head of business data. Customer insight and – and co-innovation models with their
Telco, Media & market analytics are helping them identify evolving stakeholders – to be defined,
Utilities new channels to market and new service implemented and managed.
opportunities.
6 #AscentLookOut
Introduction
Discover how highly efficient back-office Even though the two seem interchangeable
process elements are being triggered on the surface, IT and digital have their own
by real-time integration with flexible, specific agendas: IT requires a stable and
personalized customer interaction robust, yet flexible, infrastructure to keep
solutions in the new digital world. Through businesses running while digital demands
Operational Excellence the challenges an agile and open business model and
Operational Excellence of complexity are being overcome to internal processes able to respond at digital
allow otherwise disparate entities to speed to real-time, real-world changes.
deliver seamless and dynamic end-to-end
Philippe Miltin capabilities. Learn how organizations are combining
Head of both speeds to deliver cutting-edge
Manufacturing, Retail & Meanwhile the pressure to maintain current services supported by a reliable foundation.
Transportation IT operations and reduce costs while IT is robust, agile and cost effective while
simultaneously transforming the business enabling a truly responsive end-to-end
by embracing new digital opportunities business model.
continues across all industries.
‘‘With companies under pressure to
cut cost and deliver highly tailored
products and services, the connected
factory – where sensors embedded
in every machine are connected to
the plant’s Internet of Things – allows
management to rapidly react to
changing customer demands. ’’
Innovation has been on the corporate becoming flat, financiarization that incubators of the US, Europe and Asia. It
radar for many years, but has reached augments business fluidity, sustainability highlights bubbles of new players drawing
new heights in recent years. The figures constraints exacerbated by demographic billions in venture capital funding and initial
speak for themselves: today’s world is upheavals that are forcing us to invent public offerings (IPOs), hoping to find the
accelerating with innovation lead times new ways to leverage our world's limited unicorns of tomorrow. Too often, however,
declining and Schumpeterian rates of natural resources and, above all, the digital it neglects to see the profound changes
replacement rising. This, in turn, is causing revolution. that are silently rising at the heart of core
the tectonic plates of corporate business to industry players.
shift as never before, forcing corporations After having powered first business and
and organizations to profoundly transform then people, information technologies are Indeed the third digital revolution –
themselves for a new age. now going the last mile: digitizing things. explored in Atos' Ascent Journey 2018
This Copernican-scale revolution will vision, which is powered by our Scientific
transform the way we interact with our Community – is not just about streamlining
Innovation lead time & Schumpeterian
environment for ever, marking a definitive productivity or communication, as the first
disruption: a concurrent-acceleration
step into the digital era. two were. It, at last, combines the digital
The reasons? Multiple revolutions are and physical worlds into a new blended
happening at the same time, each ‘digical’ universe.
reinforcing one another. Hiding below the surface of the
innovation iceberg It’s no secret that the most publicized digital
This current issue of Ascent Look Out To characterize this move, the media companies are now investing in new and
explores them all: accelerated multi-sided repeatedly focuses on the obvious: startups diverse hardware domains – Google in
globalization in a world that is definitively rising to 'change the world' in the multiple robots, Amazon in drones, Apple in cars
Internet: 12 years
10 #AscentLookOut
Focus On
or others. Startups are often portrayed as a nutshell: they should make innovation most complex, yet the most crucial. It’s not
leading the innovators that will redefine part of their cultural mindset – not for something that can be done in ivory R&D
the data economy of tomorrow. Yet, many innovation’s sake, but in a pragmatic way. towers and it's not something you can ask
of the most fundamental disruptions Today's rise of Industry 4.0, smart cities and your customers for the answer to either.
expected in the coming years will arise connected health is an excellent testimony As Henry Ford is credited to have declared
from ‘traditional’ players striving to reinvent of this best practice. in the middle of the last century: “If we
themselves in the midst of Industry 4.0, had asked people what they wanted, they
smart cities, connected stores, smart Management plays a crucial role in making would have said faster horses.”
utilities and more. Under the surface, in the this happen. A recent Harvard Business
silent part of the digital iceberg, the dark Review highlighted that only 13 percent of As history has shown, disruptive innovation
layers of the innovation sea are where the factors stalling growth were external. That actually comes from unexpected places:
most spectacular megatrends of tomorrow means, in 87 percent of cases, successful anywhere from the interface between R&D
are taking shape. transformation in a changing landscape and the consumer to field trials and errors.
falls squarely on management’s shoulders. This is precisely what a connected digital
world favors.
Reinventing the innovation game
Rule number 2: Not just
What are the rules of this secret reinvention What’s more, in today's changing
game? How will companies successfully
innovating, but reinventing
landscape, enterprises must behave ever
transform years of assets and change business models more like investors. They must try and they
corporate culture, leveraging them for the must experiment – and they must ‘fail fast
new world? It's well known that, while incremental
and fail often’.
innovation is good, the greatest success
Through our co-innovation expertise and comes from disruptive innovation – from
After all, retailers, banks, telecom and
vast experience studying innovation best total reinvention.
media companies and others stand at the
practices with our customers, we have forefront of this revolution because they
developed five golden rules: Digital is disruptive. It changes everything:
experiment. To help them do so they have
distance (everyone is just a microsecond
created and nurtured open innovation
Rule number 1: Recognizing away on the Internet); time (everything
ecosystems that are both internal and
is getting closer to real time); complexity
the pace of change (today's computational power can solve
external incubators for partners and even
customers. Within these ecosystems they
more problems); cost (digitization enables
Change is hard. Oddly enough, it’s have created hackathons, APIs, open
zero marginal cost) and we're entering a
especially hard for the companies that have innovation platforms and more…
predictive - or even prescriptive - world.
been the most successful in the past. The
underlying syndrome is well-recognized: These companies have allowed
More importantly, digital opens up new
over-confidence, clutching at outdated themselves to be fully open to change and
opportunities for completely overhauling
models and, above all, inertia. opportunities that have come from the
existing business models. Innovation is no
outside in.
longer just about looking for technological
All too often, enterprises delay recognizing
progress; it’s about considering the
that they need to change. They go through
possibilities it opens up and the potential Rule number 3: Breaking long-
a common process: denial (‘It’s marginal'),
impacts. held beliefs
anger ('Why don't regulations stop that?’),
haggling (‘Which defenses can we build?’) As digital redefines the world, companies
After all, with each customer now just a
and depression (‘Couldn’t we partner or should not be afraid to rupture long-held
swipe away and the winner taking all in
buy someone?’) before final acceptance, industry models: they should not be wary
today’s 'superstar' economy, the search
when it's nearly too late. of evolving from ‘ownership’ to ‘pay-as-
for a business model that guarantees
excellence becomes crucial. Just providing you-go’, from ‘mass market’ to ‘mass
So, what is the secret to avoiding this personalization’ or from ‘customer’ to ‘co-
better service is no longer enough: you
pitfall? The answer lies in constant horizon supplier’, for instance. Though doing that is
must provide the ultimate experience.
scanning and questioning of the status never easy.
Doing more with less is no longer enough:
quo.
you must do better with less. Guaranteed
security is no longer sufficient: you must An open mind is more than just expected:
The early warning signs of change are it’s vital.
build trust. Incremental innovation is no
usually easy to spot, well before they
longer enough: you must completely
become visible on the revenue curve. They A recent American Management
reinvent your business models.
might include customer behavior shifts, Association study determined that only 10
competitiveness declines or talent drying percent of innovation investment at global
In a nutshell: don’t just target that extra 10
up, for instance. Companies need to react companies today is focused on developing
percent – target that extra 10-fold instead!
at this early point in time. new business models. However, 40 percent
Of all the challenges we see – Customer of the 27 companies born in the last
What's required? Companies must quarter century that grew their way into
Experience, Business Reinvention,
constantly question the status quo, the Fortune 500 in the past 10 years did so
Operational Excellence and Trust and
rewarding curiosity and allowing room through business model innovation.
Compliance – Business Reinvention is the
for experimentation and partnerships. In
Companies that have adopted the open- ownership in a world now moving from Whether your primary focus is on
minded approach that supports breaking product centricity to customer centricity reinventing your business model, fostering
the unquestioned mantra of their industry and ecosystem openness in an open world Customer Experience or growing
are therefore definitive examples of those where ecosystem mastery is key. Operational Excellence, building Trust and
that will succeed. We already see it today ensuring Compliance will be mandatory –
in the energy market with smart grid, Seen as a quadrant, these two axes provide in every case. Furthermore, all four of these
emerging in the transport industry with the businesses with a choice of four major challenges must be met simultaneously
collaborative economy and in the service categories to position themselves in for the for digital success, but some have more
industry with automation replacing labor. digital age. strategic weight than others depending on
the position you target.
But we're just at the beginning. If long- Which business are you in today? Where
held beliefs are broken we may, in fact, do you want to be tomorrow? Your choices So, your choice of position will determine
find tomorrow’s landscape turns out to be may be shaped, yet your competitive which of the challenges you have to face
even stranger than the one we’re currently strategy and focus will vary significantly, is most strategic alongside which strategic
expecting. depending on the choice you make. investments you must make.
Rule number 4: Choosing the It's hardly surprising that today's most Rule number 5: Constantly
right positioning attractive position – the one strived for adapting with analytics and
by all leaders – is the ecosystem driver, Artificial Intelligence solutions
Ultimately, digital transforms value chains which serves as the platform for entire
and creates novel ecosystems. It's therefore ecosystems. This position requires strong Last, but not least, like never before in
essential that you understand how best Business Reinvention strategies for both economic history, digital has led us to a
to position your organization in an ever- acquiring customers and attracting world where competitive positions may
changing digital landscape. innovation partners. move at any time, where today's winner
could be displaced within just a few
So, which are the best paths to success? But others models may also be of months and where tomorrow’s innovators
interest too. You may decide to remain may themselves be replaced even more
The future is never fixed. It's difficult to a silo supplier and continue play the rapidly. In a nutshell: we’re entering an age
give a definitive view in a new and yet commodity or niche value game. Or you of perpetual reinvention.
undiscovered digital country that pioneers might successfully position yourself as a
are still exploring acre after acre. The map modular producer and primarily play the Companies must play a continual game
is perpetually changing. Operational Excellence game. Or perhaps of internal R&D and startup acquisitions
you would prefer to choose the omni- just to maintain their pace in a fast-moving
Yet, two dimensions stand out right channel game, focusing on Customer world. We see it every day with the
now from this terra incognita: customer Experience. traditional industry players as much as
Ecosystems mastery
Source: adapted from MIT Sloan School of Management,
"Four business models for the digital era"
12 #AscentLookOut
Focus On
with the technology giants. Remember the Analytics is the missing link that will enable Atos has seen this trend for years. It should
billions spent on the Instagram, WhatsApp this constant reinvention. come as no surprise that the Atos Scientific
and Nest acquisitions? Community's Ascent Journey 2018 Vision
The digital world has a one specific feature was centered on the analytics life cycle and
So, how do you succeed in this unstable that is unique in history: it's a fully quantified that Thierry Breton, Atos' Chairman and
world? world. By connecting people, process and Chief Executive Officer, predicted that "The
things, it can measure customer feedback, 21st century will be the century of data, the
The answer lies in maintaining a constant process states and things’ behaviors – at new resource to boost the economy, as
focus on two strategic axes: any time. finance was in the previous century."
-- Perpetually reconnecting with end The advantage? It’s not only tracking The future may be uncertain, but one thing
customers and fully rearticulating the everything simply to deliver a better is clear: analytics, insight technologies
value chain around their expectations Customer Experience and improve and robotics will be among the core
through customer-focused strategic Operational Excellence, but also to identify technologies that will make the difference,
thinking. the weak signals that announce emerging as our CxO Agenda and Tech Trends radar
trends and opportunities for Business show.
-- Constantly generating additional value by Reinvention. In essence, we’re entering a
making others work for you, leveraging data-driven world where the winners will Welcome to the world of reinvention
not only social and peer-to-peer from be those who will succeed in turning this intelligence!
end-users, but also supporting the data into the intelligence that allows them
development of partner ecosystems to constantly adapt and reinvent their
through collaborative innovation business models.
platforms.
Megatrends: Socio-Cultural,
Economic and Political
Ascent Look Out begins our horizon scanning process with an analysis of the megatrends that will
advance the opportunities and threats in each of your markets. This section describes each of these
socio-cultural, economic and political waves, commenting on its trajectory and how it might impact
the transformation challenges you're facing.
SOCIO-
CULT
URA
L
Neo-Luddites Contemplating the
Singularity
Generation Z
Liquid Corporations
Secular Stagnation
vs Creative Destruction
Resource Security
POL
Addressing Global
Climate Change
14 #AscentLookOut
Megatrends
Addressing Global Climate Change areas will only get wetter and arid areas will of futurists who have nurtured 20th century
Concept become drier. Precipitation will decline in myths, notably through science fiction and
Evidence from the US space agency, NASA, the Middle East and Northern Africa as well prospective thinking.
shows a current warming trend across as Western Central Asia, Southern Europe,
our planet: sea levels are rising, surface Southern Africa and the US Southwest. While very prospective and promoted by
temperatures continue to increase despite Arctic resources may become more a small number of futurist thinkers, these
solar output decline, oceans are warming, accessible. ideas began to get concrete traction in the
ice sheets are shrinking, glaciers are 1990s. At that time pioneering thinkers,
retreating, and extreme weather events are Impact such as Ray Kurzweil (now CTO of Google),
becoming more common. In fact, all 10 of Climate change and public perception predicted that the technological singularity
our planet's warmest years occurred within of the causes have raised corporate would be reached around 2045.
the past 12 years. According to NASA, most responsibility and ethical operations on the
of the current warming trend is very likely agenda of corporate decision-makers, both These ideas have spread in recent
human-induced and proceeding at a rate public and private. This should accelerate years, with concrete advances in
that is unprecedented in the past 1,300 sustainability and energy transition nanotechnologies, cognitive computing,
years. initiatives. Digital initiatives such as smart gene therapy, robotics and life science for
cities, smart grids and electric cars will military (augmented soldier), healthcare
Trajectory play a major role in bringing innovative (prolonged life and cure of genetic
Adopted in Kyoto, Japan, on 11 December solutions and processes. diseases) and business applications.
1997 and entered into force on 16 Beyond 2020, exascale, and later quantum
February 2005, the Kyoto Protocol is an Faced, nevertheless, with the potential for technologies, should begin to surpass
international treaty that commits its 192 more extreme weather phenomena across the power of a human brain, opening
state parties to reduce the greenhouse the globe as a result of climate change, up potentially revolutionary applications.
gases emissions that are believed to be protecting assets from floods, hurricanes, Pioneering companies, including Google
the root of the human-induced climate blizzards and other disasters becomes and multiple start-ups, have already begun
change. In December 2012 the 18th United even more critical. Major investment to heavily invest in disruptive technologies
Nations (UN) climate summit reached an funds, such as BlackRock, consider climate with the long term goal of ‘solving death’ –
agreement to extend the Kyoto Protocol, change risk to be an investment issue. though this ambition far exceeds current
which was due to expire at the end of scientific capabilities.
2012, to 2020 with a stated goal of keeping Companies will need to ensure they have
climate change below two degrees Celsius. disaster recovery plans in place that both Meanwhile, a growing number of scientists
ensure data can be quickly and easily and industry leaders – most notably Bill
The 2015 United Nations Climate Change recovered in the event of a disaster and Gates, Stephen Hawking and Tesla Motor’s
Conference, COP21, negotiated the Paris ensure members of staff can continue to CEO and co-founder of PayPal Elon Musk –
Agreement, a global agreement on the operate from alternative locations. are raising concerns around the technical
reduction of climate change. Key elements singularity. Concerned about machines
included: endeavoring to limit global Contemplating the Singularity being able to think for themselves and
temperatures to one and a half degrees Concept potentially becoming more powerful than
Celsius above pre-industrial times; reaching With the pace of technological innovation humans, they are amongst the thousands
zero net greenhouse gases emissions accelerating, especially Artificial Intelligence, of people who have signed an open letter
between 2050 and 2100; and revisiting many expect that we will one day reach the proposing proper safeguards be put
global goals every five years beginning Technological Singularity – the point where in place to research and develop such
2023. machines would be more intelligent than intelligence without humans losing control.
humans. Furthermore, machines would be
Recent legislation from the European capable of recursive self-improvement, self- Impact
Commission (EC) has reasserted evolving their intelligence in an exponential Singularity and Transhumanism are at this
environmental issues on the economic fashion – unlike humans, bounded by slow point purely prospective thinking, even if
agenda. Its 20-20-20 targets include a 20 biological evolution. the technology community is supporting
percent reduction in European Union (EU) active research on disruptive artificial
greenhouse gas emissions; 20 percent of This concept is often associated with intelligence and life sciences by some
EU energy consumption from renewables; 'transhumanism' (or 'Posthumanism'), corporations and think tanks such as the
and a 20 percent improvement in the EU's a loose set of theories that foresee Singularity University.
energy efficiency by 2020. Its 2030 climate technology as a means to profoundly
and energy framework, meanwhile, targets enhance human intellectual, physical and If real progresses are to be made, this may
40 percent, 27 percent and 27 percent psychological capacities well beyond their lead to extreme opportunities. Research
improvements by 2030. The 2050 targets natural condition, ultimately leading to may also lead to the new social, medical
are currently being looked into. augmented or even ‘post humans’. and security risks highlighted by decades
of apocalyptic Sci-Fi culture. Many tech
Meanwhile, the US National Intelligence Trajectory leaders express concerns about the rapid
Center (NIC) has highlighted that climate Linked to the ideas of science and progress rise of the artificial intelligence that may
change will worsen the availability of some that have emerged since the 19th century, solve all our problems or, equally, threaten
critical natural resources. As the severity of human augmentation and transformation us within the coming decades.
existing weather patterns intensifies, wet through technology is a long-term dream
Corporations should follow these research megacities growing in parallel. Meanwhile, new business models will be
trends since they may profoundly Ultimately, growth may slow down even in crucial to driving inclusive growth initiatives
transform our world in the coming emerging countries, leading to stabilization in emergent economies such as in Africa,
decades. They must also show caution and then, potentially, a ‘demographic winter’ the Middle-East and India where the
around the business, legal, social and with the global population plateauing population explosion may create social
ethical implications and risks. somewhere above 10 billion people, but this unrest if resources and employment don't
is still subject to estimation. Sustainability at catch up.
Demographic Evolutions this level of population remains a concern
Concept for some prospectivists. Social welfare and health systems, on the
The world is in the midst of four key other hand, are becoming increasingly
demographic trends: a rapidly growing In 2015, the number of people aged 60 and strained as the relative size of the working
population; an aging population in the West over was 901 million – around 12 percent population reduces. Today's third digital
and increasingly in developing countries; a of the world’s population. This number is revolution, with its rise of automation
shrinking number of young societies and expected to grow to 1.4 billion by 2030 and and robotics, will help ensure services in
states; and growing urbanization. 2.1 billion by 2050. Currently, Europe has diverse domains such as smart healthcare
the greatest percentage of its population and smart cities remain sustainable as the
Trajectory aged 60 or over (24 percent) but all major population transforms.
The world’s population continues to areas of the world, except Africa, are
grow rapidly: the UN anticipates a global projected to have nearly a quarter or more Generation Z
population of 8.5 billion by 2030 and 9.7 of their populations aged 60 or over by Concept
billion by 2050, up from 7.3 billion as of 2050. Generation Z, generally acknowledged to
mid-2015. Overall, the UN expects Africa’s be those born after 1995, will come of age
population to be the fastest-growing, up In 2015, the median age of the world’s in the 2020s. Also called "echo boomers", as
from 1.2 billion in 2015 to 1.7 billion in 2030 population was just under 30, but the they echo the silent generation who were
and 2.5 billion in 2050. But it sees European UN projects this to increase to around 36 born just before the Second World War,
populations declining from 738 million in by 2050 and 42 by 2100. Median age is Generation Z was raised during the recent
2015 to 734 million in 2030 and 707 million lowest in regions with low fertility: it was economic downturn.
in 2050. 42 in Europe in 2015, where it's expect to
reach 46 in 2050 and 47 in 2100. In less Emotive, yet lucid, and in search of
According to NIC, 95 percent of recent developed region, median age was 20 in stability alongside flexibility, they were
increases have been in developing 2015 and projected to reach 26 by 2050 brought into a fast-changing, uncertain
countries, nearly all in rapidly expanding and 36 years by 2100. and economically depressed world. As
urban areas. The UN anticipates the teenagers, they saw their parents worry
proportion of people living in cities will Impact about keeping their jobs, making ends
grow, from 54 percent today to around Services must be aligned with aging meet and keeping a roof over their heads.
66 percent in 2050, with the number of populations in developed countries. Their focus is inherently global, with mass
16 #AscentLookOut
Megatrends
media bringing growing global issues quantify our individual performance – our task force of top 20 economies) to have
(including unemployment, climate change, health, our fitness, our finances and more continued to grow from $25 trillion in 2008
terrorism and humanitarian) to their regular – a clearer picture of our digital selves is to $75 trillion in 2013. This equates to 25
attention. emerging, based on our consumption of percent of worldwide financial assets, half
digital services. of the traditional banking system and is
Full digital natives, they have been equivalent to the global gross domestic
surrounded by social media, mobile Impact product (GDP), raising concerns about
applications, personalized online services Each generation tends to mark its epoch possible systemic effects of a next crisis.
and Cloud Computing since childhood. in opposition to the previous one, as
To them, virtual reality, nanocomputing, consumers, entrepreneurs and employees. Volatility has also increased with the
3D printing, driverless cars and other As consumers, Generation Z are marked rise of High-Frequency Trading (HFT),
innovations are simply the next step by a "what I want, when I want" culture, in which developed after the US Securities
forward. an epoch focusing on access rather than and Exchange Commission authorized
property, services rather than products and electronic exchanges in 1998. Automated,
Trajectory where alternatives are just a swipe away. algorithm-driven and enabled by
According to various models including the technology, HFT is executed in milli-, or
Strauss-Howe theory, generations evolved Meanwhile, employers looking to retain even micro-, seconds. Consultancy Tabb
through the recent modern history in four- Generation Z talents should offer this lucid Group estimated HFT to make up 56
phase cycles. The first phase of the current generation, whose blind fidelity is not a percent of equity trades by value in the US
cycle is characterized by the baby boomer given, flexibility and fulfillment. Meeting and 38 percent in Europe in 2010.
generation (1945-1960) "prophets" who high expectations and understanding how
were moved by freedom and individualism, to leverage empathy to build trust will be At that time, potential volatility due to HFT
initiating the protest movements of key. As consumers, they're less susceptible orders had already been experienced on
the 1960s. These are followed by the to manipulation. Organizations that fall several occasions with some equities losing
pragmatic, adventurous and sometimes below their standards will simply find their most of their value in a few minutes as a
cynical Generation X (1961-1981) "nomads", potential Generation Z customers look side effect of the concurrent algorithmic
characterized by the financiarization of elsewhere. chain reaction. Even if it was corrected
the 1980s, which saw financial institutions afterwards by human operators, this
and markets increase in size and influence. Global Market Volatility showed its potential to create or increase
And then the more disengaged Generation Concept market panic. Today, HFT is estimated to
Y (born 1982-1995) "heroes" who were Market volatility refers to the swings from account for 75 percent of all equity order
raised during the early phase of the boom to bust. Globalization, securitization volumes in the US, 40 percent in Europe
digital revolution and the beginning of the (the process of transforming illiquid and 10 percent in Asia, with potential for
economic crises in the Western world. assets into a security), private and public rapid growth.
debt along with the rise of supporting
Over-protected as children, Generation digital technologies have all contributed Together globalization and financiarization
Z "artists" tend to be risk-averse. They significantly to the fast financial growth of – where financial institutions and markets
distinguish themselves from the preceding these last decades. This, in turn, contributed increase in size and influence – mean
Generation Y by their increased desire for to economic growth, but also increased we now live in an uncertain world where
security and stability in a fast-changing market volatility risks. volatility risks are high. The US National
world where social and professional Intelligence Council (NIC) believes the
positions are progressively less stable. As Over recent years we have seen massive international economy will continue to
such, they tend to be conformists, since swings in the stock markets, going up and be characterized by various regional and
conformism provides a more secure path down in magnitudes that seemed hardly national economies moving at significantly
to success. thinkable before. These risks has been different speeds, exacerbating global
increased by the rise of High-Frequency imbalances and straining governments and
However, their search for security Trading, massive quantitative easing the international system. The key question
is combined with a strong need for policies from central banks and the rise of in their mind is whether the divergences
personal fulfilment and independence. shadow banking equivalent to global gross and increased volatility will result in a global
In an economy marked by the rise of domestic product (GDP). breakdown and collapse or whether the
freelancers, it’s not surprising that they development of multiple growth centers
value their careers, seeking security, Trajectory will lead to resiliency.
contentment and passion. They might Investment banks, mortgage companies,
have multiple employments, sometimes hedge funds and other non-bank financial Impact
in multiple countries, to ensure they won't intermediaries saw their finance activities Geopolitical tensions, potential social crises
find themselves in a risky position in an that were not subject to regulation – in high-demographic emerging countries,
economic bust. "shadow banking" – grow dramatically post private or sovereign debt crises, along
2000, playing a significant role in the 2008 with the impact of disruptive technology
When it comes to digital, it's not just financial crisis. Despite regulations being advances, could lead to new financial black
Generation Z whose lives are influenced enforced across the banking sector post swans. Governments and corporations
by today’s increasingly connected crisis, shadow banking is estimated by alike must therefore leverage prospects for
and monitored world. With emerging the Financial Stability Board (a regulatory growth, but be prepared for an uncertain
technologies allowing us to permanently and volatile world. They will need to
be more flexible and forward-looking, trillion – is now held by just one percent of percent higher than in 2015. It projects
reinventing their business models, building the population. Despite only accounting the number of millionaires to grow to
ones that are better able to resist that for less than one percent of the population, 49.3 million adults. In 2020, emerging
volatility. millionaires own around 45 percent of markets will likely account for 9.1 percent
global wealth. The geographical imbalance of millionaire wealth, one percent above
At the same time real-time stock market is particularly evident in North America and current levels.
analysis will help them become more agile Europe, which together contain 18 percent
in today’s fast-moving world. Enabled by of the global adult population, but account Impact
advanced analytics and high performance for 67 percent of total household wealth. Reduction of extreme poverty opens new
computing, this analysis will help them At the other end of the scale, in Africa and opportunities for low-cost products and
identify and react to stock market India the population share exceeds the services in emerging economies. Targeting
fluctuations more swiftly. wealth share by a factor of more than ten. new mass markets (such as the unbanked)
could prove very profitable. The billions of
Growing Global Middle Class Trajectory newly affluent middle-class households,
Concept OECD estimates that the world’s middle with their increased spending power, are
The World Bank hopes to see an "end class will swell from two billion to almost also reshaping global markets, offering
to poverty" by around 2030. This shift five billion by 2030, with growth coming renewed opportunity for growth in Asia,
encompasses two strong trends: a from developing countries while the middle Middle-East, Africa and Latin America.
significant rise of the middle class in class is squeezed in developed countries. Enhanced efficiency and improved
emerging markets accompanied by a productivity will be critical to offering the
significant drop in poverty, which has With increased wealth comes increased products and services they require at a
fallen to around 10 percent of the world spending power. Today, people in relevant price.
population. The Organization for Economic developing countries make up a greater
Co-operation and Development (OECD) percent of the world’s consumer spending However, the shrinking Western middle
defines middle class as those making than ever before, with that trend set to class means the share of adults living in
between $10 and $100 a day, adjusted for continue to rise. Spending by middle-class both upper- and lower-income households
the purchasing power of each currency, Asian consumers, for example, could is rising in developed countries. This
while the World Bank defines the threshold rise nine percent a year through 2030, requires suppliers to change their classical
under which an individual is considered to according to the Asian Development Bank. product segmentation to focus on upper
be living in poverty as $1.90 or less a day, and low-cost segments, at the expense
taking into account country-level data on Conversely, the spending power of the of mid-range solutions – a phenomenon
living standards. shrinking and struggling Western middle known as the "consumer hourglass
classes has plateaued, expected to only economy". This also opens opportunities
Counteracting this is the corresponding rise slightly over the next couple of for reinventing business with new models,
relative loss of purchasing power of the decades. This is due to a complexity of such as "as a service" or the "sharing
middle class in Western countries, as a factors, including aging populations and economy", targeting this changing balance
consequence of global rebalancing. This is an increase in single-parent households of wealth.
leading to social unrest in the West, made alongside automation, offshoring, and
worse by the widening gap between rich competition from workers of low-cost Liquid Corporations
and poor. countries. Concept
Liquid corporations take the concept of
This widening gap has been confirmed by Credit Suisse Global expects wealth growth "boundaryless" organizations popularized in
Credit Suisse Global, estimating that half to pick up by the end of the decade, the 1990s to a new level. In a volatile world
of global wealth – amounting to $250.1 reaching $345 trillion by mid-2020, 38 were billions of connected customers,
18 #AscentLookOut
Megatrends
things, partner, competitors and regulation moving to Europe, Northern America and Technology can also pay a key part.
bodies evolve in real time, massive use Oceania for almost half a century, fleeing Efficient and effective processes are vital for
of outsourcing, crowdsourcing and open conflict or seeking better education and eliminating uncertainty and ensuring new
innovation strategies enable organizations opportunities. arrivals are quickly settled into their new
to dynamically adapt to new market home.
realities. Growth prospects in the US and in Europe,
where workforce levels are declining, will Neo-Luddites
Trajectory depend on these immigration flows, but Concept
The increased pace of innovation and immigration may also lead to multi-cultural The rise of technology creates expectations
chaotic markets changes are putting tensions. and fears. In the 19th century, a social
immense pressure on corporation movement of British artisans, the Luddites,
strategies: 45 percent of Fortune 1000 Trajectory violently opposed technological advances
companies were replaced between 1983 According to the UN, between 1950 and in the textile industry. Considering their
and 1993, rising to 70 percent between 2015, the major areas of Europe, Northern skills as property to be protected, they
2003 and 2013. America and Oceania have been overall net argued that machines undermined the
receivers of international migrants, while labor skills that were a crucial part of the
While creative destruction is accelerating, Africa, Asia and Latin and the Caribbean economy.
monolithic organizations inherited from have been net senders.
the past are increasingly evolving toward Similar new technophobic groups are
complex, open ecosystems. Enabled From 2000 to 2015, high-income countries emerging today. These "neo-luddites"
by digital, they take best practices from received an average of 4.1 million net believe modern large corporations with
start-ups, the technology giants and open migrants annually from lower- and their modern technologies threaten their
communities. middle-income countries. But migration is way of life and their livelihoods. As such,
accelerating, particularly towards Europe they have developed radical resistance to
Focused on customer requirements, with conflicts in the Middle East and very technology.
procurement, operations and delivery strong growth in Africa driving people out
are dynamically executed across an of their homelands. Furthermore, some Their "neo-luddism" is mostly founded on
open network of suppliers and partners, prospects foresee unpredictable spikes in loose, radical anti-system movements.
blurring traditional silos between providers, migration driven by climate change-related It covers a wide variety of beliefs: from
operations and customers. The rise of events. groups preaching economic decrease and
fabless corporations, outsourcing, BPO, the return to the soil to technophobic groups
gig economy and crowdsourcing is a clear The UN expects high-income countries (including anti-nuclear, anti-GM and anti-
sign of this happening. Some estimate that, to receive 91 million immigrants between nanotechnologies).
by 2020, 40 percent of US employees may 2020 and 2050, while total births in these
be freelancers, for instance. countries may exceed deaths by 20 million. Trajectory
Thus, net migration may account for 82 Neo-luddites are currently a very small
Impact per cent of population growth in the high- minority. However, the coming hyper-
Ultimately, a liquid organization is not income countries. connected world that may lead to threats
a stable, fixed structure; it federates an on privacy and the rise of automation and
ecosystem that can adapt to market As aging high-income countries struggle robotics that may pose a significant threat
changes in near real time. Organizations with fewer people of working age, the to employment may drive an increase
should take advantage of these trends vacuum may be filled by immigrants from in their numbers. Some estimate that as
toward a networked economy to gain low-income countries. These opportunities many as 60 percent of current jobs may
agility and flexibility. are balanced by risks that call for be automated by 2022, with extreme
accelerated inclusive growth and education scenarios pointing to a risk of 90 percent
A dynamic ecosystem of providers initiatives. unemployment by 2030.
spawned across suppliers and continents In the previous industrial revolutions,
may function at the expense of Impact Schumpeter’s "gale of creative destruction"
accountability. This increases the risk Transnational migration flows shape has always succeeded in replacing
of compliance issues, business failures societies’ character. Households in the West extinguished jobs with new ones. The 19th
and loss of customer trust as such, are increasingly multi-ethnic. However, century Luddite artisan movement, for
organizations wanting to implement ‘liquid co-existence of ethnically different instance, progressively vanished with the
corporation principles’ will need to set up populations might lead to nationalistic rise of the new industrial economy and its
strong governance processes. and ‘communalistic’ (where people see employment opportunities.
themselves as part of their ethnic, cultural
Migration: Sedentary versus Nomadic or religious group rather than part of the However, the speed and scale of the
Concept wider community) tendencies. Countries current transition is complicated to project.
Economic and demographic inequalities must decide how they should react to Nevertheless, it creates the risk of revolt
between low- and high-income countries increasing migration. Tighter regulation and again the high rises in unemployment and
have driven migration patterns around border controls may be needed. radical inequalities of wealth that are usual
the globe for many years. People from in massive destructive creation eras such
Asia, Africa and Latin America have been With large migrations comes the need as the one we are experiencing today with
for strong social and education initiatives. the third digital revolution.
Ascent Look Out 19
Market Context
Impact collective intelligence, building networks in the industry, buildings and transport
The economic impact of today's third and organizing their community activities sectors; progressively reducing the use
digital revolution creates both opportunities by themselves. There's increased of the least-efficient coal-fired power
and social risks that must be carefully awareness around and participation plants and banning their construction;
managed at international, state and even in charities and non-governmental increasing investment in renewable energy
corporation social responsibility level. organizations (NGOs) thanks to social technologies in the power sector from
Governments and corporations alike networks. $270 billion in 2014 to $400 billion in 2030;
should concentrate on inclusive growth gradual phasing out of fossil-fuel subsidies
initiatives to increase jobs and social care, Co-operation is also an important behavior to end-users by 2030; reducing methane
helping build the trust amongst the general trend for the more digitally-connected emissions in oil and gas production.
population that is crucial to mitigating any generations Y and Z, as are connections
risk. At the same time, they must protect and relationships (community), social or Impact
the privacy of individual’s data while personal justice and authenticity. These Proactive efforts will be required by
increasing transparency and inclusivity, for groups tend to be more socially aware than policymakers in combination with private
instance. their predecessors. sector partners to avoid a future dominated
by natural resource scarcity. Strong
Technology, on the other hand, provides Impact technology innovation will also play a vital
many opportunities to not only promote Public and private sector organizations role in optimizing resources in the next
an inclusive society, but also enable must put the power of communities at 15 to 20 years. This will not only include
sustainable growth that is good for the the heart of their digital strategies to build genetically modified crops, precision
environment. Some technologies ensure trust with the people they serve. It could agriculture, water irrigation techniques,
physically disadvantages individuals have be through the facilitation of peer-to-peer solar energy, advanced bio-based fuels and
access to information and services, for and social exchanges through or around enhanced oil and natural gas extraction via
instance; others optimize our use of natural their services or products. It could also fracturing; but also the smart technologies
resources. be through open innovation serving as a that will help optimize resource (oil, gas
platform to let communities form and grow, and water) usage through simulation and
Power of Communities ultimately extending solutions and services analytics.
Concept thanks to social and third party dynamics.
Increased personal and social mobility Either way, they must not only listen, but Furthermore, simulation and analytics
decreases the likelihood of multiple also react and contribute, leveraging the will also be core to improving resource
generations of the same family living in voice of the community to steer them in a (oil and gas) exploration and developing
the same geographical area. It also leads constructive direction. the next generation of sustainable
to a rise in single person households, with technologies that include genetic
young professionals, in particular, more Resource Security (Energy, Water, Food) engineering, nanotechnologies, nuclear
likely to move around and live alone, Concept fusion and others. In addition, new services
away from their traditional (family) and The world’s resources are under ever- will not only give the consumer a better
geographical networks. increasing strain owing to an increase in understanding of how they're using
the global population and the consumption resources, but companies can also leverage
As a consequence of this, and possibly patterns of an expanding middle class. This them to encourage good consumer
as a backlash against the trend towards strain is only being exacerbated by climate behaviors aimed at reducing the strain on
individualization, new ways of community change and environmental changes due to those resources.
building are emerging. Much of this that population growth, urbanization and
activity occurs on the internet. This human related activities. Return of the Blocs
digital connectivity is leading to a rise in Concept
‘"communalism" (where people seems Trajectory Throughout history, wars and economic
themselves as part of their ethnic, religious The US National Intelligence Center (NIC) depressions (or recessions) have led to
or cultural group rather than the wider projects that demand for food, water and increases in protectionism, while peace
community) and social activism driven by energy will grow by approximately 35, 40, and prosperity have tended to encourage
the power of communities. and 50 percent respectively by 2030. free trade. Current economic geopolitical
tensions may mark a return of trade blocs:
Trajectory The energy sector, in particular, is shifting to trade alliances across countries that have
In the industrialized nations, the apparent a low-carbon path that supports economic common ambitions. Furthermore, the
loss of physical communities is seen as a growth and energy access. In line with the current currency war taking place amongst
key cause of social disintegration and of the Paris Agreement drafted at the 2015 United the central banks is significantly increasing
emergence of antisocial behavior. In our Nations Climate Change Conference, COP risks for cross-border trade and investment.
virtual worlds, communities are growing. 21, the International Energy Agency has
Worldwide, there are over 1.49 billion underlined a number of measures that Trajectory
monthly active Facebook users. could lead to a peak in global energy- The passage of GATT (General Agreement
related greenhouse gas emissions while on Tariffs and Trade), from the post Second
Focus is shifting away from the individual supporting economic growth and providing World War era until the early 1990s, saw
toward the community and common energy to more people. These measures many protectionist trade barriers fall. The
welfare. People are making use of their include: increasing energy efficiency fall of the Soviet Union in the early 1990s
20 #AscentLookOut
Megatrends
led to hope for the return of free trade. Secular Stagnation (versus Creative However, based on long-term economic
In 1995, such trade protection was Destruction) cycles, economists inspired by Kondratieff
formalized with the creation of the World Concept and Schumpeter theories also recognize
Trade Organization (WTO). Since then, Global economic activity remained recent deflation, bankruptcies, banking
numerous free exchanges zones have been subdued in 2015, according to the crisis, credit crisis and more as the "winter"
created or are being negotiated. Examples International Monetary Fund (IMF). Growth season of the 1970-2010 economic cycle
include the North American Free Trade in emerging markets and developing powered by the first generations of
Agreement (NAFTA), a trilateral rules-based economies declined for the fifth information technologies.
trade bloc in North America involving consecutive year, while a modest recovery
Canada, the United States and Mexico; continued in advanced economies. While Ongoing innovations created by the
the Trans-Pacific Partnership (TPP) that some believe this stagnation is simply a third digital revolution, combining digital
makes it easier for American companies conjectural hangover effect of the 2001 with nanotechnologies, biotechnologies
to sell Made-In-America products across 11 and 2008 crises, others warn economies and cognitive sciences, may provide a
other countries; and the Transatlantic Free risk becoming trapped in an extended significant contribution to solving this
Trade Area (TAFTA) proposal for creating and structural period of slow growth in issue, possibly leading to a new growth
a transatlantic free trade area covering productivity, income and job creation. era culminating around 2030. In the short
Europe and North America. term, the next wave of IT/OT convergence,
Prospects of accelerated innovation, along with Industry 4.0, smart cities and
The return of conflicts and geopolitical however, may sustain the alternative other technology-enabled transformations,
tensions with Russia, China, Latin America scenario of a new era of growth, similar to could rapidly bring a whole new boost to
and Islamic countries over recent years that which followed the invention of steam productivity and the economy. Together
has seen numerous import and export and electricity. The rise of the Internet of they could help answer two major
restrictions put in place. These restrictions Things (IoT) and Industry 4.0, along with opportunities on the horizon: the silver
work by means of tariffs, subsidies, import nanotechnologies, biotechnologies and economy in the West and the growing
quotas or handicaps placed on imports. cognitive sciences, may bring the boost demand for low-cost solutions and services
They can also include tariffs being imposed economies need to avoid the pessimistic from emerging countries' popular and
on products not produced in a sustainable scenario. middle classes.
fashion, or as stimulus packages for the
development of clean technologies. Trajectory Impact
The economic stagnation of the past Whatever the causes, low growth prospects
Impact decades is attributed by economists to will create concerns in the short term.
The return to the blocs may touch IT in various factors. They notably include More than ever, corporations must prepare
particular since IT is seen as an increasingly demographics (aging population in for a sluggish and competitive world.
strategic sector, touching all verticals. In this developed countries) and macro-economic Leveraging innovation driven by new
domain, there's a rising will from several issues (including an excess of savings over digital opportunities is not only a matter
large countries and unions (including investment, debt overhang and supply-side of competitive survival; it’s critical for any
China, Europe and Brazil) to develop headwinds). A slowdown in technology company wanting to position itself at the
their own industries, especially in high- innovation is also mentioned among the core of future growth opportunities.
performance computing, cloud, software key factors, with recent years’ immaterial With digital automation and robotics
and security. The PRISM case has notably innovation creating less nominal growth decoupling productivity growth with
driven many countries to grow regulations and productivity improvement than in jobs and income, the possible social
to protect technologies and data better previous decades. impact of automation must, however, be
through local trusted suppliers and local carefully watched for by policy makers and
data management. corporations alike. After all, the success
22 #AscentLookOut
Megatrends
nc l
nc l
lle na
lle na
n
n
ce
ce
rie er
rie er
e
e
e
e
tio
tio
inv ss
inv ss
ce tio
ce tio
nc
nc
an
an
Ex stom
Ex stom
Co ust &
Co ust &
Re ne
Re ine
en
en
Ex era
Ex ra
pli
pli
i
e
s
s
pe
pe
Op
Op
m
m
Cu
Cu
Bu
Bu
Tr
Tr
Addressing Global
Climate Change Neo-Luddites
Contemplating the
Liquid Corporations
singularity
CxO Agenda
As you start your digital journey, understanding how your challenges might evolve will help you
to be more resilient, more prepared for the uncertainties that lie ahead. Equally importantly, it will
sharpen your understanding of how technology can help you overcome the obstacles and take
advantage of the possibilities along the way.
24 #AscentLookOut
CxO Agenda
possibilities freely and come up with novel seconds? How many people are on board? partner of the partner, for instance, doesn’t
innovations. In fact, many innovations Is my oil level getting low? Is their flooding act inappropriately is crucial for protecting
require organizations to share insight on the line? a company’s reputation.
across the ecosystem – but only with
the owner’s approval. While each player Increasingly smart and specialized in a Meanwhile, sensors on smart, connected
individually is leveraging that to add specific task, individual things are part of machines, vehicles and devices are
value its own service, the ecosystem also a highly-connected ecosystem – a smart producing greater volumes of data every
works together to deliver a seamless and cyber-physical system that comprises second of the day, data that is vital for
consistence experience across the entire smart autonomous machines and devices. ensuring operations run smoothly. These
service. Each is able act autonomously, to not only growing data volumes give fraudsters and
maintain an environment that maximizes terrorists more opportunities than ever
A note of caution: With all this productivity, but also to respond the before: terrorists threatening to disrupt
transformation taking place, we believe changing needs of its wider ecosystem. essential utilities, hackers holding customer
organizations should be careful not to information to ransom, blackmailers
neglect properly planning the phase out It acts in real time based on a combination compromising patient data and fraudsters
and maintenance of their legacy business of its own data and data shared by the stealing assets and identities.
along with its supporting processes and wider ecosystem. IT systems help with
tools. In the fight back against the new agile managing and processing the growing Businesses of all types and sizes are
market entrants, adapting the historical volumes of data; they also connect the leveraging technology to store their data
business is key to staying ahead of the new ecosystem to the wider world – to human more securely. To combat cybercrimes,
players. operators along with CRM, PLM and other their security focus has turned from
systems. blocking threats after they hit to detecting
and eliminating them before impact.
The future of After all, new levels of automation Real-time monitoring and analysis are key.
Operational have led to supply chains becoming Only by identifying the tiny early clues
Excellence increasingly disaggregated and dynamic. that something is amiss can organizations
prevent a threat before it takes hold.
Intelligent robotic manufacturing systems,
for example, rely on information from
partner systems to predict demand After all, people have become more aware
Today’s manufacturing plants, warehouses, more accurately and adjust behaviors of privacy and the importance of knowing
stores, cities and transport systems are accordingly. how their data is stored, shared and used.
more flexible, more agile and responsive, They expect traceability and control to be
than ever before. They are also more A note of caution: We believe that, as maintained whenever their personal data
efficient in delivering products that are systems become smarter and able to solve is shared along the value chain. The more
massively customized and services that are more complicated problems, organizations informed and in charge they are, the more
highly tailored. need to take care they don’t build systems willing they are to share their information.
that are over sophisticated, so highly They happily opt in and out of the growing
Internally, sales, marketing, research and complex that one small problem can number of services and information feeds,
production have become more closely cause a string of unforeseen failures. A eliminating those that provide little value.
linked while externally the entire supply comprehensive, yet understandable, end-
chain collaborates more effectively than to-end view of operations is still required so This increasingly complex world is matched
ever before. With operations streamlined, organizations can make rapid and smart by tighter regulations and more intense
organizations can handle more information, decisions based on that insight. scrutiny. Companies are becoming used
operate faster and respond more rapidly. to being constantly monitored. With
Companies have moved from working transparency and accountability high on
on timescales based on months or years The future of the agenda, they’re not only leveraging
to ones based on days and weeks, giving
the business more confidence in a fast-
Trust and technology to quickly adapt to new
Time of impact
2016 Look today at how solutions could
address these needs.
2017 Consider potential solutions by
running pilots, for example.
2018 Understand now. Consider potential
implications and how these could be
addressed.
2019+ Follow for now. Watch how it's
evolving.
Business impact
Transformational Likely to require
transformational changes within
organizations.
High Will have a high impact at work and in
people's home lives.
Medium Will impact organizations'
processes & services or affect users' &
consumers' lives.
Low More likely to require minor
improvements than radical changes.
Maturity
Emerging Mainly seen in academia and a
small number of specialized markets.
Adolescent Discussed more widely by
analysts and thought leaders.
Early adopter Clients are starting to look
for solutions.
Mainstream There's a clear need and
many clients are implementing solutions.
26 #AscentLookOut
CxO Agenda
TRANSFORM
ATIO
NAL
HI
GH
Maturity
Mainstream
Early adoption
Adolescent
Ambient Computing Emerging
ME
DI
Omics
UM
Personalization
Economy of
Data
API Economy
Innovation
Servitization Value Webs MOOCs Protecting Digital
Property
Cyber-Physical
Systems
Gig Economy
Bi-Modal Neurobusiness
Industry 4.0 Businesses
LOW
Omni-Channel
DevOps
Amplified intelligence augments machine- Understanding where and how machine- Impact
generated data-driven insights with the generated and human intelligence As companies raise their game in
human intelligence that is able to direct complements each other – and how best customer experience, understanding the
analysis in new ways, proposing alternative to leverage that combination – will become social equation across diverse customers
possibilities that only the know-how of the increasingly important as our reliance on segments is crucial. Together social
human mind can provide. Equally amplified machine-driven data analytics grows. network analysis and social media analysis
intelligence sees machine-generated, can help reveal the key influencers who
data-driven intelligence augmented by the Amplified intelligence will therefore support could, in turn, be leveraged as brand
human life experience needed to ensure improving customer experience and advocates.
the right – but not always entirely logical – excellence in operations, bringing answers
decision is reached. in domains not within our current reach. That said, the primary purpose of social
However, the CxO should take care to not media analysis is to understand customer
Impact lose control of the decision-making process. needs, desires, behaviors and concerns
Take a machine analyzing trends in human whether at an individual level or across
behaviors online, for example. A trend Analytics for Social specific customer segments. It can, for
might show people suddenly switching Concept example, help identify growing customer
to a specific payment option without any Customer behavior – both positive and dismay so that it can be addressed before
insight into why. Only a person would negative – is largely influenced by social impacting a brand’s reputation. Equally, it
realize that this trend is likely driven by relationships. As such, corporations and can help reduce churn by allowing brands
extensive media coverage of extensive governments alike must put the social to react quickly to disgruntled customers,
cybersecurity threats relating to some of voice at the heart of their digital strategies delighting them with unexpected surprises
the other payment options. In another to build the trust that is vital to their that will buy their enduring loyalty.
instance you wouldn’t leave a final decision success. They must not only listen, but also
on which children are most vulnerable and react, leveraging the voice of the social Organizations must, however, take into
need the most help entirely to a computer, community to steer them in the right account how their customers feel. People
but machine-generated intelligence will direction. don’t always like being listened to. To
provide some of the vital insight needed to successfully leverage social insight to
ensure the right decision is made. The emerging discipline of social network enhance their services, organizations
analysis brings to light the complex across both the private and public sector
Often organizations can only answer the patterns of connection, influence and will need to ensure critical customer
what, where and why of atypical scenarios reciprocity that are the main factors in relationships aren’t impacted – and local
impacted by human behaviors by customer behavior. Meanwhile, social and international regulations around
combining machine-generated data-driven media analysis, with its social media privacy are respected.
intelligence with wider human monitoring and sentiment analysis, helps
experience and understanding. companies derive intelligence from
customer conversations on digital media.
28 #AscentLookOut
CxO Agenda
API Economy Throughout their digital journey, companies functionality is defined by software as well
Concept will want to ensure legacy systems that as its physical features.
In a digital, networked economy, success they do decide to consolidate or transition
comes not only from innovating by to a new platform are decommissioned When applied to the world of production,
yourself, but also from fostering the seamlessly and any legacy that remains the CPS becomes the smart factory where
development of partner ecosystems. continues to run at peak performance. In manufacturing units leverage relevant
Application programming interfaces (APIs) effect a two-speed business will emerge: information to behave autonomously.
help organizations do that by allowing accelerating innovation to keep pace
them to safely ‘expose’ the functionality of with today’s fast-moving world while Impact
their internal applications or services to the meticulously planning the maintenance or Currently used throughout industry in
outside world in a limited fashion, either for potential phase out of the legacy business aerospace, automotive, infrastructure,
free or for a fee. IT capability is effectively – along with its supporting processes and energy, transport and other areas, CPS are
virtualized, decoupling application or tools. increasingly critical to manufacturers and
service implementations from their the factory ecosystem. Smart factories
consumers. These then become building Banks and stores, for instance, need open up new business models based on
blocks for third parties that create their own to ensure their bricks-and-mortar the convergence of physical devices and IT.
unique services – mobile apps for instance environments continue to operate
– by integrating multiple services together. optimally while they transform to a CPS are already impacting the way
new omni-channel model that also factories are constructed and run and
Companies are increasingly generating encompasses online and mobile. For this playing an ever-increasing role in the way
revenues by exposing their IT capability they will need to ensure they don’t take smart products, connected machines and
through APIs. The API economy reflects their eyes off their legacy network. augmented operators work together.
how APIs are now positively affecting an
organization's profitability. Impact Cybersecurity
Companies may be seeking a hybrid Concept
Impact environment where their legacy Cybercrime is estimated to already
As ‘every company becomes a technology dynamically enhances their new IT cost more than $1 trillion a year. And
company’, this mechanism becomes environment. From a legacy systems while cybercrime has now emerged
increasingly critical. Organizations will perspective, this may mean ensuring as an industry, digital warfare is a key
increasingly publish APIs to extend their interoperability between new and factor in nations’ military and economic
products and services and interface with legacy environments, deploying legacy success. Attacks may come from activists,
partners and customers in new ways. applications on alternative (modern) disgruntled employees, mafias, terrorist
New business models and new market platforms or cloud-enabling legacy services. organizations, government agencies or
offerings are already being created based even competitors (industrial espionage).
on companies opening up their internal IT Equally, planning and communicating
systems to the external world. the phase out of legacy business is key. Mobile and boundaryless networks
There may well be resistance internally, but are now a core route to exposure and
While Salesforce.com, Amazon, Facebook, communicating the options and benefits systemic vulnerabilities have been
Twitter and Google have all opened up will help. Externally, marketing departments weaponized. Every industry is at risk:
new revenue streams in this way, Netflix and competitive pricing will help accelerate increasing automation makes electrical
has used its APIs to extend its service to customers’ move from the legacy to the grids and telecommunication systems
more than 200 different devices – including new business. more vulnerable; military activities that
television, gaming devices and remote use computers or satellites are at risk of
controls – and all major mobile platforms in Cyber-Physical Systems disruption; transportation infrastructures
less than two years. Concept are vulnerable to breakdown; security
As web pioneer Marc Andreessen famously breaches in financial institutions have
According to analysts, while APIs started prophesized: “Software is eating the already gone far beyond stolen credit card
in media and high tech, they have now world”. Devices and production assets are numbers and fraudulent transactions on
moved into financial services, government becoming smarter. Their function is no the stock markets.
and retail. Most future API use will come longer solely defined by their mechanical
from digital business applications and the parameters, but also by their software, While cloud and mobility are now widely
Internet of Things. processing and communication capabilities. adopted across the enterprise, new
They are becoming unified cyber-physical paradigms such as the Internet of Things
Bi-Modal Businesses (getting into the devices. (IoT) and smart machines are forcing
new while keeping the legacy) companies to rethink protection.
Concept Bringing these devices together in an
With so much transformation taking place, intelligent way creates a complex cyber- Impact
organizations also need to consider what physical system (CPS). CPSs are defined as To fight new risks, cybersecurity requires
they should do with their legacies. Should ‘systems of collaborating computational a multitude of techniques coupled with
they shut down parts of their business? elements controlling physical entities’. holistic convergence between information,
Should they reinvent them? Essentially, within CPSs, physical entities physical and operational security across the
are fully controlled by IT. A device's whole digital chain. Application shielding,
for example, shields applications in secure DevOps: Aligning Software Development Fully integrated tools and lean processes
zones with trusted (corporate) information with Digital Operations ensure development and operations are
brokers acting as a central verification Concept totally aligned and fully in sync, decreasing
service between individual zones. In today’s fast-paced world, organizations IT operational costs while improving
need to be able to respond quickly to ever- software quality and accelerating time-to-
Organizations also need to take a more changing customer demands. At the same market.
proactive approach to cybersecurity, using time, IT systems are becoming increasingly Operations are improved and changes can
probes to look for evidence of specific complex and need to be integrated be implemented faster since they no longer
suspicious behaviors, for instance, to help with a higher degree of reliability and need to wait for long development cycles
anticipate threats. Millions of events can availability. As such, duplicating production followed by long testing processes. This
now be analyzed in real time thanks to environments for testing has become brings increased agility to the organization.
high performance computing. And after difficult.
a potential incident is detected, forensic Automation eliminates slow, costly and
analysis can help identify where the attack Meanwhile, developers are often unable error-prone manual processes while
started, who is behind it and how it was to understand the trade-offs between advanced release management methods
carried out. performance, scale and reliability. and automated operations build reliable
Operations teams, on the other hand, self-healing systems. Standards and
Today's advanced prescriptive security often become involved far too late in the standard components reduce complexity
techniques utilize a variety of analytical development cycle and are limited to and enable easier and faster build-to-order
and machine learning techniques to keeping production services stable. services.
study recent and historical intelligence.
They allow companies to do more than Emerged out of applying Agile and Lean But, in fact, this thing we see in IT is just
simply foresee future threats; they analyze approaches to operations, notably with the tip of the iceberg. DevOps will reach far
possible responses, prescribing the optimal the cloud, the DevOps (an abbreviation of beyond the IT department. It will help with
approach for eliminating threats before Development and Operations, illustrating streamlining processes and workflows. It
they happen. that they are now linked) approach to will help the business develop a culture of
building new and changing existing continual experimentation and learning,
The impact of applying proper services removes the traditional hurdle and react more quickly to ever-changing
cybersecurity techniques is not only between the development of software and market conditions.
significant in lowering exposure and putting it into operations. DevOps includes
accelerating curation of potential damages; best practices such as continuous delivery, Economy of Data
it can also enhance operations by building continuous integration, automated testing Concept
trusted agile infrastructures, reward and application monitoring. The massive growth in personal
business innovation thought better IP smartphone usage and increasing
protection, grow customer experience with Impact prevalence of connected devices are
trusted services and perfect compliance to Implementing DevOps requires significant leading to an explosion in data generation.
privacy regulations. While trust has always changes to existing processes and The Economy of Data (EoD) sees new
been a core business asset, business- governance within the organization. business models derived from this data, not
driven cyber protection can turn risks into Development and operations teams can simply for reselling data, but for creating
business value. then work closely together, supported by completely new market offerings.
established well-engineered repeatable As highlighted by Atos ‘Ascent Journey
processes that intrinsically consider 2018’, an EoD organization is one that
change, replacement and evolution. understands that data can provide more
than mere insight into market trends. When
30 #AscentLookOut
CxO Agenda
multiple sources of data are combined changing market demands and transient of the area of concern: sharing their
and refined, they can unlock access to opportunities, CxOs can take advantage of perspectives and knowledge with each
new markets and revenue streams. Such the gig economy to help align capacity and other so as to 'scan' how new phenomena
an organization will target potential users capability with their ever-changing talent might influence the future.
and providers of data to form a multi-sided requirements. Horizon scanning may be complimented
market, building partner, customer and by other future-oriented methodologies
supplier ecosystems and establishing In fact, the gig economy will be vital for such as trend impact analysis and scenario
shared data asset platforms to be used by enabling the liquid corporation. After all, a building, or the Delphi method, which
the participating players. large pool of flexible, highly-skilled workers builds consensus among experts on
available almost on-demand makes for predictions concerning a specific issue by
Impact an incredibly scalable workforce. You following a structured and iterative process
At a basic level, value creation within the could even think of it as a ‘swarm of skills’ of brainstorming.
platform comes from the act of sharing responding both reactively and proactively
data that offers benefit to multiple parties to emerging demands. Impact
(the direct approach). Data may be An awareness of what the future might
exchanged in its raw state or refined and Embracing a remote workforce by look like is the first step on the innovation
combined with additional Open Data eliminating restrictions based on journey that will guide companies to
sources. Participating parties extract the geographies will be key to gaining greater achieving their strategic goals. In contrast
value for their business context. access to this flexible, highly-available to processes focused on predicting the
talent pool. Virtual communication and future, horizon scanning encourages
At a more sophisticated level, data collaboration tools will make it easier for participants to develop new insights
semantics can be used to exploit data fed dispersed teams located across the globe by thinking out of the box. Looking at
back from participants engaging in the to work together. technologies in new ways may reveal ideas
direct approach to extract further value and that never come to fruition, but equally it
meaning. This new insight and value is then Horizon Scanning may uncover ideas that drive substantial
shared through the platform (the indirect Concept competitive advantage. After all, initial ideas
approach). The third digital revolution is driving that often seem far-fetched can lead to the
continual change. Social, mobile, IoT, most disruptive innovations.
An EoD system can drive business benefit analytics, cloud, smart technologies,
by offering access to a larger market, Industry 4.0, bioinformatics and more Horizon scanning allows organizations
increasing profitability by sharing market are forcing business to evolve at an to stay one step ahead by providing the
operating costs between participating unprecedented speed and scale. Exploring insight needed to develop strategies that
members and enabling higher prices what the future might look like helps anticipate future developments. CxOs
through the perceived increased value companies to be more resilient, to be should ensure their organizations have
of services enriched by the shared data prepared for the uncertainties that lie the strong horizon scanning capabilities
insights. ahead. needed to ensure their portfolio strategy
is aligned with evolving demand. Internal
Gig Economy Horizon scanning allows organizations to or outsourced, these capabilities will
Concept systematically and continuously analyze need to leverage suitable digital tools and
The new on-demand economy goes evidence about future trends, emphasizing processes.
beyond simply matching buyers with new technology and its effects. It's a
sellers, passengers with taxis, tourists technique for detecting early signs of Industry 4.0
with accommodation. The gig economy potentially important developments Concept
matches workers with gigs (or jobs), on- through a systematic examination of Technology-wise, Industry 4.0 is a melting
demand. In the basic model, gig workers potential opportunities and threats. Small pot that combines the Internet of Things
enter a formal agreement to provide groups of experts share their perspectives (IoT), advanced Big Data analytics,
services with the on-demand company. and knowledge with each other, consider new generations of human-machine
Prospective clients can then request their how emerging trends and developments interfaces and reliable layers of ubiquitous
services via a smartphone or web page – in might potentially influence the future of connectivity. It helps organizations manage
the same way a passenger would request their organization – its strategy, products, the flood of information from smart
a taxi from Uber – and the worker is services and more. machines, connected workers and the
compensated for the tasks they perform. products themselves.
The Organization for Economic
Recent surveys have shown that gig Cooperation and Development (OECD) Initiated in Germany to reflect the fourth
workers represent a growing segment of notes that horizon scanning helps industrial revolution, this European term is
the labor market. Some estimate that, by develop the big picture behind the increasingly being adopted across America
2020, 40 percent of US employees may be issues to be examined. Often based and Asia, in synergy with the 'Industrial
freelancers, for instance. on desk research and involving a wide Internet' concept.
variety of sources (including prospective
Impact research communities, think tanks, public Impact
As delivery models become more abstract organizations and NGOs), it comments that Industry 4.0 addresses growing demands
and flexible to allow services to react to horizon scanning can also be undertaken for digital production, providing greater
by small groups of experts at the forefront
flexibility, transparency, knowledge and more efficient and effective interactions Impact
the pervasive use of smart production beyond conventional organization MOOCs have the potential to scale up
facilities. Traditional layered shop-floor MES, boundaries – whether internal or external. to enable millions of students to attend
PLM and ERP systems that see top-level Innovation value webs facilitate open a single course consecutively. They
business processes separated from shop innovation both within the social enterprise not only democratize education, even
floor processes are transformed into a and beyond its borders. from some of the most prestigious
smart connected production environment. universities in the US, Europe and Asia,
In fact, organizations are increasingly but also facilitate education in emerging
The interconnection of machines, moving away from the traditional R&D economies. Currently mostly targeted at
components, products, people and intensive ways of working. They are the undergraduate market, they are also
processes is bringing disruptive changes at embracing corporate ‘intrapreneurialism’ beginning to offer professional training.
all levels and functions. Smart actors extend (entrepreneurialism, but within the In an enterprise context, MOOC can be
from ‘top-floor to shop-floor’ and even to organization), establishing in-house seen as the road to the future employee
the customer of the product. Smart supply corporate venture capital capabilities education system.
chains are restructured dynamically for and building collaborative relationships
optimal performance, with some physical internally across organization siloes and As MOOCs models refine, technologies
links even removed. externally with third parties. These include such as augmented reality may be
start-ups, SMEs, universities, suppliers, lead leveraged to combine work with education.
The fully autonomous operations allow producers, competitors, interest groups An employee could receive customized
on-demand operations to configure and customers. The new relationships and information via a wearable device, enabling
production lines directly, according to interactions that result are highly dynamic. progressive training that complements a
specific design parameters. Individual They encourage new insights, improve specific role.
digital blueprints accompanying creativity and enable rapid assembly of the
component parts interactively direct both solution components required. Though MOOCs seem to be booming,
machine and human manufacturing some issues still remain. While large
resources. Prescriptive maintenance uses Impact foundations and venture firms fund MOOC
data collected from shop-floor monitoring As this new business ecosystem of actors initiatives, potentially replacing millions of
to determine a minimum downtime exchanges objects of economic value teachers, questions remain on privacy, the
maintenance strategy. toward a shared goal of profit generation, ownership and accuracy of information
a new view on how things get done and the risk of propaganda. Stronger
Two-way communication between emerges. Relationships move from simple international certifications may be needed
machines and workers on the shop-floor collaboration to active cooperation. in the future to regulate this new field of
via smart devices, tablets or even wearable Organizations that embrace innovation education.
technology ensures continuous interaction. value webs will drive up their innovation
Procedures such as maintenance, productivity and ultimately increase their Neurobusiness
reconfiguring, refitting or calibration competitive advantage. Concept
become extremely agile, responding to Neurobusiness leverages neuroscience
actual production needs in near real time. Social business tools help organizations capabilities to improve business decisions
and employees develop and participate in and interact with people and communities
In sectors where automation and a new marketplace of ideas. But success more effectively. Closely associated with
connectivity are already mature, realization demands more than new technology digital marketing research on how to reach
of Industry 4.0 concepts is more imminent. alone. Firms need to redesign the way consumers and influence purchasing
Where production is outsourced, adoption they innovate, with implications for their better, it uses psychology, social sciences,
could extend decades into the future. business model, their alliance management wearables and brain-computer interfaces,
processes and their operating model, as such as electroencephalography headsets,
Industry 4.0 will bring significant well as for their IT. Hackathons are one to track emotions and guide sentiments.
improvement in operations, but will such example of these processes. This, in turn, may allow organizations to
require the reinvention of all aspects of influence attitudes, actions and behavior.
production, product and market strategies. Massive Open Online Courses (MOOCs)
We can expect to see a number of different Concept Impact
approaches adopted across and within Multiple for-profit and not-for-profit Interest in neurobusiness is growing. The
different industries, with some undoubtedly education providers (such as Coursera, technology is just emerging and it may
more successful than others. The courage edX and Udacity) are now offering Massive take three to four years for brain-computer
to change business doctrines and cultures Open Online Courses (MOOCs) through the interfaces to hit the mainstream, but
and the ability to learn from mistakes and internet, adding quizzes, projects and more potential applications are large.
adapt on the way, will ultimately determine to YouTube lectures and picking up millions
success and select the winners. of users along the way for participating Insight derived through neurobusiness
universities and colleges. As a lecturer talks, techniques will give marketing
Innovation Value Webs his output is recorded and posted online. It departments a whole new perspective on
Concept can be complemented by interactive user customers’ beliefs, behaviors and desires. In
Innovation is rising up the corporate forums to support community interactions turn, this intelligence will help organizations
agenda. One way to keep ahead is to among students, professors, and teaching surprise and delight their customers, who
develop an innovation model that enables assistants.
32 #AscentLookOut
CxO Agenda
are increasingly focused on the experience veterinary sciences and medicine) allowing together form an intelligent computing and
and outcome rather than the product or scientists to get a full understanding of the communication ecosystem that enhances
service. It may also help companies retain molecular processes that govern living the real world we live in. As we transverse
customer interest in a product or service beings. from a real bricks-and-mortar world to a
at a time when customers are becoming virtual online one, we expect a consistent
more fickle and less loyal – and less Meanwhile, biocomputing – the growing and uninterrupted end-to-end experience
susceptible to manipulation – than ever. capability of leveraging high performance regardless of where we are and how we
computing and simulation to solve are connected. We expect an omni-channel
Internally, neurobusiness techniques may problems in biology, biochemistry and experience.
have a role to play in helping organizations genetics – has become a cornerstone of
keep their staff engaged and loyal, while life sciences in the recent years. It may After all, the lines between our offline
also encouraging the creativity that is vital well contribute to what may be the next and online worlds have blurred over the
for driving innovation. These techniques technology revolution, combining digital, past few years. It doesn’t matter how we
may give employers looking to retain biotechnology, nanotechnologies and communicate with friends and family
Generation Z talents, for instance, a better cognitive sciences. – we seamlessly switch between face-to-
understanding of how they can deliver face, telephone, SMS and social media
the flexibility and fulfillment this lucid Impact interactions. The challenge for the retailers,
generation needs. Omics technologies reduce time and cost banks, government departments and other
of laboratory tasks, shifting the bulk of the organizations is to enable correspondingly
Furthermore, neurobusiness may also workload downstream from the laboratory flexible interactions.
help improve productivity, particularly in (wet lab) to the data analysis processes (in
stressful or demanding roles. silico lab). Already helping pharmaceutical Impact
companies reduce the cost and time of The goal is to deliver the best service
CxOs would do well to build – or hire – inventing, experimenting and releasing new anytime anywhere, the way customers
some in-house neurobusiness expertise, drugs, for instance, they promise radical want it – whether purely digital (web,
though they should be vigilant to potential advances in healthcare, with multiple mobile apps, kiosks, connected device
ethical and privacy issues. startups and large groups heavily investing for instance), physical (such as store or
in omics-powered personalized medicine. call center) or hybrid (connected store
Omics: Advanced Biocomputing and help desk, for example). It requires
Technologies Omics also has a wider role to play: it is all touchpoints to be unified to provide
Concept helping farmers increase their crop yields a seamless personalized experience
Omics refers to the collective technologies and it may one day help life insurers that delights across all channels. The
that explore the behaviors of the molecules better understand risk or CPG companies omni-channel customer experience can,
that make up cells, such as genes, proteins, understand more about nutrition. New therefore, only be fully realized once core
cellular carbohydrates and cellular lipids. business models may emerge based on business operations within disaggregated
Genomics, for example, explores the roles, new insight into our individual health service supply chains are aligned and
relationships and actions of genes. risks or how our individual bodies react to optimized.
different foods, for instance.
Omics techniques have exploded in the last To achieve a true omni-channel experience,
decade, powered by the completion of the Omni-channel organizations also require a single source
human genome project. These techniques Concept of information about the end user that is
are now routinely being applied to a wide Today’s multitude of devices – from accessible to all points of contact: from the
range of important topics in life sciences wearable devices to our smartphones, store, branch and office to the call center
(including microbiology, agriculture, tablets, laptops, desktops and TVs – and online website, social media site or
chat. However, assurances may need to be Wearables, for instance, could provide Today companies across a wide range of
given that all stored personal data will not real-time biometric information about industries are developing services as a
be accumulated or used without explicit consumers, indicating emotional and way to expand their offering, target new
contractual agreement. physical responses to interactions. This customer segments or differentiate their
will provide valuable input into the commoditizing business. Retailers are
The omni-channel experience helps monetization process, including a whole looking at offering consumers services
organizations engage with their customers new level of dynamic, ultra-personalized, linked to the goods they sell, automotive
more intimately and individually than ever embedded advertising. companies are offering tires-as-a-service on
before, ensuring customer engagement, a pay-per-use basis and manufacturers are
loyalty and advocacy. CxO should review Protecting Digital Property offering preventive diagnostic services.
their IT strategies and ensure their Concept
enterprises are well-positioned to build an Digital Rights Management (DRM) may Impact
omni-channel experience since existing IT have been around for more than 20 years, After all, services are broadly seen as
systems might limit this ambition. Bi-modal but today it has more recently taken on attractive business: providing additional
IT can offer a means to reaching this goal. a new significance. As products such as high margin revenues on top of the
music, games and videos are increasingly product business; representing a relatively
Personalization distributed through online digital platforms, stable business that can act as a damper
Concept DRM plays a vital role in ensuring creative against volatile product business; and
While the Ford industrial era developed outputs are not copied or stolen. enabling a deeper connection with the end
the concept of mass production, customer and, with it, insight into customer
digital brings in a new promise: mass However, DRM will require the supporting needs and desires.
personalization. The seemingly opposing economy to be further developed to avoid
forces of ‘maximizing process efficiency’ a slowdown of exchanges. Developing a product business toward a
and ‘personalizing user experience’ service business typically involves four
present a complex business challenge. Impact maturity stages:
Understanding how to make them work Soon, as we face the third digital revolution,
together rather than against each other is DRM will be extended into digital -- Product manufacturer: sell products and
critical. This requires operations and supply manufacturing where it will play a key role charge for basic break-fix services.
chains to be optimized for both B2B and in protecting intellectual property. With -- Value added manufacturer: sell products
B2C interactions. 3D printing, for instance, as the number and service to enhance the product
of products created on 3D printers grows performance.
Enriching personalized experiences also and manufacturers turn their focus from -- Full service provider: replace products
requires a balance between individual manufacturing physical products to by (managed) services and enhance
choice, regulatory compliance and trust. producing digital product designs that customers’ operational performance.
There will be a point at which customers consumers can download and use to -- Integrated solution provider: take over
consider sharing the source data used to ‘manufacture’ the products themselves at (parts of) customers operations.
shape a personalized B2C interaction is an home, DRM aims to help manufacturers
unacceptable invasion of privacy, limiting retain product IP. As servitization transforms entire product
trust and therefore adoption. industries from ‘technology-push and
Servitization product oriented' business to ‘customer-pull
Impact Concept and service’ business, players will need to
The personalization of products, services Services are increasingly being employed adapt their business models to keep pace.
and interactions in general can be a key as profitable and stable revenue streams Furthermore, the as-a-service economy
factor in driving customer experience, to enhance product businesses. Leading very often finds heightened success when
improving satisfaction, ensuring loyalty firms are adopting an ‘as a service’ it bridges multiple actors with differing
and attracting new business through business model, offering customized agendas within multi-sided markets.
advocacy. Tech-savvy digital natives, solutions to clients. Leveraging the cloud
for instance, demand richer connection and the Internet of Things, these business
and engagement through seamless, models can help grow high-end and very
personalized experiences across virtual and differentiated personalized offerings when
physical channels. manufacturing is no longer a differentiating
process. This process, where services make
With the advent of data analytics, end up a larger part of a product company, is
user behaviors can be determined in far known as servitization.
greater detail. This enables organizations to
personalize and target specific interactions An early example was the change
through tailored services, driving service in the aircraft engine industry when
monetization where access to a service manufacturers such as Rolls-Royce, who
will be in exchange for the use of personal coined the term ‘power-by-the-hour’, started
data, giving companies the opportunity to to sell air power as a service rather than
reinvent parts of their services. engines, maintenance and spares.
34 #AscentLookOut
CxO Agenda
nc l
nc l
lle na
lle na
n
n
ce
ce
rie er
rie er
e
e
e
e
tio
tio
inv ss
inv ss
ce tio
ce tio
nc
nc
an
an
Ex stom
Ex stom
Co ust &
Co ust &
Re ine
Re ine
en
en
Ex ra
Ex ra
pli
pli
e
e
s
s
pe
pe
Op
Op
m
m
Cu
Cu
Bu
Bu
Tr
Tr
Ambient Computing Horizon Scanning
Cybersecurity
Omni-Channel
Techniques
DevOps Personalization
38 Aerospace 98 Healthcare
44 Automotive 104 Homeland Security
50 Banking 110 Insurance
56 Chemicals 116 Media
62 Cities 122 Oil and Gas
68 Consumer Packaged Goods 128 Pharmaceuticals
74 Defense 134 Retail
80 Discrete Manufacturing 140 Telco
86 Education 146 Travel, Transport and Hospitality
92 Government 152 Utilities
Market views
Aerospace
Customer digitally engaged throughout that journey, leveraging insight shared by the connected
particularly during times of disruption when craft to open up new revenue streams.
Experience they want to be empowered to choose Services that anticipate failure or enable
alternative travel arrangements. As such, spare parts to be manufactured on
some airlines are differentiating themselves site significantly shorten maintenance
In today’s increasing connected world, by offering enhanced accessibility services. times and thus operational expenditure.
airline passengers expect a fast, reliable Consequently, maintenance, repair and
connectivity, even at 30,000 feet. The passage through the airport should operations (MRO) services are poised for
Business travelers want to keep working; be streamlined and rapid. Security and profitable growth.
families want access to information immigration checks should be smooth
and entertainment. They want their and non-intrusive, giving passengers In addition, intelligence borne out of
personalized connectivity, entertainment a feeling of security – but without long data on how passengers behave on
and meals already prepared for them when delays. Passengers’ dialogue with the board allows them to open up new
they board the aircraft. airline, airport and other partners should be high-margin revenue streams. Relevant
efficient, personalized and consistent from targeted passenger services – including
The connected aircraft also enriches the the moment they book their seat through exclusive infotainment, communications or
in-flight experience for pilots and cabin their train, airport and flight experience to concierge services that enrich the on-board
crew. Access to digital documentation, arriving at their final destination. experience and allow passengers to plan
email facilities, telemedicine and credit time their stays – boost sales and build a
card authorization systems increases This seamless passenger experience deeper, more meaningful, relationship with
productivity. Access to systems for needs airports, airlines and other providers passengers.
rescheduling onward connections, for to connect their systems and share
instance, allows them to serve passengers pertinent customer data. Passengers with Unlike many other industries, regulation
better. disabilities, for example, only expect to has shielded aerospace somewhat from
share that information once to get the the new entrants. The aerospace industry
Today’s armed forces personnel expect assistance they need throughout their should, nevertheless, be wary of the
this same productive in-flight or on-board journey. Equally, diverse military solutions technology giants whose understanding of
experience in their military lives. As such, will need to share interfaces, specifications individuals’ needs, habits and preferences
defense organizations, with their squeezed and user requirements to ease integration allows them to challenge established
budgets, are replacing the expensive and ensure a similarly seamless user players across many industries. To ensure
rigid, difficult-to-use and un-interoperable experience. they stay ahead, industry players should
systems currently in operation with modern focus on building deeper relationships with
technologies. Familiar smartphones, tablets passengers to address their needs and
and other civilian technologies also make Business expectations. Future legislative changes,
solutions more cost efficient, faster to Reinvention however, could lead to an industry shake-
develop, easier to use and less dependent up. An airborne Uber is not beyond the
on specific suppliers. Innovations need realms of future possibility.
specific adaptions, particularly for security,
and their suitability needs to be proven The connected craft can share in-flight
Companies will struggle to innovate
under manoeuver conditions. or on-board data on the health of critical
without building partnerships that extend
components and systems (including
their capabilities: alliances between craft
Meanwhile, civilian passengers expect avionics) with operations teams and
manufacturers and technology providers
services on the ground to be as efficient as manufacturers in real time. Manufactures
will open up new possibilities and ensure
those in the air. They also expect to be kept of both civilian and military craft are
they're adopted safely and securely;
38 #AscentLookOut
Aerospace
alliances with media, telco and payment must incorporate complex multi-force manufacture to meet new potentially
services companies will open up new and multi-usage requirements that also multi-billion dollar orders for small numbers
multi-sided business models that enhance need to be tailored to suit the missions of high-value, very customized items.
infotainment services; alliances between of each specific country. Designs need International sales require home state
airlines, airports and other transport to be modular to accommodate diverse approval for weapon or dual-use exports.
operators will open up other new revenue configurations yet complaint with any Equally, the target country might have
streams. With new multi-sided business existing systems in operation. specific import requirements that need to
models, companies consume relevant be considered, such as offset agreements
data from third-party partners and build The sophisticated end product requires or joint ventures.
innovative services by combining this deep integration between mechanical,
intelligence with their own customer electrical and software components. The sophisticated craft built today will be
insight. Tight collaboration between design, operating for anything between 20 and
development, production and aftersales, 40 years. Numerous upgrade recalls will
Military organizations expect to be shielded along with tight integration across the be needed as the industry adopts new
from the complex ecosystem of partners supply chain, is vital for accelerating lead technological advances. Manufacturers’
needed to deliver today’s immense times and ensuring safe and efficient ability to manage the craft evolution
integration projects; they simply want to operations amidst increased complexity. efficiently – and ensure components
purchase an end-to-end solution. Having don’t become obsolete – will be crucial to
one prime contract simplifies engagement As manufacturers extend their network of managing cost over the product’s lifetime.
and accountability. Some defense partners and suppliers around the globe, Defense craft, in particular, may encounter
manufacturers are evolving into integrators a shared and common understanding and need to be maintained in extreme
to meet this need. of that data is critical to ensuring all combat conditions on the battle field.
stakeholders interpret the product design
correctly. Upstream standardization and
Operational commoditization will help. Trust and
Excellence Compliance
Meanwhile, both end product and
component manufacturers need flexibility
to cope with erratic production cycles:
Craft manufacturers and operators have to As airlines, defense suppliers and
ramping production up or down within
balance building a high-quality and fitting manufacturers extend their capabilities
a short period of time. Civilian backlogs
product with minimizing operational cost. and services, safety and security is always
are currently full, meaning manufacturers
Cost is influenced by a multitude of factors: at the forefront of any new innovation.
must focus on ensuring they have enough
from product price, maintenance cost Today’s growing reliance on data and
capacity to meet their commitments. IT will
and fuel consumption to operations and increase in connectivity bring with
help them in this by transforming them into
logistics, operational risk and passenger them a greater diversity of threats and
a more efficient organization.
numbers. amplified responsibilities. Companies must
protect new services and capabilities
In defense, declining home markets
Craft must be tailored to meet very specific from the increasingly diverse virtual and
in the US, Europe and China are being
requirements. For civilian aircraft, each physical threats that need to be foreseen,
more than matched by growing exports
airline requires its own customization, understood and prevented. After all, the
driven by the growth of threats in
increasing complexity in the product, its craft can be considered a complex IT
countries that do not have strong defense
manufacture and the supply chain. For system, which has to be protected against
manufacturing capabilities. Manufacturers
military craft, a single equipment program cyberattacks. When docked it has many
must be prepared to suddenly accelerate
connections with other systems, all of accessible; potential terrorists prevented be optimized, eliminating the need for
which are sources of vulnerability. from even boarding the plane; and flights aircraft to circle above airports, saving
tracked across the skies with black boxes time, fuel and reducing CO2 emissions.
Companies are facing additional security recording exactly what is happening in the New procedures, supported by new
and safety challenges driven by additional increasingly connected aircraft. Passenger technologies, provide the best trajectories
complexity in manufacture and the data must be protected too and companies for fuel and time efficiency and associated
supply chain. Risks include spies hacking must balance compliance with data atmospheric emissions while also reducing
into drawing data when it’s transferred protection regulations with knowing exactly noise. Shorter but steeper landing
across the extended enterprise network who is on the plane to mitigate the risk of approaches means aircraft can fly at cruise
and ensuring the supplier of the supplier terrorism. altitude for longer.
doesn’t allow a defect in a small part that
could damage the craft. Adopting IT that Regulatory requirements are increasing
has safety and security already built in will and the aerospace industry is being
help. closely scrutinized for safety and
environmental issues, including noise
As well as guaranteeing the chain pollution and reducing CO2 emissions from
of production, supply and logistics, manufacturing. Climate change targets
scrutinizing all suppliers and ensuring demand organizations reduce carbon
compliance with all legal requirements, emissions.
defense manufacturers must additionally
safeguard the chain of confidentiality and The European Union Clean Sky
ensure their product is not used against its aeronautical research program aims to
own country or allies. develop breakthrough technologies to
significantly increase the environmental
Trust must be built amongst suppliers performances of air transport. Clean Sky 2
and partners too. The broad ecosystem will deliver break-through technologies for
requires companies to work together more incorporation into the next generations of
openly and a modern IT environment that aircraft from 2025 onwards.
enables safe, secure, effective and efficient
collaboration and communications. The connected craft can help too. In
transoceanic flights, for example, data
Passengers expect to be protected showing an accurate position of the plane
too. Cockpits need to be secured, yet allows aircraft arrivals and landings to
40 #AscentLookOut
Aerospace
Quantum
cryptography Mainstream
Early adoption
Adolescent
Emerging
Semantic
technologies
Distributed Prescriptive
analytics analytics Self-adaptive security
Cyber-physical Augmented
Industry 4.0 systems reality Innovation value webs
technologies
High performance
computing IP networks
Advanced data 3D printing
Internet of Things visualization
Context-rich
systems Virtual assistants
Streaming
analytics Wearable
computing
DevOps Cloud Service Integration
Autonomous vehicles
Near field
communication
2016 2017 2018 2019+
© Atos 2016. All rights reserved.
42 #AscentLookOut
Aerospace
nc l
nc l
lle na
lle na
n
n
ce
ce
rie er
rie er
e
e
e
e
tio
tio
inv ss
inv ss
ce tio
ce tio
nc
nc
an
an
Ex stom
Ex stom
Co ust &
Co ust &
Re ine
Re ine
en
en
Ex ra
Ex ra
pli
pli
e
e
s
s
pe
pe
Op
Op
m
m
Cu
Cu
Bu
Bu
Tr
Tr
3D printing Innovation Value Webs
Near field
Autonomous vehicles
communication
Cloud Service
Prescriptive analytics
Integration
High performance
Virtual assistants
computing
Automotive
44 #AscentLookOut
Automotive
‘‘Vehicle and equipment makers are looking to unlock the full potential
of the unique intelligence gleaned from customers, dealerships and
connected vehicles by sharing relevant data with third-party partners.’’
Thilo Stieber
Vice President
Portfolio &
Innovation,
Manufacturing,
Retail & Transport
needed to re-charge their fleets; on the more resistant to disease, increasing flexible production network that allows
other, fleet operators can help balance the yield of the farmers. Data privacy automotive companies to respond
the grid by providing distributed energy requirements are, naturally, respected. more rapidly to the changing business
storage devices. New legal frameworks environment. It does, however, require an
and technological approaches must be Once simply a host for foreign players, intelligent global supply chain network
developed to ensure the impact of the China’s role within the automotive market is management with enhanced risk
integration of huge numbers of FEVs is low also transforming. Chinese vehicle makers management.
and to ensure re-charging requirements are are evolving from mass manufacturers to
fully understood. creative innovators while increasing their Shorter product lifecycles, higher
footprint on the global stage. As a result, integration of electronics and increased
New players, including electric vehicle European vehicle makers are rethinking customization has increased complexity
manufactures such as Tesla and Google their positioning for many markets. in the product, its manufacture and the
with its self-driving car, are driving supply chain. The increasing complexity
innovation in the industry. Disruptions of components and the use of more
– from Google, Uber, Tesla and Zipcar, Operational advanced technologies for sensors and
for instance – are coming primarily from Excellence actuators, wireless communication,
software, internet and Big Data application and multicore processors pose a major
companies outside the traditional challenge for building next-generation
automotive ecosystem. For traditional vehicle control systems, for example. Both
Vehicle makers are increasingly building
players, alliances outside of the traditional the supplier and integrator need new
factories closer to where end user demand
ecosystem of partners – collaborations with systems science that enables reliable and
is to help them meet local regulatory
software and electronics companies such cost-effective integration of independently
requirements, such as the local content
as Apple and Bosch – are critical for driving developed system components. The
regulations reflected in high customs
novel innovations. Global co-creation proliferation of the digital design and
import fees. Vehicle makers overcome
communities such as Local Motors might development process, which now also
these regulations and lack of trained
also provide some unique inspiration. includes the production lifecycle and
workforce needed to build entire cars by
aftersales, will allow vehicle makers to make
implementing Semi & Complete Knock-
Vehicle and equipment makers are looking much better trade-offs.
Down (SDK & CDK) approaches.
to unlock the full potential of the unique
intelligence gleaned from customers, Automotive makers are increasingly
In China, vehicle makers are forced to enter
dealerships and connected vehicles by leveraging manufacturing intelligence
into joint ventures with local vehicle makers
sharing relevant data with third-party to optimize production in response to
to gain access to the fast growing Chinese
partners, such as insurance companies. individual customer requirements. Fully
market – an approach which needs to be
This shared data could, for example, autonomous production chains reconfigure
managed properly to ensure a proper IPR
provide the insight insurance companies automatically for each individual product
management. It's also helping them tailor
need to offer lower premiums to safe according to its individual design
products to local desires and minimize
drivers. Vehicle makers would receive a parameters. Initiatives such as Industry 4.0
customs charges. Automotive parts
referral fee for sharing that data. are aiming to provide the technological
suppliers are, in turn, increasingly aligning
foundation to enable automotive
their production footprint with their key
In another example, data collected from companies to provide these personalized
customers.
agricultural vehicles such as seeders, products in an efficient way.
harvesters, spreaders and sprayers, is
Both global- and local-sourcing schemes
being sold onto farmers and the seed The connected vehicle will help vehicle
are enabling the more global and more
manufacturer to help them make crops makers address one of the top challenges
of current times. The ability to make remote GLONASS regulation, are on their way. Both As vehicles become smarter and more
updates will not only reduce recall costs, it regulations will see vehicles automatically connected, manufacturers must also shield
will help them improve the product over dial emergency services in the event of customer data and essential resources
its life time as a basis for an enhanced a serious accident – even if the driver is from the threat of cyber-crime. A team
customer experience and foundation for unconscious. of researchers conducted an experiment
product and business innovation. that simulated a Jeep being hacked by
Other new innovations, such as the an invisible, virtual force. Vents blew out
autonomous vehicle, are opening up some cold air, the radio switched channel and
Trust and still grey areas when it comes to regulation the wipers came on before the hackers
Compliance and liability. For example, can the sole revealed themselves on the vehicle’s digital
passenger in an autonomous vehicle – display.
bearing in mind it has no driver – legally
Trust and compliance represents the be intoxicated? Insurers have already Cyber security and the protection it
foundation for customer experience and started to analyze the liability situation in offers against criminals, hackers and even
business reinvention. each country because of different local terrorists are fundamental to maintaining
liability concepts. Independent of any customer trust. After all, customers will only
Growing environmental awareness and legal challenges, the race to become the offer the data that is critical to new service-
stricter regulations, for example around first vehicle manufacturer to offer a fully based business models to companies they
CO2 emissions, have elevated the demand autonomous vehicle driving is already on. trust. Companies must also ensure they
for more fuel efficient vehicles. New lighter comply with data protection regulations
weight carbon-fiber materials increase the Whilst advancing at an incredible speed, and policies – from the factory all the
overall efficiency of new vehicle models the automotive industry may also be losing way to the dealership until the end of the
while giving designers greater freedom. the consumer’s trust. Electronics are driving product lifecycle.
up prices, shorting product lifecycles and
Meanwhile, innovations through ADAS increasing complexity. Whilst the ‘smart’
(Advanced Driver Assistance Systems) on board software has also lead to higher
electronics allow a safer driving experience. defect rates for new vehicle models,
The pan European eCall regulation, for the Volkswagen ‘diesel-gate’ emissions
example, requires SIM cards in all new scandal has inconvenienced millions of
EU vehicles models from April 2018 customers with recalls and higher running
and, as such, is envisaged as an enabler costs, damaging the entire brand with a
for the connected vehicle and local significant impact on sales.
regulations, such as the Russian ERA-
46 #AscentLookOut
Automotive
Autonomous vehicles
Mainstream
5G networks Early adoption
Adolescent
Emerging
Machine learning
Streaming
analytics Virtual assistants
Cyber-physical Advanced data visualization
3D printing systems
High performance
computing Prescriptive analytics
Wearable
computing Distributed
analytics
Gamification
Internet of
Things Embedded Self-adaptive security
sensors
Augmented
Machine-to- reality
machine Sentiment Haptic technologies
Gesture recognition
Near field analytics
communication
2016 2017 2018 2019+
© Atos 2016. All rights reserved.
information provided by embedded function and even experience a trip in Near field communication
sensors to guide the vehicle safely along their new purchase before it even starts its Connectivity within the vehicle includes
the highway. journey on the manufacturing line. Haptics the wireless integration of the growing
– along with gamification technologies – number of consumer devices. Drivers
Cloud Service Integration can also be found in dealerships where and passengers can connect their own
The extended services offered by it allows potential buyers to experience personal laptops, tablets, smartphones and
vehicle makers are provided through vehicle models not on show. Sensors other mobile devices with the vehicle using
the cloud. A service combines historical integrated with haptics gives drivers the Bluetooth and near field communication
data collected from a vehicle with a warnings they need to avoid mistakes and (NFC) technologies to receive consumer-
weather service and a GIS service using accidents. Haptics also help in opening oriented services such as infotainment,
Cloud Service Integration to optimize a up new human machine interface (HMI) navigation and telematics.
vehicle’s performance and minimize fuel options for the driver, increasing driver
consumption on a specific road surface in comfort, as well as an enhanced console NFC also facilitates driver identification
specific weather conditions, for example. and dashboard feedback. for personalization, allowing drivers and
passengers to unlock their doors, adjust
Cyber-physical systems High performance computing their seating position and even pay for
Around the manufacturing plant, Big Data and advanced analytics powered tolls and parking. Engine control unit (ECU)
sophisticated cyber-physical systems by high performance computing (HPC) parameters are optimized to the individual
(CPS) monitor and control the physical allow manufacturers to combine their own driver’s profile to increase the energy
environment to improve performance and data with data from external cloud-based efficiency of the vehicle.
safety. Localized sensing helps identify environments, for example to combine
issues with machinery performance their internal vehicle information with data Prescriptive analytics
and reliability, while communication on government emission limits. Potential issues are identified early and
technologies send machines instructions the right suggestions are executed thanks
for the next bespoke assembly. Internet of Things to the predictive analytics that analyze
Part of the Internet of Things (IoT), vehicles vehicle diagnostics in real time and the
Distributed analytics are contributing to a picture of traffic flow prescriptive analytics that suggest
Behind the scenes streaming analytics and and weather maps. Information coming maintenance options and their likely
HPC analyze millions of events in real time, from them is combined with intelligence outcomes. Vehicle makers use these
with distributed analytics in combination gleaned from social media, meteorologists suggestions within the extended services
with HPC supporting vital forensic analysis and a wealth of other sources to create they offer vehicle owners, who can select
after an incident is detected. an intelligent traffic system that warns which options they want to take. These
all drivers of adverse traffic or weather services ensure any potential problems are
Embedded sensors conditions. The IoT also combines the identified and fixed before they escalate.
Embedded sensors within the inner connected vehicle with, for example, the
workings of the vehicle constantly stream connected home from where in-vehicle Self-adaptive security
billions of pieces of information back to heating or air conditioning and more can As the threat of cybercrime increases,
its maker and data subscribers. This vast be controlled. self-adaptive security looks for evidence
amount of data needs to be managed and of specific suspicious behaviors to help
processed to provide invaluable insight. Machine learning vehicle makers anticipate threats.
Machine learning ensures the vehicle
Gamification takes advantage of new situations to Vehicle makers manage their data and
Learner drivers are leveraging gamification enhance safety and performance. These services securely in their private clouds.
(application of game playing elements technologies are also being used in the Dynamic access control ensures owners
to other activities) to experience real life specific engine components to improve and employees have access to the
driving scenarios. It provides the real life performance and reduce emissions. information and systems they need to
simulations that enable them to learn to access, but only when they need it.
manage diverse situations on real roads. Machine-to-machine
Vehicle-to-vehicle and vehicle-to- Sentiment analytics
Gesture recognition infrastructure communication based on Vehicle makers have been employing
Inside the vehicle gesture recognition machine-to-machine (M2M) technology social media and social network analytics
plays an important role in ensuring safety allow vehicles – and their passengers to understand general customer needs for
in the connected vehicle. For example, a – to interact with each other and the some time. This allows them to sharpen
driver can use gestures to signal to the surrounding environment. A vehicle might their insight on trends in color or feature
satnav to locate the nearest gas station or automatically alert the vehicle behind that preferences, for example, and gather
charging point. Hand-gesture based user it's about to park up or receive a warning intelligence on how customers view their
interfaces (UIs) in vehicles can lower visual from traffic lights that they're about to brand. An advanced view of negative
and cognitive distraction, and can improve turn red, for instance. Equally passengers sentiment provided by sentiment analytics
safety and comfort. travelling together but in separate vehicles ensures that they're prepared before any
can keep in contact, so they know exactly potentially reputation-damaging waves hit.
Haptic technologies where each other is and when they’re
Wearable haptic technologies allow buyers about to make a turning.
to open the door, feel how the controls
48 #AscentLookOut
Automotive
Streaming analytics a vehicle. Buyers want to know which sporting wearables view a new design
Vehicle makers are using streaming type of steering wheel would best suit before even building a prototype. Workers
analytics to analyze geo-location their driving style, the difference between and maintenance engineers in the
information on the fly in real time. This the diverse pedal types and more. Virtual production plant use digital glasses to gain
allows them to offer fleet owners a service assistants that can make themselves access to specific requirements for the
that provides a comprehensive, up-to-the- available anywhere and at any time help to vehicle they’re currently assembling or
minute view on the location of all their provide the answers. They’re even popping machine they’re currently fixing hands-free.
assets and enables insurance premium and up in dealerships, helping to excite potential In addition, wearable wristbands worn by
‘Pay as you Drive’ calculations. buyers around new features and models. drivers and passengers can communicate
with the vehicle they’re in.
Virtual assistants Wearable computing
There are so many options available and so This technology is enhancing design
many choices to make when customizing and manufacturing processes. Engineers
nc l
lle na
lle na
n
n
ce
ce
rie er
rie er
e
e
e
e
tio
tio
inv ss
inv ss
ce tio
ce tio
nc
nc
an
an
Ex stom
Ex stom
Co ust &
Co ust &
Re ine
Re ine
en
en
Ex ra
Ex ra
pli
pli
e
e
s
s
pe
pe
Op
Op
m
m
Cu
Cu
Bu
Bu
Tr
Tr
High performance
3D printing computing
Advanced data
Machine learning
visualization
Near field
Autonomous vehicles
communication
Cloud Service
Prescriptive analytics
Integration
Haptic technologies
Banking
$
FinTechs disaggregating banking value Machine learning will disrupt 40% of
chain banking roles
Banks offering banking and non- FinTechs investing $12 billion in
banking products banking tech innovations
Programmable APIs key to embedding Business model shifted to customer
new products 360° personalized banking
11 top investment banks in Blockchain
Cyber insecurity a threat to business
proof of concept
50 #AscentLookOut
€
Banking
Simultaneously, new digital-only players would be developed as entirely new vertical banking and credit risk management, will
are already disrupting the Retail banking technology stacks. grow as strategic lines of business for new
market. These challenger banks are entrants.
expected to take 15 percent of prime With all their ‘know your customer’
personal and business accounts. One of procedures and digital banking efforts,
their key success factors is their more Retail banks are also ideally placed Operational
convenient digital interfaces – such as to provide the trusted digital identity Excellence
‘push of a button’ account opening and frameworks that are vital to the digital
management, possibly even across regions. economy. Instead of storing their
As for non-bank competition, these Fintech customers’ personal and financial data
With no legacy infrastructure, new
players are native digital innovators and with the risks that this data might be
challenger banks are more agile and
will push banks to their limits in an attempt stolen, companies and governments
have significantly lower operating costs.
to keep up with their pace. We have yet to alike would contact the bank to get that
Digital-only banks, for example, expect a
see how traditional banks will react to the data. This would see banks compete with
cost-to-income ratio of below 30 percent
competition. They can choose to compete, the technology players, but they may be
– substantially lower than traditional retail
collaborate or buy, but the XS2A regulation helped by local regulations that would
banks’ 40 to 60 percent. Inefficiencies
means dismissing them is no longer an prefer relying on local trusted partners.
mean the cost of regulation, for example,
option. Banks in the Nordics already play a key role
is now equivalent to between three and
in digital identity management.
five percent of return on equity. Capital
Incumbents still have very old-style
provision regulations in particular have
service provision philosophies, with some Connected data ecosystems will enable
made some lines of business unprofitable.
exceptions, but if they're to thrive they may other new personalized products
have to change how business is conducted, and services. The connected home,
Retail and Corporate banking are
how innovation is conducted and what for example, will allow banks to offer
leveraging digital technologies to make
types of service they offer their customers. customers loans without the customer
straight through transaction processing
As they strive to transform their business having to fill in long forms: the home
and exception processing more efficient.
models and keep pace with new players, ecosystem provides all the details the
Digital is also helping to make account
open innovation labs are providing the bank needs about the applicant and the
opening faster, more secure and more
ideal environment for banks to create new property. Banks have already taken a step
responsive. Digitized account servicing,
digital services. New ideas and concepts in this direction by forming a consortium
meanwhile, increases transparency and
from new partners accelerate banks’ ability to share ‘know your customer’ risk-scoring
reduces cost by providing customers with
to respond to the demands of now. Open data using the SWIFT payments network.
all the tools and information they need to
innovation labs allow banks to bring all the Such consortia are vital for ensuring such
manage their own accounts.
digital skills they need under one roof in data comes only from secure and reliable
exchange for facilities, a network or even sources.
Transactional digital services companies
some financial investment.
are prime targets for acquisition. Retail
Future banking business models around
banks are employing high volume services
Banks might even consider creating new investment and capital will be focused
such as international, forex, digital currency
offerings that reflect alternative credit on the front office and include product
instruments and others, while initially
products – such as crowdfunding, peer-to- development and customer acquisition,
retaining equivalent legacy capabilities.
peer, private equity and digital currency with industrial-scale partners or utilities
Banks are also selectively acquiring or
– or develop new strategic lines of business providing back office non-core processes.
investing in payment services providers.
focused on personal concierge services, Major bank’s utility services, including
for example. These value-added services customer on-boarding, transactional
The European Payment Service Directive the volume and granularity of regulatory do shape up and deliver very high levels
dictated that transfers should not take reporting increased. Billions of euros of security, data protection and, above all,
longer than one business day at a time in fines have already been applied by professional integrity will be rewarded with
when banks were trying to optimize regulators and government agencies. In continued loyalty from existing customers
holding cash. Recent low, or even negative, response, financial institutions have shut and an influx of disgruntled customers
interest rates are a disincentive for parking down or sold high risk business activities, from other financial institutions.
money or bank-to-bank investments. Banks increased compliance staff numbers,
are instead using the cash for providing punished malpractice and communicated Some banks are even abandoning
industry or consumer credits. the importance of professional values and strong authentication; reverting back
behavior. to usernames and passwords rather
Around the globe, in the UK payment than one-time passwords or multi-factor
processing schemes (including BACS, Some banks have responded positively authentication when the purpose of
CHAPS and Faster Payments) have been to the increased regulation, seeing it as authentication allows it. In the background
ring-fenced and reconstituted as public a source of competitive advantage. By profiling tools provide additional security
limited companies following Payment creating a single view of the truth, for measures that bind a device profile to a
System Regulator (PSR) regulatory example, they can respond to regulators, username.
intervention. In Continental Europe, local the CEO and business units in real time,
schemes owned by banks are fighting for reducing costs and using data as an Public pressure demanding transparency,
their survival against international payment asset for better marketing, new product sustainability and ecologic commitment
schemes, primarily Visa and MasterCard. In development and reduced capital from banks will increase, leading them to
China and Brazil, dominant local schemes requirements. integrate these concerns in their processes
(China Union Pay, Claro) are partly or and review their investment and financing
completely owned by the state. In Africa Simultaneously, banks also have to deal strategies.
and some parts of Asia, new payment with a security environment that has
schemes based on mobile money are turned markedly more hostile and shows
emerging. every sign of continuing to be so. Today
criminals are targeting banks as much as
Corporate banks are aiming to automate they're targeting consumers directly. There
90 percent of credit and saving operations are more and more attacks aiming at ATMs,
with straight through processing, with the for example. Some countries have suffered
remaining 10 percent covering complex enormous breaches with high volumes
exceptions. In Investment banking of credit cards stolen, such as the recent
operations, Securities Management is being attack on Experian. To guard against the
progressively digitized. reputational damage seen with every major
data breach, banks are developing a highly
The emergence of Blockchain-based collaborative security communications
business process proof of concepts for infrastructure aimed at countering and
complex multi-lateral financial market neutralizing organized cybercrime and
transactions point to a radical consolidation interference from rogue state-sponsored
in the clearing and settlement value chain cyber warfare.
bringing the benefits of real-time clearing
and settlement, all at a fraction of current It follows that personal, commercial,
cost. However, scalability issues remain to corporate and institutional customers
be solved at present. demand the very highest security
standards and practice from their banks to
protect sensitive personal and commercial
Trust and data. Security should be at the level of the
Compliance bank’s systems in their communication
with customer’s personal digital devices.
Banks that don’t shape up will lose their
Financial institutions have seen regulatory client’s trust and, consequently, a lot of
standards, risk management and business and they can also expect to be
compliance tightened significantly, with subject to punitive damages. Banks that
52 #AscentLookOut
€
Banking
Mainstream
Early adoption
Adolescent
Emerging
Blockchain Virtual
smart contracts assistants
Edge computing
Self-adaptive security
Beacons Robotics
Sentiment analytics
2016 2017 2018 2019+
© Atos 2016. All rights reserved.
54 #AscentLookOut
€
Banking
time streaming analytics. The spread of productive discussions with appropriately customers through their health tracker
this type of high performance computing qualified customer advisors. might reward them for improving their
to trading is already leading to an increase fitness levels.
in margins. Wearable computing
The explosion of sensory data from Web-scale computing
Virtual assistants personal wearables, amongst other things, Banks are progressing toward web-
Banks are leveraging virtual assistants is driving the creation of new value chains. scale computing with its highly scalable,
to enable customers to have intelligent These very personal devices do more inexpensive open source-based hardware,
dialogue with the solution; understand and than simply open up new insight into integrated computer resources and
assess options available to them; obtain customers; they provide a new channel for self-healing capabilities. Its operational
in-context information from trusted third banks to engage with customers in exciting simplicity allows departments to be more
party sources in real time and facilitate ways. For instance, banks engaging with agile while optimizing investments.
nc l
lle na
lle na
n
n
ce
ce
rie er
rie er
e
e
e
e
tio
tio
inv ss
inv ss
ce tio
ce tio
nc
nc
an
an
Ex stom
Ex stom
Co ust &
Co ust &
Re ine
Re ine
en
en
Ex ra
Ex ra
pli
pli
e
e
s
s
pe
pe
Op
Op
m
m
Cu
Cu
Bu
Bu
Tr
Tr
Advanced data
visualization Internet of Things
Advanced quantitative
analytics Machine learning
Programmable open
Beacons
APIs
Blockchain Robotics
Cloud Service
Self-adaptive security
Integration
High performance
Wearable computing
computing
Chemicals
Future growth mainly from developing Global markets to grow 20% in next 20
markets years
Raw material costs are volatile Asian players will own 2/3 of the
market by 2030
Growing health & environmental Nearly 60% more EU regulations than
concerns in 2008
Chemical plants vulnerable to cyber- Average chemical company spends
attacks 8% of sales on investments
Customer increase loyalty and repeat business. developing markets, meanwhile, companies
are investing in new plants and research
Experience Customer experience, on the other hand, facilities close to the local market. Very
is not conventionally a driver for traditional strong competitor knowledge is essential
bulk chemicals such as salt or chlorine for enabling an agile business response to
In today’s increasingly competitive since the properties of these products challenges in both mature and emerging
landscape, chemical companies of all types cannot be changed. Here, delivering a markets.
will benefit from a better understanding of great (primarily B2B) customer experience
the needs, desires and behaviors of their is about delivering a great service against Some companies are operating a variety
diverse customers: both B2C and B2B, and the lowest possible price. This is particularly of business models around the globe, with
including wholesalers, distributors and true when it comes to providing timely each model specifically tailored to its own
downstream manufacturers. access to specifics around the chemical specific market. Choice of model is critical
product: its properties and approved usage, in each region as it impacts future growth
Take, for example, the specialty flavor, safe handling, potential hazards and more. potential and profitability. In some regions
perfume and food additive chemical This information helps researchers and their business model may be aligned to
companies that aim to delight the senses of decision-makers identify materials that low-cost products that cater for the mass
the end user. To do this they must connect might improve how their own products market while in others it may be aligned to
directly with the consumer to understand are manufactured or even facilitate the specialist products, for example.
how molecular level changes result in taste development of new products.
or visual sensations. China is still the largest growing bulk
chemicals market in the world. A slowdown
Companies that already touch the Business in the market, however, has led to
consumer directly – for example paint Reinvention overcapacity, making for a tough market
manufacturers – would benefit from over the next few years. But despite an
deepening those relationships. After all, ailing economy and slowing manufacturing
new opportunities in the B2B2C space are industry – and the tragic loss of life
increasing their competitive advantage and When commoditization erodes profitability, following the explosion of a chemical
boosting their share of revenue. bulk chemical companies customarily warehouse in Tianjin – Western companies
focus on building market leadership continue to see China as the key market in
Some companies are even establishing through acquisitions and tightening Asia.
themselves as a brand for end customers. their core business through divestments.
Their modern virtual and physical stores Specialty chemicals companies, on the In a globalized world, where the pace of
offer a rich, personalized shopping other hand, invest significantly (more than change is ever increasing, reducing product
experience that engages and excites the the three percent industry average) in R&D innovation time-to-market is critical to
consumer around the brand. to develop new products and to better sustaining profitability. Companies cannot
rationalize an often complex portfolio of afford to waste money and resources on
These consumers expect a seamless and products that is costly to maintain on a innovations that are not going to fly; they
integrated experience across all channels, global scale. need a rapid return on their investments.
whether for pricing, return policies, stock This requires tighter management of new
availability or anything else. Ensuring a Globalization, meanwhile, continues to product ideation, with stronger moderation
virtual brand experience aligned with the drive restructuring in mature markets, early in the product lifecycle to simplify
in-store brand experience and standardized where business models, organizational process complexity and separate the wheat
across their online presence is important structures and information systems are from the chaff.
for building trust, which – in turn – helps evolving to align with the new structures. In
56 #AscentLookOut
Chemicals
energy and raw material utilization and risk of it being lost or destroyed by mistake
waste generation, they're combining their increases – especially in mergers and
desire to be sustainable with their desire to acquisitions.
increase margins.
58 #AscentLookOut
Chemicals
Mainstream
Early adoption
Adolescent
Emerging
Prescriptive analytics
Advanced data visualization
Internet of
Things
Distributed analytics
Innovation
Industry 4.0 Value Webs
technologies Edge
High performance computing
Streaming computing
analytics 3D printing Self-adaptive security
Wearable
computing Pattern-matching
Robotics technologies Intelligence amplification
Augmented reality
Mobile and social
media apps
Sentiment analytics
networking services locally whenever they brings the smart factory to life. Senior information, systems and locations they
need them – ensuring computationally- management can automatically tap into need to access, but only when they need it.
intensive smart factory initiatives are social media, for example, to understand
scalable. current customer preferences and Sentiment analytics
behaviors; then communicate these needs Specialty chemical companies have moved
High performance computing to the shop floor where production is up the value chain to where they're now
Computational chemistry suggests aligned just-in-time. closer to the end customer. Social media
possible options when developing and network analytics is helping them
new materials that require specific Mobile and social media app understand general customer behaviors,
performance and properties, safety and Chemical companies have moved toward trends and desires. Its sentiment analytics
toxicity characteristics. Behind the scenes offering end customers a full range of allows them to not only quickly identify
advanced analytics combined with high services around their products, such as new trends, but also respond to any
performance computing rapidly analyzes decorating services or gardening expertise. potentially reputation-damaging comments
millions of possibilities. Mobile and social media apps supporting before they cause any harm.
products sold to the end consumer help
Industry 4.0 technologies companies gather deeper intelligence on Streaming analytics
On the factory floor, Industry 4.0 individual customers. An app that provides Industrial data analytics include the
technologies (including the Internet of information on different types of weed streaming analytics that are helping
Things) are enabling the creation of smart provides insight on which types of weed companies to optimize production
factories where plant management is killer an individual customer might be operations and planning along the value
smarter and more virtual. They're not only looking for when they identify themselves chain.
improving agility, but also helping workers in either a physical or online store.
– from senior management to machine Wearable computing
operators – to make better decisions. Geo- Pattern-matching technologies Across the plant technicians access
location technologies and radio frequency Intelligence derived from the vast volumes information hands-free through modern
identification (RFID) tags, sensors allow of data now available allows chemical wearables, such as glasses, that have been
machinery to perceive the world around companies to make informed decisions made safe from the risk of explosions.
them. around what customers want. Pattern- Augmented reality relays vital information
matching technologies help them discover – such as step-by-step instructions on
Innovation Value Webs the patterns and trends across their many maintenance or configuration requirements
Open innovation allows the chemical products and their end effects that may – from the cloud to the paperless worker’s
industry to gain value from their wider bring new opportunities to innovate and line of sight. Embedded cameras relay
partner ecosystem, including the gain competitive advantage. pictures to the cloud, allowing specialist
collaborative joint ventures that are now engineers to offer their expert support from
embracing diverse industries. Innovation Prescriptive analytics remote locations.
value webs with their new social business Intelligent systems then employ
tools are facilitating open and nonlinear prescriptive analytics to determine
innovation processes amongst this wider configuration or maintenance
ecosystem. requirements, prescribing a course of
action that will both ensure optimal
Intelligence amplification production levels and identify failing parts
Decision-making has also been greatly that need to be serviced or replaced long
enhanced through intelligence before they threaten to cause downtime.
amplification, which requires workers to This type of condition-based maintenance
interpret and react to the broader context helps companies save on labor and service
of intelligence derived through advanced costs, reduce unscheduled downtime and
analytics and machine learning. improve operational efficiency.
60 #AscentLookOut
Chemicals
nc l
nc l
lle na
lle na
n
n
ce
ce
rie er
rie er
e
e
e
e
tio
tio
inv ss
inv ss
ce tio
ce tio
nc
nc
an
an
Ex stom
Ex stom
Co ust &
Co ust &
Re ine
Re ine
en
en
Ex ra
Ex ra
pli
pli
e
e
s
s
pe
pe
Op
Op
m
m
Cu
Cu
Bu
Bu
Tr
Tr
3D printing Internet of Things
Pattern-matching
Augmented reality
technologies
Cloud Service
Prescriptive analytics
Integration
High performance
Sentiment analytics
computing
Intelligence
amplification
Cities
Cities are becoming smarter Large cities contribute 85% of the GDP
62 #AscentLookOut
Cities
‘‘Smart Cities will transform the city into a digital platform that enables
the development of innovative services. These have the potential to
transform the economy – fostering growth and creating of new jobs.’’
Albert H. Seubers
Head of Global Strategy
IT in Cities
64 #AscentLookOut
Cities
Mainstream
5G networks Early adoption
Adolescent
Emerging
Internet of
Things Edge computing
Prescriptive analytics
Streaming
analytics Distributed
analytics 3D printing
Context-rich systems
Virtual assistants
Wireless power
Open Data/Economy
of Data Cyber-physical systems
API economy
Federated Augmented reality
identity
Peer-to-peer platforms
Mobile and social Sentiment analytics Autonomous
media apps vehicles
Wearable Near field
computing communication
66 #AscentLookOut
Cities
engages seamlessly with the visitor agency offices to engage with the city and
through a multitude of online channels. access city services.
nc l
lle na
lle na
n
n
ce
ce
rie er
rie er
e
e
e
e
tio
tio
inv ss
inv ss
ce tio
ce tio
nc
nc
an
an
Ex stom
Ex stom
Co ust &
Co ust &
Re ine
Re ine
en
en
Ex era
Ex ra
pli
pli
e
s
s
pe
pe
Op
Op
m
m
Cu
Cu
Bu
Bu
Tr
Tr
Mobile and social media
3D printing apps
Open Data/Economy
API economy
of Data
Internet of Things
>1bn new consumers by 2020 spending Consumer demand for variety and
$10 - $100 per day authenticity
Generation Y will spend $65bn on CPG Digital is driving innovation in delivery
over the next decade models
80m Generation Y consumers shop Brand loyalty is declining in food,
differently beverage & household goods
By 2025, 50% of retail purchases will be 3D printing will create new business
mobile models
68 #AscentLookOut
Consumer Packaged Goods
70 #AscentLookOut
Consumer Packaged Goods
Mainstream
Early adoption
5G networks
Adolescent
3D printing Emerging
Semantic technologies
Edge computing
Internet of
Things Wearables Privacy-enhancing technologies
computing
Context-rich
systems
Beacons
Augmented reality
Machine-to-machine
Geo-location technologies
Near field communications
Hybrid cloud
Sentiment analytics
manufacturing of the product. further enhancing the experience. and retailers as well their customers and
the product itself – to help them build the
Cloud-based federated identity governance Internet of Things intelligence that is improving efficiency
will provide secure federated access to By connecting devices, people, processes and decision-making as well as enhancing
both operational systems and customer and information, the Internet of Things customer experience. Behind the scenes
information across systems, between MOM, (IoT) has opened up the opportunity to semantic technologies help these
ERP, PLM and CRM systems. deliver a compelling experience, the likes intelligent systems to understand the
of which have never been seen before. relationships within and across data.
Context-rich systems Real-time data gathered from social media,
Marketing messages are highly contextual. smart devices, wearables and more gives Sentiment analytics
They’re tailored to the shopper’s brands a great deal of insight into their Brands have employed social media and
preferences and buying history, the current customers’ needs, desires and behaviors. network analytics to understand general
environments (such as the weather outside customer issues and desires for some
or local events) and where the shopper is Machine-to-machine time. Its sentiment analytics allows
standing in the store. Context-rich systems Two way machine-to-machine (M2M) them to quickly identify and respond to
combine intelligence from diverse systems communications allow shelves or vending individual customer’s gripes and any other
– from social media and purchase histories machines to manage their own stock. Stock reputation-damaging sentiment. They're
to weather forecasts and diaries of local levels are automatically transmitted to a now also leveraging it to gather intelligence
events – to fully understand the shopper’s central control room in real time, where on individual customers.
current context. advanced analytics assess requirements
and schedule any deliveries needed into an Wearable computing
Edge computing optimized schedule. Brand employees in stores can access vital
Some CPG companies are leveraging edge intelligence hands-free through modern
computing to both process relevant data Near Field Communications wearable devices. These wearable devices
more quickly and ensure scalability within When they require comprehensive infuse insights with the real-world, blurring
the end-to-end integration. Indexing data information customers make their the lines between digital and physical.
close to the point of capture, for examples, way to a brand store where Near Field
lightens the load of centralized servers Communications (NFC) has become the
while making it highly accessible to the norm for tapping into product details.
systems that need it soon after capture.
Prescriptive analytics
Geo-location technologies Brands are turning to prescriptive
Combined with geo-location technologies analytics to help deliver a highly
and radio frequency identification (RFID) personalized customer service, whatever
tags, sensors ensure devices such as the channel. This advanced analytics
vending machines, fridges and other examines each individual customer’s
product displays are running well and preferences, purchase history, sentiment
haven’t been moved from their designated on social media accounts and more before
location. Diagnostic and location data is presenting relevant recommendations or
continually transmitted back to the central offers – whether on a web page or even
control room where an intelligent system as a text message. At a higher level, it's
alerts maintenance teams to issues as also helping brands decide when to cut
they arise. Any misplaced, or even stolen, prices and how to optimize stocks across
machines can be tracked in real time. different regions or even stores in response
These technologies also allow brands to to changing environments. For example, it's
track and trace their products from factory helping them optimize beer or ice cream
to store. stocks as weather conditions change.
72 #AscentLookOut
Consumer Packaged Goods
nc l
nc l
lle na
lle na
n
n
ce
ce
rie er
rie er
e
e
e
e
tio
tio
inv ss
inv ss
ce tio
ce tio
nc
nc
an
an
Ex stom
Ex stom
Co ust &
Co ust &
Re ine
Re ine
en
en
Ex ra
Ex ra
pli
pli
e
e
s
s
pe
pe
Op
Op
m
m
Cu
Cu
Bu
Bu
Tr
Tr
3D printing Hybrid cloud
Geo-location
Wearable computing
technologies
Defense
Customer appreciate lightweight, intuitive and user- industry to provide open standards and
systems that can operate in cross-border
friendly smartphone and tablet interfaces.
Experience Consumer market waterproof smartphones operations without giving in on security
and tablets, for example, could be and flexibility.
encrypted and adapted to meet field needs.
The mission spectrum is becoming Against an enemy without borders,
increasingly diverse. Today’s asymmetric Defense organizations are already efficient protection requires cooperation
threats include everything from nuclear changing the paradigm and investigating between national organizations and allies.
proliferation and climatic disaster through how they can leverage familiar civilian Collaboration within a wider ecosystem of
failed states, ideological warfare and tools and technologies to reduce peers and partners is now the norm. But
terrorism to the looming threats of global training requirements, raise acceptance new threat scenarios are only complicating
resource scarcity and energy security. levels, increase efficiency and cut cost – the picture. Sharing information beyond
particularly for non-combat scenarios. defense communities now becomes the
To stay one step ahead of the enemy, our critical factor. But making wider ecosystems
armed forces and intelligence services Current public devices require major work in practice can be challenging.
need ready access to the latest advances modification to meet specific user
in technology. Speed of development and demands and expectations. Users deployed Innovation and creativity play an
deployment are critical success factors in in remote locations, for example, require increasingly important role in enhancing
the increasingly complex and fast-moving devices that can function in extreme capability, accelerating deployment and
landscape. environmental conditions, such as high or delivering financial efficiency benefits. As
low temperature, high levels of humidity or sovereign innovation becomes a core
Military personnel need user-friendly, shock. Additional security measures – such aspiration, new open and more integrated
but tactically-oriented, innovations that as zero clients – are needed to ensure the approaches that enable defense and
integrate seamlessly with the tools and device and the data on it remain safe in industry organizations to work together
processes already at their disposal. It’s case of loss, theft or if it needs to be left in- more effectively will stimulate valuable
important that the devices they use are the situ. Some devices may not be suitable for home grown defense ecosystems and
smallest possible form factor. Man portable use in combat situations. innovation that would otherwise be
and ultra-low power compute (9v battery) constrained by organizational boundaries.
technologies will improve the mobility of
deployed forces. Business A new approach to contracting with
Reinvention defense suppliers is needed; moving from
A joined up user experience is important a rigidly defined requirements contract to a
too, with the same systems and services flexible results-based model that can adapt
available to personnel whether they're fixed and evolve in the face of a change in threat
or deployed. Training should be swift, with The defense sector needs to reinvent the
type and vector.
‘train as you fight’ often the reality. way it works. Defeating today’s asymmetric
threats demands global connectivity. No
Today’s new generation of military one defense or security organization can
fulfill its core mission alone. To maximize
Operational
personnel expects tools and gear that
operational effect and minimize risk, those
Excellence
is at least as user-friendly as that they
operate in their private lives. A far cry executing operations require total solutions
from many of the specific ruggedized, backed up by an integrated full service
rigid, difficult-to-use and un-interoperable capability. This places interoperability at the The accelerating operational tempo
systems currently in operation, they would top of the agenda, challenging defense and requires rapid decision-making. Information
74 #AscentLookOut
Defense
‘‘Faced with squeezed budgets and a real need for turning information
into strategic and tactical advantage, Armed Forces need to rely more
and more on the power of IT technology evolution, provided it's fully
adapted to the specific military environment.’’
Stéphane
Janichewski
Head of Defense &
Aerospace Market
superiority has become the defining metric they're required. Mobile command posts military personnel deployed in extremely
for every defense outcome. Timely and need to be deployed at the very heart of dangerous situations. From risk analysis
reliable intelligence is vital for enabling the conflict or emergency to immediately to monitoring for new threats, exposed
crucial real-time situational awareness manage information and resources as if in a intelligence information signifies a clear
and rapid decision-making throughout fixed installation. Field hospitals need to be reduction in capacity to both act and
the whole command chain. Across the deployed rapidly in support of operations defend.
battlefield, for example, informational where health infrastructure is non-existent
superiority enables command and control or has suffered a lot of damage. Connected All mobile security solutions need to
to deliver real-time situational awareness to systems allow critical casualty data to be support interoperability between mobile
dismounted personnel and inside vehicles, provided to medical response teams before devices and multiple advanced military
providing a force multiplier capability. they arrive on the scene, for example. or governmental systems, devices and
technologies. Examples of such systems
Defense organizations must master the Equally, technologies that allow security include advanced security solutions for
data and information flood flowing out from zones to be collapsed remove the need data transfer and specific applications for
both operational and IT sources, including for a multitude of discreet infrastructures, communication, such as head-up displays
radio, imaging, human and open sources. reducing complexity and costs. Design with security functions.
Tight integration across all sources is vital once, use many times, simple repeatable
for eliminating dangerous prediction and processes, incremental acquisition of As cyber space joins the classic realms
diagnosis time lags. Only then can timely capability and spiral development provide of military operations, people, assets and
decisions be made to ensure that alerts the basis for rapid implementation in this infrastructure must be secured from known
and actions launched are appropriate. ever-changing landscape – minimizing both and emerging threats across both physical
To extract timely meaning and pertinent latency and the possibility that solutions will and virtual worlds throughout all hours
signals from the data, large information be out of date by the time they're delivered. of the day and night. Protecting identity,
bases need to be processed efficiently. access and cyber disruption along with
the integrity and confidentiality of the
Today’s security and defense mission increasing number of connected objects
is complex and continually evolving. Trust and are simply the latest variables thrown into
The rapidly changing operational Compliance the strategic defense mix along with the
environment demands higher levels of likes of drones and improvised explosives.
agility and adaptability, both on and in There's no room for human intervention in
support of battlefield operations. Defense the cyber domain. Attacks appear with the
To maintain strategic advantage, armed
organizations also need to be able to scale speed of light; so must defense.
forces and intelligence agencies need to
resources and performance as and when
ensure the entire information value chain
required in a landscape of increasingly
is secure – from observation to action.
unpredictable mission requirements: from
The most effective security solutions for
disaster response to global deployment.
protection against unauthorized access
Scalability is also vital for meeting ever-
to computers and computer networks will
shifting security agendas.
preserve the confidentiality, integrity and
availability of critical information and data.
Agility and scalability go hand in hand
with interoperability, particularly across
Ever-increasing mobility requires end-
areas of defense where operations require
to-end security to protect against well-
solutions to be deployed easily, rapidly
organized threats and ensure the safety of
and seamlessly wherever and whenever
76 #AscentLookOut
Defense
Quantum computing
Mainstream
5G networks Early adoption
Adolescent
Emerging
Self-adaptive
security
Swarm computing
Brain-computer
interface
Prescriptive analytics
3D printing
Industry 4.0
technologies Cloud Service
Machine learning Integration
Internet of
Things Streaming
analytics
High performance Distributed Innovation
computing analytics Value Webs
Edge computing
Semantic
Social media Advanced technologies
analytics data visualization
Autonomous
vehicles
Software-defined
technologies DevOps App stores
Wearable computing
Augmented
Robots reality Hybrid clouds
DevOps be conserved since only immediately foes, is stored in private clouds. Hybrid
The Agile development methodology pertinent information needs to be clouds allow combat personnel to enhance
accelerates development by presenting transmitted centrally. sensitive insights with publicly available
early mock-ups, allowing military personnel data such as maps or weather forecasts.
to express their needs and desires early High performance computing
in the design process. To accelerate Growing volumes of data are being turned Innovation Value Webs
deployment, defense organizations into critical military intelligence – Military With collaboration within a wider
are adopting a DevOps approach to Intelligence 4.0. With the volumes, variety ecosystem of peers and partners key
development. It reduces time-to-market and velocity of data accelerating, high- in the fight against an enemy without
and cost while improving quality by performance computing (HPC) ensures borders, innovation value webs are
enhancing collaboration between software military personnel can run the complex empowering network centric warfare and
developers and IT operations. simulations and analyses that deliver intelligence. Value webs ensure processes
vital intelligence. By combining HPC are supported along their entire paths,
Distributed analytics computation infrastructures, networks and with dynamic and both synchronous and
New research programs around the last mathematical models they can asynchronous participation all supported.
distributed analytics will address future predict behaviors, prevent cyber or terrorist In addition these webs are able to process
coalition operations in the congested, attacks and more. diverse and unpredictable metadata
cluttered, contested, connected and formats.
constrained battlefield. Hybrid clouds
Cloud computing is helping defense Internet of Things (IoT), Industry 4.0
Edge computing organizations ensure data is accessible technologies
Information gathered and analyzed at the whenever and wherever it's needed, By promoting Internet of Things (IoT),
edge through edge computing allows improving mobility and flexibility. Sensitive Industry 4.0 technologies are enabling the
restrictive and valuable bandwidth to data, such as the position of peers and liquid operational intelligence and control
called for in today’s continually evolving technologies help agencies anticipate used to analyze geo-location information
theatre of war and terrorism. Connected threats. Behind the scenes streaming in real time to provide a comprehensive,
objects and vehicles integrated to the analytics and HPC analyze millions of up-to-the-minute view on the location of all
heart of the action zone ease information events in real time. mobile assets.
collection and processing directly in the
field. Self-adaptive security approaches that Swarm computing
can, for instance, automatically adapt to Part of the wider IoT, sensors, robots
Sensors and geo-location technologies a fast-changing context would heighten and other devices together make up
embedded in mobile devices and smart security in self-organizing ad-hoc and the intelligent dust that can detect
vehicles continually transmit intelligence to sensor networks. light, temperature, vibration, magnetism,
a central control center. Any individual or chemicals and more. Operating wirelessly
vehicle needing assistance can be found Meanwhile distributed analytics in within a network it provides invaluable data.
easily, their status understood in advance combination with HPC supports vital
of reaching them. forensic analysis after an incident is Wearable computing
detected. They help organizations quickly On the battlefield, wearables connect
Machine learning identify where the attack started, who is military personnel with their peers and
Behind military robots lies a complex set behind it and how it was carried out. operational headquarters. Electronics
of automated processes, with no room and sensors that can be worn or placed
for error. The wrong information or the Semantic technologies in uniforms provide real-time monitoring
wrong outcome of an analysis may lead In defense, semantic technologies help of their location, vital signs and the
to automated responses with real life organizations unleash the hidden value of environment around them.
consequences. Machine learning will play data, develop shared common databases
a key role in that decision-making. and simplify the management of military
intelligence reference data. They help
Prescriptive analytics intelligence systems to understand the
Operations research falls under the relationships within and across data.
category of prescriptive analytics. Its first
application was in planning and managing Social media analytics
organizational operations during World Defense organizations are employing
War II when human and material resources social media analytics to gain additional
were scarce and managing war logistics insight into how situations are developing.
was a daunting task. This will also provide Open Source
Intelligence (OSINT) to complement
Quantum computing established methods already in place.
With communication security critical on the OSINT enhances situational awareness. In
battle field, quantum computing promises a non-combatant evacuation operation
to deliver new levels of protection. What’s it can provide valuable insight for those
more, quantum computers threaten to preparing to deploy or who have deployed,
break today’s encryption methods. Their for example.
substantial increase in computing power
could be a game-changer in intelligence, Software-defined technologies
surveillance and reconnaissance. Build over the wire and software defined
techniques improve deployment speed
Robots and safety. Software-defined networking
Security robots undertake dangerous (SDN), for example, provides the agile
actions without jeopardizing military forces network that helps forces communicate,
and act in areas that are either extremely train and operate together better. Military
difficult or impossible for humans to access. personnel can create dynamic links
Autonomous, they can self-organize and between locations and dynamically
reach certain level of independent decision apply appropriate quality-of-service and
making. bandwidth allocation to those links.
78 #AscentLookOut
Defense
nc l
nc l
lle na
lle na
n
n
ce
ce
rie er
rie er
e
e
e
e
tio
tio
inv ss
inv ss
ce tio
ce tio
nc
nc
an
an
Ex stom
Ex stom
Co ust &
Co ust &
Re ine
Re ine
en
en
Ex ra
Ex ra
pli
pli
e
e
s
s
pe
pe
Op
Op
m
m
Cu
Cu
Bu
Bu
Tr
Tr
3D printing Innovation Value Webs
Advanced data
Machine learning
visualization
Brain-computer
Self-adaptive security
interface
Cloud Service
Semantic technologies
Integration
Industry 4.0
technologies
Discrete Manufacturing
Almost all products are becoming Market revenues will reach almost
smarter $28bn in 2017
Connectivity is growing at an 70% of manufacturers offer connected
exponential rate products
40% will provide Product-as-a-Service
3D printing will transform the market
platforms by 2018
By 2020, most things at home can be
Energy costs continuing to rise
monitored online
80 #AscentLookOut
Discrete Manufacturing
partnerships, joint ventures, mergers and Zoo in 2007. In another instance a shirt to-market. Being nearer to customers also
acquisitions will swell further. Those joint manufacturer was suddenly hit with huge increases control and accelerates reaction
ventures and partnerships help companies demands for the shirt worn by drug lord El times.
acquire the skills and capabilities they're Chapo when he was interviewed by Sean
lacking – for example helping a home Penn. Manufacturers need high levels of For partnerships and joint ventures to
appliance manufacturer gain vital software flexibility that can cope with huge variations succeed, companies must take a more
skills – while the data from downstream in demand over short periods of time. open approach to working together.
manufacturers is vital for presenting Questions remain around how openness is
measurable results. For instance, the The core product needs to be tailored achieved and how companies still protect
performance of a light-transmitting to appeal to diverse markets around the their intellectual property.
furniture solution is equally vital for the world and increasingly customized to
upstream smart LED manufacturer and the meet the specific needs and desires of Meanwhile, mergers and acquisitions will
furniture manufacturer. the individual consumer. This not only bring together diverse legacy systems that
increases development and production will need to be simplified and harmonized
complexity, but changes demanded by the to optimize operations.
Operational B2C are reflected backwards up the B2B
Excellence value chain.
Trust and
As product complexity grows, so will Compliance
products’ support and maintenance
Product lifecycles are decreasing in a
requirements. But the lifecycles of
booming market driven by both consumer
products’ hardware and software are
demand and technology-push. New As product digitalization becomes the
different: software upgrades are needed
versions of TV sets, for example, appear norm, the increasing volumes of data
more frequently. Managing these different
on an almost annual basis. Companies produced and shared must be secured
lifecycles can be complex, for both PLM
are investing significant amounts of time from threats across cyberspace. To
and utilization phases.
and money into R&D to ensure they keep preserve the confidentiality, integrity
pace with decreasing product lifecycles. and availability of critical data, discrete
Upgrade processes need to be simple
Materials analysis, for example, is helping manufacturers need to protect against
and intuitive or even automated. Discrete
them discover new more reliable, more unauthorized access to products, data
manufacturers are exploring how they can
resistant, lighter and cheaper materials. centers and networks.
leverage increasing connectivity and their
Nowadays, R&D effort focused on software
growing volumes of data to reduce the
development is commonly transferred The risks are high. A well-organized attack
cost of maintaining both their products and
offshore to take advantage of the could potentially take control of products,
their manufacturing equipment. Examples
abundance of low cost talent. rendering them unusable or, worse still,
include remote tuning and remote
diagnostics. putting the safety of their users at risk.
Companies must be able to react quickly Companies must take all precautious
to trends. New product launches must necessary to identify, understand and
Furthermore, as production networks
be timely to ensure opportunities aren’t eliminate threats. Their mere existence
become more complex – particularly for
missed in a world where products can depends on it.
higher value and customized products –
very quickly gain and lose favor with the
collaboration must become more dynamic.
end customer. Steiff, for example, missed Risks also extend to suppliers and
Some manufacturing is now returning
a unique opportunity to market a teddy to subcontractors. Manufacturers must ensure
closer to home to reduce logistics cost,
celebrate the birth polar bear Knut at Berlin they are also fully secured and can trace
increase customization and improve time-
any issues. Even the smallest subcontractor That understanding is vital for ensuring
– who may be unable to adequately compliance in where they store product
manage their security – must not bring and customer data, along with where they
any unknown risks to the final product. In access it from and how they use it.
the event that a problem slips through the
net, if manufactures cannot trace the root Depending on the nature of data, export
cause, the consequences could be dire. control may demand it’s stored in-country,
for example, and prevent it being accessed
But it’s not just their products that need from overseas. The EU's Data Protection
to be protected. Companies must also Directive, for example, lays down specific
secure future profit streams by protecting rules for the transfer of personal data
intellectual property from any low-cost outside the EU.
copycats: their various hardware and
software components and their designs. Depending on the country, there may
This is particularly important where R&D also be restrictions on whether data can
is taking advantage of near- or off-shore be passed to third parties or used for
talents. It’s not just profits that are at risk; recommending products or services. Can a
brand reputations are at risk from low motorcycle manufacturer pass information
quality alternatives. gathered about its customers’ journeys
onto relevant tourist offices so they can
And since customers will only offer their recommend places to visit or stay, for
loyalty to companies whom they trust, example?
companies must comply with increasingly
tough data protection regulations and On everybody’s agenda, sustainability
policies. With new national and international is driven partly through regulation and
legislation emerging all the time, discrete partly through customer and consumer
manufacturers must understand and demands. Discrete manufacturers must
be able to implement diverse regulatory deliver sustainable products – and
changes smoothly. increasingly services – while minimizing
pollution, eliminating the exploitation of
Furthermore, companies will need to child labor and turning their backs on
fully understand the diverse regulations bribery and corruption.
that exist across individual nations.
82 #AscentLookOut
Discrete Manufacturing
Mainstream
Early adoption
Machine learning
Adolescent
Emerging
Edge
computing
3D printing Self-adaptive security
Internet of
Things Prescriptive analytics
Cloud Service Integration
Digital rights management
Distributed analytics
Streaming analytics
Advanced data visualization
Augmented reality
High performance
computing Innovation value webs
Hybrid cloud
Digital signage
Wearable computing
Beacons
plants or shops can be deployed quickly, close to the point of capture. early indication that parts are becoming
delivering the consistent engineer or worn. Technicians can access the remote
customer experience that enhances High performance computing discrete product securely – no matter
productivity and drives engagement. As With the volumes, variety and velocity where they are and where the product is
the need for cloud-based functions grows, of data accelerating, high performance located – to perform remote maintenance
Cloud Service Integration connects computing is needed for handling the and optimize its performance. Experts no
processes seamlessly. complex analysis of the volumes of data longer need to be onsite – they can share
transmitted from consumer devices. It will their knowledge and expertise from any
Leading manufacturers have moved to give companies a better understand of corner of the globe.
the integrated manufacturing, enabling how products are being used and reveal
the information transparency and potential issues before they arise. Machine learning
collaboration between MES / MOM, ERP To help improve both products and
and PLM systems. This vertical view along Hybrid cloud manufacturing processes, machine
the value chain becomes increasingly To enhance customer value, manufacturers learning is learning about how products
critical as product lifecycles shorten and are increasingly complementing their perform and are used during their entire life
the continuous evolution within product own services with third-party services. cycle. It takes advantage of the additional
releases accelerates. The shift to integrated For example, moped manufacturers are knowledge that can be gained from novel
manufacturing was not a quick technical fix. offering a service that enhances a view situations to enhance their performance.
The first steps required a simplification and of a customer’s journey and driving
harmonization of the IT landscape. Later performance with details of the weather Prescriptive analytics
steps include Cloud Service Integration. along the way. A hybrid cloud combines Advanced data analytics are making
the manufacturer’s insight with the third- use of that data to increase plant uptime
Digital rights management party weather service. by predicting – and even prescribing –
As the number of products created on maintenance requirements. Manufacturers
3D printers grows, manufacturers must Innovation Value Webs are turning to prescriptive analytics to
turn their focus from producing physical Open innovation ensures discrete predict actual equipment failures and then
products to delivering value-added services manufacturers optimize value from their suggest a number of possible actions and
to their customers. Once the cost of 3D wider partner ecosystem. Suppliers are their likely outcomes.
printers drops and consumers begin encouraged to provide more complex
printing products at home, digital rights outcomes and share the investment cost of They’re also deploying prescriptive
management will help manufacturers new technologies. Innovation value webs analytics to predict when and how their
retain intellectual property (IP). encourage collaboration and knowledge washing machines, TVs and more will fail
sharing while facilitating data aggregation and recommend the actions the consumer
Digital signage and sharing. needs to take to prevent that failure.
In store digital signage – from wall
mounted screens to tablets and even the Internet of Things Self-adaptive security
consumer’s own smartphone or smart On the shop floor, the smart factory Self-adaptive security techniques,
watch – allows the manufacturer to show a is helping manufactures respond to including trusted probes are being
greater variety of stock in a limited space an increasingly complex and fast- deployed to look for evidence of specific
while, at the same time, providing a more paced production environment. Fully suspicious behaviors and help companies
engaging and personalized customer autonomous production chains reconfigure anticipate threats. Behind the scenes
experience. automatically for each individual product streaming analytics and HPC analyze
according to its individual design millions of events in real time.
Distributed analytics parameters. By promoting Internet of
A few years from now virtually every Things (IoT), Industry 4.0 helps companies Meanwhile distributed analytics in
action on or by a product will leave a to efficiently respond to the increasing combination with HPC supports vital
digital trace. Manufacturers manage demand for customized products. forensic analysis after an incident is
those billions of pieces of information detected. They help organizations quickly
coming from embedded sensors securely Furthermore, senior management gets the identify where the attack started, who is
in an internally-managed private cloud. real-time insight it needs to make informed behind it and how it was carried out.
Distributed analytics gives them deep business decisions. After communicating
intelligence on consumer desires and changing production to the shop floor, Streaming analytics
behaviors by combining insight from this for example, flexible reconfiguration New sources of intelligence are paving the
data with insight from operational, stock, procedures, amongst others, ensure way for manufacturers to develop new
price and customer data. production can respond to customer needs types of relationships with and exciting
in next to no time. new services for their end customers. A
Edge computing service linking real-time data streaming
With vast amounts of data to be processed Both plant assets and discrete products from a bicycle helmet with customer data
and intelligence required in real time, continually report their status back to automatically calls the emergency services
manufacturers have adopted edge the central control system using IoT with the cyclist’s details if they do not move
computing to process – for example index technologies. Precise measurements of for 30 seconds, for example. Streaming
or analyze – the data in its diverse formats components, oil pressures, vibrations and analytics processes that data in real time.
more not only provide engineers with an
84 #AscentLookOut
Discrete Manufacturing
Wearable computing
Two-way communications between
machines, workers through tablets,
smartphones and even wearables has
increased agility on the shop floor.
nc l
nc l
lle na
lle na
n
n
ce
ce
rie er
rie er
e
e
e
e
tio
tio
inv ss
inv ss
ce tio
ce tio
nc
nc
an
an
Ex stom
Ex stom
Co ust &
Co ust &
Re ine
Re ine
en
en
Ex era
Ex ra
pli
pli
e
s
s
pe
pe
Op
Op
m
m
Cu
Cu
Bu
Bu
Tr
Tr
High performance
3D printing computing
Advanced data
Hybrid cloud
visualization
Cloud Service
Machine learning
Integration
Digital rights
Self-adaptive security
management
Education
86 #AscentLookOut
Education
With students accessing the best on making previously inaccessible learning looking to make better use of their legacy
professors from the best universities free analytics data openly available, offer classrooms and libraries. Proposals include
of charge through MOOCs, as well as new business opportunities, specifically everything from transforming them into
collaborating and researching online, local intelligence services related to this data: its new formats of learning spaces that enable
teachers must rethink their added value analysis, prediction and the detection of complementary learning to selling them or
and transform their role within this ‘flipped- patterns. Examples might include a service hiring them out to raise additional funds.
classroom’. Students use their time in the that analyzes environmental data to predict
flipped classroom to apply their knowledge major natural events such as tsunamis or Flexible infrastructures keep education
and benefit from personalized teacher to understand the environmental impact establishment agile, better able to keep
support: more intimate discussions and of working oil platforms and identify up with new trends and adopt new
exercises with smaller groups of students, measures that will reduce any impacts. technologies as they emerge. After all, the
for example. Furthermore, combining z-generation won’t tolerate anything less
MOOCs with adaptive learning increases than a modern, flexible environment that
flexibility and helps previously discouraged Operational empowers them to take control of their
students to progress better since teachers’ Excellence learning.
time is freed up so they can help those
students who need it most.
The education environment is incredibly Trust and
Schools and college’s ability to offer exciting, but also incredibly tough thanks to Compliance
individual tailored services will set them budget constraints. Schools must continue
apart from the MOOCs. To do this they to improve the quality of education without
must make sense of the data they retain raising costs. Digital technologies have Schools are increasingly creating their own
about their students. A school might, for become key to delivering more and better IT-based educational environment, where
example, use information on a student’s education for less. Conversely, just keeping students have to register to use the school’s
attendance and grades to flag up a need up with today’s fast-changing technology learning material and communicate with
for additional support. This helps ensure domains can be costly. teachers, schedule exam or get their
every student attains predefined levels
results. To keep all this data safe and
of skills and competences, enhancing The demands on teachers are becoming ensure the availability of their services,
the school’s reputation in a climate of more complex. Teachers are not only educational establishments must protect
increasing competition. finding it increasingly difficult to manage this environment from the increasingly
their agendas as education becomes diverse cyber threats. Cyber-attacks need
The role of universities is changing more personalized, they're expected to be foreseen, understood and prevented.
too: they're becoming ecosystems, to be sensitive to culture and gender Prevention plans should include recovery
blurring their boundaries with large scale issues, respond to students with learning measures that will minimize impact in the
enterprises through offering co-innovation, or behavioral difficulties and adopt new event of an attack.
innovation hubs and a safe harbor for technologies – all while keeping pace with
start-ups. As universities become innovative developments in their field of knowledge. And as students bring their own devices
job creation engines they will need to
into the physical and virtual classroom,
change their business models and financial As schools transition from a static schools have to grapple with new security
structures. bricks-and-mortar to a blended learning challenges. They must ensure their
environment, the school building becomes infrastructure has adequate security
Many universities already collect vast an environment for face-to-face social measures in place to allow diverse new
amounts of data for scientific and research networking. As they modernize and devices to enter their networks.
purposes. Open Data initiatives, which focus harmonize, educational establishments are
88 #AscentLookOut
Education
Mainstream
5G networks Early adoption
Adolescent
Emerging
Self-adaptive security
Prescriptive
analytics
Cloud Service
Integration
Distributed analytics
information gathered on anything from platform for creating, sharing and refining such as identity theft, hacking and the theft
a student’s performance, learning pace ideas and materials. of intellectual property. Privacy-enhancing
and learning preferences to their location, technologies (PET) control disclosure of
device-type and network capabilities. Internet of Things data, helping educational establishments
The Internet of Things (IoT) connects to manage privacy risk by ensuring
Distributed analytics students’ devices to cloud services and compliance with data protection legislation
Diverse sources of data are processed educational assets. Their wearable devices and regulation.
across diverse systems to provide a single might, for example, provide access to
view of the student, their performance, school premises, specific rooms or even Robotics
behaviors, needs and desires that is individual pieces of equipment. The Introducing robotics to learning is an
more comprehensive than ever before. data shared ensures computer settings effective way of introducing programming
Distributed analytics provides teachers automatically reflect the individual student’s to very young learners, contributing
with the insight they need to offer needs when they log in, providing larger to the acquisition of a set of skills and
students with a personalized, meaningful fonts for a visually impaired student for competences that will be mandatory for
and engaging learning experience. For example. their future employment. Robots also help
educational institutions it provides the learners with different types of abilities or
insight needed to optimize the different Mobile and social media apps special needs.
organizational aspects of learning from Students are increasingly learning about
learning spaces to resources. specific topics by watching online videos Self-adaptive security
outside of the classroom, then making the Students – and in some instances their
Local education authorities are also most of class time for engaging face-to-face guardians – are able to access information
leveraging distributed analytics for discussions with their peers and for seeking to help them appreciate their progress
assessing and planning communities’ teachers’ guidance on specific matters – the and also to ensure support at home is
educational needs. By combining data flipped classroom. Mobile and social media aligned with learning in the classroom.
from schools and GP practices, and taking apps deliver learning content to students’ Self-adaptive security with its dynamic
into account migration and new housing mobile devices through the cloud. access control capabilities ensures
developments, amongst other things, teachers, students and parents alike have
they're making real-time forecasts for pupil Pattern-matching technologies access to the classrooms, information and
numbers. Schools are able to make informed systems they need to access, but only
decisions around what works best for each when they need it and on the devices
Gamification student or when intervention is required, where they need it. Schools may want, for
Introducing gaming mechanisms into for example. As part of the learning example, to prevent students’ exam results
the learning experience, also known as analytics approach, pattern-matching or progress from being accessible on their
gamification, motivates students to want technologies help schools identify specific smartphones to minimize opportunities for
to learn, to take ownership of their learning behavior patterns that might indicate a school bullies.
and to maintain their focus on the learning need for additional educational support or
task in hand. Students are learning about that a student is being affected by events Semantic technologies
concepts in the real world by solving outside of school. Behind the scenes semantic technologies
riddles and experiencing simulated help intelligent systems to understand the
situations. Role-playing games allow Prescriptive analytics relationships within and across data.
teachers to experience difficult situations Rather than allowing problems to escalate,
and learn to manage them. a predictive model can forecast students’ Virtual assistants
results and alert staff of potential issues. Innovations, such as virtual assistants,
Haptic technologies The other element of learning analytics, provide students with the advice they need,
Wearable haptic technologies ensure very prescriptive analytics, goes beyond when they need it. They have an important
young children also benefit from digital predictive models by showing the likely role to play in remote locations or where
learning. These technologies provide a fun outcome of one or more possible courses the student is unable to access a teacher
way to engage in real life experiences and of action. directly – for example if they're learning
to learn about the world around them. Prescriptive analytics is also helping from home while they're recovering from
students make the best choices for new an illness.
Hybrid cloud learning and future careers. Time spent and
Education institutions are increasingly results achieved will lead to suggestions Wearable computing
adopting hybrid cloud services to enhance for jobs and career paths when most In the case of social media apps, the
the student experience by augmenting students don’t know what they want to do surrounding social media environment
learning resources offered through internal or become. offers a platform for students to share their
private clouds with the myriad of learning thoughts, concerns and ideas. As such,
resources available on public cloud Privacy-enhancing technologies learning can take place anytime and on
infrastructures. As students share more information any device – from desktops and laptops to
on social media and with public sector tablets, smartphones and even wearables.
Innovation Value Webs organizations they will be looking to Whatever the device, learning should be
As educational establishments across ensure that the information they supply is accessible to all – including those with
the globe increase their collaboration, appropriately protected. Social media, in visual, movement or hearing impairments,
innovation value webs provide an ideal particular, brings new security challenges or any other disabilities.
90 #AscentLookOut
Education
nc l
nc l
lle na
lle na
n
n
ce
ce
rie er
rie er
e
e
e
e
tio
tio
inv ss
inv ss
ce tio
ce tio
nc
nc
an
an
Ex stom
Ex stom
Co ust &
Co ust &
Re ine
Re ine
en
en
Ex ra
Ex ra
pli
pli
e
e
s
s
pe
pe
Op
Op
m
m
Cu
Cu
Bu
Bu
Tr
Tr
3D printing Internet of Things
Cloud Service
Integration Prescriptive analytics
Privacy-enhancing
Context-rich systems
technologies
Government
92 #AscentLookOut
Government
economic models. In the public sector, bodies, there's pressure for change. While boost citizen empowerment, allowing
where tax remains the prime funding centralized services can be delivered more individuals to control how their personal
source, this is critical. New multi-sided efficiently, benefitting from economies of data held by private sector organizations is
business models see governments scale, centralization also has its drawbacks: used. Transparency and innovation will help
as either the market place provider – citizens feel alienated having to travel to companies boost their innovation activities.
providing security or privacy governance, hospitals outside of their community or In the UK the ‘mydata’ initiative is opening
for example – or being a simple customer, taking their children to bigger, specialized up the data held by businesses, giving the
cross-funding large infrastructure projects, academies further away from home. The individual access to their personal data
electronic identification projects and more. swing back from big to small is underway, – such as energy usage, credit card fees,
specifically with public sector budgets phone tariffs and weekly spend – so they
becoming more regionalized. can make more informed decisions.
Operational
Excellence Today’s governments have to exercise The ways people need to be protected are
a difficult balance between providing changing. In an increasingly connected
services that are engaging and world, citizens expect governments to
personalized and providing services safeguard their data, their communications
Governments must continue to deliver
that are agile and lean. Modernized and their services. The confidentiality,
more with less; to do that they must rethink
governmental institutions shall have to find integrity and availability of information
their operational and delivery models.
a way to do this. Controlling and creating a are more crucial than ever before. Citizens
Automating core processes will play a
360° view of the citizen might be possible expect governments to not only prevent
key part in ensuring services are well-
for now, but may later backfire because of breaches that could see their personal
organized and cost-effective by enhancing
privacy concerns. information fall into the hands of fraudsters,
appointment scheduling, optimizing case
but ensure digital services remain available
management or eliminating manual data
on any channel they may choose to
entry tasks. Trust and interact.
Automation could also help the judicial Compliance
But it’s not just the citizen that is at risk –
system that is already under pressure and
national security is also at stake. If critical
seeing delays in cases, for instance. The
national infrastructure – such as hospital,
vast volumes of documents associated Government and governance are bound
energy or transport communications or
with cases could be automatically uploaded together and we need to be able to
IT systems – is not adequately protected,
and organized to accelerate case resolution implement decisions for the common good
cybercriminals could cause major havoc –
times and make more efficient use of at both a national and international level.
and even put lives in danger. Governments
resources. With new international legislation emerging
must continue to keep ahead of new
all the time, national government must
technologies before fraudsters and
To maximize its full potential, automation be able to plan and implement regulatory
cybercriminals, in particular, can evolve
needs full end-to-end integration across change smoothly. Around Europe, EU
their activities.
the government ecosystem. Beyond members who are regularly finding
simply saving time and money, automation themselves facing hefty fines from non-
In the sharing economy, governments are
will also ensure services are delivered compliance are looking for more freedom
finding it more difficult to keep track of
consistently and at a very high level. to choose which laws they abide by at EU-
their citizen’s activities. New peer-to-peer
level and which they abide by locally.
consumer business models mean it's not
Across all public sector organizations,
clear who is working where or selling what,
from school and hospitals to governing Future government legislations might
for example. The potential for
94 #AscentLookOut
Government
Mainstream
Early adoption
5G networks
Adolescent
Emerging
Privacy-enhancing
technologies
Web-scale computing
Prescriptive analytics
Internet of Context-rich
Things systems Intelligence amplification
Edge computing
Distributed
analytics
Cloud Service
Integration
Wearable computing
Cyber physical
systems
Sentiment Autonomous vehicles
analytics
Hybrid cloud Augmented
Open Data reality
Mobile and social
media apps
2016 2017 2018 2019+
© Atos 2016. All rights reserved.
content based on device-type, network and sector employees to interpret and react governance around citizen privacy.
input capabilities. to the broader context of intelligence
derived through advanced analytics and Sentiment analytics
Cyber-physical systems machine learning. Computer-generated Governments began leveraging social
Body cams worn by law enforcement analytics might, for example, highlight media some years ago to help them
agencies not only provide video images an increase in the number of people engage more deeply with their citizens.
of any police interactions, they're linked missing appointments. Only a human can Social media not only provides citizens
with wearables that monitor the well-being correctly interpret the data; a machine is with a platform where they can express
of the constable. These cyber-physical unlikely to understand the wider context their needs, desires and concerns, it also
systems (CPS) both monitor and control and realize this is likely to be a temporary allows governments to present information
the physical environment. Any signs of glitch connected to the current football from different departments as a single
distress and these smart systems can championship. communication and provides a platform for
automatically call for back-up, medical politicians to canvas opinions on proposals
assistance or automatically divert traffic Internet of Things or policy initiatives. Furthermore, advanced
away from an area by interacting with 5G enables more simultaneous social media analytics with its sentiment
smart traffic controls. connections, ensuring connectivity for analytics provides governments with
the growing base of intelligent objects. deeper insight into the needs and desires
Distributed analytics These have been combined with traditional of different segments of the population.
Analytics running across diverse systems internet and IT systems and modern social Forward thinking departments and
in different departments provide a near media sources, amongst other things, to politicians listen and actively innovate
360° view of the citizen to individual create a smart city based on the Internet based on what they learn.
government agencies. Distributed of Things (IoT). Sensors placed in lantern
analytics helps ensure each engages with poles or the ground monitor availability Wearable computing
the citizen consistently, more personally of on-street parking places throughout Citizens can interact with government
and appropriately. This comprehensive the city. Smartphone apps guide drivers departments at any time, from anywhere,
view of the citizen allows departments to to available parking places, minimizing on any channel, using any device – from
make informed decisions on the care they the time spent looking for a suitable spot, tablets and laptops to smartphones
need to provide to vulnerable citizens, for reducing traffic and pollution. At the same and wearables – without having to visit
example, or whether to take a tougher time the use of available on-street parking government offices in person.
approach with individuals who have capacity is maximized and thus income
failed to comply with a number of other from parking fees. Web-scale computing
departments. Governments are progressing toward
Mobile and social media apps web-scale computing with its highly
Edge computing Diverse governmental services will soon scalable, inexpensive open source-based
Some governments are leveraging edge all be available online, through mobile and hardware, integrated computer resources
computing to process that data close social media apps as well as web pages. and self-healing capabilities. Its operational
to the point of capture to make real- simplicity allows departments to be
time assessments about what actions Open Data more agile while optimizing investments.
they should take. Running constantly Governments are embracing the economic Cloud adoption was their first step in this
in the background and embedded into value of opening up data through Open direction.
business processes, it processes sensor Data initiatives. To make it accessible open
and environmental data. Edge computing data should be in a standardized format,
proved particularly useful in emergency easy to link to, with guaranteed availability
situations where it adjusts activities on the and consistency over time. It should also be
fly as events unfold, requesting the expert easily traceable so that it can be trusted.
resources needed or reprioritizing activities.
Prescriptive analytics
Hybrid cloud Combined with prescriptive analytics,
Already on the landscape, cloud computing UAVs play a role in maintaining and
has just touched the tip of the iceberg extending the life of the country’s assets.
when it comes to the role it will play in In the Netherlands, for example, UAVs
public sector. Cloud enables organizations transmit diagnostics data from dykes
across public sector to share resources, back to a central control center. Advanced
reducing costs and providing access to analytics determine maintenance
additional resources as required. Hybrid requirements and prescribe a course
cloud allows governments to combine of action that will ensure the dykes are
internal private clouds with external cloud- repaired before they fail while, at the same
based environments. time, avoiding unnecessary maintenance.
96 #AscentLookOut
Government
nc l
nc l
lle na
lle na
n
n
ce
ce
rie er
rie er
e
e
e
e
tio
tio
inv ss
inv ss
ce tio
ce tio
nc
nc
an
an
Ex stom
Ex stom
Co ust &
Co ust &
Re ine
Re ine
en
en
Ex era
Ex ra
pli
pli
e
s
s
pe
pe
Op
Op
m
m
Cu
Cu
Bu
Bu
Tr
Tr
Intelligence
5G networks amplification
Cloud Service
Open Data
Integration
Privacy-enhancing
Cyber physical systems
technologies
Healthcare
63% believe online is best for booking Shift toward patient-centered, value-
appointments based healthcare
70% using digital channels for medical Patients increasingly using digital for
education healthcare
63% prefer a single app for holding all Patient generated & genomic data
their data spurring innovation
Digital may reduce European Growing health needs of an aging
healthcare costs by 10% global population
98 #AscentLookOut
Healthcare
are coming closer together too, creating information produced to help simplify its creating a sustainable system. Patients
concentration within each specialism. transformation into integrated knowledge. would also benefit from research and
clinical trials activities currently included
The relationship between the healthcare Hospitals already collect vast amounts within research pathways at academic
provider – general practitioner, hospital of insightful eHealth data. They might hospitals being connected to their care
or other provider – and equipment consider monetizing anonymized health pathways.
supplier is evolving too. New ecosystems records, offering new services that
are emerging, with business models make previously inaccessible data more An integrated and transparent eHealth
that are reevaluating who actually owns available. Examples might include offering solution is needed that encompasses all
the medical device, who pays for its anonymized patient data to pharmaceutical stakeholders, from citizen to professional.
support and maintenance, and how risk is companies who might use it to search for But, at present, the wider health ecosystem
distributed. intelligence that might be developed to lacks any mature business model
improve procedures or treatments. connecting all these parts. Interaction
Both the centralized and the specialist between organizations within the
services models allow health and social ecosystem must be straightforward. After
care providers to come together to Operational all, interoperability is vital for delivering
exchange information and deliver the Excellence effective healthcare.
truly joined-up services that both improve
outcomes and cut cost. An eHealth The growing digitization of all healthcare
solution that shares real-time data across processes and technologies is helping
Demographic changes, continuous
patient pathways, for example, makes early to improve patient outcomes, simplify
innovation and growing regulations
diagnosis and disease prevention possible. healthcare processes and shorten cycles.
are putting pressure on the financial
Risk can be assessed more accurately eHealth is already boosting efficiency,
sustainability of healthcare systems. With
and providers can deliver the proactive increasing agility and reducing cost –
demand growing fast and resources
personalized care patients expect. which in turn allows providers to fund
limited, these systems are under immense
innovation to improve their services further.
stress, particularly in developed countries.
Collaboration across new, broader Electronic healthcare records, for example,
Healthcare providers need to do more
healthcare ecosystems that include both give providers the more complete patient
with less. Increasing convergence between
public and private sector organizations information that enables them to make
cure and care organizations is helping. Co-
is accelerating technology and process well-informed treatment decisions quickly
operation is of strategic importance; it will
innovation, disrupting traditional and safely. Providers have come a long way
ensure effort is not duplicated and, in doing
business models. New performance- already, but there's more to be done.
so, optimize use of valuable resources –
based drug reimbursement models offer
particularly doctors and ambulances.
pharmaceutical companies a higher Automation will play a key part in
reimbursement rate for better results. In ensuring services are well-organized and
Major improvements in the way care is
this model the pharma carries the risk. cost-effective. But to maximize its full
organized, via care pathways amongst
potential, automation needs full end-to-
other things, are minimizing patient
Meanwhile, the Virtual Physiological Human end integration across the healthcare
throughput times. Integrated care is
(VPH) methodology and technological ecosystem. Beyond simply saving time
becoming the norm across patients, rooms,
framework, for example, aims to enable and money, automation will also ensure
beds, materials and staff. It also includes
collaborative investigation of the human services are delivered consistently and
integration with family, social services and
body as a single complex system. A new at a very high level. However, existing IT
the other relevant actors in an individual’s
approach integrates the huge volumes of solutions are often specific to a particular
continuum of care that are important for
biomedical research and clinical practice organization or function, and that results in
information silos and business processes across both physical and virtual worlds personal control and integrity of health
that are not sufficiently integrated. throughout all hours of the day and night. data before developing any new services
A combination of regulatory pressures, that require targeted promotion of relevant
Even though the cost of overhead and operational cost and patient expectations health and care services or proactive
support processes will decrease over has led healthcare providers to adopt a sharing of personal healthcare data with
time, state healthcare provision, based on proactive stance in both physical and cyber chosen providers.
taxation alone, is no longer sustainable. security.
Sustainable healthcare requires a mix of At the same time, information provenance
public and private services. Interaction The personal and sensitive nature of becomes paramount. As more and more
between public and private providers patient data means that all healthcare people turn to the internet to source
reduces costs, opens access to specialized providers must consider its confidentiality, information about their condition, they
capabilities and makes services more integrity and availability as part of the need ways to ensure it comes from a
scalable. In many countries there are same process. In some countries, patients reliable and trusted source.
already a lot of public/private initiatives, are concerned about the digitization of
with the state withdrawing more and more. their personal health information; but their
concerns are diminishing as they become
accustomed to sharing more and more
Trust and information online in return for value-added
Compliance services. Sharing personal health data
with their wearable device manufacturer
in return for analysis on their fitness is one
such example.
For most people, there's one aspect of
life that takes priority over all the rest:
New security solutions will be critical for
their health. That’s why we want to have
ensuring people can access data and
confidence in our healthcare systems,
suites of tools when they need them,
both today and into the future. Healthcare
regardless of where data sources are
legislators, funders and service providers
located. The security, reliability and integrity
need to be able to guarantee the availability
of information becomes even more crucial
and quality of healthcare provision for the
as patients gain direct control over what
population.
their personal data can be used for and
with whom it can be shared. To that end,
People, assets and infrastructure must be
healthcare providers need to ensure
secured from known and emerging threats
100 #AscentLookOut
Healthcare
Mainstream
3D printing
Early adoption
Adolescent
Emerging
Distributed
analytics
Virtual assistants
Privacy-enhancing
technologies
Smart Edge computing
machines
Internet of
Things Advanced data
Wearable visualization
computing Prescriptive Semantic
High performance analytics technologies
computing Augmented Robotics
Streaming reality
analytics Cloud Service Integration
Mobile apps
Pattern-matching
Multi-factor technologies
authentication Gamification
Telemedicine
Social media
analytics Intelligence
Near field amplification
communication
2016 2017 2018 2019+
© Atos 2016. All rights reserved.
102 #AscentLookOut
Healthcare
appropriately. Telemedicine also includes important role to play in locations that monitoring the vital signs of older people,
technologies such as teleoperations, where are hard to reach or when high levels of for instance.
a surgeon carries out a surgical procedure infection might put medical staff at risk.
remotely (sometimes also referred to as The number and types of wearables is
telepresence), and practices such as the Wearable computing expanding rapidly. Innovations include LG’s
outsourcing of x-ray analysis overseas to In a few years from now smartphones, heart rate monitor earphones; Reebok’s
countries such as India. wearables and other smart devices Checklight, which measures the impact an
will mean patients are not only more athlete experiences; the Luma Back, which
Virtual assistants connected than ever before, but can more measures your posture, steps, sitting and
Innovations such as virtual assistants for easily be monitored in real time. These sleeping time; the Hexoskin vest, which
providing advice anytime and anywhere, technologies improve the care process measures your heart and breathing rate;
might not be so easily accepted. After by giving carers and medical staff direct and the MC10 Biostamp, which collects data
all, people like that human touch, access to the individual’s vital signs and such as body temperature, heart rate, brain
especially when they're feeling vulnerable. alerting them in an emergency. The data is activity, and exposure to ultraviolet radiation
Innovations such as these have an collected by unobtrusive wearable sensors, and more.
nc l
lle na
lle na
n
n
ce
ce
rie er
rie er
e
e
e
e
tio
tio
inv ss
inv ss
ce tio
ce tio
nc
nc
an
an
Ex stom
Ex stom
Co ust &
Co ust &
Re ine
Re ine
en
en
Ex ra
Ex ra
pli
pli
e
e
s
s
pe
pe
Op
Op
m
m
Cu
Cu
Bu
Bu
Tr
Tr
Near field
3D printing
communication
Advanced data Pattern-matching
visualization technologies
High performance
Social media analytics
computing
Homeland Security
104 #AscentLookOut
Homeland Security
increased connectivity and therefore Moreover, people are more willing to share
increased vulnerability to threats from more about themselves with organizations
cyberspace, makes protecting vital national if they understand how that data will
infrastructures and critical sites such as be used and how they will benefit from
large events and industrial sites significantly sharing it. Smarter borders, for example,
more complex. will require information to be shared across
borders. Travelers will benefit with a slicker
The personal and sensitive nature of passage across the border.
an individual’s data means security
organizations must consider its Transparency is key: individuals don’t just
confidentiality, integrity and availability in want to know where their data is, but also
addition to legal and regulatory privacy how to escalate any concerns they might
concerns whenever it's shared within the have about how it's gathered, used and
wider security community. People are more stored – along with who has access to it.
willing to share data over different types Without it organizations risk a grilling by
of media. However, this willingness should the press at a time when authorities need
not be a motivation for homeland security to facilitate trust of individuals in national
or intelligence services to exploit this data security practices to encourage the general
for other purposes or for the protection of public to collaborate in national security
a nation. matters to enhance national security.
106 #AscentLookOut
Homeland Security
Brain-computer
interface
Internet of
Things
Distributed
analytics Augmented reality
Self-adaptive security
Cloud Service Integration Software-defined
Robotics technologies
Privacy enhancing technologies
State- Edge computing
of-the-art
jamming High performance
products computing LPWAN
Wearable
Crowdsourcing computing Quantum cryptography
Streaming
analytics Unmanned
Biometrics aerial vehicles
will act as the central verification service, Internet of Things not only help agencies anticipate threats
eliminating the need for individuals to The Internet of Things (IoT) connects as attackers try to hide. Behind the scenes
register and authenticate themselves with everything from sensors and unmanned streaming analytics and HPC play a key
each distinct cloud service. systems to wearable computer role in enabling the real-time analysis that
technologies and smart clothing. The also helps to keep personal and sensitive
Crowdsourcing networks and data that flow from them data and systems secure.
Civilians are increasingly contributing to have significantly enhanced situational
the intelligence that homeland security awareness, command and control. Meanwhile distributed analytics in
organizations need to keep their people combination with HPC together accelerate
safe. On the U.S.-Mexico border, for LPWAN the forensic analysis after an incident
example, homeland security organizations In the future data will be sent over a is detected. They help agencies quickly
are leveraging crowdsourcing to gather combination of low power, extended range identify where the attack started, who is
intelligence. Anyone with an internet 5G and IoT-optimized Low-Power Wide- behind it and how they carried it out.
connection can patrol that border. Area Networks (LPWAN).
To enhance security further, contextual
Distributed analytics Privacy-enhancing technologies dynamic access control ensures homeland
With the diversity of information sources As agencies gather more and more data security personnel can only access to
growing, distributed analytics is also about the civilians they protect, privacy- information and systems when and where
accelerating the creation of intelligence. enhancing technologies are managing they need to.
This technology allows information on privacy risk, ensuring compliance with
known or suspected criminals, terrorists data protection legislation and regulation. Sentiment analytics
and immigration to be analyzed alongside They help ensure information that is shared Now the primary channel for engaging
information from social media, biometric amongst the homeland security ecosystem with civilians during a disaster scenario,
surveillance and other sources in real time. is anonymized or pseudonymized where social media is also a channel individuals
Furthermore the integration of multiple appropriate. can use to let their families know they're
information sources (data from sensors, safe or even call for help. Homeland
first responders, GIS, social networks and Quantum cryptography security organizations are employing
more) improves crisis management and Quantum cryptography will help ensure social media and network analytics, with
rescue operations. the security of high end transmissions its sentiment analytics, to gain additional
and assure secured interoperability and insight into how situations – from floods
Edge computing collaboration for highly sensitive data. and earthquakes to criminal, migration and
Agencies are leveraging edge computing Encryption technology will be used terrorist activities – are developing and how
to index and analyze data close to the point end-to-end across public, hybrid and people are reacting. This will also provide
of capture to help them make real-time private cloud solutions with a common additional Open Source Intelligence to
assessments about what actions they need encryption standard ensuring secure cross complement established methods already
to take. Constantly processing sensor and organization, and even cross country, in place.
environmental data in the background, communications.
edge analytics have proved particularly Software-defined technologies
useful in emergency situations where they Robotics In any disaster scenario, multiple agencies
adjust activities on the fly as events unfold, Advanced security robotics, support must work closely together: organizing,
requesting the expert resources needed or surveillance, protection, detection, rescue coordinating and commanding in a
reprioritizing activities. and immigration violation activities. They rapidly-evolving and complex environment.
undertake dangerous actions without Effective collaboration, shared situational
High performance computing jeopardizing personnel and are deployed awareness and informed decision
With the volumes, variety and velocity in areas that are either extremely difficult support require the timely distribution of
of data accelerating, high performance or impossible for humans to access to information. Software-defined networking
computing (HPC) allows complex enhance situational awareness. (SDN) allows agencies to create dynamic
simulations and analyses to deliver vital links between locations.
intelligence rapidly. By combining HPC with Self-adaptive security
computation infrastructures, networks and While traditionally crimes are responded to State-of-the-art jamming products
the latest mathematical models, they help after they have been committed, agencies Next-generation communications are
predict behaviors, prevent cyber or terrorist are now putting proactive security now able to transmit video as well as
attacks, and more. controls in place to prevent cyberattacks. voice in even the remotest of locations,
Advanced Security Operations Centers is now critical. State-of-the-art jammers
Hybrid cloud (SOC) and Security Information and Event not only block these communications
Agencies often need to combine resources Management (SIEM) are integral to their to protect convoys but also detect and
on internal private clouds with external new security strategies. locate suspects, and support Explosive
cloud-based environments such as those of Ordnance Disposal (EOD) teams by
certified security companies. Hybrid cloud Trusted probes are being deployed in preventing remote detonations. Telephony
allows selected on-premises, private cloud trusted environments to detect for the eavesdropping devices, meanwhile,
and public cloud services to unite in a minutest of evidence of specific suspicious intercept and record communications to
heterogeneous environment of clouds. behaviors amongst millions of events. enhance situational awareness.
These self-adaptive security technologies
108 #AscentLookOut
Homeland Security
Streaming analytics Unmanned aerial vehicles track individuals – their location and vital
Growing volumes of data are being While unmanned aerial vehicles (UAVs) signs – while streaming video from the
rapidly turned into critical security support surveillance, protection, detection, scene to a remote location where it can be
intelligence thanks to advanced analytics. rescue and immigration violation activities, analyzed and stored.
Streaming analytics, for example, provides drone-shielding technologies allow security
organizations with real-time intelligence forces to protect themselves against All devices must be ruggedized and
on the movement of cars or boats. This remotely piloted aerial vehicles that may capable of withstanding the rigors of
enhanced situational awareness allows be used to deliver destructive payloads or police work – in particular the extreme
agencies to be more proactive. used for surveillance purposes. environments that often accompany
emergency situations. These new
Swarm computing Wearable computing technologies enable rapid training solutions
Intelligent dust comprising sensors, robots One of the vital tools of modern policing, that can be accessed by a government
and other devices detects minute changes wearables gather and store a wide array officer wherever they are.
in light, temperature, vibration, magnetism, of incoming and outgoing data. Examples
chemicals and more. Operating wirelessly include smart glasses, watches, wristbands,
as part of the IoT, it helps gather critical helmets, socks, vests and more. In an
intelligence. emergency situation these devices help
nc l
lle na
lle na
n
n
ce
ce
rie er
rie er
e
e
e
e
tio
tio
inv ss
inv ss
ce tio
ce tio
nc
nc
an
an
Ex stom
Ex stom
Co ust &
Co ust &
Re ine
Re ine
en
en
Ex era
Ex ra
pli
pli
e
s
s
pe
pe
Op
Op
m
m
Cu
Cu
Bu
Bu
Tr
Tr
Privacy enhancing
Augmented reality technologies
Brain-computer Robotics
interface
Cloud Service
Self-adaptive security
Integration
Software-defined
Distributed analytics
technologies
State-of-the-art jamming
Edge computing
products
High performance
Streaming analytics
computing
Insurance
Connected world will transform the Expected that half of premiums will
industry have a telematics component by 2025
Data and analytics empowering the 68% of consumers willing to
insurance industry download and use an insurance app
Auto insurance market being impacted Just 2% of large firms have explicit
strongly cyber cover
Reputation, brand and improving Overall auto insurance premiums
customer intimacy are top concerns of expected to be reduced by 25% by
insurers 2025
110 #AscentLookOut
Insurance
‘‘For all lines of business, the next decade will be defined by increasing
connectivity and growing volumes of data. Business model innovation
will be driven by collaboration across broader ecosystems.’’
Laurent Gibert
Global Insurance
Market Executive
preserve his own and his family’s health or risk coverage. Individual usage based On the flip side of a lower interest rate
wealth, and the company, who must have insurance (UBI) models – where car makers environment, hedge funds and other
the right financial assets, reputation and share relevant driver data gather from their alternative sources of capital are becoming
tools to support the customer during his connected cars with insurance companies part of the insurance value chain. Driven
whole lifespan. It is, in fact, a matter of long (with drivers’ permission) – are emerging by low interest rates, they’re increasingly
term strategies. in new motor insurance products. These providing additional funding options for
allow insurance companies to offer lower insurers and, in doing so, transferring
For all lines of business, the next decade will premiums to safe drivers along with pay- investment risks outside of the insurance
be defined by increasing connectivity and per-use models. company.
growing volumes of data. Business model
innovation will be driven by collaboration Furthermore, the emergence of the This business reinvention is happening fast
across broader ecosystems that include, connected and autonomous car has in an industry not used to drastic change
amongst others, the technology giants the potential to transform car insurance and will require an ability to change some
that are driving disruption across many further. Companies are thinking about its key aspects of corporate and industry
industries. On the positive side, car, implications. It may reduce risk but, even culture towards a more open, participative
health and home insurers are already in the new world, somebody will need culture, internally and externally integrating
collaborating with these technology players to be held liable if the autonomous car open innovation and new types of partners.
to leverage the growing volumes of data malfunctions. Premiums may decrease and
they have available to further enhance and shift from individual property to collective
personalize policies. On the downside, they liability insurance or to more commercial Operational
could separate insurers from the ownership lines cover as ownership shifts from Excellence
of customer relationships. private individual to fleet or corporate hire
provision.
New players with innovative new business
Insurance companies are adopting
models and insurance products and The combination of sustained period
technological solutions to automate and
services will emerge, some disrupting of low interest rates, which is yielding
increase the accuracy of the underwriting
traditional distribution models by offering low investment returns, and increased
process, support variable pricing,
customers integrated value propositions regulation is hurting profitability for L&P
help maximize the efficacy of scarce
that encourage a healthier lifestyle (Vitality, insurance companies, as it is banks. To
underwriting resources and increase
Oscar) or help to protect their property increase their top line, L&P companies
direct sales. But this is not enough. Only by
better, for example. need to turn their focus back to driving
completely re-engineering their business
profit margins from underwriting and
processes can they ensure they’re aligned
Social (peer-to-peer) insurance is also new product development rather than
with best practices and able to adopt more
increasing. German Friendsurance is five investment. That means going back on
and more straight through processing
years’ old while Guevara, a peer-to-peer the offensive and reaching out to the
within their environments.
car insurance service, has only recently customer with the products they need
launched in the UK. Radically integrated and desire, by using de-regulation in the
Front office digitization – including
value propositions that combine personal, pension markets to come up with new and
connected devices, self-service and an
family and business lives are also becoming innovative retirement plans, for example. At
omni-channel environment – promises to
more commonplace. the same time, L&P companies must focus
give customers secure and high speed
on improving operational efficiency to cut
access to the heart of insurance business
Meanwhile, the traditional car insurance their bottom lines, OPEX in particular, and
systems. It allows customers to manage
business within the P&C market is shifting capital efficiency through reinvented ERM,
their own accounts and interact with the
to a new business model based on online leveraging Big Data and new platforms.
company when it suits them, on their with it significant challenges, including visibility – particularly in relation to the
preferred channels and in way that is outsourcing management, continuous reserve and solvency information that
intuitive and engaging. In addition, it’s integration, the closure of entire business rating agencies need to understand. But
helping insurance companies reduce lines and product displacement. merging data silos to create a single view
capital expenditure and cost while of the truth, in real time, will help not only to
freeing up personnel so they can focus address regulation such as Solvency II and
on more valuable customer relationship Trust and Markets in Financial Instruments Directive ;
management and sales tasks. Compliance it also offers competitive advantage by
allowing insurers to offer more personally
Back office digitization, on the other hand, tailored products to the customers that
promises to boost returns on investment, really need them.
Insurance companies must take steps to
with the greatest value coming from
ensure they’re compliant with intensifying
process automation. By digitizing manual Generation Y consumers are more
consumer protection legislation and to
processes and paper documents, insurers prepared than their parents to trade
avoid a repeat of the miss-selling that has
can increase efficiency and agility while personal data for financial reward such as
dented consumers’ confidence in the
reducing cost by up to 40 percent. discounts, vouchers or access to services.
industry. Accelerating information risk
Documents can be shared more easily Advances in security, data governance and
management in the front office will help to
and non-core functions such as IT, human data usage transparency are needed to
ensure consumer data protection, with the
resources and finance can be moved to help them stay secure while they do this.
appropriate ‘touch’ on risk and underwriting
a more efficient and more cost-effective
to meet new consumer expectations.
centralized role. New cyber-risks and the ‘cloudification’ of IT
mean insurance companies need to rapidly
Insurers are increasing their focus on Anti
Those looking anew at their processes and adopt new security technologies to ensure
Money Laundering and Counter Terrorist
thinking front to back digitalization will be proper data and consumer protection.
Financing legislation in a way that is natural
the ones reaping the most benefits from Cyber-risks offer new opportunities too:
to banks but new to insurers. New solvency
the digital revolution. They will also be most cyber-risk insurance.
regulations coming into play across Europe,
likely to respond effectively to the digital
for example, mean insurers will have to
disruptors and to customer expectations. All in all, building trust especially on how
screen customers before underwriting their
data is protected and used is absolutely
policies.
Meanwhile, industry-wide consolidation critical, not only for the obvious sense
is extending demand for the low-cost of safety but also to allow companies to
When it comes to internal and external
business models that are helping continue to play in a world where access to
stakeholder information requests, insurers
companies across all geographies to data is becoming vital at each step of the
need to be more efficient in how they
manage their legacy closed block portfolios insurance value chain.
deliver the information wanted. Only then
more effectively. That consolidation is
will they be sure they can respond to the
also increasing pressure for the greater
requests within the timescales required.
‘economy of scale’ that will help companies
gain market share in specific geographies
Accurate, reliable, consistent and timely
(particularly in advanced western countries)
compliance data requires reporting to be
and fight against margin reduction. Greater
more transparent. Combining information
economy of scale does, however, bring
from diverse, siloed systems will enhance
112 #AscentLookOut
Insurance
Mainstream
Early adoption
5G networks
Adolescent
Emerging
Privacy-enhancing
technologies
Software-defined
technologies
Blockchain
Internet of Web-scale computing
Things Distributed analytics Prescriptive analytics
Pattern-matching technologies
High performance computing
Streaming analytics
Context-rich systems Cloud Service Integration
Self-adaptive security
Hybrid cloud
Wearable computing
Rules engines Virtual assistants
DevOps
Mobile first & real-time interfaces
Semantic technologies
Sentiment analytics
High performance computing data protection legislation and regulation. Software-defined technologies
High performance computing allows Cloud native applications allow companies
insurance companies to take full advantage Robotics/intelligent automation to take full advantage of web-scale
of the benefits offered by IoT data. Workplace robotics, as automated virtual computing and software-defined
Models help them anticipate and prevent workers, that can be deployed across technologies. They allow new products to
catastrophes, eliminating the need to pay unstable architectures or multiple legacy be tested and launched within significantly
out for damages created by such events. systems as easily as a human operative shortened project lifecycles.
take on a lot of the dull, time sensitive
Hybrid cloud and repetitive back office tasks at a Streaming analytics
Private clouds allow insurers to make much lower cost. 100 per cent auditable Big Data is helping leading insurance
resources – both data and applications and reliable, they can be deployed with companies outperform their peers. Its
– available from anywhere and on any minimum disruption and, unlike the human advanced streaming analytics enables
device. No matter where the customer workforce, never make mistakes, work 24/7 insurers to leverage real-time data, for
engages from or where an employee and can be programmed for a multitude of example about properties likely to be
or partner is working from, the systems variable tasks. affected by weather data for claims
that they interact with and the data these initiation, optimization or prevention. These
systems use will be the same. Hybrid cloud Rules engines dynamic customer profiles signal insurers
then allows companies to augment their Resilient and agile frontend tools need moving away from the generic customer
own omni-channel services with relevant powerful and extremely flexible rules profiles that cater for millions of customers
third-party services – such as news, hints engines to deliver ultra-personalized to individual 360° customer profiling.
and tips or even weather forecasts – further products and pricing.
enhancing the experience. Self-adaptive security
Insurers are achieving their goals of 100 While trusted information brokers
Internet of Things percent straight through processing provide insurers with the confidence to
A few years from now and the Internet of now that core insurance IT systems are share more information with agents, the
Things (IoT) will have transformed not only aligned with the best-in-class automatic dynamic access control enabled by self-
the health, motor and home markets but process solutions. Business-rules based adaptive security and a new generation
also commercial lines with its widespread configuration that leverages advanced of collaborative tools ensures they have
use of sensor technology, advanced analytics is allowing standard policy access to the information, systems and
analytics and new ecosystems. underwriting and claims processes to locations they need to access, but only
be automated, eliminating manual work when they need it.
Mobile first and real-time customer activities at an enterprise scale.
interfaces Virtual assistants
New customer usages require investment This increases the accuracy of underwriting Digital advisors have a vital role to play in
in mobile first and real-time customer decisions, supports variable pricing and helping insurers avoid scandals such as the
interfaces that link seamlessly with helps insurers to maximize the efficacy miss-selling saga that dented consumers’
backend systems. of scarce underwriting resources. trust. These intelligent virtual assistants
Able to handle multiple product lines provide accurate, consistent and compliant
Pattern-matching technologies simultaneously, rules-based configuration information throughout the sales processes
Pattern-matching technologies help is accelerating time-to-market for new and listen in on call center agents to ensure
companies leverage the vast volumes products. they do the same.
of data available today to identify and
then address unusual behavior patterns, Semantic technologies Wearable computing
including potentially fraudulent behaviors. Companies are storing both operational Health wearables, such as smartwatches
and customer data in private clouds, and sensors embedded in clothing, have
Prescriptive analytics providing secure and robust access to created a huge health insurance market,
This dynamic customer profiling allows the information they need to improve with policies that include preventive
for more sophisticated segmentation that efficiency and decision-making as well as medical assistance provision and
has improved cross-segment sales and enhance customer experience. Behind the connections to health professional doctors
cut response times for origination and scenes semantic technologies help their and medics.
claims. The prescriptive analytics that can intelligence systems to understand the
decipher what customers want even before relationships within and across data. Web-scale computing
they know themselves provides ‘next best The IT organization and architecture
offer’ capabilities. Sentiment analytics has been redesigned for web-scale
The lifestyle, behavioral and health computing, underpinned by a software-
Privacy-enhancing technologies data collected from mobile devices defined architecture. This has allowed a
As customers share more information and wearables gives insurers a deeper more profound digital transformation of
with insurers, insurers must ensure understanding of their customers. What’s insurance operating models, from front
robust compliance with consumer more, with social networks now well to back. Its operational simplicity allows
protection legislation. Privacy-enhancing integrated into our everyday lives, insurers insurers to be more agile while optimizing
technologies (PET) control disclosure are using advanced social media analytics investments.
of data, helping companies to manage with its sentiment analytics to enhance
privacy risk by ensuring compliance with this insight even further.
114 #AscentLookOut
Insurance
nc l
lle na
lle na
n
n
ce
ce
rie er
rie er
e
e
e
e
tio
tio
inv ss
inv ss
ce tio
ce tio
nc
nc
an
an
Ex stom
Ex stom
Co ust &
Co ust &
Re ine
Re ine
en
en
Ex ra
Ex ra
pli
pli
e
e
s
s
pe
pe
Op
Op
m
m
Cu
Cu
Bu
Bu
Tr
Tr
Privacy-enhancing
5G networks technologies
Robotics/intelligent
Blockchain
automation
High performance
Streaming analytics
computing
Prescriptive analytics
Media
Mobile will become the principal digital 70% of all mobile network traffic will
content platform be video by 2021
Print will remain the format of choice Facebook is serving 4 billion video
for consumers views a day
Books will emerge as survivors as digital Users spend nearly 6 hours watching
readership plateaus videos on their phones each month
Augmented reality will outstrip virtual 88% of millennials engage in second
reality within 3-5 years screen behaviors when watching
video content
116 #AscentLookOut
Media
become increasingly important. real-time audience behavior to help B2B But as advertising dollars move to the web,
partners tailor their own services to better online services delivering personalized
Nevertheless, content is still ‘King’ and meet consumer needs – but only with content offer numerous opportunities for
where companies can differentiate. permission from the consumer. highly-tuned advertising and its related
Some companies that were previously cross- and up-sell. To succeed in this space,
purely distributors are now creating and Meanwhile, passive forms of media will media companies need to understand
publishing their own original material to continue to exist – and may even continue their customer well and be able to tag
increase subscriber numbers. Netflix, for to be the most popular way to consume content appropriately and relate it to other
example, is investing millions of dollars content – for many years. They will, materials and adverts. Surging mobile
creating their own work (House of Cards for however, need to become increasingly advertising sales have helped Facebook
example) and Amazon is now following this augmented and tailored to meet consumer revenues, for instance. But the mutation
lead with TV favorite Top Gear, amongst demands for a more personalized of the selling process is adding to the
others. experience. For TV, advertising is becoming complexity of the advertising sales function
more subtle and includes product with the emergence of programmatic
At the same time, content is not enough placement and program sponsorship along advertising and its real-time, data-driven
in the digital world, if not supported by the with interactions that allow things (clothes, approaches.
ability to manage the (meta)data about cars, food and more) seen in a TV program
it and about its consumer (the Queen). to be purchased more easily. With modern audiences more likely
Successful companies are the ones that are to grant their loyalty to content rather
able to do both. In fact, traditional media For the print publishing industry, the future than media brands – gravitating toward
companies are using a combination of is a little more uncertain. Large parts of it specific TV series, film and music brands,
content and data to turn the threat from may disappear, yet books, for example, will for example – content providers are
social media and user-generated content survive – partly because they're unbundled creating fan-based communities where
around: leveraging user-generated content and partly because they provide a unique they can offer targeted content along with
to enhance owned content, using social experience that is appreciated by the the advertising for cross- or up-selling
media to direct audiences to their content reader. Publishers are, however, offering related products. These highly-engaged
and engaging with audiences on social additional value-added services: education communities love to participate in brand-
media to learn more about their desires publishers, for example, are offering related activities – activities that can go
and behaviors. platforms for supporting students’ creative viral and, in doing so, create a great deal of
activities while other publisher are enabling interest in these content brands.
After all, to successfully compete against online digital communities for writing
free content and agile new market entrants, books.
traditional media companies need a deeper Operational
understanding of their diverse audience Nevertheless, new business models, Excellence
segments, along with the content and which could include crowdfunding and
viewing behaviors and desires of each. other innovative ways of funding in
Actionable business intelligence directly addition to the traditional ones, will keep
Digital technologies are driving an ongoing
from their knowledge of real-time audience popular publishers alive. In a sector that
reinvention of the media landscape. It
behaviors is vital for monetizing high- is transforming at an incredible pace,
seems that new technologies are available
quality content. one thing remains constant: publishers’
every other week and consumers have
desire to maintain control of the pricing
no hesitation in dropping one thing if
Media companies could also derive and production of their content. We will
something better and cheaper comes
monetary value from the data too, wait and see if their appeals are heard as
along. Although the free video streaming
monetizing their unique insight into Amazon moves into the high street.
service Popcorn Time was illegal, the fact lagging behind the competition. Therefore, that wisely, consumers will be immensely
that even Netflix mentioned the service as effective innovation processes are needed. grateful. But if media companies get
a main competitor is a perfect illustration of Leading organizations are investing in it wrong, they will have disgruntled
this point. ensuring they fully understand the potential customers on their hands.
and challenges of new technologies as they
In such a highly competitive and fast- emerge, so they can swiftly adapt and align But, it’s not just personal data that media
changing landscape, media companies their businesses. Organizations that don’t companies need to consider. Risks of all
of all types must focus their investments have the knowledge and flexibility required shapes and sizes must be anticipated,
toward creating high-quality, informative to roll-out new services when consumers prevented and managed in a world
and entertaining content and innovative are demanding them will find it difficult to that is increasingly mobile and social.
distribution models. After all, audiences are keep their audiences’ attention and attract Fail to prevent the leakage or misuse of
willing to pay for higher quality content and new viewers. licensed content and organizations may
optimal user experience. find themselves losing their license or
To fund the investments, traditional distribution rights. Fail to protect the brand
Both traditional and modern media media organizations will need to reduce and the performance and availability of
companies are, however, increasingly the burden of their legacy technology services and audiences will take their
extending the monetary value of their landscape. They also need to reinvent loyalty and their dollars elsewhere (recent
content beyond the initial broadcast themselves, transforming their legacy attacks by hackers have undoubtedly
or publication; repurposing broadcast content-driven organizational and been aimed at interrupting services). And,
content for online or mobile consumption, operational models (including ‘old-world most importantly, fail to protect sources for
for example. There are, nevertheless, thinking’) into ones that are data-centric sensitive journalistic investigations, along
overheads that must be considered: the and more agile – and do so as fast as with the reporters, and the consequences
cost and effort required for publishing possible. could be dire.
the content on different and continuously
evolving technology platforms and for Risks come from inside media
ensuring the quality of the repurposed Trust and organizations too. In an online world,
media matches the original. On the plus Compliance content becomes available to billions of
side, repurposed content can be more people across the globe as soon as it’s
accessible for the visibly impaired. Screen published. Any errors or misrepresentations
readers on their mobile devices can read As the audience experience becomes are sure to be spotted by someone
content to them, for instance. increasingly personalized and participative, somewhere. Once published, any glaring
media companies must increase their focus mistakes are likely to be shared virally. They
To free up spend, companies should on protecting audience data – including cannot be changed.
explore how they can make their both personal data and usage patterns.
production and business systems better, Too many large media organizations Because of the great responsibility media
faster and more cost-effective. At least part have experienced security breaches and organizations have to individual consumers
of the answer lies in standard IT storage, significant data leakage in recent years, and to society at large, combined with the
networks and workflows, amongst other denting the consumer’s trust in their brand. challenge of new risks that are introduced
things. With media technology now more To show themselves to be trustworthy and by adoption of new digital technologies, the
closely aligned to IT, media companies responsible, companies must also comply importance of security needs to be high on
can take advantage of the considerable – and be seen to comply – with regions’ the agenda in order to continue to comply
investment that has gone into making diverse data protection regulations and with legislation and remain a trusted brand.
modern IT what it is today. policies.
More generally, any media organization Consumers are increasingly expecting to
that struggles to reap the benefits of see benefits in exchange for their data and
technology advances will soon find they're information. Where media companies use
118 #AscentLookOut
Media
Mainstream
Early adoption
Adolescent
Emerging
Augmented reality
Distributed analytics
Wearable computing
Gamification
Robotics
Internet of Privacy-enhancing
Things technologies
Self-adaptive security
Prescriptive analytics
Software-defined technologies
Streaming
analytics Virtual reality
Cloud Service
Integration Context-rich systems
Edge computing
Social media analysis
delivery network or media provider. – their preferences and behaviors. They Social media analysis
can develop ways to better engage their Social media is valuable source of
By bringing together insights from various audience and drive the loyalty that is vital information for informing content. Social
sources, context-rich systems proactively to achieving enduring success. media analysis, with its sentiment analysis,
anticipate each consumer’s individual provides media companies with a deeper
needs and preferences. They're adept Named Data Networks understanding of how audiences are
at aligning revenue generating media The volume of content hosted will responding. Service customization based
products and services to consumers’ continue to expand, increasing the load on social media insights can be a key factor
needs, desires and behaviors, offering them on underlying networks and storage. The in driving customer satisfaction, ensuring
up at the exact moment in time when the future of file distribution across the internet loyalty and attracting new business
consumer is most likely to buy. Contextual may be transformed by Named Data through advocacy.
systems might also adapt the product Networks (NDN), which would change
itself, aligning the end of a movie to who the architecture of the internet at its core. Software-defined technologies
is watching and the mood they're in for For media companies, NDN promises Flexible software-defined technologies
instance, or even the product’s digital rights reduced congestion and improved delivery have transformed operations at
to the medium at hand. speeds, along with increased robustness many levels. Media specific functions
and security. As the volumes of data media implemented in vertical appliances that
Context-rich systems also have a wider companies distribute grow, it could help bundle hardware and software have been
role, particularly when it comes to mobile ensure the continuity of their services. decoupled. Instead specialized software
content and the connected car. Such applications run on general-purpose
systems offer consumers content that is Prescriptive analytics hardware platforms, leveraging both
not only tailored for their location when As expectations for personalized viewing virtualized and cloud environments.
they're out and about, but optimized for the rises, media companies are turning to
viewer’s device as well as wider context – prescriptive analytics to automatically Small programmable chips, for example,
whether they're driving the car and where provide the viewer with a profiled catalog replace expensive specialized hardware
they're sat in relation to other passengers, of content tailored to their individual needs – such as tools for transcoding or
for example. and desires. This will offer each specific transforming files – with commodity
viewer a highly-tailored passive traditional platforms running specialized software.
Distributed analytics TV experience that doesn’t require any This means media companies can
Distributed analytics provides insight into interactivity on their part. now embrace next-generation media
audience consumption across multiple platforms and delivery options swiftly,
platforms, across TV and online initially. Self-adaptive security without abandoning current infrastructure
With protection of the brand and its investments. These virtualized
Edge computing services crucial to any media company’s environments have accelerated time-to-
Media companies are leveraging edge survival, companies are employing market for new offerings and new business
computing to process those vast volumes pre-emptive self-adaptive security models.
of data close to the point of capture. Server technologies to look for early evidence of
loads are reduced as the processing suspicious behaviors. Cloud continues to be a pivotal technology.
required to present the personalized It not only enables rapid innovation cycles,
content to the consumer is offloaded to Privacy-enhancing technologies but also allows companies to rapidly scale
servers at the edge of the cloud. Despite enabling a whole new level of or shrink in response to changing market
dynamic, ultra-personalized, embedded demands. Disrupters adopted it early on;
Gamification advertising, some consumers have incumbents – including the multinational,
Wearables impact the gaming industry reached the point at which use of their multimedia conglomerates – are adopting
too. Dynamic online gaming with personal data to shape a personalized B2C it too. Combined with the virtualized
interactive storytelling and narratives are interaction is an unacceptable invasion of structures enabled by software-defined
even more realistic now that they can be privacy. Media companies are employing technologies, cloud helps companies
tailored to a player’s emotional response. privacy-enhancing technologies (PET) standardize, optimize and automate the
The technologies benefit non-leisure to control their use of consumer data, digital media supply chain.
gamers too, delivering the gamification ensuring their compliance with data
(application of game playing elements to protection legislation and regulation. Streaming analytics
other activities) that has multiple uses in Direct real-time user feedback is becoming
education, health, government and defense Robotics an essential part of the media creation,
sectors in particular. Robotics are not only impacting the media development and improvement cycle.
industry in terms of automation, but also in Advanced forms of data analytics allow
Internet of Things the creative and editorial parts of the value media creators and distributors to
Wearables are just a small proportion of chain. In Australia, Channel Nine’s new personalize and target specific interactions,
the billions of connected devices that share state-of-the-art studio includes a news desk from tailored subscription packages and
information seamlessly across the Internet surrounded by a cluster of robotic cameras transactional offers to show narratives.
of Things (IoT). The vast volumes of data that don’t require operators. Streaming analytics provides real-time
from the connected devices, social media insight into audience reactions.
and other sources enriches what media
companies know about their audiences
120 #AscentLookOut
Media
Virtual reality Alternatively they can experience what it's Wearable computing
Technology is driving huge changes in like to be their favorite sports star. Totally A new category of web-connected
how we use media to tell and experience immersed they feel what it's like to where wearables that can measure physiological
stories. Immersive virtual reality devices, their hero’s shoes – in a racing car, on a indicators – such as heart rate, body
such as Facebook’s Oculus Rift and Sony football pitch, at the Olympics or even temperature, pupil dilation or sweat
PlayStation VR, allow millions of online down the ski slope. In more advanced production – is allowing media companies
gamers to interact with each other in real systems narratives evolve in response to to align services to users’ response to
time while living their own unique game implicit or explicit real-time feedback from environmental stimuli. A live production
experience. social network analytics, wearables and team can measure and respond to the
other context sensing technologies. emotional response of a million viewers of
a live TV show or sports fans in real time.
nc l
lle na
lle na
n
n
ce
ce
rie er
rie er
e
e
e
e
tio
tio
inv ss
inv ss
ce tio
ce tio
nc
nc
an
an
Ex stom
Ex stom
Co ust &
Co ust &
Re ine
Re ine
en
en
Ex era
Ex ra
pli
pli
e
s
s
pe
pe
Op
Op
m
m
Cu
Cu
Bu
Bu
Tr
Tr
Advanced data
visualization Prescriptive analytics
122 #AscentLookOut
Oil and Gas
Operational of reinvesting is considerable and it will take Any major incident can have catastrophic
companies more than a decade to bring effects on both planet and reputation. The
Excellence replacements on board. quality of data, governance and reporting
matters more than ever.
Upstream, efficiency is key to managing
As oil prices continue to tumble in the face the operations at the smaller and more As oil prices tumble and companies
of excess supplies, every oil company finds remote sites with a limited life-span. Without seek out new ways to save money, data
itself operating under immense pressure. it, these sites would simply not be viable. quality and integrity must be assured
With no rebound expected at least until In location-specific and relatively stable without compromise wherever data
a clearer picture of supply emerges, midstream environments, effectiveness management is outsourced. What’s more,
companies urgently need to reduce costs depends on exact inventory and timely industry constraints must be taken into
to combat shrinking margins and higher intervention. full consideration in the design of the
discovery and development costs. They virtualized systems that will help oil and
must also increase agility to quickly adapt gas companies reduce cost and boost
to new economic environments. Trust and efficiency.
Compliance
Outsourcing non-core operations – loyalty Security processes and solutions must
card management in downstream be applied across the partner ecosystem
operations or even divesting whole too. Where pumps on a rig, for example,
tranches of the retail business, for example No other industry sector comes under as
are owned and managed by a third-party
– can reduce cost and boost effectiveness intense critical public scrutiny as oil and
under contract, the responsibility for
while maintaining the brand and customer gas. Companies must protect customer
the safe and effective working of those
relationship strategy. After all, oil companies data and shield essential resources
pumps is ultimately carried by the oil
want to keep control and retain their from the threat of cyber-attacks while
or gas company. With these complex
position as the decision makers for responding to increasing regulatory
interdependencies, it's essential that
strategic topics. To maximize value, oil and reporting obligations in a timely and
local and global security and compliance
gas companies must form tighter and more transparent fashion.
obligations are extended across the
active business relationships with their new partnership network.
specialist partners and their suppliers. In a world that is now very much digitally
connected, oil and gas companies must
Actionable intelligence is vital for improving be seen to meet social and environmental
efficiency, reducing downtime and helping obligations. As oil and gas companies
oil and gas companies thrive. After all, a increase their energy production they must
single day’s downtime can cost a company manage the environmental impact of their
more than $10 million. They must fully operations very carefully. Commitments to
exploit both real-time and historical data protecting the environment should not only
upstream, midstream and downstream, focus on eliminating leakages, reducing
especially in those areas where operational CO2 emissions, water consumption and
and information technology come together. waste, they should also include working
closely with local communities.
With significant investments tied up in
assets that are often more than 20 years Always in the public eye, no oil or
old, maintenance costs have become gas company can underestimate the
almost unsustainable. Meanwhile, the cost importance of environmental impact.
124 #AscentLookOut
Oil and Gas
Mainstream
5G networks Early adoption
Adolescent
Emerging
Prescriptive analytics
Privacy-enhancing
technologies Self-adaptive
security
Hybrid cloud
Augmented reality
Sentiment analytics
company’s own private asset management that are organized in collaborative working across the refinery equipment that they
cloud service and a sub-surface analysis environments for looking after a series of can then drill down into. Behind the
cloud service. fields. scenes semantic technologies help
these intelligent systems understand the
Context-rich systems Internet of Things relationships within and across data.
By bringing together insight on the wider By exploiting data from predictive models
context, context-rich systems in tandem – such as weather – along with production Sentiment analytics
with advanced analytics, help companies data, data from smart embedded sensors As oil and gas companies looking to
ensure they deliver the personalized and engineers’ wearables and a wealth address massive environmental and
interaction today’s customers demand. of broader information sources, the public confidence pressures are turning
Internet of Things (IoT) provides oil and to advanced social media analytics with
Distributed analytics gas companies with a rich picture of the its sentiment analytics to determine
Distributed analytics helps companies environment out in the field. what people feel about their brands and
optimize production yield by analyzing quickly address any reputation-damaging
data from the well head, in the field and Machine-to-machine sentiment.
other remote locations in real time. They Breakdowns are few and far between
help reduce leakage by combining and these days. Smart, data-driven prescriptive Streaming analytics
analyzing data gathered from sensors maintenance programs are helping to A few years from now and you will find oil
deployed throughout the production chain maximize the effective lifecycle of aging and gas companies well into their Big Data
in real time, for instance. upstream and midstream assets, while revolution, dependent on the timeliness
improving tool reliability and cutting and quality of intelligence for production,
Edge computing maintenance cost. Machine-to-machine refinement and commercialization of oil
Upstream, edge computing is adding (M2M) technology connects assets, and gas. Advanced analytics play a vital
intelligence to equipment. Critical continually transmitting diagnostic data role in ensuring safety and profitability.
production decisions are well-informed and from machinery in the field, at wells or in Streaming analytics, for example, allows
can be made quickly. refineries to an intelligent system in the companies to extract intelligence in
remote control center. real time so they can act rapidly. By
High performance computing immediately analyzing data coming from
With actionable real-time intelligence now Prescriptive analytics a pump at the wells it provides production
crucial for helping oil and gas companies Companies are increasingly leveraging engineers with actionable insight in next
not only survive, but thrive, high smart, data-driven prescriptive analytics to no time – insight into any sudden drop
performance computing is able to process to optimize operations up-, mid- and in production that might prevent the well
the vast volumes of real-time and historical downstream. Downstream, prescriptive reaching its target daily production, for
data that is now available. Seismic imaging, analytics not only helps companies predict example.
for example, relies on HPC to process data market demand and align per barrel
on how acoustic waves propagate and production cost against the current and Wearable computing
reflect through the subsurface to determine foreseeable future of crude oil price, it Well engineers access vital information
the possible presence of hydrocarbon can also suggest how, when and where hands-free through modern wearables
accumulations. These simulations enable production needs to be stepped up. – including smart glasses, bracelets and
companies to predict whether oil wells will sensors embedded in clothing – improving
fulfill expectations more accurately before Privacy-enhancing technologies productivity and safety. Sensors can send
drilling begins. With the oil and gas industry under such information on the engineer, their actions
intense scrutiny privacy-enhancing and the local environment back to a
Hybrid cloud technologies are helping control the remote control center.
Cloud computing is helping oil and gas disclosure of customer data. They help
companies ensure data is accessible companies manage privacy risk by
whenever and wherever it's needed, ensuring compliance with data protection
improving mobility and flexibility. Sensitive legislation and regulation.
data, such as prospecting intelligence, is
stored in private clouds. Hybrid clouds Self-adaptive security
then allow companies to combine their Contextual dynamic access control
sensitive data with classified data, such as enabled by self-adaptive security provides
the contact information for local associates. companies, customers and partners with
access to information and systems only
Innovation Value Webs when needed, shielding essential resources
With oil and gas companies building from the threat of cyber-attacks while
partnerships and alliances beyond raising levels of privacy protection.
traditional borders, innovation value
webs are enhancing collaboration and Semantic technologies
communication across the wider partner Distributed analytics has a role to play in
ecosystem. Their new social business reducing power consumption in midstream
tools are also encouraging deeper operations. It provides refinery managers
cooperation between the multi-skill teams with an overall analysis of power usage
126 #AscentLookOut
Oil and Gas
nc l
nc l
lle na
lle na
n
n
ce
ce
rie er
rie er
e
e
e
e
tio
tio
inv ss
inv ss
ce tio
ce tio
nc
nc
an
an
Ex stom
Ex stom
Co ust &
Co ust &
Re ine
Re ine
en
en
Ex era
Ex ra
pli
pli
e
s
s
pe
pe
Op
Op
m
m
Cu
Cu
Bu
Bu
Tr
Tr
3D printing Innovation Value Webs
Pharmaceuticals
128 #AscentLookOut
Pharmaceuticals
themselves as data brokers, brokering data Our ever more connected and monitored successfully satisfied, especially now that
gathered from via tablets, watches, TVs and world offers many great new opportunities manufacturing is commonly outsourced
other sources. for pharmaceutical companies. Take to contract manufacturers in low-
ingestible sensors that will be activated cost locations. A real-time value chain
By redesigning the patient experience, upon swallowing and enable wireless combined with transparency both inside
moving from a product-centric to a patient- patient monitoring and diagnostic imaging, the pharmaceutical company and in its
centric world, pharmaceutical companies for example. These ‘smart pills’ could open interaction with its network of partners
can gain the insight and loyalty that is up new revenue streams, along with other will help ensure the ‘right first time’ quality
critical to success. Online communities wearable products and apps. demanded today.
keep the brand at the forefront of cyber
patient’s mind while providing a direct Meanwhile, doctors could prescribe their
channel for learning about his fears at patients apps, either in a more preventive Trust and
the different stages of his health journey approach to health or as an alternative Compliance
– healthy living, prevention, diagnosis, to medication. An app that monitors
treatment, recovery and home care. In and encourages exercise and a healthy
return, cyber patient may offer his trust and diet could be an alternative to statins, for Patient and product safety is increasing
loyalty. example. regulatory burden on the development,
manufacturing and supply of drugs.
Increased patient engagement and greater Pharmaceutical companies must
transparency will help pharmaceutical Operational keep their organizations up-to-date on
companies connect with patients along Excellence national and international laws, as well
their very personal health journey. Linking as healthcare specific regulations. An
the Business-to-Business and Business- effective compliance capability, with
to-Patient worlds provides companies efficient communications, is a differentiator.
With revenues declining, pharmaceutical
with the access to volumes of patient Furthermore, standardizing processes
companies must increase efficiency
data they need to deliver innovative along the entire value chain will help
and reduce costs to improve margins.
new personalized services – for example pharmaceutical companies meet the
Operational excellence is required
providing diabetic patients with a complete increased legislative pressure and combat
throughout the life sciences organization:
service comprising measuring the blood counterfeiting.
in production and across the supply chain
sugar level, the right doses of insulin, a
and within IT. A modern digital environment
pump and their physicians access to their Meanwhile, pharmaceutical companies are
is vital for streamline both internal and
real-time patient data. increasingly outsourcing drug discovery,
external processes that reach across the
pharmaceutical ecosystem. clinical trials and clinical data management
Centralizing that insight along with other to cut cost. They're also working more
critical data will not only enable real-time closely with each other to share risk, take
Despite demand weakening in established
access to information from anywhere, it will advantage of economies of scale and
markets, demand for healthcare is
strengthen engagement with stakeholders influence the direction of clinical research.
strengthening in the emerging markets.
(including study sponsors, regulators, Protecting intellectual property in this new
Companies therefore need to be able to
hospitals, physicians and nurses, as well very collaborative environment is a key
provide any drug anywhere around the
as the patients) by simplifying information concern.
world at any time, swiftly moving drugs
sharing. Stakeholders will no longer
around the globe. Reliable forecasting
participate individually; instead they will This places security, reliability and
and a well-managed global supply
work together towards a united goal. scalability at the top of the IT agenda.
chain are key to ensuring demand is
130 #AscentLookOut
Pharmaceuticals
Mainstream
Early adoption
5G networks
Adolescent
Emerging
3D printing
Streaming
analytics
Self-adaptive security
Trusted information
High performance brokers
computing
Internet of Virtual assistants
Things Cloud Service
Distributed Prescriptive analytics
analytics Integration
Pattern-matching Privacy-enhancing
technologies technologies
Wearable Semantic
computing technologies Advanced data
visualization
Social network
analytics
Augmented reality
without the need to first copy the data to are repaired or replaced long before they trial or physician can react quickly to any
a central location. Companies can more threaten to cause down time. This type change in a participant’s vital signs, for
rapidly understand how differences in of condition-based maintenance helps instance.
genes result in an effective cure, non- companies save on labor and service
effectiveness or severe side effects for a cost, reduce unscheduled downtime and Trusted information brokers
specific drug treatment. improve operational efficiency. Pharma companies are looking for a
trusted mediator to host personal health
High performance computing Privacy-enhancing technologies information. Trusted information brokers
With the volumes, variety and velocity As companies gather more and more will act as the central verification service
of data accelerating, high performance information about patients during eliminating the risk of manipulation –
computing is needed for handling complex their clinical trials privacy-enhancing especially in clinical trials – and ensuring
simulations and analyses; for analyzing the technologies control the disclosure of data. integrity of data.
DNA of clinical trial participants to try and They help companies manage privacy
identify the variants involved in different risk by ensuring compliance with data Virtual assistants
side effects, for instance. It also enables protection legislation and regulation. Innovations, such as virtual assistants, will
the virtual high throughput screening that have a significant important role to play
is accelerating lead compound discovery Self-adaptive security in patient compliance. This might be both
processes. Contextual dynamic access control during clinical trials and once the candidate
enabled by self-adaptive security provides drug has been approved and released to
Internet of Things companies, patients and partners with market. Carried on a smartphone or a 3D
Intelligence from wearables and smart access to information and systems only visualization, the avatar may remind the
devices is combined with information from when needed, raising levels of security and patient to take their medication or simply
numerous other diverse sources – from privacy protection. provide help and advice.
electronic patient records to information
about the drug candidate, trial itself and Semantic technologies Wearable computing
even all stakeholders involved – in the Semantic technologies enable the Just a few years into the future and we will
Internet of Things (IoT). The IoT enables integration of the diverse formats of data see the speed at which pharmaceutical
smart, timely and appropriate drug that come from disparate systems into the companies gather, combine and explore
administration, amongst other things, cloud. They ensure analytics systems can information continuing to increase – during
where a patient’s KPIs measured by smart understand the meaning of the data they research, in the manufacturing plant and
sensors regulate an ‘embedded’ active process, whatever its format. across the entire pharmaceutical supply
pharmaceutical ingredient depot (such as chain. Patients participating in clinical trials
an insulin pump), for instance. Cloud enables people to share their health will be more connected and sharing more
KPIs – clinical trial data, for example – from information than ever before. Smartphones,
Pattern-matching technologies anywhere and allows other stakeholders wearables and other smart sensor devices
In the event of a pandemic, the medical to act on that data in real time. Examples are constantly collecting information on
community and pharmaceutical companies might include physicians increasing insulin health KPIs (oxygen levels, blood pressure,
need to understand how the disease is on seeing blood sugar levels decrease. blood sugar levels and more) and storing it
spreading in order to predict future spread in the cloud.
and these future drug requirements. Social network analysis
Pattern-matching technologies such as Pharmaceutical companies are striving
deep learning are helping them understand to move from a product-centric to a
disease behaviors, revealing otherwise patient-centric world while patients want
hidden patterns in transmission or to take a greater role in their choice of
remission, for example. medicine. Social media is taking an active
role in enabling that transformation and
Prescriptive analytics participation. In combination with social
Pharmaceutical companies are adopting network analysis it's helping companies
prescriptive analytics to ensure they to understand how patients feel about
meet significantly greater demand for their drugs and which side effects impact
specific drugs in the event of a pandemic. them most. Meanwhile companies are
Prescriptive analytics takes intelligence on participating in or creating specific disease
the spread of the disease, availability of communities that help educate patients
raw materials and production schedules about their disease and to encourage
to suggest (or prescribe) an appropriate them to lead the healthier lifestyles that will
production schedule for the product. improve outcomes.
132 #AscentLookOut
Pharmaceuticals
nc l
nc l
lle na
lle na
n
n
ce
ce
rie er
rie er
e
e
e
e
tio
tio
inv ss
inv ss
ce tio
ce tio
nc
nc
an
an
Ex stom
Ex stom
Co ust &
Co ust &
Re ine
Re ine
en
en
Ex ra
Ex ra
pli
pli
e
e
s
s
pe
pe
Op
Op
m
m
Cu
Cu
Bu
Bu
Tr
Tr
3D printing
Prescriptive analytics
5G networks Privacy-enhancing
technologies
Advanced data
visualization Self-adaptive security
Cloud Service
Social network analytics
Integration
Pattern-matching
technologies Wearable computing
Retail
Old school loyalty programs are on their 2.5 billion new users will come online
way out in next 5 years
Social is growing as part of the omni- 84% of smartphone owners use
channel mix phones instore
Ecommerce will account for 8.8% of all
Retail is now borderless
retail by 2018
IoT will have a significant economic 26% of purchases are impacted by
impact on retail social
134 #AscentLookOut
Retail
can even be installed outside of physical To take full advantage of reliable real-time And as they become increasingly
stores to provide customers with virtual data to optimize operations and cost, dependent on technology, retailers must
shopping opportunities on their way to retailers will need to standardize, simplify also protect their stores and their services
work or while waiting for the subway. and modernize their IT systems. While from both virtual and physical attack.
they're doing this they must also invest in Furthermore, they must protect the
But this is only the start of the story. the new technology that will enable them increasing number of electronic channels
Retailers also need to anticipate how and to both offer their customers a true omni- through which they engage with their
where tomorrow’s customers are likely to channel experience and engage with them customers – from laptop and tablets to
want to shop: how and why they navigate in a more personalized way. smartphones and wearables. To guard
through different channels. As customers’ against reputational damage from an
habits and preferences evolve – and the A true omni-channel experience offers outage or a major data breach, risk must
pace at which they're evolving is getting seamless integration across all available be continually anticipated, assessed and
faster and faster – retailers will need to be channels. Product names, information, managed.
able to react quickly to accommodate new pictures, prices, returns policies, stock
behaviors and desires. availability needs to be consistent
whether online or in stores. Ensuring
this is important for building the trust
Operational that increases loyalty and, with it, repeat
Excellence business.
Trust and
To help them succeed in today’s
increasingly diverse and competitive
Compliance
environment, retailers are looking for new
ways to improve efficiency and reduce
costs. Both instore and online, they’re Retailers need to build trusted relationships
looking for more efficient ways to engage with their customers to encourage them
with customers and to provide customers to share personal information. Without it
with self-service access to information. they will struggle to understand and target
individual’s needs and desires.
Now present on a variety of channels
– their own virtual and physical stores All customers, however, expect retailers
as well as their partners’ – retailers must to safeguard that data, to prevent
ensure ample stock. Real-time visibility and unauthorized breaches that could see their
optimization of not only stock levels but personal information fall into the hands of
also the supply chain, along with real-time fraudsters. Stringent protection against its
demand forecasting, will be key to ensuring fraudulent use by third parties remains a
they have the right products available, in basic condition for a trustful brand. High
the right store, at the right time. Online standards of data privacy and IT security
they have the luxury of being able to see management – including leveraging the
what pending purchases are in customers’ strong authentication required to ensure
shopping baskets. their customers are who they profess to
be – have to be established and kept at all
times.
136 #AscentLookOut
Retail
Mainstream
Early adoption
Adolescent
Emerging
3D printing
5G systems
Edge
computing Privacy-enhancing technologies
Advanced data visualization
Cloud Service Integration
Internet of Prescriptive analytics
Things Augmented reality
Context-rich systems
Distributed analytics
Self-adaptive security
Pattern-matching technologies
Biometric technologies
Hybrid cloud
Robotics
Virtual assistants
Mobile and social media apps
Near field communication
Beacons Wearable computing
Geo-location
technologies Sentiment analytics
2016 2017 2018 2019+
© Atos 2016. All rights reserved.
Cloud Service Integration ensures tight Distributed analytics it soon after capture.
integration between all these various cloud To engage on a personal level with their
services. customer, retailers need a single up-to- Geo-location technologies
date 360° view of the customer, their Electronic shelf labels (ESLs) also provide
Cloud-based federated identity provides purchasing history, needs, desires and a very precise global product positioning
secure federated access to both operational their behaviors. Distributed analytics system since each product in the store is
systems and customer information across provides a comprehensive view of the individually labeled. If a customer is looking
systems. Trusted information brokers customer by analyzing data in situ across for something they can’t find, a product
are poised to act as the future central heterogeneous data sources. This single search on the store map will find easily
verification service, eliminating the need for source of the truth helps stores ensure the product thanks to the geo-located ESL
individual registration and authentication of every interaction – whether digital or with a enabled by geo-location technologies. A
each service. human store assistant or customer service NFC tap on any nearby ESL will identify
representative on the phone – is consistent, their exact location in store and direct them
Context-rich systems relevant and meaningful. toward the product they’re looking for.
Working in tandem with advanced
analytics, context-rich systems bring Edge computing Hybrid cloud
together insight on the wider context to In the future companies may leverage Retailers are looking to enhance that
help retailers proactively align content edge computing to both process relevant customer experience further; to encourage
with the consumer’s needs. These systems data more quickly and ensure scalability ad-hoc purchases based on the current
may, for example, adjust content sent to within the smart connected retail context. Hybrid cloud allows companies
an individual customer or digital signage environment. Indexing data close to the to augment customer data stored within
based on anything from the weather point of capture, for examples, lightens the their own private clouds with third-party
outside to current events, device-type, load of centralized servers while making it information – such as news on trends, hints
network capabilities and more. highly accessible to the systems that need and tips or even weather forecasts – so
they can offer the customer timely, relevant Prescriptive analytics minimize overcrowding in specific regions
suggestions. By analyzing a comprehensive up-to-the- of the store.
minute picture of the customer and their
Internet of Things context combined with well-understood Wearable computing
Embedded sensors in shelves, packaging customer habits, expectations and buying Warehouse employees can track a product
and more together form the growing behaviors, prescriptive analytics suggest hands-free through modern wearable
Internet of Things (IoT). Connected which promotions the retailer should offer devices. These wearables infuse insights
systems, processes, workers, customers, a customer to maximize their shopping with the real-world, blurring the lines
stock and shelving transforms the store basket. Prescriptive analytics also has a between digital and physical. They provide
into a smart connected retail environment role in helping retailers gauge the expected the same detailed information on stock
equipped to respond in real time to future profitability of each customer levels and location that the robots have
changes in customer demand and relationship. Online it helps with optimizing available to them.
behavior. In the future it will also enable checkout-funnels and maximizing
automatic purchasing, for example. With conversion rates.
products and customers located in real
time, the merchandising becomes dynamic. Privacy-enhancing technologies
As customers share more information with
ESLs, for example, allow retailers to display retailers privacy-enhancing technologies
and update prices remotely across the (PET) control disclosure of data, helping
store, without the need for staff intervention establishments to manage privacy risk by
at the shelf edge – generating significant ensuring compliance with data protection
and recurrent operating cost savings. legislation and regulation.
The ESLs not only allow dynamic pricing,
varying price by time of day, but can also Robotics
enable interaction with customers’ smart In the warehouse, robotics helps with
phones to access product information or laborious manual tasks such as order
enable personalized offers. picking. Instore, always abreast of the
real-time location and current stock levels
Mobile and social media apps of all of a shop's wares, robots become a
The cloud is a key enabler for business useful source of information and can be
transformation in the retail industry. used in customer service to engage with
It allows retailers to offer customers a customers and help them find items.
truly omni-channel experience across
all channels and locations. Whether the Self-adaptive security
customer engages with the retailer in a With retailers managing and sharing
physical, on the PC or through mobile more and more of their data and services
and social media apps, the systems they securely through their private clouds,
interact with and the data these systems the dynamic access control enabled
use will be the same. by self-adaptive security ensures staff,
partners and customers have access to
Near field communication the information and systems they need to
Stores' use of near field communication access, but only when they need it.
(NFC) is expanding rapidly from its initial
adoption as a means of secure contactless Sentiment analytics
payment. Customers tap an NFC tag on Social media provides customers, retailers
a table, shelf – or anywhere else it can and brands with more than just an
be embedded – with their NFC enabled opportunity to express needs, desires and
smartphone or smartcard to receive concerns; social is also becoming a new
advertising, offers, coupons, loyalty points peer-to-peer shopping platform. Sentiment
or even information on a specific product. analytics allows retailers to obtain valuable
feedback on consumer satisfaction and
Pattern-matching technologies ideas for innovation.
Pattern-matching technologies help
companies leverage the vast volumes of Virtual assistants
data available today to identify hidden Customers are greeted by a virtual
customer habits, identify untapped assistants as they enter the store. The
marketing opportunities and better avatar provides the customer voice- or
understand their customers – as well text-based information on their mobile. It
identify and then address potentially not only responds to customer queries,
fraudulent behavior patterns, including but advices the customer about the length
potentially fraudulent behaviors. of the queues, where to pay and more,
creating a novel interaction that draws
the customer in. For the retailer it helps to
138 #AscentLookOut
Retail
nc l
nc l
lle na
lle na
n
n
ce
ce
rie er
rie er
e
e
e
e
tio
tio
inv ss
inv ss
ce tio
ce tio
nc
nc
an
an
Ex stom
Ex stom
Co ust &
Co ust &
Re ine
Re ine
en
en
Ex era
Ex ra
pli
pli
e
s
s
pe
pe
Op
Op
m
m
Cu
Cu
Bu
Bu
Tr
Tr
3D printing Internet of Things
Privacy-enhancing
Biometric technologies
technologies
Hybrid cloud
Telco
OTTs’ growing share of industry value Global mobile subscriptions will grow
chain revenues to 8.5bn by 2019
Network equipment hindering Mobile service revenues will reach
innovation time-to-market $1.1tn by 2019
The industry will continue to By 2017, half the world’s population
consolidate through M&A transactions will be mobile Internet subscribers
Regulatory uncertainties continue to M2M connections are forecast to
unsettle the industry reach 1bn by 2020
140 #AscentLookOut
Telco
the-top services, becoming part of the global giants could leverage their scale
to negotiate great deals with over-the-
Operational
media revolution, buying TV channels
or becoming a gateway to third-party top-players. Their role would transform to
Excellence
products such as games, for example. service lifecycle orchestration, connecting
They should take advantage of their over-the-top service providers and local
strengths – network ownership and access Telco players. This would require significant Agility – the ability to reconfigure operations
to devices in particular, as well as means organizational change. instantly – and effective, resilient and
for monetization – to enable them to do so. scalable operations will be vital to survival
Active intelligence and open innovation will Unlike many other sectors, Telcos have in tomorrow’s volatile Telco landscape.
be key. access to an exceptionally high proportion High levels of back office automation are
of real-time data. Companies must fully needed to ensure new services are efficient
But, traditionally, time-to-market for Telcos' exploit that data to build the personal and cost-effective. Furthermore, sharing
innovations has been hampered by their propositions that will drive customer loyalty new radio access network infrastructures
reliance on network equipment providers and boost spend. Integrating customer among several operators in high density
(NEP). New features and services are and network data and exploiting real-time areas will help contain Capex.
often dependent on changes to network data will help them to rapidly deliver the
equipment hardware and, as such, can take new services and exceptional value their But real excellence will increasingly depend
up to 18 months to implement – hampering customers demand, providing regulations on a Telco’s ability to understand and
their ability to compete with over-the-top- and customer concerns around privacy exploit the relationships between multiple
providers. allow it. commercial and operational information
sources, and to compete with over-the-
Telcos can no longer afford to act in Only the technology giants, Google in top providers within the bounds of net
isolation. They need to adapt new business particular, have access to similarly large neutrality principles.
models that necessitate close cooperation volumes of data. Already exploiting its full
with third parties. potential, these giants have the potential Exploiting the new cross-over between
to compete with Telcos by offering tailored commercial systems (BSS) and operational
The significantly reduced latency offered services based on their customer insight. systems (OSS), for example, will create
by Telcos' next generation of networks, immediate and lasting business
may lead to partnerships with over-the-top With so much happening and so fast, differentiation; it’s an under-used gold
providers, for instance; it will be vital for working in open and agile partnerships mine with high business potential. Both
ensuring these providers' services meet the becomes more important than ever. areas need to seamlessly contribute to
growing expectations of their ever more These new business models with their an active service catalogue that defines
demanding customers. Augmented reality open approaches represent a real cultural which Telco (and non-Telco) assets needs
and connected car services, for example, shift for Telcos. Areas of specialist Telco to be orchestrated and which assets need
need responses in near real time. Their innovation can become a bridge into new to be harvested to extract added value for
success depends on networks with latency joint business opportunities with not only customers and business value for the Telco.
of no more than a couple of milliseconds – retailers, banks, payment service providers Furthermore, cross-over must also expand
significantly lower than the 50 or even 100 and local and regional government bodies, beyond Telcos’ own data and be the basis
milliseconds available today. but also with the sensor and machine- for partnerships that enable new services
to-machine technology players who will to be developed.
In fact, global Telcos may form partnerships play a crucial role in enabling a connected
with smaller local Telco service providers ‘Internet of Things’ world. As yet, few Telcos have taken this area of
too. With local players managing and cross-over anywhere near its potential. This
providing access to the networks, the capability will be central to the fight-back
against over-the-top service providers who than ever before. Our usage patterns, in complex scenarios. Automated trust
simply do not have access to the essential buying preferences and habits are of high frameworks allows for greater control
operational intelligence that is so important interest to commerce and advertisement of business partners and also of Telco’s
to the Telco. After all, network and product companies at a time when mobile own performance. They not only foster
performance have a direct effect on advertising is set to grow exponentially. innovation, but also align with forthcoming
profitability and customer satisfaction. While Telcos have the opportunity of regulatory aspects related to the rights of
building new business models around consumers.
The key value-generating OSS and BSS privacy, they must be mindful that
domains also need to be further optimized customers’ loyalty will be significantly In actual fact Telcos are the only parties
and re-engineered. OSS systems need determined by the way their private data is able to create a real data service for millions
to be able to manage and orchestrate IT being used and protected. of users, simply because they're able and
and network assets together in real time – willing to take security, privacy and other
both within transactions and on-demand. Users are increasingly appreciating regulatory requirements into account.
Instead of pushing only pre-defined Telco the value of a personalized digital This key differentiator is enabling Telcos
assets, BSS systems need work in real time environment. In the future, users may be to become a very powerful player in the
to expose and monetize the granular Telco willing to share privacy information far digital economy.
and non-Telco assets and offer the bundles beyond today’s boundaries if they obtain
that are now being pulled on-demand by corresponding value in return. At the
the end customer. same time, they're going to become much
more discriminative about the brands and
Meanwhile, with IT operations delivering a institutions they trust. To gain that trust,
significant portion of the Telco value chain, Telcos must give their customers absolute
the industrialization of IT operations is transparency about what is being done
key to reducing cost. Telecom companies with their data: the ability to control who is
would benefit from raising the maturity doing what and when (including a full opt
levels of their operational processes and out) and the physical protection of their
service delivery. data.
Network sharing also has a role to play Irrespective of the value that enterprises
in reducing operational cost, improving offer in return for private data, stringent
margins and freeing up funds to invest in protection against fraudulent use by third
innovation. But before new approaches parties remains a basic condition for a
can be adopted, network and IT assets trustful brand. High standards of data
should be harmonized, consolidated and privacy and IT security management have
rationalized to both maximize their value to be established and kept at all times. That
and ensure these heterogeneous networks means risk must be continually anticipated,
are run efficiently and cost-effectively. assessed and managed. As more and more
devices become connected, security will
be key. What if a hacker gains access to a
Trust and customer’s cameras, sensors or devices in
Compliance their home?
142 #AscentLookOut
Telco
5G networks
Mainstream
Early adoption
Adolescent
Emerging
Context-rich systems
Cloud Service Integration
wherever and whenever they need to – buildings or managing energy demand, appreciating that they can now access that
without ever needing to switch between for example. Their success will depend on content from anywhere and on any device,
Wi-Fi and mobile networks as they move improved flexibility and quality enabled whenever they need it. With consumers,
location. The embedded SIM (eSIM), which by smarter networks with increased companies and machines sharing sensitive
allows customers to manage multiple programmability. and personal information over today’s the
mobile network operator subscriptions, is ubiquitous networks that provide access
easily integrated into any ‘thing’. LPWAN to cloud environments, operators must
Businesses, consumers and ‘things’ are ensure high levels of security and privacy
High performance computing better connected and better informed than protection. Contextual dynamic access
To deliver the coverage and service ever before. Future IoTs will see data sent control provides access to information and
performance of fixed, mobile and cable over a combination of the pervasive 5G systems only when they're needed.
TV networks customers expected today and IoT-optimized low power wide-area
while, at the same time, offering meaningful (LPWAN) networks. Sentiment analytics
customer service, Telcos must tie network Social media, with its continuous narrative
data with customer information in real Mobile edge computing of emotion, has long been somewhere
time. Firstly, network data is processed in Mobile edge computing (MEC) has Telco customers can call for help or simply
an instant through streaming analytics introduced computer processing and discuss their issues and experiences
supported by high performance storage capabilities into the cellular base- with their friends and family. Telcos are
computing, automatically alerting support station. In doing so, it provides Telcos with employing social media and network
teams to any network issues. Prescriptive a new ecosystem and value chain, opening analytics not only to understand general
analytics are then deployed to provide up their networks to authorized third- customer issues and desires, but also
service performance details for individual parties to deploy innovative applications to identify network outages and gather
customers and identify the course of action and services towards mobile subscribers, intelligence on individual customers.
that will minimize disruption for each. enterprises and vertical segments. Its sentiment analytics allows them to
quickly identify and respond to individual
Hybrid cloud Network Function Virtualization customer’s gripes and any other
Telco operators are offering enterprises a Telcos are already adopting Network reputation-damaging sentiment.
hybrid cloud desktop environment that Function Virtualization (NFV) to cut
not only connects to the Telco network, but cost, improve agility and accelerate the Software-defined networking
also to the enterprise network and cloud- deployment of new applications and Software-defined networking (SDN)
based productivity tools offered by third- services. NFV replaces aging monolithic makes the network more programmable
party providers. Telcos are responsible for appliances provided by telecommunication and easier to manage, enabling cost
provisioning and activating the machines, equipment manufacturers with open reductions and new features. Its multi-
along with enabling user credentials, source software running on commodity tenancy capabilities allow Telcos to offer
connectivity, routing and firewalls at the servers. policy-driven and virtualized network ‘slices’
enterprise customer’s site. to customers according to their business
Pattern-matching technologies requirements. Telcos can, for example,
Innovation Value Webs With cyber and communications security provide high quality network services
With the Telco network a core enabler of climbing ever higher on the world’s directly to one customer for their network
many of the technological innovations agenda, streaming analytics combined streaming and a lower quality of service
we're seeing today – from smart cities to with pattern-matching technologies are to another customer who is using the
mobile commerce and banking – operators helping Telcos identify and address unusual network to connect sensors.
are building partnerships and alliances behavior patterns – particularly those that
beyond traditional borders to exploit these may result in a distributed denial of service Streaming analytics
new opportunities. Innovation value webs attack. Advanced Big Data analytics are helping
are helping Telcos enhance collaboration Telcos retain customers and enable growth
and communication across the wider Prescriptive analytics in both saturated and emerging markets.
partner ecosystem. Their new agile and Whereas previously predictive modeling To gain the complete customer picture vital
smart business platform that goes beyond helped Telcos plan for the future by for delivering a truly personalized omni-
elastic connectivity and transport capacity forecasting churn and acquisition; today channel experience, Telcos are making use
encourages the open and participatory Telcos are leveraging prescriptive of real-time streaming analytics to derive
approach to innovation that is crucial to analytics to ensure they offer the right customer intelligence from their multitude
building a marketplace of new ideas. product to the right customer segment of diverse systems.
at the right time. Prescriptive analytics go
Internet of Things beyond predictive modelling by accurately
Besides serving end users, networks need predicting how customer segments will
to cope with the billions of connected response to new products or service
devices that will share information changes and prescribing the optimal
seamlessly across the Internet of Things course of action.
(IoT). IoT business opportunities for
Telcos and their partners are many and Self-adaptive security
varied: from environmental, health or Consumers now see the cloud as the place
traffic monitoring to improving comfort in to store their ever-growing digital histories,
144 #AscentLookOut
Telco
nc l
nc l
lle na
lle na
n
n
ce
ce
rie er
rie er
e
e
e
e
tio
tio
inv ss
inv ss
ce tio
ce tio
nc
nc
an
an
Ex stom
Ex stom
Co ust &
Co ust &
Re ine
Re ine
en
en
Ex ra
Ex ra
pli
pli
e
e
s
s
pe
pe
Op
Op
m
m
Cu
Cu
Bu
Bu
Tr
Tr
5G networks LPWAN
Pattern-matching
Context-rich systems
technologies
Internet of Things
146 #AscentLookOut
Travel, Transport and Hospitality
This is putting tremendous pressure on Trust must be built with and amongst
Travel and transport companies hold a very
aging technology and on companies’ partners too. To drive innovation
special place in their customers’ lives and
ability to integrate historically gathered companies must inspire confidence to
148 #AscentLookOut
Travel, Transport and Hospitality
Mainstream
5G networks Early adoption
Adolescent
Emerging
Machine learning
Autonomous vehicles
Open Data
Virtual assistants
give operators and managers holistic can spot and even predict disruptions Control room operators then become
insights on traveler usage, buying behavior, in their services and take measures to problem managers. Furthermore,
needs and preferences. Derived from these correct them. They're learning about how prescriptive maintenance programs
distributed analytics platforms, deeper people use transport and accommodation extend the life of assets, eliminate major
intelligence allows transport operators to over time whilst taking advantage of breakdowns and ensure sound parts aren’t
offer their customers tailored deals that novel situations, such as major events or replaced unnecessarily.
drive loyalty. These analytics also help incidents, to enhance their understanding
rail companies to better understand the of demand or flow. Pre-emptive security technologies
complex interactions in control rooms, A proactive security approach that is
improving how they manage disruptions Near-field communication helping to prevent cyberattacks. Trusted
and reducing dependence on individual New sources of income rely on simple, probes look for evidence of specific
expertise. effective and secure personal payment suspicious behaviors. These pre-emptive
solutions. Mobile wallets based on near- security technologies help companies
Gamification field communication (NFC) technology are anticipate threats. Behind the scenes,
For the next generation of workers, proving to be the most popular solution. advanced analytics and high performance
gamification (application of game playing These contactless solutions simplify computing together analyze millions of
elements to other activities) is motivating payments for travelers with mobility or events in real time.
them to want to learn, to take ownership of cognitive impairments.
their learning and to maintain their focus Privacy-enhancing technologies
on the learning task in hand. It provides Looking further, just about any electronic Personalized customer services that
the real life simulations that enable them identifier can be used for travel or process personal data coming from
to experience and learn to manage diverse hospitality, provided it can be read and different sources related to the traveler’s
situations. verified against a hub that ensures it has an daily activity follow a privacy-aware
entitlement. This dematerialized ticketing approach that leverages privacy-
High performance computing concept means a traveler never needs to enhancing technologies. Privacy-aware
In rail, for example, advanced analytics buy a ticket again; they simply pay for their approaches require a change in the way we
improves the integration between control journey and accommodation. The identifier think, analyze and implement privacy, from
room decisions and subsequent short-term can also be used for travel-related services, a passive manner to a proactive manner.
timetable changes. Behind the scenes, such as taxis or meals, making the entire
high performance computing provides travel experience seamless. Semantic technologies
the computing power needed to analyze In the hospitality sector, semantic
millions of events in real time. Open Data technologies help employees understand
New online and mobile services based customers' requests better and provide
Innovation Value Webs on Open Data from the General Transit a better level of service. For instance, the
Innovation value webs are helping Feed Specification (a common format customer can ask for something in his
transport companies facilitate open for public transportation schedules and own language without the need to train
innovation within that wider partner their associated geographic information personnel in every language.
ecosystem. Their new social business tools originally developed by Google), amongst
encourage the participation needed to other sources, join up all modes of Streaming analytics
develop new ideas. transport to provide the comprehensive up- With the volumes of real-time operational
to-the-minute information travelers need to data growing at an unprecedented speed,
Internet of Things get where they’re going. streaming analytics platforms ensure
Combined with sensors and geo-location transport operators and hospitality
technologies, machine-to-machine (M2M) Peer-to-peer platforms providers have a precise picture of demand
technology continually transmits diagnostic Driven by real needs and reliant on ease- and operations throughout the day. Traffic
data to a central control center to form of-use, trust and accurate information, new control centers, for example, can respond
an Internet of Things (IoT). On top of peer-to-peer services based on innovative more quickly to accidents, adverse weather,
that mobile devices provide insight into business models have the potential to incidents or other difficulties, and can even
train, traffic and pedestrian movements; disrupt the market. Peer-to-peer platforms take proactive steps to stop problems
smart pavements and smart roads relay and their associated social channels and before they occur.
information on crowds and congestion; mobile apps allow individuals to connect
and smart tagged parcels improve with their peers to turn idle rooms in Unmanned aerial vehicles
postal service efficiency, while reducing homes, seats in cars, spaces on driveways, Transport operators rely heavily on data
manual errors. Operators use this insight unused truck space and more into a viable on the status of their infrastructure to
to deliver dynamic up-to-the-minute toll, source of income. keep it in tip top condition. With assets
parking, accommodation and journey spread far and wide across fields, over
pricing mechanisms based on time-of-day, Prescriptive analytics mountains and even deep within tunnels,
congestion, demand and even carbon The answer to complex operational unmanned aerial vehicles (UAVs) have
emissions. challenges will no longer be dependent relieved engineers of hazardous, time-
upon human experts. Systems based on consuming and costly inspection activities.
Machine learning advanced prescriptive analytics suggest And when people are on the line or heavy
With the help of advanced machine actions that might avoid service disruption: traffic threatens to cause disruption, these
learning technologies, travel companies a list of tasks that will give service remedy. ‘drones’ can pinpoint the source of the
150 #AscentLookOut
Travel, Transport and Hospitality
problem far quicker than any human could, who knows their preferences and agenda – timely warning of delays to their journeys,
with onboard cameras relay videos and guides them to their room or seat or, in the suggest alternative routes or means of
photos back to base, while sensors gather event of an emergency, to the nearest exit. transport and provide access to transport
data on the environment. Drones may also During the journey or stay the assistance or services. Wearables are the digital/
have a role to play in rural parcel deliveries. offers additional relevant information and physical interaction frontier with mobile
services to enhance the overall experience. acting as the control tower. Together they
Virtual assistant provide a seamless experience.
Travelers are greeted by a virtual assistant Wearable computing
as they enter the bus, hotel, train or any Travelers rely heavily on alerts from their
other travel-related facility. This assistant – mobile devices and wearables to provide
nc l
lle na
lle na
n
n
ce
ce
rie er
rie er
e
e
e
e
tio
tio
inv ss
inv ss
ce tio
ce tio
nc
nc
an
an
Ex stom
Ex stom
Co ust &
Co ust &
Re ine
Re ine
en
en
Ex ra
Ex ra
pli
pli
e
e
s
s
pe
pe
Op
Op
m
m
Cu
Cu
Bu
Bu
Tr
Tr
Near field
3D printing communication
Advanced data
Peer-to-peer platforms
visualization
Privacy-enhancing
Distributed analytics
technologies
High performance
Streaming analytics
computing
Unmanned aerial
Innovation Value Webs
vehicles
Utilities
Smart grids revolutionizing the volume Global smart grid data analytics
of data available market to triple by 2022
Consumers are becoming power Smart gas market worth $11 billion
producers by 2019
New demands from electric vehicles Revenue from the home energy sector
and smart cities to more than double by 2023
Smart meters are transforming meter- 27% of EU energy consumption from
to-cash renewables by 2030
Customer must transform into a customer-centric and political issues are forcing utilities
to take action. Companies also face a
business. Leveraging the new inflow of data
Experience will allow them to offer their customers whole new landscape that includes smart
the services they want, drive customer grids, sustainable and renewable energy
behaviors and build enduring customer management, electricity storage, electric
The smart grid is the vision for the future relationships. A personalized service vehicles and the connected home.
of energy; it’s changing the way utilities that includes suggestions on what to
manage their networks. Driven by data, it use when to minimize cost, for example, Governments and shareholders are
allows utilities to build better relationships would be particularly valuable to industrial urging companies to reinvent the way
with their customers, gain control of customers. they operate. The European Commission’s
the low voltage network and optimize 2030 climate and energy framework, for
distribution and the mix of renewables. Utilities must also empower the customer, example, targets a 40 percent reduction in
Customers play a more active role but, to not only providing them with the EU greenhouse gas emissions, 27 percent
do so, they require more choices and more information they want, but also enabling of energy consumption from renewables
information. them to manage their own interactions – and 27 percent improvement in the EU’s
at any time, from anywhere and on their energy efficiency by 2030.
With the smart grid and its multitude of channel of choice. Automatic payments
smart devices revolutionizing the volume services and alternative bill formats are With the cost of fossil energy production
of data available, companies will have important for disabled customers, for rising, some countries are halting nuclear
better insight into the way customers example, while in some countries peer- power generation. And with long-term
behave, consume and, sometimes, produce to-peer comparisons allow customers to infrastructure capital expenditure growing
energy. The connected home and Industry compare their own consumption with their and gas prices falling, several companies
4.0 connected factory, for example, offer peers. are separating – or potentially spinning
both retailers and distributors a great off – up- and mid-stream businesses.
opportunity to learn about individual If utilities don’t act there’s a real risk This will allow them to be more engaged
customers and their behaviors, then the technology giants, who are also in the areas where they see the most
enable real-time systems based on this gaining deep insight into customer value: optimizing the more agile grid
insight. Connected home pilot projects are behaviors and consumption through management parts of their businesses and
everywhere, even in countries that have their connected home gadgets, will jump the integration of renewables.
not yet started rolling out smart meters. on the opportunity to deliver new utility-
related services to customers. In doing so Today's global energy market is shifting
After many years during which customer they would starve utilities of insight into from a model dominated by large
management and relationships were really customer behaviors, diminishing their centralized power plants owned by big
poor, utilities are investing in improving the ability deliver to the new services that are utilities to a mix of distributed energy
customer experience and reducing the vital for cultivating loyalty. generation facilities: smaller residential,
churn rate. They’re demonstrating value for commercial and industrial power
money for customers and regulators and generation systems, many of which use
getting value from social media and mobile. Business renewable resources. This decentralized
Reinvention model – which sees consumers become
Today’s digital customer expects an power producers (or prosumers) – is
engaging, personalized digital service becoming increasingly common in Europe.
in return for sharing more and more
Every utility faces an extraordinary period
information with their utility provider. Both Micro-grids, the most relevant example,
of transition. New economic, operational
retailers and B2B2C distribution companies contain loads and distributed energy
152 #AscentLookOut
Utilities
resources that can be operated in a innovative services by combining this Completely new grid structures are now
controlled, coordinated way, either while intelligence with their own customer insight being set up, largely in emerging countries
connected to the main power network and forecasts for demand on the grid. such as China and India where many
or while islanded. New technologies and Thermatics information from a solar panel regions are being supplied for the first time.
business models – such as those designed manufacturer, for instance, could enable More developed markets, such as Brazil
to keep prosumers as customers – are a service that automatically configures where the vast majority of households
helping to balance loads, smooth variability a prosumer’s solar panel to optimize the already have electricity, are modernizing
and integrate diverse resources. power it produces. their systems to increase supply reliability
and reduce commercial losses. Smart grids
In the virtual power plant (VPP) model, an New services and operations will have an will play a key role ensuring a sustainable
energy aggregator gathers a portfolio of impact on trading systems. Trading must and cost-efficient energy supply in these
smaller generators and operates them as a find ways to leverage and monetize the regions.
unified and flexible resource on the energy real-time data now available so that utilities
market or sells their power as system can cash in on the increasing volatility. As smart meters transform meter-to-cash
reserve. VPPs add the supply and demand by giving customers access to more data,
flexibility that will be increasingly necessary utilities will be forced to diversify plan
for accommodating fast ramping periods Operational prices, services and consumption. This will
and address corresponding supply forecast Excellence only increase complexity at a time when
errors. companies need to reduce meter-to-cash
times. Meter-to-cash processes need to be
Multi-sided markets are also reinventing Utility companies are under unprecedented optimized to ensure companies maximize
the utility business. There are already pressure to reduce cost and increase value from their assets.
some pilots for smart household electrical operational efficiency right across their
appliances. Non-commodities products chains of operation. With the margin for The growth in micro-generation and rise
– such as light bulbs and boilers – are price increase in the end product limited, in number of smart devices attached to
being sold in a pay-per-use mode, with all- cost needs to be addressed urgently to the grid increases the complexity of the
inclusive maintenance, controls and more. prevent it eroding competitiveness. network and distributors’ challenge of
balancing supply with demand. It’s also
As electric vehicles and smart cities mature, Meanwhile, overall demand is rising. While undermining the traditional advantages
new back office systems will be needed to growing fast in the BRIC (Brazil, Russia, associated with building large centralized
manage and process the new volumes of India and China countries); in the west power generation, such as economies of
data being produced. The insight derived significant government investment in green scale. Utilities must adopt a more proactive
from this data will allow utilities to offer and renewable energy has led to expensive role, leveraging available data to optimize
consumers new value-added services. overcapacity, especially tied to the cost of network operations and cost.
Examples include a service that locates conventional power plants.
the nearest electric vehicle recharging But many legacy assets installed during
station. Core platforms are emerging, Volumes of non-conventional energy are past growth booms and are now operating
but it’s a complex ecosystem with many growing in the US and Europe. Distribution at, or beyond, their designed life span. With
stakeholders, including cities and car companies are facing new challenges: they the cost of renewing them high, utilities
manufacturers, amongst others. must optimize their network operating must find a cost-efficient way to extend
costs, inject renewables in a way that their useful life.
At the heart of these multi-sided business avoids network failure and cope with the
models, utilities consume relevant data additional strain electric cars and other And with the workforce aging too, utility
from third-party partners and build innovations will add. companies are leveraging technology to
reduce overall staffing make and make performance, quality and consumption,
those that remain more productive, amongst other things. New tools and better
concentrating on their core business. systems are needed to allow companies to
They're faced, however, with a clear report in a more systematic and effective
problem of knowledge transfer. way.
154 #AscentLookOut
Utilities
Mainstream
Early adoption
Adolescent
Emerging
3D printing
5G networks
Pattern-matching technologies
LPWAN
needs. These systems may, for example, Innovation Value Webs opportunities and better understand
adjust content based on anything from With so many new possibilities emerging, their customers. They will also help
where a customer is in their billing cycle innovation value webs are helping with identifying and address customer
to their location, device-type, network and utilities facilitate open innovation beyond behaviors that might result in non-technical
input capabilities – or even weather and the enterprise borders, enhancing losses.
events local to the customer. collaboration and communication across
the wider partner ecosystem. The new Prescriptive analytics
Distributed analytics social business tools that lie at their core Advanced prescriptive analytics
Analytics running across distributed encourage the participation required to determine maintenance requirements and
platforms give utilities an end-to-end develop the new marketplace of ideas. prescribe a course of action that will ensure
view across high-, medium- and low- equipment is repaired or replaced before
voltage networks. These distributed Internet of Things it fails. What’s more, an engineer assigned
analytics platforms provide the converged The vision of a connected home is fast to a maintenance task knows exactly what
intelligence and visibility that allows becoming a reality. Customers – particularly is involved and which parts are required –
utilities to make better informed decisions, disabled customers – appreciate being able reducing repair times and costs.
minimizing any risk of disruption to supply. to control their heating remotely using
Leading-edge utilities are including the an app on their smartphone, smartwatch Self-adaptive security
whereabouts of engineers, their shift or even from within their connected While trusted information brokers provide
patters, SCADA data and budget forecasts car. Recent innovations are integrating utilities with the confidence to share
in this picture. customers’ social media accounts and information with new service partners,
utility data with the smart appliances, dynamic access control ensures partners
Edge computing heating and water systems that are already and employees alike have access to the
Edge computing processes critical data connected to the Internet of Things (IoT). information, systems and locations they
near to its source to ensure it’s available in need to access, but only when they need it.
real time. In the event of an emergency, the Winters are less of a worry these days. If a
control center can understand the situation connected sensor were ever to identify a Social media analytics
in real time and quickly divert appropriate burst pipe, social technologies would swiftly Now the primary channel for engaging
engineers to deal with the problem. alert customer and utility company. With with utilities, social media is also
customer data also connected to the IoT, somewhere customers can call for help or
Geo-location technologies a utility maintenance engineer can be sent simply discuss their issues and experiences
Combined with geo-location technologies straight to the property. with their friends and family. Utilities
and radio frequency identification (RFID) companies are employing social media
tags, sensors ensure engineers are safe In-memory computing analytics to identify network emergencies;
– that they’re wearing safety equipment Billing is a long process. Meter-to-cash can understand general customer issues and
correctly, their equipment is performing be improved. Utilities are launching trials of desires; identify and respond to individual
optimally and the environment around in-memory solutions such as SAP HANA to customer’s gripes; gather intelligence on
them doesn’t pose any risks. The data improve the quality of invoicing, reducing individual customers and quickly address
gathered can be gathered to form a 3D errors and unbilled revenues. any reputation-damaging sentiment.
visualization of the situation out in the field, In-memory technologies for ERP or vertical
which will help to improve safety. applications for utilities can change the Streaming analytics
way a business user works and free up The immense volumes of real-time data
High performance computing their time to evaluate the quality of outputs coming from millions of smart meters
Integrating information on networks, such as invoices, reports, balance sheets, are processed in an instant on numerous
people and budgets has further enhanced scheduling of activities and more. streaming analytics platforms, which
visibility and with it project and incident ensure utility companies have a clear
management. High performance Machine-to-machine picture of the precise demand throughout
computing helps utilities process the vast Emergencies are few and far between the day.
volumes of data now available. these days. Smart, data-driven prescriptive
maintenance programs not only eliminate More agile than ever before, utilities act on
Hybrid cloud major breakdowns, they also extend the the intelligence provided by these smart
Cloud computing has been helping utilities life of assets while ensuring perfectly grids in almost real time to optimize supply
to reduce cost and carbon footprint for good parts aren’t replaced unnecessarily. to business and residential customers
some time; customer and usage data is Machine-to-machine (M2M) technology alike. This continual and real-time insight
managed securely under an internally- continually transmits diagnostic data from gives customers better insight into their
managed private cloud. Companies machinery in the field or in the plant to consumption, which, in turn, is helping to
are increasingly adopting hybrid cloud an intelligent system in the central control optimize meter-to-cash processes.
services to enhance customers’ utility center.
information with external data, such as Wearable computing
weather information, settings for their Pattern-matching technologies Customers are able to interact seamlessly
smart meter or home automation device, Pattern-matching technologies supported with their utility company across a wide
or even a mapping service that locates the by high performance computing will variety of channels – online, mobile, social,
nearest available car charging station. help companies identify hidden usage wearables and more.
patterns and untapped energy efficiency
156 #AscentLookOut
Utilities
Workforce management scheduling of maintenance activities; reflected in a huge amount of money with
Workforce management is helping to customer portals and CRM systems a very quick pay-back period.
reduce cost, especially when full-integrated managing demand rising from the final
with: geoportals managing network customers; and finally mobile systems
and assets information; ERP systems able to dispatch work orders, report work
managing economical and financial data; done and manage emergency calls. Saving
MRP systems managing resources and arising from this kind of projects will be
nc l
lle na
lle na
n
n
ce
ce
rie er
rie er
e
e
e
e
tio
tio
inv ss
inv ss
ce tio
ce tio
nc
nc
an
an
Ex stom
Ex stom
Co ust &
Co ust &
Re ine
Re ine
en
en
Ex ra
Ex ra
pli
pli
e
e
s
s
pe
pe
Op
Op
m
m
Cu
Cu
Bu
Bu
Tr
Tr
3D printing Internet of Things
Geo-location
Streaming analytics
technologies
Smart Machines
Advanced Robotics
Quantum
Computing
Maturity
Brain-Computer Interface
Mainstream
Autonomous Memristors 5G Early adoption
Vehicles
Cognitive Computing Biocomputer Adolescent
Swarm Computing Emerging
Internet of Everything
Self-Adaptive Security
3D Printing Exascale
Privacy-Enhancing
Technologies
Ubiquitous PIM
SDx
Blockchain
Insight Immersive Fabric-Based Computing
Platforms Experience
Wearable Computing Virtual Assistants
Deep Natural User
Interfaces Context Broker
Learning Semantic
Technologies
Digital Workplace
Edge Computing Distributed
Web-scale Trusted Devices Social Networks
Computing
Wireless Power
LPWAN
WebRTC
In-Memory Computing Location-Based Plastic Transistors
Cloud Service Services NG
Containers
Integration
Advanced Data Visualization IPv6
Biometrics Digital Signage
NFC Open Source Hardware
The radar diagram provides a pictorial view of our findings, allowing you to quickly understand how disruptive emerging technology is
likely to be and the actions you might consider taking. Polar co-ordinates depict the likely time to impact your business along with the
potential size of the impact, while colors represent the current maturity of each topic.
160 #AscentLookOut
Tech trends
Each trend has been analyzed from three perspectives: potential size of impact on your business;
likely time to impact your business and maturity.
around one to two milliseconds, enabling more natural ways to understand patterns will be democratized through mainstream
innovations such as the connected car and relationships in complex data sets. solutions.
• Expected to improve wireless capacity Many solutions also enable interaction with • Data sets are no longer static and, as
1,000-fold and, as such, deliver the these data sets (manipulating the data and such, being able to visualize and explore
capacity needed for mobile video changing viewpoints, for example), allowing real-time (or quickly evolving) data sets is
streaming, video conferencing and more us to explore them in more depth, reveal useful and sometimes necessary.
• Projected to save up to 90 percent on hidden relationships, find relevance among • The paradigm of the data warehouse
energy, mainly from the radio access a large number of variables and more. is progressively becoming obsolete: as
network the volume of available data increases,
• Forecast to connect more than seven We also need a means to explore the rather than digging into three years, three
trillion wireless devices serving over massive volumes of near instantaneous months or even three days of historical
seven billion people in the IoT data provided by our increasingly data, we will need to explore massive
• Accelerates new service time-to-market, connected world. With a growing number amounts of nearly instantaneous data.
potentially reducing the average creation of data sets no longer static, advanced
time cycle from 90 hours to 90 minutes dataviz solutions enable the visualization Issues
and exploration of rapidly-evolving real-time • High interactivity visualization can be
Evolution data sets. quite complex, demanding very specific
• Current research is focused on the 5G knowledge.
network’s architecture, functionality and In some cases, visualization can go • Even as tooling improves, data
capabilities. beyond the 2D screen, providing a 3D visualization is still relatively low-level and
• First 5G deployments are expected representation within augmented and/or often requires some degree of coding.
around 2020. reality environments or even immersive • Badly used or understood, visualization
• In the meantime, legacy 4th generation 'caves'. can provide incorrect outcomes and
LTE technologies are continuing to evolve, misdirection.
offering a fully IP-based, integrated system Applications
providing high speeds indoors and • Scientific computing
outdoors, with premium quality and high
Advanced Robotics
• Engineering
Concept
security. • Finance
Definition
• LTE-A (LTE Advanced), for example, offers • Health
The field of robotics is gathering a lot
increased speeds, performance and • Pharmaceuticals
of momentum, thanks to advances in
capacity along with higher densities than • Big Data projects
artificial intelligence (AI) and computer
its predecessor. • Social network diagrams
vision (artificial vision computer systems
• Geographical diagrams
implemented in software and/or hardware
Issues
that are able to perceive, process and
• Various regions around the world Trajectory
understand visual data such as images and
are currently competing to lead 5G Impact
videos).
standardization activities. • Improves decision-making, particularly in
• 5G must accommodate a wide range enterprises
Today's advanced ‘intelligent’ robots are
of use cases from diverse verticals, • Extends the work done by the Data
autonomous and able to make informed
each with advanced requirements Scientist
decisions around their own actions. They're
around latency, resilience, coverage and
also increasingly connected, able to interact
bandwidth. Evolution
with their environment and other smart
• These use cases need to be considered • Initially, visualizations were limited to
machines as part of the Internet of Things.
in the early phases of the standardization specific types of business charts provided
Not necessarily humanoid, today's robots
process and, as such, non-Telco by productivity and Business Intelligence
are mostly machines or even vehicles, such
companies (automotive, IT services, (BI) solutions.
as autonomous cars.
consumer goods, health and others) need • Big Data increased the need for intuitive,
to be included too. visual ways of traversing content. As such,
Applications
• 5G is a combination of diverse many of today's BI products now include
• Industrial processes — such as for
technologies, the maturity of which will be advanced data visualization capabilities.
repetitive tasks or precise guidance
varied when 5G is first deployed. • Open source data visualization tools are
• Services and knowledge workers
progressing quickly, but often basic and
— including at work, in public or in
less user-friendly.
hazardous environments
A • Data visualization could evolve
significantly with advances in human-
• Surveillance — particularly in harsh or
dangerous environments
computer interfaces. Immersive systems
• Fire prevention — including detection and
Advanced Data Visualization that include advanced 3D graphics, for
extinguishing
Concept instance, are already being employed
• Industrial inspection — such as network
Definition in the astronomy and health science
repairs
As the volume of data grows, we need fields as well as for analysis of complex
• Cleaning, sorting and delivery — of mail,
ways to easily grasp its implication. Visual economic data, such as on the stock
for example
representations (data visualization market.
• Robotic doctors — allowing doctors to
technologies or dataviz) are one of the • In time, advanced data visualization tools
162 #AscentLookOut
Tech trends
diagnose, and even operate on patients Issues • Agricultural transport — such as for crop
from a remote location • The media's portrayal of ‘robots’ often monitoring and cattle control
• Care — including of elderly people presents a distorted view of the truth. • Military transportation and surveillance —
• Autonomous vehicles — such as self- • "Moravec's Paradox" is still true: robots especially in dangerous environments
driving cars are very good at complex tasks, but fail
• Spacecraft — including planetary (sometimes quite miserably) in day-to-day Trajectory
navigation tasks, such as climbing stairs or opening Impact
• Agriculture — including sheep-shearing doors. • Reduces the number of accidents caused
• Social, entertainment, sports or even • Staff may resist as robots' role moves by human error
teaching from facilitating human labor to • Optimizes the number of vehicles on the
supplanting it. road
Trajectory • Connected robots, like other connected • Accelerates point-to-point logistics
Impact devices, are raising concerns around • Minimizes risk in military and other
• Improve safety by replacing workers privacy. dangerous scenarios
in dangerous activities, such as fires or • In personal scenarios, such as situations • Extends transport to those unable to
nuclear power plant accidents relating to health and finances, people drive, including children, seniors and
• Increase efficiency with AI systems prefer a human touch. individuals with disabilities
recognizing, learning and optimizing • Badly designed smart machines that • Makes expensive services, such as aerial
otherwise imperceptible mathematical don't function as expected could photography, affordable
patterns to maximize efficiency and potential bring about serious unwanted • Offers alternative to current means of
minimize cost consequences. transportation
• Maximize productivity as robots do • Industry experts and scientists are • Opens up new opportunities for novel
not tire and can, therefore, maintain concerned about the consequences of services based on collaborative uses
a consistent level of performance reaching the Technological Singularity — • Expected to have transformational
indefinitely the point where machines would be more impact in automotive, insurance, energy,
• Reduce cost as the only outlays required intelligent than humans. health, defense and city planning
are the initial purchase price and • Projected to have greatest impact
subsequent maintenance once vehicles are fully automated as
• Enhance flexibility by rapidly adapting to
Autonomous Vehicles
mutualization will be much easier
Concept
constantly changing work environments
Definition
• Improve customizability by taking the Evolution
Autonomous vehicles is an emerging
form factor most suited to the job • The long-term goal is for fleets of
field arising from the interaction of
autonomous vehicles to complement or
transportation vehicles and robotic
Evolution even replace traditional, human-manned
capabilities that include environmental
• Robotics has a long history, mainly vehicles.
sensors, context awareness and
related to factory automation. • Though still very active in their R&D
autonomous decision-making using
• Advances in AI, improved connectivity phase, these companies are already
artificial intelligence. These self-driving
and distributed computing models (cloud) testing autonomous vehicles.
vehicles rely on these technologies to
brought new life into the field. • The main R&D focus is around helping
enable them to drive themselves while
• Robots are becoming smarter, moving drivers reach their designated destination
recognizing and responding to their
beyond doing repetitive tasks in factory effortlessly, though they also want to
surrounding environment.
scenarios to making informed decisions ensure drivers feel satisfied and safe.
around their actions. • Governments are beginning to play a
Major players in this space include both
• Many large planes are now essentially more active role, crafting regulations and
automotive and technology companies,
robots, flying themselves with pilots only providing funding for R&D.
who are both competing and/or
really needed to reassure passengers. • Wide adoption is predicted to be around
collaborating.
• Japan has historically pushed robotics to 2020, but that may be a bit optimistic.
compensate for both a lack of workforce
Applications
and increasing dependence as its Issues
• Personal transport — including the
population ages. • Cost: Sensors used in autonomous
autonomous (and semi-autonomous) cars
• New entrants, including Google with its vehicles, such as the LIDARs that
created by Google and Tesla
expertise in AI, are betting on advanced illuminate the surroundings with a laser
• Industrial surveillance and transport —
robotics. and analyze the reflected light, are still
especially in harsh, wide or difficult to
• New use cases, military drones for expensive.
access environments such as mines,
instance, are becoming increasingly • Complex environments: The variability
pipelines or traffic jams
important and their profile is rising. of conditions (weather, environment and
• Urgent, specialized transport — including
• We may one day see a war fought by other actors) is extraordinarily complex.
aerial drones for search and rescue
robot armies. • Testing: Tests are very promising, but
• Unmanned parcel delivery drones — such
• The future will likely see robots gain social have mostly been carried out under
as those created by Amazon and Google
intelligence, artificial emotions and more controlled conditions.
• High-volume logistics — including
natural interaction. • Safety: Safety requirements are very high
autonomous lorry platoons with just one
since human lives are at risk.
driver controlling several vehicles
• Regulations: Regulations for autonomous
B biochips.
• A few years ago, Stanford University
• Enhancing consumer device security —
particularly for smartphones
made the final component needed • Providing strong security in defense or
Biocomputers to build biocomputers available by homeland security scenarios — including
Concept developing the first biological transistor, detecting suspects at borders and crowd
Definition called ‘transcriptor’, using DNA and RNA. control
Biocomputers are computers that use • In February 2016, parallel computation
biological materials such as DNA and was achieved in protein filaments with Trajectory
proteins to perform computational biological agents. Impact
calculations that involve the storage, • Biocomputers may offer some interesting • Enables strong authentication since
retrieving and processing of data. They applications in the future. biometrics are unique and difficult to
leverage the capabilities of living beings, reproduce
relying on nanobiotechnology to engineer Issues • Provides advantages over passwords
biomolecular systems that provide the • Today, biocomputers are still a very for access control and security systems
computational functionality. prospective field of research. since biometrics don’t require any
• Despite being able to execute a high memorization
Applications number of multiple parallel computations,
• Performing living processes — based the DNA-computer biocomputing Evolution
on complex biomolecular interactions approach has a slow processing speed • Some biometric systems, including
involving biomolecules coded by our with a response time that may be hours fingerprint scanners, have a long history
DNA or days, rather than milliseconds. behind them.
• Providing advanced bio-templates for • Biocomputing results are much harder • Advances in both sensors and
bacterial and viral analysis — sparking to analyze than results from a digital recognition software meaning false
other biomechanical technologies since computer. non-match rates (that disturb legal users)
it's currently the only self-replicating • There is growing public concern around and false match rates (that are a security
computing technology we know of biocomputers' relationship with genomics risk) are improving — though there's a
• Executing calculations that require and, as such, the potential for biological trade-off between cost, response time,
extreme parallelism — which can be catastrophes. convenience and reliability.
achieved by billions of molecules • Local use of biometric systems in trusted
interacting simultaneously with each Biometrics personal devices is now more acceptable.
other Concept • Also driven by the reducing cost of
• Solving problems that cannot be Definition biometric systems combined with their
deterministically solved in polynomial Biometrics refers to the detection and integration with authentication and
time measurement of specific measurable authorization standards in software,
• DNA shows promise as a mechanism for human characteristics. These can be biometrics are gaining popularity in end
long-term storage of information used, with a certain degree of certainty, to consumer devices.
differentiate individuals. Accuracy can be • Advances in artificial vision are improving
Trajectory further improved by combining several biometrics based on pictures or video —
Impact different biometric mechanisms into including facial recognition.
• May offer an alternative to silicon-based ‘multimodal biometric systems’. • Behavioral or passive biometrics exploits
systems — potentially faster, smaller dynamic characteristics — including
and more energy efficient for some Well-known examples include fingerprints, keystrokes, mouse moves and even
specialized problems retinal blood vessels, iris recognition and complex body movements such as gait —
• Potentially offering massive parallelism, voice recognition, though there are many enabling continuous authentication.
massive storage and high levels of other human characteristics that can be • Future trust and compliance models
artificial intelligence alongside low waste used to identify an individual and may be will likely leverage a combination of
and low energy usage useful in certain situations. These include biometric-based security and new smart
• May also provide a whole new field of heart rate and walking pace. And while phones capabilities in the never-ending
innovation in healthcare and life sciences DNA provides the ultimate biometric, DNA quest to ease access control.
— such as detecting cancerous activity analysis currently takes too long to make it
within a cell and releasing an anti-cancer a viable option at this moment in time. Issues
drug upon diagnosis • Biometrics requires specialized
equipment for capturing the biometric
characteristics.
164 #AscentLookOut
Tech trends
• Recent advancements showed that collaboration between MES/MOM, ERP federation services — will ensure
EEG-based BCI can accomplish tasks on a and PLM systems seamless authentication and access
similar level to invasive BCI. • Industry — helping gas companies, control for information and services.
• It could eventually become one of the for instance, optimize extraction by They will use characteristics belonging
most advanced method for interacting enabling tight integration between the to the information requester — such as
with computers and devices. gas turbine manufacturer’s PLM cloud age, organization or citizenship — while
service, the company’s own private asset ensuring that proprietary or personal
Issues management cloud service and a sub- information is not spread unnecessarily.
• Invasive methods require complex surface analysis cloud service
medical procedures and may have • Enhancing information services — Issues
undesired side-effects. Ensuring a allowing organizations to augment their • Compatibility across services is
permanent connection with specific areas own services with public third-party still an open issue, compromising
of the brain is difficult as the connection services, such as weather or traffic further advance of inter-cloud service
may decay, for example. • Business continuity — reducing the cost provisioning. Cloud market leaders are
• Non-invasive EEG is still at the early of disaster recovery while enhancing yet to widely adopt any standardization
stages of research. flexibility and the agility efforts, but multi-cloud may be the market
• Brain activity is permanent and, as such, force that pushes that adoption, breaking
it's not easy to isolate significant signals. Trajectory down current vendor lock-in.
Non-invasive techniques will require Impact • Multi-cloud environments increase the
additional effort. • Helps companies balance functionality, complexity of service level agreements
• The brain is incredibly complex (more flexibility and investment protection since providers rely on diverse services
than 100 billion of neurons) and analyzing • Reduces cost by eliminating the need from a more complex cloud ecosystem.
patterns based on electric signals is for hardware to absorb peak demands, Existing contracts will need to be
really challenging and compounded with reducing overall management cost and analyzed and extended so chains of
individual differences. energy consumption contractual relationships can be
• Longer term, there may be ethical risks • Accelerates computing resource delivery automatically established across multiple
such as the potential for mind-reading while improving resource availability and and heterogeneous cloud providers.
and mind-control. optimizing resource utilization • Multi-cloud environments will need virtual
• Helps small and medium cloud networks to be set up across multiple
companies handle peak-loads, acquiring cloud providers. Yet poor network
166 #AscentLookOut
Tech trends
Applications • Digital signage is moving into the cloud server administrator. Their peer-to-peer
• Advertising — including offering and the Internet of Things (IoT). It will operating model and focus in privacy
promotions and encouraging return visits soon be able to interact with beacons, means they tend to be focused in specific
• Entertainment — at theme parks, sensors and wearables. scenarios.
museums, cinemas and more • Artificial intelligence and Deep Learning
• Displaying information — such as news, are being explored to allow digital signage Applications
weather, directions, traffic, pricing, to help and interact with users better. • Privacy-oriented communities of interest
menus, programs and even emergency • Transparent screens that include LCD • Ephemeral or temporal communities
information displays are emerging. When the screen • Inter-organizational communities
• Improving visibility — including offering is turned off, the glass looks like a window;
the shopper all variants of an article in the turn on, the image appears. Trajectory
virtual store • Glasses-free 3D and holographic images Impact
• Enhancing the retail experience — are emerging, but with limited traction so • Eliminate the risk of being locked into an
allowing the user to try new garments far. integrated solution
virtually (when combined with • Screens that are bendable and can, to a • Provide better control on the data
augmented reality) certain degree, be adapted to different exposed through social networks,
• Providing information — in kiosks and shapes are a subject of intense research. enhancing data security and privacy
vending-machines These flexible screens rely largely on • Make creating business revenue difficult
existing OLED (organic light emitting since personal data is owned by the end-
Trajectory diode) or AMOLED (active matrix light user
Impact emitting diode) technologies.
• Offers a more flexible alternative to signs Evolution
and posters Issues • Domination of integrated social networks
• Increases the effectiveness of signage • The domain is still young. What effective such as Facebook led to worries about the
• Improves the user experience through digital content looks like and what the control of personal data and the monetary
the interactivity it provides key success factors are is not yet fully interest of social networking companies.
• Makes an entertainment experience understood. • Startups, such as Diaspora, proposed
more exciting • Equipment is more expensive than distributed models, standards and
• Can be updated easily and instantly, and conventional displays; although cost has protocols to guarantee data ownership
managed remotely and centrally to be balanced with benefits. to users, evolving established standards
• Allows content to be dynamically adapted • Delivering a multi-channel experience in the digital identity, instant messaging,
to the context and the audience increases implementation and integration telecommunications and web worlds.
• Enables richer, immersive user risk and complexity. • However, these initiatives struggled to
experiences through advanced multi- • Rich content and rich immersive and grow significantly to compete with the
touch, 3D rendering engines and responsive user experiences add established giants.
responsive designs additional complexity and cost. • Diaspora, for instance, still exists as a not-
• The growing variety of devices and for-profit, open source project.
Evolution their diverse form-factors and operating
• Early digital signage used video systems is also increasing complexity. Issues
projection or LED walls to deliver digital • DSNs are still heavily influenced by their
content but was costly and there were Distributed Social Networks background and lacking in maturity and
issues with visual quality. Concept standards.
• Digital signage moved from simple Definition • Knowledge sharing and the sense of
information displays to interactive and Distributed social networks (DSNs) refer to discovery, the most important elements of
immersive devices. social networking platforms developed by social networking, have been exchanged
• Large flat, high-definition screens (plasma, social network initiatives and operated in a for privacy.
LCD) have boosted use of digital signage. federated and distributed mode. Many such • The censorial workload users encounter
• Kiosks and digital signage are converging projects are federated under the ‘federated doesn't facilitate inclusion.
and quickly becoming an integral part social web’ banner. • Where large communities do exist,
of the omni-channel digital experience, migration from existing networks is likely
particularly within retail. Critical social networks functions (such as to be slow.
• Convergence with mobile applications personal information sharing, messaging, • There is additional competition coming
and augmented reality will provide an relationship management and content from emergent communication
even more interactive and personalized sharing) are enabled by emerging open technologies, such as messaging
user experience as rich and interactive standards and protocols. platforms.
content becomes increasingly important. • Legislation around consumer privacy
• Analytic capabilities are being Although DSNs may have similar use might make existing social networks
incorporated. These measure the clicks, cases to centralized social networks, they adjust their attitude, eliminating the need
navigation and interactions that help have a stronger emphasis on privacy and for DSN.
retailers maximize impact and improve control of personal data. Many try to ensure • Finding a healthy DSN business model is
the user journey. (personal) data is owned by the end-user not easy since personal data cannot easily
rather than under control of the system/ be harvested and used to make money.
170 #AscentLookOut
Tech trends
I
• In the US, exascale research is supported • Enabling the fully software-defined data
by a National Strategic Computing center with its improved agility and
Initiative (NSCI). reduced time-to-execution
• In Japan, the RIKEN Advanced Institute • Addressing the sometimes near-real-time Immersive Experience
for Computational Science is planning an demands of Big Data and contextual Concept
exascale system for 2020. smart mobility Definition
• China has also strong ambitions in An immersive experience is one that is
exascale Trajectory totally absorbing, that allows users to
Impact disconnect from the real world and lose
Issues • Provides a fully-meshed physical network themselves in a simulated dimension.
• Exascale is dependent upon a new upon which the software-defined data Immersive experience technologies
generation of supercomputers for tackling center can define its services encompass a wide range of devices that
its four main challenges: • Provides the high levels of granularity assist in making the experience more
-- Power consumption needs to be needed to adjust resources to perfectly absorbing and, by doing so, make the
reduced. match requirements technologies more invisible to the user.
-- Compute will need to be able to cope • Aims to address problems that inhibit These include:
with massive data pools, rising from full-scale virtualization of the entire data • 3D displays — display devices that create
petabytes to exabytes. center the perception of depth
-- Application performance, with a tens • Reduces the number of physical changes • Haptic devices — which add the sensation
of millions-way parallelism, needs to required and decouples them from of touch
be accelerated. service provisioning • Holographic user interfaces — laser-based
-- Systems will experience various kinds • Allows deployments and configuration volumetric displays where users interact
of faults several times a day because changes to be executed in near real time with holographic images
of their massive number of critical • Means IT resources can be rapidly • Virtual reality (VR) — digital simulations of
hardware and software components. aligned to changing business demands real world environments
Self-healing system (resiliency) are • Optimizes performance and power
required. consumption Applications
• A new generation of massively parallel • Expected to increase overall resource • Entertainment — including movies, TV
software is also needed to extract more utilization to over 80 percent on average and gaming
parallelism, handle increasingly hybrid • Reduces cost through better resource • Health — used by surgeons and
configurations and support greater utilization and automation radiologist and to ease remote operations
heterogeneity.
172 #AscentLookOut
Tech trends
• the heart of future digital strategies, as Sensors and actuators vary in size and • Companies must decide what data to
organizations' digital nervous systems price, with some available on a microscopic store and how to store it, ensuring they
scale. As such, they can be embedded into have sufficient storage for both personal
Evolution many different objects and deployed in data (consumer-driven) and Big Data
• At an early stage of their development, many different environments — including (enterprise-driven).
insight platforms are considered a critical adverse environments in remote locations. • IoE will significantly increase demand
technology for the future. Sensors may include capabilities such on datacenter resources and may
• For prescriptive analytics in particular as GPS, RFID, Wi-Fi or internet access. even mean data processing, network
they will increasingly leverage the Some are even capable of detecting the connectivity and network bandwidth
learning capabilities of cognitive approximate location of other nodes. need to be re-architected.
computing. Examples include heart monitoring
• These platforms are expected to be implants, biochip transponders on farm IPv6
embedded within large-scale solutions, animals, electric clams in coastal waters, Concept
such as IoT and Industry 4.0, while also automobiles with built-in sensors or field Definition
available as customizable platforms. operation devices that assist fire-fighters in IP (Internet Protocol) is the main
• Both independent software vendors and search and rescue. communication protocol underlying
Open Source communities will provide networks such as the Internet. IPv6 (version
components, while integrated solutions Applications 6) was designed in the 1990s as the
will come from integrators and SaaS • Automating operations successor to IPv4.
providers. • Monitoring asset health, wear and location,
traffic or the environment IPv6 includes adjacent features, such as
Issues • Enhancing healthcare address assignment, network renumbering
• A broad set of capabilities are needed for • Providing surveillance and security, and auto configuration. It addresses some
building these platforms: including early warning systems of the shortcomings of IPv4 by providing
-- Advanced ability to collect, aggregate • Acquiring information about movements support for multicast, manages of mobile
and clean data from billions of sensors and/or terrain parameters data traffic more efficiently. Additionally,
in real time • Managing energy or water usage IPv6 embeds several configuration and
-- Extreme computing power to analyze discovery mechanisms that were added to
and create meaning from Exabytes Trajectory IPv4 after its standardization.
of information on the fly or for rapid Impact
simulation • Provides large amounts of data for analysis, Applications
-- Advanced algorithms for automated enabling businesses to make better- • Real-time networking — as required by
or human decision-making informed decisions. autonomous vehicles, remote tele-surgery,
-- Real-time orchestration of prescriptive • Ensures data availability by automatically industry automation, video-streaming and
insight to action, strong embedded rerouting data in the event of a node failure voice over IP, overcoming the artificial
security to optimize availability. bottleneck imposed by IPv4on many of
• Large enterprise platforms will often • Enables numerous value-adding services these use cases
need to be customized for corporate and across healthcare, retail, city management • Mobility — providing unlimited scaling at
government specific processes. and more. routing level, with 5G mandating IPv6 as
critical
Internet of Everything Evolution • Internet of Everything — providing nearly
Concept • The concept of the IoT first became unlimited addressing
Definition popular in the late 1990s as a follow-up of • A platform for innovation — since it
The Internet of Everything (IoE) is a ubiquitous computing. performs better, is simpler and easier to
ubiquitous communication network • The development and cost reduction deploy than IPv4
that effectively captures, manages and of wireless and mobile networks and
leverages data from billions of real-life low-power micro-controllers, which Trajectory
objects and physical activities. It extends progressively made it possible to connect Impact
the Internet of Things (IoT) by also anything to the internet, brought the IoT • Allows more connected objects to
including people, processes, locations and to life. connect to one another outside the span
more. • While it was initially most closely associated of a local area network
with machine-to-machine in manufacturing, • Is vital for the sustainability of the internet,
Networks of spatially distributed energy and utility industries, its now covers mobile internet and IoT-related business:
sensors and actuators (nodes), each a much broader, nearly universal scope. -- A 128-bit address space means the
with a transceiver and a controller for • Projections predict 100 trillion connected number of possible IP addresses
communicating within a networked devices in the world by 2030. As such, increases from a few billion with IPv4
environment, detect and monitor events broader adoption of IPv6 is required to to 340 trillion trillion trillion addresses
(sensors) or trigger actions (actuators). overcome the IPv4 addresses scarcity. (36 trailing zeros).
Each has a unique identifier and the ability -- Addressing is basically free, which
to transfer data over a network without Issues is particularly important for IoT
human-to-human or human-to-computer • Security, privacy and trust must be deployments where the number of
interaction. considered in developing IoT/IoE objects to address may be very large.
solutions.
174 #AscentLookOut
Tech trends
• Includes hierarchical addressing, IPsec wide array of sources, including global buildings. Integration with indoor
authentication and security, and improved positioning satellites, beacons, Wi-Fi positioning is required to ensure
ability to carry multimedia data. hotspots, remote sensors and visible light continuous positioning.
• Simplifies administration and eliminates communication (VLC) sources such as Li-Fi. • Accurate indoor positioning requires
the need for workarounds such as Visualization technologies allow companies specific equipment.
Network Address Translation (NAT). to extract insights from this spatial data. • Spatial analytics consume a vast amount
of computing resources.
Evolution The most basic use cases push content • When it comes to targeted marketing,
• IPv4 was deployed in 1981 and IPv6 in or activate or deactivate functionality insights such as past behaviors,
1999. based on geofences or address lists. More preferences, needs and situations are
• The IPv4 address space became advanced spacial (3D) analytics uses a needed to deliver relevant messages to
completely allocated in February 2011. user’s or an object’s exact geographical individual customers, however, the more
• Tunneling mechanisms and gateways position to deliver contextualized accurate the technology, the lower its
were standardized by the Internet information and services reach.
Engineering Task Force (IETF) to bypass • In addition, smart contextual messages
IPv4 limitations and deal with the IP Applications can be difficult to deliver at scale.
address shortage. • Identifying and understanding assets and • Proximity-based marketing and in-store
• Migration to IPv6 has started in many customers — anything from simple store location tracking are already raising
different areas, mainly on central locators to real-time displays of delivery privacy concerns.
infrastructures, though the uptake of pure driver locations or dense pipe networks
IPv6 is taking longer than expected. • Securing sensitive data — through LPWAN
• The fraction of IP traffic using IPv6 is still geofences Concept
significantly lower than IPv4: around 26 • Enabling local experiences — such as Definition
percent of US applications are IPv6 native triggering an offer when a customer Also referred to as ultra-narrowband,
and 10 percent of Facebook's global traffic enters a store Low-Power Wide-Area Network (LPWAN)
uses IPv6, for instance. • Studying sound propagation, lighting wireless communication technology has a
• Some of the networking community are (shades) or rain flow low power requirement and a long range,
advocating a global switch. but a low data rate.
• The number of applications is growing, Trajectory
increasing the need for the IPv6 protocol. Impact LPWAN was designed to enable objects
• Improves customer intimacy as that don't have a powerful source of energy
Issues customers come to expect contextual to be connected, primarily to the Internet
• The transition, which was announced products and services based on their of Things (IoT). After all, most objects
in 1995 and supposed to last until year current location connected to the IoT only need to transfer
2000, has been much slower than • Drives innovation beyond the industries small amounts of data, such as commands
expected. that have traditionally used GIS and statuses, and that operation only
• Although support for IPv6 in major • Increases brand preference by delivering requires a small amount of power.
operating systems facilitates this personalized customer experiences
transition, many legacy devices cannot be • Increases revenue by enabling more Applications
updated to support IPv6 and will not be effective marketing that influences • Metering — gas and water in particular
replaced overnight. purchasing decisions • Monitoring — including waste, parking,
• Technologies such as Carrier-Grade land, livestock, forests and pipelines
NAT and recent regulatory moves are Evolution • Tracking — items such as containers,
helping IPv4 survive, thus harming the • Big Data technologies have made the bicycles, pets, indoor assets
deployment of IPv6. storage and processing of large spatial • Fault signaling — such as with smart
data sets economically feasible and home appliances and alarms
scalable. • Control — street lighting and plant
• Cloud has made augmenting solutions machinery for instance
L with location-based context simpler.
• New tools are making spatial analytics Trajectory
more widely available. Impact
Location-Based Services NG • The popularization of smartphones, as • Allows millions of objects to be
Concept well as glasses and other wearables, will connected at low cost
Definition strengthen this market. • Are a simpler and more effective
Geographical information systems solution for IoT than traditional cellular
(GIS) capture, store, analyze and display Issues networks, which were designed for high
information referenced according to its • Location technologies in general, and performance data transfer
geographical location. The next generation beacons in particular, are immature.
takes the third dimension into account. This • Traditional location technologies only Evolution
3D (spatial) representation provides a much provide a sufficient level of accuracy • Early LPWAN adopters first appeared in
more realistic representation of the world. on the third dimension when they are 2014.
combined. • Country and global-sized networks are
Spatial data can be gathered from a • GPS is generally unusable within already being deployed.
• Waste monitoring and telemetry systems, • Could outperform traditional computers and finger
whose refresh period is between one at a fraction of the energy cost as • Haptics — digital feedback mimicking
and four measures per day, are already compact neuromemristive systems physical sensations
working with LPWAN solutions from LoRa • Adaptive interfaces/emotion tracking
or Sigfox. Evolution — changing layouts and elements in
• Remote surveillance operators have • First coined in 1971 as a name for a response to the changing context or
started using LPWAN to monitor alarm theoretical passive electrical component needs of the user
systems as a more reliable alternative to to supplement the resistor, capacitor and • Relational awareness — devices that, as
GSM. inductor. an agent for the user, are aware of where
• Although expanding quickly, geographical • The first physical example was created the user is in relation to other people
coverage is still limited. in 2008, paving the way for concrete • Affordances — providing a digital
• LPWAN is expected to become applications. representation of a physical object that
mainstream around 2017. • Experimental organic neural networks allows the user to take advantage of all
based on polymeric memristors are being the things they already knows about how
Issues created. to use that object
• There are currently multiple LPWAN • 3D displays — display devices that create
standards and this is impacting Issues the perception of depth
interoperability. • Memristors are still experimental. • Holographic user interfaces — laser-based
• For the IoT to really take off, LPWAN volumetric displays where users interact
modem cost needs to drop below $1, with holographic images
provisioning below $2 and data cost to
zero. N • Physical controls — where physical inputs
are translated into digital outputs
M Concept
Definition
• Voice control — using language to access
a large set of commands
Natural user interfaces (UI) are systems • Conversational agents — allowing users
Memristors designed to make human-computer to interact without prior knowledge of a
Concept interaction feel as natural as possible. system’s commands
Definition This wide range of technologies allows • Audio channels — opening up novel
Memristors are non-linear, passive electric the user to leverage everyday behaviors, channels for data transmission
components that have a resistance that intuitive actions and their natural abilities • Collaboration — allowing multiple users to
varies according to the history of the to control interactive applications. These controlling the interface simultaneously
flow of electric charge through them. The might include touch, vision, voice, motion • Utilizing three dimensions — providing
component's resistance reflects this history, and higher cognitive functions such as a more direct connection to content by
hence its name combining "memory" and expression, perception and recall. taking advantage of depth in movement
"resistor". • Monitoring physical movements —
Some natural user interfaces rely on helping systems (and users) understand
Memristor-based memory is non-volatile, intermediary devices while other more more about themselves in order to learn
with a density higher than 100 terabytes advanced systems are either unobtrusive — and adapt
per cubic centimeter, high speeds and low or even invisible — to the user. The ultimate • Audio security — providing identification
power requirements. goal is to make the human-computer and authentication through voice
interface seem to disappear. Examples signatures
Applications include: • Visual security — providing identification
• Providing advanced memory technology • Augmented reality — adding an additional and authentication through visual images
such as non-volatile random access intelligence layer on top of natural life • Biometric security — providing
memory • Virtual reality — providing an immersive identification and authentication through
• Delivering fast, compact and low-power digital representation of a real or other biometrics
neuromimetic elements since memristors imaginary environment
function using a continuous range while • Mixed reality — merging of real and virtual Trajectory
transistor-based logic only knows zeros worlds to produce environments where Impact
and ones physical and digital objects co-exist and • Reduces complexity for users with user
• Implementing neuroplasticity by forming interact in real time interface design incorporating more and
neuromemristive systems, a variant of • Neuro interfaces — enabling a direct more of the components needed to make
neuromorphic computers communication pathway between the user interfaces as natural as possible
brain and an external device based on • Decreases the level of user training
Trajectory neural activity generated by the brain needed, with training mainly focused
Impact • Virtual retinal displays — images on domain knowledge rather than
• Allow neural networks to move from broadcast directly onto the retina, interacting with the interface
computer simulations and onto their own effectively augmenting the real world • Allows computers and human beings
physical implementations • Body monitoring — reading body to interact in diverse and robust ways,
• Have a longer term potential in language with gestures beyond the hand tailored to the abilities and needs of an
neuromorphic systems individual user
176 #AscentLookOut
Tech trends
• Enables complex interactions with digital check-out coupled with short lifecycles, may lead
objects in our physical world to infrastructure assets being refreshed
Trajectory without NFC as the primary mobile
Evolution Impact strategy.
• The first attempts at natural user • Standardizes and facilitates the
interfaces aim to provide an alternative integration of contactless communication
to a command-line interfaces (CLI) and
graphical user interfaces (GUI).
in end-user electronic devices:
-- Extending the functionality of those O
• Attention later turned to developing products
user-interface strategies using natural -- Making them interoperable with Open Source Hardware
interactions with the real world. existing contactless infrastructure Concept
• Touch and voice recognition are now • Dematerializing tickets, coupons, badges Definition
increasingly appearing next to the more and cards The open source hardware model extends
traditional mouse and keyboard. • Making payment more convenient, with the ideas and methodologies popularized
• Interfaces have also begun to incorporate NFC wristbands gaining popularity in in open source software development to
gestures, handwriting and vision. micro-payments and tap-to-pay travel hardware development. Documentation —
• May allow technology companies to including schematics, diagrams, list of parts
Issues disrupt the payment/transaction value and related specifications — are published
We don't yet have the complex chain with open source licenses so other teams
technologies needed to make truly natural • Could enhance privacy in the future can modify and improve them, based on
and seamless interfaces. smartphone applications specific needs.
Evolution • Printable computer circuits users are keen to allow some services to
• Initially primarily initiated by the open • Transparent circuits leverage, but only provided some privacy is
source community. • Wearable computing respected.
• Traction in the enterprise world — from • Smart bandages
both industrial users and hardware • RFID tags As such, PETs reach beyond the
vendors — is increasing. • Plastic solar cells technologies traditionally dedicated to
• Interest is expanding across diverse preserving data confidentiality (such as
industries — including processors, servers, Trajectory access control and encryption); they also
3D printing and prototyping, ambient Impact encompass technologies and techniques
information devices, mobile phones, • Provides the flexibility that allows for ensuring data usage is limited to the
notebooks and robotics. computing abilities to be added to purposes intended or protected, including
• There is a great deal of interest in dynamic environments including clothes, homomorphic encryption, data masking,
emerging countries. tight enclosures and organic tissues anonymization and pseudonymization.
• Open source hardware is expected to • Integrates easily with other additive
continue to evolve in three directions: manufacturing methods, such as 3-D Applications
-- Supporting hardware innovation and printing • Commerce, finance, Telco, public services
standards development • Enables the low-cost volume fabrication and healthcare — any domains where
-- Guaranteeing long-term maintenance that is essential for widely distributed customers leave sensitive personal data
capabilities solutions such as RFID tags • Social media and networks along with
-- Creating low-cost devices and collaborative services — also domains
infrastructures, including network Evolution where customers share selected data to a
infrastructures • Basic R&D around organic electronics selected audience
began during the last quarter of the 20th • Personal employee data
Issues century.
• Business models are adapted to core • OLED screens and printed RFID Trajectory
technologies, where users and vendors tags are widely deployed today and Impact
have a mutual interest in sharing popular in consumer devices, including • Gives individuals the confidence to share
innovation, fostering standards and smartphones and e-readers. or trade access to their personal data for
minimizing cost. • Other organic electronic technologies digital services
• Certification, which beyond small project look very promising for cheap and • Enables new data monetization business
communities, is required for many uses durable solar energy panels. models while ensuring compliance to
— security or radio electric interference various data protection legislations
certification, for instance Issues • Mitigates the financial and legal risk linked
• Fabrication occurs in small batches • Poor electronic efficiency, when to regulation violation
in small projects making for low cost- compared with traditional electronics, • Supports Corporate Social Responsibility
efficiency. may impact some use cases.
• Intellectual property issues could block • In some domains, including health-related Evolution
some developments. devices, safety issues may limit adoption. • Early work started in the mid-1970s, with
• For the technology to really take off it the birth of the concepts of anonymity
needs to be properly integrated with and unlinkability.
178 #AscentLookOut
Tech trends
Q
were invented around the millennium. a wide variety of aspect of an IT system
• The first commercial systems based on including networking, compute, storage,
quantum technology (D-Wave) reached management, security and more.
Quantum Computing the market around 2010.
Concept • Though the current practical Applications
Definition implementation of quantum computers • Software-defined networking (SDN) —
Quantum computers are computation is limited to a few dozens or hundreds of where a programmable remote controller,
systems that use quantum-mechanical qubits, rapid development is underway. which is decoupled from the physical
phenomena (such as superposition • Big internet companies (such as Google) network devices, forwards the data
entanglement) to execute operations on recently began testing quantum-based through the network.
data. Built over the basic element of the technology. • Software-defined compute (SDC or
qubit (which is in a quantum superposition • The U.S. National Security Agency, China virtualization) — decouples CPU and
of states, hence having multiple values and other governments are ramping up memory resources from physical
simultaneously), quantum computing's their quantum safe projects. hardware to create isolated software
main advantage is its ability to execute • Quantum computing (and other containers (virtual machines) that can be
some types of quantum algorithms quantum technologies) is expected run simultaneously in the same physical
exponentially faster than the best possible to become a flagship project for the server.
classical computing alternative. European Union. • Software-defined storage (SDS or
• Atos is among the very few companies storage virtualization) — decouples
These algorithms are currently undergoing in the world to work on quantum storage functions (including backup and
rapid development and could potentially computing, targeting both Big Data and recovery) from storage hardware with
one day break significant aspects of security applications. software automating and optimizing the
current technologies limitations in provisioning of the storage resources.
combinatory analysis. Applications range Issues • Software-defined datacenter (SDDC) —
from decryption to operational research, • Quantum computing poses a threat has all resources (including CPU, memory,
optimization, simulation (with quantic to conventional information security storage and security) virtualized and
models) and Big Data analysis (neural systems, requiring the development of delivered as a service.
networks). quantum safe cryptography before the • Network Function Virtualization (NFV) —
widespread use of quantum computers. combines SDC, SDS and SNS as a solution
Applications • Kaspersky’s Labs has dubbed the found within the Telco industry.
• Breaking cryptographic standards – unpreparedness for quantum attacks as
emerging quantum safe cryptography the ‘Cryptopocalypse’. Trajectory
aims to overcome this threat, deriving • Trained resources are scarce in this very Impact
new cryptographic methods able to resist complex field and often unconcerned • Raises the level of automation possible in
attacks by quantum computers about quantum computing's impact on infrastructure management.
• Trading – in the financial sector business or society. • Optimizes resource usage by making
• Recognizing patterns – in defense, • Quantum programming languages are resources easier to manage
homeland security, Telco, utilities and still very basic and require a different way • Enhances performance by enabling
insurance of thinking. dynamic, on-demand (re)allocation of
• Speeding up lead compound discovery – • Quantum logic is hampering resources
in the pharmaceuticals industry development on an engineering level. • Allows spurious changes of the resources’
• Accelerating simulations – in the chemical • The technology currently requires low state to be reacted to automatically,
industry and quantum physics temperatures, physical isolation and other improving availability
technical complexities that are currently • Reduces complexity and errors since
Trajectory more expensive than the computing itself. there is no need to understand details
Impact • There is uncertainty over the future around the underlying hardware
• Allows hugely enormous, complex performance of the wide variety of • Improves visibility of the status of
problems to be solved in a reasonable competing quantum computing resources, enabling the development
amount of time architectures. of more sophisticated control functions,
services and applications
• Allows traditional distributed control to Information and Event Management (SIEM) monitored and reacted to.
become logical and centralized technologies enhanced with machine • Seamless communication between
• Cuts cost by improving resource learning and prescriptive analytics. security devices is needed to ensure
utilization, opening up commodity Self-adaptive security also relies on new contextual information is shared across
hardware options and reducing system generations of context-aware security internal silos to enable the automated
maintenance time and effort technologies (including Identity and Access configuration changes that strengthen
• Reduces time-to-market for new products Management, network security, device and security and block attacks before they
and services smart machine security) that dynamically happen.
adapt to threats. • Self-adaptive security often relies on
Evolution human intelligence for confirming
• Standardization efforts are already Applications adaptive actions on the fly after
widespread and expected to continue to • Protecting information systems automated risk detection. This is vital for
evolve. belonging to boundaryless corporations avoiding any overreaction to false positive
• The SDN evolution, for example, and open business ecosystems signals, which may impact the business
is mainly being driven by the ONF • Offering better protection against the in unexpected ways (see Amplified
(Open Networking Foundation) while latest generations of threats, including Intelligence in the CxO agenda).
being embraced by the IETF (Internet Advanced Persistent Threats (APTs) • The increased focus on rapid detection
Engineering Task Force) and the • Adapting security strategies to the and response should not lead to
ETSI (European Telecommunications specific business challenges of individual decreased protection levels. Protection
Standards Institute). organizations within diverse industry levels should, instead, be more targeted
• Related efforts are ongoing within contexts and more reactive. As such, end-to-end
industry and the open source community security, 'Zero trust' security architectures
(OpenDaylight and OpenNFV for SDN, for Trajectory and very high security zones for critical
instance) Impact applications (such as 'Application
• Companies are tending generally • Mitigates attacks (including hacktivism, Resource Islands') are often set up to
deploying open implementations and cybercrime from mafias, fraud, industrial complement self-adaptive security.
specifications that may then become espionage and cyberwar attacks) before
candidates for de facto standards. they significantly threaten the availability, Semantic Technologies
data integrity and confidentiality of Concept
Issues systems Definition
• The transition from legacy systems to • Facilitates forensics by enabling effective Semantic technologies encompasses
SDx can be complex. and accurate aggregation of evidence a diverse set of technologies aimed at
• The centralized logic has the potential to helping machines to make sense of large or
become a single point of failure. However, Evolution complex data sets without being supplied
solutions that distribute this logically • Experts estimate that detection and any knowledge about that data. In essence,
centralized control do exist. response share will move from less than they bring structure and meaning to
• A change in a management policy might 30% of IT security budgets today to 75% information, often by providing machine-
result in temporary loops or errors that by 2020. readable metadata that is associated with
then lead to failures. Ongoing research • Open platforms are being developing humanly readable content specifying its
aims to tackle this issue. that will facilitate 2-way communication meaning.
among multi-vendor security products.
Self-Adaptive Security • Self-adaptive security depends on the Applications
Concept convergence between security and • Natural-language processing (NLP) —
Definition Big Data technologies, with the notable processing unstructured text content
With the growth of cloud, APIs and the addition of machine learning to traditional • Data mining technologies — uncovering
Internet of Things (IoT), cybercrime SIEM technologies (see 'Insight Systems'). patterns (trends and correlations) within
is constantly increasing in volume, • Solutions are rapidly increasing the large sets of data
sophistication and impact. As a result, the number of data sources (including the • Artificial intelligence systems — using
paradigm of security must change. After Dark Net) they are leveraging — well reasoning models to answer complex
the perimeter security of the 90’s (which beyond classical security sensors and questions
emphasized network defenses) and the devices — to analyze suspicious behaviors • Classification technologies — employing
in-depth security of the 2000s (which and foresee or detect attacks. heuristics and rules to categorize data
emphasized multiple protection layers), • Self-adaptive security is becoming • Semantic Web — allowing programs to
cyber defense strategies now evolved increasingly verticalized, taking into fetch specific information and answer
toward new self-adaptive security principles. account industry-specific risks in finance, non-obvious queries
This pre-emptive approach to security manufacturing, utilities and other • Linked Data — a subset of the Semantic
moves the emphasis from protection to domains. Web and way of publishing data so they
real-time detection and response that are interlinked and more useful, enabling
adapts defenses immediately. Issues automatic reading by computers
• Self-adaptive security requires strong • Semantic data integration — enhancing
Technologies and processes incorporate and business-driven Governance, analysis and decision making by
Security Operation Centers (SOC), Risk and Compliance analysis to help combining heterogeneous data sources
which rely on new generation Security systems understand what really must be
180 #AscentLookOut
Tech trends
• Semantic search technologies — allowing • Discarding spurious information in autonomously thanks to cognitive
people to locate information by concept ontologies is difficult. computing, advanced algorithms and
• Data providers usually generate revenue artificial intelligence.
Trajectory from advertisements that have to be seen • Over time, more machines will enter our
Impact by human beings so may have no interest lives and they will become better, faster
• Enable semantics-based technology in providing semantically-enriched and cheaper, according to Moore’s law.
automation by providing that meaning information. • Advances in artificial intelligence, speech
explicitly, so machines don't need to • A means for automatically establishing recognition and machine learning mean
derive it from within the data correspondences between vocabularies knowledge work can now be automated.
• Help humans and machines understand is needed for when different data sources • Machines will make increasingly
and communicate with each other at use different concept definitions. significant business decisions over which
the same level as people do among • The Semantic Web is still unrealized humans have decreasing control.
themselves due to the size and complexity of the • As such, smart machines have the
• Allow technology to automatically use ambition. potential to significantly impact the
services on behalf of a user business dynamics of at least one-third of
• Bring enterprise data integration to the Smart Machines the industries in the developed world in
next level by integrating heterogeneous Concept the future.
sources and augmenting corporate data Definition
with publicly available databases Smart machines refer to systems Issues
• Give computers a better way to represent, embedded with cognitive computing • CIOs must make the business aware
exchange and manipulate knowledge capabilities that are able to make decisions of the risks and opportunities as smart
• Increase agility by dealing with and solve problems without human machines work more autonomously in
knowledge instead of just data intervention. They perform activities and support of business goals.
• Allow computers to learn by themselves tasks traditionally conducted by humans, • There are real concerns that smart
(machine learning) boosting efficiency and productivity. machines will replace both white and
• Make data collected for a given purpose blue collar jobs in industries ranging
usable in other contexts Applications from manufacturing and warehousing to
• Autonomous robots or vehicles — shipping.
Evolution reshaping transportation, logistics, • The impact on society will need to be
• The RDF (which stores the semantic distribution and supply chain understood and appropriate action
metadata) and OWL (which defines management may need to be taken in areas such as
the ontologies which, in turn, specify • Expert systems — emulating the decision- taxation.
information meaning and relationships) making capabilities of a human to solve
were introduced and later standardized. problems that typically require expert Swarm Computing
• The SPARQL semantic query language input in sectors such as automotive, Concept
was introduced and later standardized. consumer electronics, healthcare and Definition
• Tim Berners-Lee published his thoughts industrial Also known as swarm intelligence or hive
on Linked Data on the W3C website • Intelligent virtual assistants — such as computing, swarm computing refers to
• The Semantic Web at a global scale is avatars, which provide information and massively distributed, self-organizing
still a dream, but related ideas, concepts, service assistance to customers systems of agents that work collaboratively
standards and technologies are being • Sensors — collecting data about our towards a defined outcome. Each agent
used on smaller scale to provide physical environment without direct within the system has a simple set of rules
semantically-enriched services. human intervention to follow and only interacts with its local
• Companies are providing commercial environment. The aggregate behavior
support for semantic solutions and using Trajectory of the agents leads to the emergence of
them in production. Impact ‘intelligent’ global behavior.
• Existing and legacy SQL-based data • Increase efficiency and productivity
integration solutions are being turned into • Raise earnings and profit margin potential With the number of nodes comprising the
a semantic data cloud. • Offer a viable alternative to unskilled labor Internet of Everything (IoE) predicted to
• Standardization efforts for while augmenting demand for skilled rise and many individual nodes likely have
transformations (RDB2RDF) are enabling labor limited compute capabilities, each would
more valuable information to be retrieved • Complement tasks that cannot be be complimented by connection to other
out of the existing data maze by substituted by computerization objects in a community — thus creating an
combining it with other data sources. IoE swarm.
• Companies are increasingly providing Evolution
semantic search engines heavily based • Prototype autonomous vehicles, Applications
on NLP. advanced robots, virtual personal • Optimizing logistic chains and
assistants and smart advisers already transportation
Issues exist. • Controlling driverless vehicles, optimizing
• Ontologies are not easy to design and • The explosive growth of sensor-based journey times and road usage
their relevance can always be debated. data will provide them with more context • Coordinating the operation of complex
• Gaining consensus around ontologies is about the physical world. infrastructures such as smart cities and
difficult, even in very specific fields. • They will evolve to work more distributed power grids
• Predicting the behavior of complex under the primary control of different strengthening of objects on the Internet
systems, such as transport or logistic individuals or organizations. of Things (IoT) that are involved in critical
networks • Communication protocols need to be processes.
• Providing surveillance in military standardized to enable flexible and • The next evolution is focusing on
scenarios dynamic interaction. securing smart, autonomous machines.
• Delivering sensor network security • There is a possibility that non- After all, as we become increasingly
• Managing crowds deterministic behaviors, including reliant on robot surgeons, smart cars
• Enabling opportunistic collaboration unexpected or out of control ‘emergent’ and autonomous drones, absolute trust
• Managing the economics of participation behaviors, may emerge. becomes vital.
by helping to engage resources, -- Swarm viruses, where swarm behaviors
encourage contribution and optimize are influenced adversely by rogue Issues
services components, may also emerge. These • Most trusted devices require a
would have huge implications in use combination of hardware and software
Trajectory cases such as driverless vehicles. security since software security alone
Impact increases the risk of hijacking.
• Creates a dynamic eco-systems of cyber- • Establishing trust in today's increasingly
physical devices, each adding to the
collective capability and insight T connected world requires the successful
integration of secure elements (Secure
• Allows operations and interactions to IoT) and management of huge numbers
adapt according to context Trusted Devices of identities (Next Generation Identity &
• Improves efficiency and reliability of Concept Access Management and Big Data).
service provision through: Definition • It may also require embedded contextual
-- Enabling ad-hoc collaborations, which Trusted devices are terminals and software- intelligence so that hacking attempts can
help built service networks powered objects and machines that are be detected and appropriate counter
-- Optimizing delivery schemes and made secure and trustworthy in order measures (such as the auto-destruction
communication patterns, which allow to protect data and process availability, of sensitive information) can be taken
information and services to be shared integrity and confidentiality. They include automatically
and exchanged human interaction devices such as
-- Creating reliability and dependability smartphones, payments terminals as well
from volatile resources, which help
manage uncertainty
as autonomous devices such as smart
homes and smart machines. U
• Allows work to be distributed across
simpler devices (or robots) Trusted devices rely on high security Ubiquitous PIM
• Complements other forms of artificial design, hardened software and hardware, Concept
intelligence and intensive certification processes Definition
• Provides a significant step toward provided by trusted third parties (notably Currently most people use more than four
massively distributed computing models leveraging 'common criteria' norms). different information silos to store, manage
and transfer their personal information
Evolution Applications — including Google, Outlook, Facebook,
• The notion of swarm computing first • Securing human communications and Twitter, WhatsApp, local drives, USB disks,
emerged in the 1990s. interactions with digital systems OneDrive, Dropbox and more.
• Research into algorithms and simulations • Ensuring the protection of critical
began shortly afterwards. infrastructures and automated process Ubiquitous Personal Information
• Swarm computing was first use for — including smart grid, connected Management (PIM) is a new approach
logistics and simulations. healthcare, smart cities and transports to storing personal information where all
• In time, the miniaturization of mobile information is stored in a unified storage
hardware made swarms of micro-robots Trajectory system but still accessible and consumable
feasible Impact by multiple applications. The types of
• Currently, swarm computing is closely • Provides trusted terminals and smart information most suited to ubiquitous PIM
linked with robotics, the Internet of Things machines secured by design and with a approaches include messages (email, social
(IoT) and distributed cloud models. trustworthiness level depending on risk network posts, public website responses),
• In the long-term, nano-robots swarms and process criticality that people can contacts, documents (texts, pictures, video)
may, for example, prove useful in rely on and calendars.
medicine. • Mitigates risk of hacking and fraud at
a time when cybercrime is becoming Applications
Issues commonplace • Enterprise Social Networks — allowing
• Agent-based programming is complex all applications to use the same storage
and skilled practitioners are not easy to Evolution layer and exchange/share all information
come by at this present time. • Defense grade technologies have already needed
• Integrating swarms with other centralized been introduced into civil terminals, • Collaboration — providing diverse
control mechanisms is also complex. notably secure smartphones for collaboration tools access to the same
• Security is a huge concern, especially governments and CxOs. information, with each tool tailored to
if individual robots within a swarm are • The major trend today is the
182 #AscentLookOut
Tech trends
the user's level of expertise and personal of our increasingly complex digital lives in
preferences
• Business communications — unifying V the future
• May, in that case, transform customer
communications so users only need to engagement models with organizations
focus on the dialog and not worry about Virtual Assistants needing to interact with customers
the technology Concept through their assistant rather than
Definition directly; this would mean interactions
Trajectory Virtual assistants are software agents that need to be clear and concise — and
Impact perform services or tasks on our behalf. would be significantly less susceptible to
• Reduces complexity and eliminates They understand queries and can answer emotive advertising
vertical information silos them in a natural language. They exploit
• Increases usability by making information artificial intelligence, natural-language Evolution
more relevant and consistent across a processing, machine learning, voice • In the 2000s, search engines evolved to
multitude of applications processing and reasoning, and knowledge include more context, refining results to
• Cuts energy consumption as information representation to make human-machine make them more relevant.
no longer needs to be copied around and interactions simpler, more natural and more • Natural Language Processing (NLP)
kept in sync appealing. systems evolved to allow users to interact
• Unlocks individuals from reliance on with a computer in conversational
multiple dedicated social networks, The tasks and services they perform rely language.
collaboration and communication tools on written or spoken user input, context • More computing power became
• Allows individuals to select the networks awareness and access to a variety of available, meaning natural language could
and tools that suit them best online sources, such as weather or traffic be processed cost-effectively.
• Opens the door to a broad range of novel conditions, news, stock prices, schedules • The rise of virtual assistants such as
products and services and retail prices. Siri signaled search evolving toward a
• Is aligned with the Internet of Things (IoT) more personalized, interactive service
Applications and a gradual shift to an ecosystem of
Evolution • Administrative assistance — such as services mediated by a powerful software
• Local file systems with applications began in-the-moment advice, querying and assistant.
sharing more and more information. reminding, supporting both personal and • The virtual assistant will next be brought
• Mixed local and cloud-based storage business events into the cloud, making it present on
solutions emerged, with some sharing • Ongoing expert assistance — including multiple devices: on users' bodies and in
information, but more of them longer-term projects or expert work their offices, homes and vehicles.
exchanging it. where their learning capabilities mean • Future assistants will be able to detect
• Mixed local, cloud and ubiquitous the more context they're exposed to, the exactly where users are.
PIM storage solutions then started to better their assistance becomes • Advances in sensors (for example,
appear, initially combining contacts, • Customer service assistance — including microphones, cameras, accelerometers
communication, collaboration and in retailing, banking, insurance and and GPS in smart phones) will provide
documents through adapters telecommunications where they additional context for that assistant to
• Soon, applications will leverage global supplement or supplant human leverage.
ubiquitous storage, with information customer-service representatives • Virtual assistants are also learning how
exchange between ubiquitous PIMs • Data mining of large structured and to detect emotions via voice analysis or
standardized unstructured data sets — discovering facial expressions, whether the user was
• In the future, people will no longer need patterns and anomalies, proactively moving, stationary or in a vehicle.
to worry about their information and a identifying problems, spotting • Real-time learning capabilities will ensure
whole new domain of IT applications will opportunities and supporting decision- assistants remain current, as long as they
start to flourish. making have access to relevant data sets, or allow
• Predictive expert assistance — them to branch out into new fields.
Issues anticipating events and taking action
• An enormous amount of work that needs before events occur Issues
to be done to realize ubiquitous PIM, • Virtual personal shopping assistants • The increasing fragmentation and
but only a few groups and individuals — learning, predicting and serving complexity of our personal data reduces
are working on new ways to store consumers' tastes, needs and desires to the level of assistance a virtual assistant
information. help optimize their purchases can currently provide.
• In fact, there are huge gaps in the • Ubiquitous Personal Information
theoretical know-how needed. Trajectory Management (PIM) will help them
• This current situation will remain Impact interpret all our digital information, but
unchanged until the fragmentation of the • Decrease cost and increase efficiency they currently need adapters to connect
current data exchange systems become and customer satisfaction in customer to diverse data silos such as Outlook,
more evident. service desks while unifying corporate Gmail, Microsoft Live, Facebook, Twitter,
image across different channels LinkedIn and even local file systems.
• Enhance application usability and • The user needs to feel in control (for
improves information access tasks instance of where their data is used and
• Are expected to manage more and more by whom) and to be able to trust the
• assistant to act in their best interest. -- Direct interaction with smart objects • Spending on wearable technology is
• Virtual assistants that are helping users — initiating cloud-based services projected to reach nearly $20 billion in
purchasing things online will have the -- Information — simplifying access to 2018.
power to boost certain firms and deprive resources and sharing knowledge • Wearables may become a fully-integrated
others. • Industry specific part of our personal and professional
• The on-going obsolescence of the -- Healthcare — training doctors, lives in the long term, providing a more
human worker by computers and assisting surgery, monitoring patients' discrete alternative to mobile while also
artificial intelligence applications may and doctors' health, recording enhances mobile with additional insight.
lead to society raising concerns about treatment, supporting and monitoring • Some see wearables as the next step
virtual assistants as they become more medication regimes toward ambient computing.
advanced. -- Retail — sharing product information,
merchandising, warehousing and Issues
stock management • Interaction is tuned to the device's size,
W
-- Military and homeland security purpose and ergonomics.
— monitoring activities, recording • Devices would benefit from being able
operations, navigation and identity to automatically account for wider
Wearable Computing recognition environmental surroundings.
Concept -- Transport — navigation, tracking, • But advances in wearables depends
Definition measuring drivers' health on other technological advances —
Miniature electronic devices with integrated -- Sport — monitoring vital signs, including in sensors, displays, batteries,
sensing, computing and communication comparing results, adjusting to communications and augmented reality.
capabilities that are worn on the body. They environment and recording activities • The effects of materials on the human
leverage the wearer’s context — detected organism (allergic reactions, for instance)
by embedded sensors — to deliver either Trajectory and radiation must be manageable.
general or specific services that enable Impact • Power management and heat dissipation
the wearer to act in real time based on the • In combination with cognitive computing, is challenging in such small devices.
information they provide. has the potential to enhance human • Energy — along with a failover strategy
abilities — may need to be available during a
Although most popular wearables today • Allows customer service representatives complete usage cycle in some use cases.
are smart watches, wearables can be found to understand individual's desires and • In critical situations, such as medical
in different places of our body: tastes tasks, wearables and their users must
• Attached to our wrist — such as smart • Enables the Body Area Network concept abide by legal constraints.
watches, bracelets and wrist bands — enhancing the overall picture of the • Wearables need to be transparent on
• Around the head — including headbands wearer’s context while the wider IoT information transmission, storage and
and helmets amplifies the device’s knowledge of the processing, particularly where data is
• In front of the eyes — such as glasses, wearer shared with a wider ecosystem.
contact lenses, bio-augmentation • Improves performance and cuts cost in
• Around the ears — as earphones field service and assisted maintenance Web-scale Computing
• Implanted or embedded chips — • Opens up new business opportunities: Concept
including hearing aids -- Delivering health insights for Definition
• On or in the hands — such as gloves or marketers to tap into Also known as web-scale computing,
digital pens -- Offering incentives in exchange for hyperscale is a large, distributed, grid
• Smart clothing and textiles — including wearable usage and data computing environment that can scale-
bandages, t-shirts, jackets, socks, bras, -- Connecting mobile payments and out efficiently as data volumes and
belts and shoes customer loyalty workload demands increase — sometimes
• Embedded in jewelry — including rings -- Addressing novel customer problems exponentially. Compute, memory,
and earrings that were previously out of reach of networking, and storage resources are
• On the skin — as tattoos the brand added quickly and cost-effectively.
184 #AscentLookOut
Tech trends
Trajectory
Impact
• Allows electrical devices to be powered
where interconnecting wires are
inconvenient, hazardous or simply not
possible
• Solves energy storage issues for the
electric car, while increasing its range and
reliability
• Opens the door to a uninterrupted,
pervasive computing environment where
energy availability is critical
Evolution
• Induction charging is not a new
technology, but its usage is restricted to
very few devices.
• The technology has been evolving to
provide higher levels of charge, at greater
distances.
• Standardization seems to be improving,
with the most important standards
converging in the AirFuel Alliance.
• The explosion of wearables and
sensor networks, and their limited
energy capacities, has made wireless
power transmission a more interesting
proposition.
• Increasing capacities are taking it to
wider domains, including transportation
(for electric vehicles) and healthcare (for
medical devices).
• Tests are underway with special road
lanes wirelessly transferring power to
electric cars while they drive.
Issues
• Energy efficiency needs to be optimized
further by eliminating potential energy
losses.
• Energy management would benefit from
being simplified.
• There are currently several standards,
limiting interoperability.
• Security concerns are limiting its use in
certain environments.
• Social fears are limiting its uptake, though
concerns about its impact on health have
no scientific base.
186 #AscentLookOut
Tech trends
Ascent Look Out, Atos’ biennial collaborative horizon scanning publication, combines the insight
from more than 200 subject matter experts working in service lines, industry consultancies, sales,
marketing and communication in 72 countries across the globe. The Editorial Board gratefully
acknowledges all contributors for sharing their knowledge, experience, passion and enthusiasm:
188 #AscentLookOut
The Ascent Look Out Editorial Board:
Editors in Chief
Editorial Board
Denis Faivre
Head of Innovation Management
Worldline
denis.faivre@worldline.com
@ablivio
At Atos, we do more than accompany our clients on their digital journey, we actively help them to stay one step ahead. Through our
Ascent initiatives, we share our vision and innovative thinking on the emerging trends and technologies that will shape business in the
future.
ascent.atos.net/ascent-white-papers ascent.atos.net/ascentmagazine2016
Ascent Blog
It shares daily forward-looking and
inspirational blog posts on business
and technology from the Scientific
Community and Atos business and
technology experts.
ascent.atos.net
@ascentblog
190 #AscentLookOut
Thinking one step ahead
Interested in discovering more about today’s key technology Atos Innovation Workshops will help you to:
and business trends and understanding the challenges and • Gain insights into the future of your industry and the potential
opportunities they bring so you can approach the future with impact of emerging technologies and trends on your
confidence? organization and market.
You can meet our thought leaders and best of breed experts • Scan the technology and business landscape, through
in one of many Ascent events organized across a number stimulating and thought-provoking discussions how your
of different countries around the globe. Our expert will make company can anticipate and leverage on emerging technologies
sure that you always get the best solution available by taking a and trends and make unexpected innovation opportunities
proactive approach to identifying and anticipating game-changing appear.
technologies.
• Discover new ways to unscramble your future business
We also offer our clients Innovation Workshop in one of Atos challenges and successfully navigate your digital transformation.
Business Technology and Innovation Centers. During these our
experts, together with Atos Scientific Community members, What you and your business become tomorrow is not going to
scrutinize the future challenges of your company and recommend be what they were yesterday. Our experts are always ready to
how to drive innovation. work with you to help you start your digital journey, drive new
opportunities and overcome upcoming challenges.
Edited by: Atos Communication Department and copywriting by APB Research and Innovation Ltd.
Printing: This document is printed in compliance with ISO 14001.2004 for an environment management system.
Photo credits: Marc Bertrand (Agence REA) , Getty Images, Fotolia, Atos image library, all rights reserved.
Contact: Atos Global Headquarters - River Ouest - 80, quai Voltaire - 95877 Bezons Cedex - Tel.: +33 1 73 26 00 00
Atos, the Atos logo, Atos Codex, Atos Consulting, Atos Worldgrid,
Worldline, BlueKiwi, Bull, Canopy the Open Cloud Company, Unify,
Yunano, Zero Email, Zero Email Certified and The Zero Email
Company are registered trademarks of the Atos group.
April 2016.