9 emerging technologies shaping corporate strategies in 2022 – TechRepublic
Data fabric and cybersecurity mesh are new systems shaping business IT architecture while carbon-free shipping plus new warehouse robots are usually boosting efficiency and safety. Emerging technology cover everything from cybersecurity to climate change. These technology trends are the ones to watch in 2022 whether the tactic is still in the particular early stages, or growing quickly.
Clean technologies and low-carbon shipping
McKinsey lists clean technologies inside its top 10 trends within tech due to the growing need for clean-energy generation. This covers systems in order to disbritute energy in the grid, store energy and allow carbon-neutral energy era. These innovations cover renewable energy, carbon capture, smart-grid systems, electric vehicles, wastewater treatment and smart buildings plus infrastructure. As these technologies become less expensive to implement, McKinsey sees these emerging technologies as increasingly disruptive to traditional business models with the potential to influence industry structure and competitive dynamics.
The World Economic Forum also listed green tech while an emerging trend to track in 2022. Two examples of this progress are a passenger train that produces no carbon dioxide and alternative shipping fuels like green ammonia. The Coradia iLint runs in Sweden and is powered by hydrogen instead of diesel fuel. According to the manufacturer Alstom, Germany has ordered 41 of these trains and Italian teach operator FNM has purchased 14.
In addition to reducing emissions from trains, innovators are working to reduce the weather impact of plane travel as well. Green ammonia could be a cheap option fuel for the delivery industry overall. Green ammonia is produced by using alternative energy to produce electricity that feeds an electrolyser in order to extract hydrogen from water. The challenge is getting these applied at scale, according to the World Financial Forum report.
This modular approach means using interchangeable building blocks to create programs. Composable apps rely on APIs to link separate pieces and enable data sharing. This approach can make it easier with regard to organizations to adapt to changing business plus market requirements more quickly than the conventional approach. This is due to the fact that will new applications can be easily integrated with existing tech stacks without facing the particular problem associated with data silos.
Gartner sees this particular trend extending to a broader business philosophy that includes these tenets :
- Composable thinking: Prioritize modularity, autonomy, orchestration and discovery when determining what to build or even create
- Composable business structures: Build an organization that is flexible plus resilient
- Composable technologies: Use the design goals of speed through discovery and greater agility through modularity to build new technology
Companies can use this composable architecture to get stand-alone security solutions to work together to improve overall security. Gartner analyst Kasey Panetta recommends this particular new technology in order to cover identities outside the traditional protection perimeter plus to boost security regarding remote workers.
This distributed architectural approach can make it easier to scale cybersecurity control and make it more flexible plus reliable as well. According to cybersecurity firm Check Point , cybersecurity mesh structures has four foundational layers:
- Security analytics and intelligence
- Distributed identity material
- Consolidated policy and posture management
- Consolidated dashboards
Gartner included data material on its top 12 strategic technology trends based on the potential to lessen data management efforts simply by up in order to 70%. This particular technology provides a new way to integrate data sources across platforms plus business users. Data fabric supports “re-engineered decision-making” and can be used to figure out where data should be used plus changed.
Data fabric is the design concept that uses human and machine capabilities to access information where it is currently located and to determine whether it should be moved or consolidated. In a description of data fabric, Gartner analyst Ashutosh Gupta shares this example of how the architecture can improve operations :
“… a supply chain leader using a data material can add newly encountered data assets to known relationships between supplier delays and production delays a lot more rapidly, plus improve decisions with the particular new information (or intended for new suppliers or new customers). ”
Gupta explains that will data fabric observes pipelines of information and then starts suggesting more productive alternatives to the existing processes. Implementing this infrastructure requires altering the focus associated with human and machine workloads.
The Linux Foundation ’s report, State of the Edge 2021 , found that edge facilities and programs grew as compared to 2020. There biggest barrier is the tremendous system investments needed to support the growing demand:
“We estimate that among 2019 plus 2028, cumulative capital expenditures of up to $800 billion USD will be spent on brand new and replacement IT server equipment and edge processing facilities. These types of expenditures will be relatively evenly split between equipment for the particular device plus infrastructure edges. ”
Even with these types of infrastructure needs, edge computing is expanding in all global regions, the report found, using the largest edge footprint predicted in order to be within Asia Pacific at 38%. China, Japan and South Korea will be the particular biggest contributors to this infrastructure by 2028. Europe may be next at 29% and 21% in North America.
Advances in this sector include micro-modular edge data centers and new form factors such like street-side cabinets and light pole attachments. Edge computing will bring changes within hard drives too with Arm server processors, AI processing chips, GPUs, smart network interface controllers and field-programmable gate arrays.
IoT and wearables to get worker security
Internet associated with Things tech is not just pertaining to machines. Modjoul is making use of a wearable device to reduce injuries among employees and make sure people are using the right protective equipment in certain settings. The platform makes use of RFID technology and a wearable device that will can become worn around the neck or clipped on the belt or worn seeing that a belt buckle. Six sensors in the device monitor motion, location and environmental data.
Modjoul users track and try to prevent “risky bends” and twists in stockroom workforces. Modjoul published a case study based on a pilot project with a large e-commerce company plus found that injury prevention specialists used Modjoul data to determine which workers needed training and which processes were likely to cause injuries. The particular company furthermore drew these conclusions from the pilot project:
- The use of a haptic tool corrected meant for “out of compliance” behavior and resulted in a reduction in risky behaviors.
- The information captured was able to identify associates who were most at risk designed for injury and provide their names towards the Injury Prevention Specialist.
- Injury Avoidance Specialists have proven that they can change the behavior associated with the risk outliers plus lower the risk of the procedures.
- Modjoul’s technologies paired along with proper coaching reduced the overall amount of bending per associate. Most importantly, the amount of risky bending was reduced.
Privacy enhancing computation
This tactic focuses on securing personal data inside untrusted environments and uses privacy-protection techniques to allow value to be extracted from your information while meeting compliance requirements at the same time. This approach to data security will be in the early days, based on Gartner , but has the potential to reduce the risk of information breaches. Scion Analytics recommends combining these types of techniques to assemble a privacy enhancing computation infrastructure:
- Zero-knowledge proofs
- Multi-party computations
- Homomorphic encryption
- Differential privacy
- Trusted execution environments
Scion expert Michael Tupek said in a blog post that HR leaders can use PEC to decrease the gender pay gap, medical researchers could use the particular technique in order to analyze patient data whilst preserving personal privacy and bank managers can use this to avoid fraud.
Smarter robotics just for manufacturing plants
Mantis Robotics is developing a tactile robotic arm that uses sensor technology to work safely alongside people. The company claims that the device is usually safe “out of the particular box” and won’t require fencing. Factories usually keep robotic arms and other devices physically separated from humans for protection purposes. The particular Mantis arm uses sensors to detect when a person approaches plus to slow down or stop operations. The robot may lower the total cost associated with ownership and deploy within hours, according to the company.
Amazon invested inside the company as part of the retailer’s new Industrial Innovation Fund announced in April. Amazon . com will invest $1 billion in companies building solutions to make supply chain, fulfillment and logistics operations more efficient. The fund will spend “in businesses that imagine solutions that will incrementally increase delivery speed and further improve the experience of employees working inside warehousing plus logistics fields. ”
Gerry Vannuffelen, Mantis Robotics co-founder and CEO, said in an announcement about the particular investment that customers often say they have to sacrifice effectiveness if they want robots in order to work safely alongside people.
“With Amazon as a pioneer inside the use of robotics, this investment is a strong show of confidence in our vision to make human-robot collaboration even safer and a lot more productive, ” he said.
Smart storage place technologies
BionicHIVE is building an autonomous robot that will can adjust to existing shelving racks and boxes in warehouses. This means that the technologies can function in warehouses not specifically designed for the purpose of robot employees. The SqUID uses a good algorithmic engine to sort, select plus shelve packages. The device uses cameras and detectors to move in between people and objects within the factory and rails on shelves to move up plus across. The particular company calls the strategy “retrofitting automation” and states that the algorithm can dynamically learn problems created in one storage facility and apply resolutions to all warehouses in the particular network.
BionicHIVE also won an investment from Amazon’s industrial fund in April.