Mastering the technologies of disruption
The collective computing capacity in the hands and pockets of people is surpassing that in centralized data centers. These powerful computational shifts are the “Techtonics” that are going to create and amplify the Digital Shockwaves in Business.
Interview with Frederik Kerling
@QuKerling - Member of the Atos Scientific Community
With 50 billion connected objects expected by 2020, the Internet of Things and Future Networks will lead to incredible disruption.
We will see the rise of a Computing Continuum from increasingly connected computing capabilities in the cloud and at the edge.
The increasing levels of compute capacity and connectivity in mobile devices and the IoT will enable what we call Swarm Computing – connected objects that are able to self-organize and configure according to changing needs.
New Computing Memory architectures will significantly increase computational performance whilst reducing energy requirements.
Containerization of applications or platforms will be a means of transforming the way that compute workloads are deployed, managed and secured.
Additive Manufacturing will significantly disrupt the entire manufacturing production chains.
Businesses should start preparing for the Quantum Computing disruption now, by implementing strategies for Quantum-Safe Cryptography.Read More & Download PDF
Emerging & evolving technologies
Connected Everything, Swarm and Artificial Intelligence are disrupting the way we understand and conduct business.
Internet of Things
& future networks
By 2020 there will be 25 Billion objects connected to the Internet, ranging from smart watches through consumer products to industrial or medical applications.
Connected systems, such as vehicles and transport infrastructure, will come together to form local, transient micro clouds with swarm-like behavior. Distributed intelligence will determine how much of this data needs to be fed back to business applications, with advanced analytics helping organisations to make sense of this rapidly changing world.
And all this has to happen securely, taking into account the privacy of citizens or customers, the intellectual property of organisations and the value inherent in the data generated by these connected objects.
Cloud Computing, Internet of Things and the strategic use of data and analytics are the foundations of a new digital revolution.
The business opportunities are massive – as is the potential economic impact on our society.
Public cloud computing has become mainstream today and estimates of future adoption continue to grow.
The Cloud market is evolving to a Hybrid model which aims to optimize costs and avoid vendor lock-in. At the same time the number of connected devices is growing from the current 20 billion to at least 100 billion in the most conservative forecast.
For most of Information Technology’s history computing services have been constrained by the availability of hardware, software and people.
Tomorrow’s Information Technology services will compete on their ability to minimize energy use. A complete change in the cost function of IT requires a new form of IT.
A new era of computing is emerging that will combine compute operations previously performed in the CPU directly with addressable memory in a single device. We call this Computing Memory.
We see Computing Memory taking us even further and towards Neuromorphic Computing platforms; a radically different computing architecture that physically mimics the neurons and synapses present in the human nervous system. Neuromorphic computing has applications in visual processing, auditory processors, object recognition and autonomous robots.
Containerization is a form of virtualization that is able to create lightweight partitions inside the same operating system instance.
Though the Containerization concept was initially introduced in 1979, it has recently regained momentum on new platforms. It can enhance the management of applications in today’s ubiquitous cloud environments.
Driven by a burgeoning ecosystem in which Docker is playing a significant role, Containers can be expected to gain a foothold in, and ultimately become a fundamental part of, enterprise cloud strategy by 2020.
Containerization in the Cloud will increase application portability, efficiency and agility across multiple environments/clouds with seamless Operations Management. In other words, applications are deployed and managed in exactly the same way, regardless of the platform.
Containers running within a single operating system are more efficient and this will underpin the future of the cloud infrastructure industry, based on virtual machines.
Additive Manufacturing is the process of creating a 3D model solid object from a digital model, usually layer upon layer – a radically different approach to (traditional) subtractive manufacturing methodologies.
Additive Manufacturing offers the ability to produce complex and personalized products at lower development costs, shorter lead times while generating less material waste. You can produce completely functional parts, lighter and customized, adapted to the specific applications.
In addition, Additive Manufacturing is based on digital 3D models which need no storage, so it can disrupt the complete manufacturing value chain; thus enabling new business models and new products, superior to conventionally manufactured ones.
The full industrialization of Additive Manufacturing is just a few years ahead. The market is growing at double digit figures each year.
Now is the right time to think about the new possibilities this technology will bring, and take the necessary actions in order to prepare your business. Additive Manufacturing will likely be mainstream by 2020!
Anticipating the fact that soon most encryption technologies may be ineffective against quantum-technology-based attacks.
The Cloud and the Internet of Things are booming developments that use public encryption technologies to protect data, algorithms and systems from exposure. This protection is however destined to be toppled by some algorithms that run on quantum computers.
The principle of computational hardness used in conventional encryption approaches does not apply in the same way to quantum computing. Publicly sent and possibly intercepted encryption keys that rely solely on computation difficulty are of questionable security.
Read more to find out how to safeguard all data which is currently protected by classical encryption standards. Understanding and adopting quantum computing and cryptography can successfully prepare an organization for the cybersecurity threats of the future.