{"id":1462,"date":"2024-07-03T02:18:34","date_gmt":"2024-07-03T02:18:34","guid":{"rendered":"https:\/\/www.txd9.com\/?p=1462"},"modified":"2024-07-03T02:18:34","modified_gmt":"2024-07-03T02:18:34","slug":"ai-iot-quantum-security-among-top-10-emerging-tech-forrester","status":"publish","type":"post","link":"https:\/\/www.txd9.com\/?p=1462","title":{"rendered":"AI, IoT, Quantum Security Among Top 10 Emerging Tech: Forrester"},"content":{"rendered":"<p><\/p>\n<div>\n<p>Ten technologies that need to be on every company\u2019s radar were identified Tuesday in a trends report released by global technology research company Forrester.<\/p>\n<p>The 30-page report identified four technologies expected to deliver benefits in the short term to companies, four predicted to deliver benefits in the medium term, and two that will deliver benefits in the long term.<\/p>\n<p>The report explained each trend\u2019s benefits, potential business value, important use cases, examples of where it\u2019s being used, and its risks.<\/p>\n<p><strong>Short-term technologies include:<\/strong><\/p>\n<ul>\n<li>Generative AI for visual content;<\/li>\n<li>Gen AI for language;<\/li>\n<li>IoT security; and<\/li>\n<li>TuringBots, a use of AI for software development.<\/li>\n<\/ul>\n<p><strong>Mid-term tech includes:<\/strong><\/p>\n<ul>\n<li>AI agents;<\/li>\n<li>Autonomous mobility;<\/li>\n<li>Edge Intelligence; and<\/li>\n<li>Quantum security.<\/li>\n<\/ul>\n<p><strong>Long-term tech includes:<\/strong><\/p>\n<ul>\n<li>Extended Reality (XR); and<\/li>\n<li>Zero Trust Edge (ZTE), a security and networking solution that can be delivered by a single vendor.<\/li>\n<\/ul>\n<h3>Creativity Accelerant<\/h3>\n<p>According to Forrester, gen AI for visual content will offer the most potential for marketers and other creatives. The technology will accelerate creativity, with global enterprises that manage a portfolio of brands seeing the most significant benefits.<\/p>\n<p>Those benefits won\u2019t be without risks, it added, such as distorted features in visual output, unintended likenesses of public figures, inaccurate images, and legal liability from copyright infringement of training data or visual output.<\/p>\n<p>Aaron J. Rafferty, founder of Tech Buzz, a media and news platform in San Jose, Calif., and StandardDAO, a community of digital asset holders in Mountain View, Calif., explained the kind of benefits gen AI for visual content can bring to the table.<\/p>\n<p>\u201cWhat was once a 10 step process will be done in one,\u201d he told TechNewsWorld.<\/p>\n<p>\u201cSimply create a long-form piece of video content, and it is automatically clipped into the top and most viral short-form videos, redone by AI personas that are most applicable to consumer types\/ethnicities\/genders, republished in multiple languages, and even reproduced for viral text via newsletters, threads, or short-form social media posts across all channels,\u201d he said.<\/p>\n<p>\u201cThe best creators will shrink their teams and solely focus on improving their content,\u201d he continued. \u201cTheir distribution channels will multiply overnight.\u201d<\/p>\n<h3>Customer Service Boon<\/h3>\n<p>Forrester was also optimistic about gen AI for language, which it predicts will transform knowledge work. One of the areas where it will have an immediate impact is customer service \u2014 where its ability to extract and retrieve knowledge from unstructured data allows high volumes of inquiries to be handled without the cost of adding staff.<\/p>\n<p>\u201cWhen it comes to service industries,\u201d Rafferty said, \u201cwe are already seeing customer service being disrupted. Klarna has massively reduced [its] headcount and tens of millions in expenses. It\u2019s as easy as building a chatbot or call agent that knows everything about your company and gets better over time as it handles customer issues and requests in real time.\u201d<\/p>\n<p>While gen AI is providing immediate benefits in limited use cases, Forrester noted, it acknowledged that trust in the technology is low. \u201cThere is a black box nature to some of these large language models. Visibility can be elusive,\u201d noted Zeid Khater, a customer data and analytics analyst at Forrester and one of the 20 contributors to the report.<\/p>\n<p>\u201cTrust is growing, and it will continue to grow as we familiarize ourselves with what the technology does,\u201d he told TechNewsWorld. \u201cLike most technologies, there are great things that it can enable, but there are also limitations. Being aware of the limitations and what they are will help determine where the trust factor should lie.\u201d<\/p>\n<p>\u201cBut for sensitive decision-making, I don\u2019t think there\u2019ll be a point where AI is the be-all and end-all until we develop explainability frameworks that are, to themselves, reliable to a high degree,\u201d he added.<\/p>\n<h3>IoT Security Growing in Importance<\/h3>\n<p>The report noted that IoT security is an important trend because it\u2019s evolving to protect critical data and devices. It explained that IoT security technologies reduce the chances of compromising critical data and can accelerate the value of edge intelligence technology. Traditional endpoint security and attack surface management solutions are not equipped to protect these devices.<\/p>\n<p>\u201cIoT security is crucial as these devices are now deeply embedded in critical infrastructure and everyday operations,\u201d said Krishna Vishnubhotla, VP of product strategy at Zimperium, a mobile security company based in Dallas.<\/p>\n<p>\u201cWith the increase in connectivity, each IoT device, including mobile devices, can be a potential entry point for cyberthreats,\u201d he told TechNewsWorld. \u201cEnsuring robust security measures for both IoT and mobile devices is essential to protect sensitive data and maintain the integrity of networks.\u201d<\/p>\n<p>John Gallagher, vice president of Viakoo Labs, an enterprise IoT security company in Mountain View, Calif., explained that IoT represents a rapidly growing attack surface.<\/p>\n<p>\u201cSecuring vulnerable IoT devices is critically important for enterprises,\u201d he told TechNewsWorld. \u201cBreached IoT devices are having devastating impacts, such as ransomware, data loss, changing the chemical balance in a municipal water supply, replacing real camera footage with deepfakes or disrupting transportation systems.\u201d<\/p>\n<p>\u201cLike everything in security, a particular segment does not take off until the threats arise,\u201d added Richard Stiennon, founder and chief research analyst of IT-Harvest, a cybersecurity industry analyst firm in Birmingham, Mich.<\/p>\n<p>\u201cIn the case of IoT, the recent revelations that China has persistently been infiltrating critical control systems for years has boosted IoT security,\u201d he told TechNewsWorld.<\/p>\n<p>\u201cThe number of connected devices grows every day,\u201d he continued. \u201cIt should not come as a surprise that attacks against those devices are on the rise.<\/p>\n<h3>Uprooting the Cryptographic Landscape<\/h3>\n<p>Forrester predicted in its report that quantum security \u2014 which uses quantum mechanics principles and quantum-resistant algorithms to perform cryptographic tasks or secure communications \u2014 will uproot the current encryption and identity-and-access-management landscape.<\/p>\n<p>\u201cUproot is too strong a word,\u201d argued Stiennon. \u201cQuantum computing is still years away. We are about at the stage of the first transistor \u2014 1947 \u2014 relative to the first computer using semiconductors.\u201d<\/p>\n<p>\u201cThat said,\u201d he continued, \u201cit makes perfect sense for organizations to get their encryption keys in order. While they are doing that, they can catalog all the places they will need to switch to quantum-safe encryption and create a long-term plan to re-key and transition.\u201d<\/p>\n<p>Forrester\u2019s prediction, though, seemed accurate to Duncan Jones, head of cybersecurity at Quantinuum, an international quantum computing hardware and software company. \u201cQuantum computing will completely upend cybersecurity,\u201d he told TechNewsWorld. \u201cEvery inch of cyberspace will be impacted.\u201d<\/p>\n<p>\u201cBut it\u2019s not all bad news,\u201d he added. \u201cAlthough future quantum computers will break many encryption systems, we can also harness quantum technology today to strengthen systems. Examples of this include hardening keys with quantum randomness. In the long term, we will view quantum as a gift for cybersecurity rather than a threat.\u201d<\/p>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Ten technologies that need to be on every company\u2019s radar were identified Tuesday in a trends report released by global technology research company Forrester. The<\/p>\n","protected":false},"author":1,"featured_media":1463,"comment_status":"","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[1224,1225,1226,1223,1029,498,80,381],"class_list":["post-1462","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","tag-among","tag-emerging","tag-forrester","tag-iot","tag-quantum","tag-security","tag-tech","tag-top"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.txd9.com\/index.php?rest_route=\/wp\/v2\/posts\/1462","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.txd9.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.txd9.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.txd9.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.txd9.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1462"}],"version-history":[{"count":0,"href":"https:\/\/www.txd9.com\/index.php?rest_route=\/wp\/v2\/posts\/1462\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.txd9.com\/index.php?rest_route=\/wp\/v2\/media\/1463"}],"wp:attachment":[{"href":"https:\/\/www.txd9.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1462"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.txd9.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1462"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.txd9.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1462"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}