1.Deep learning accelerators such as GPUs, FPGAs, and more recently TPUs. More companies have been announcing plans to design their own accelerators (known for performance and power efficiency) which are widely used in data centers. There is also an opportunity to deploy them at the edge, initially for inference and for limited training over time. The development of these technologies will allow machine learning (or smart devices) to be used in many electrical gadgets and applications.

2.Assisted transportation. While the vision of fully autonomous, self-driving vehicles might still be a few years away, increasingly automated assistance is taking place in both personal and municipal vehicles. Assisted transportation is already very useful in terms of wide recognition and is paving the way for fully autonomous vehicles. This technology is highly dependent on deep learning accelerators for video recognition.

3.The Internet of Bodies (IoB) also known as human body gadgets. IoT and self-monitoring technologies are moving closer to and even inside the human body. Consumers are comfortable with self-tracking using external devices (such as fitness trackers, smart glasses, smartphones and smartwatches) and with online playing games using augmented reality devices. Digital pills are entering mainstream medicine, and body-attached, implantable, and embedded IoB devices are also beginning to interact with sensors in the environment. These devices yield richer data that enable more interesting and useful applications, but also raise concerns with matters such as privacy, security and many more.

4.SOCIAL CREDIT ALGORITHMS. These algorithms use facial recognition, fingerprints and other advanced biometrics to identify a person and retrieve data about that person from social media and other digital profiles for the purpose of approval or denial of access to consumer products or social services. In our increasingly networked world, the combination of biometrics and blended social data streams can turn a brief observation into a judgment of whether a person is a good or bad risk or worthy of public social sanction. Some countries are reportedly already using social credit algorithms to assess loyalty to the state.

5.Advanced (smart) materials and devices. We believe novel and advanced materials and devices for sensors, actuators, and wireless communications, such as tunable glass, smart paper, and ingestible transmitters, will create an explosion of exciting applications in healthcare, packaging, appliances, and more. These technologies will also advance pervasive, ubiquitous, and immersive computing, such as the recent announcement of a cellular phone with a foldable screen. The use of such technologies will have a large impact in the way we perceive IoT devices and will lead to new usage models.

6.Active security protection. The traditional method of protecting computer systems involves the deployment of prevention mechanisms, such as anti-virus, firewalls and passwords. As attackers become more sophisticated, the effectiveness of protection mechanisms decreases as the cost increases. However, a new generation of security mechanisms is emerging that uses an active approach, such as hooks that can be activated when new types of attacks are exposed and machine-learning mechanisms to identify sophisticated attacks. Attacking the attacker is a technological possibility as well, but is almost always illegal.

7.VIRTUAL REALITY AND AGUMENTED REALITY. These related technologies have been hitting the mainstream in some respects for a number of years. For a well-known example, Pokémon Go is a game that uses the camera of a smartphone to interpose fictional objects in real-world surroundings. Gaming is clearly a driver of these technologies, with other consumer devices becoming affordable and commonplace. VR and AR technologies are also useful for education, engineering, and other fields. However, there has been a Catch-22 in that there is a lack of applications resulting from the high cost of entry, yet the cost has stayed high due to a lack of applications. With advertisements for VR headsets appearing during prime-time television programs, we may have finally reached a tipping point.

8.Chatbots. These artificial intelligence (AI) programs simulate interactive human conversation using key pre-calculated user phrases and auditory or text-based signals. Catboats have recently started to use self-created sentences in lieu of pre-calculated user phrases, providing better results. Chatbots are frequently used for basic customer service on social networking hubs and are often included in operating systems as intelligent virtual assistants. We have recently witnessed the use of chatbots as personal assistants capable of machine-to-machine communications as well. In fact, chatbots mimic humans so well that some countries are considering requiring chatbots to disclose that they are not human. Industry is looking to expand chatbot applications to interaction with cognitive-impaired children as a way to provide therapeutic support.

9.Automated voice spam (robocall) prevention. Spam phone calls are an ongoing problem of increasing sophistication, such as spoofing the caller ID number of the victim’s family and business associates. This is leading people to regularly ignore phone calls, creating risks such as true emergency calls going unanswered. However, emerging technology can now block spoofed caller ID and intercept questionable calls so the computer can ask questions of the caller to assess whether he or she is legitimate.

10.TECHNOLOGY FOR HUMANITY (specifically machine learning). We are approaching the point where technology can help resolve societal issues. We predict that large-scale use of machine learning, robots, and drones will help improve agriculture, ease drought, ensure supply of food, and improve health in remote areas. Some of these activities have already started, but we predict an increase in adoption rate and the reporting of success stories in the next year.

LEAVE A REPLY

Please enter your comment!
Please enter your name here