Top Strategic Tech Trends for 2025 | Live from Gartner IT Symposium/Xpo

00:19:15
https://www.youtube.com/watch?v=m9qjraDsaGI

Zusammenfassung

TLDRVideoen præsenterer en kompleks diskussion om, hvordan organisationer kan navigere og innovere i lyset af hastigt stigende teknologiske forandringer. For at forklare dette bruger taleren en analogi med surfere, der skal vælge de rette bølger og strande – det vil sige teknologier og tidsrammer – for at opnå succes. Der diskuteres specifikt tre overordnede teknologiske områder: AI og dets risici, kommende grænser for computing, og menneske-maskine-synergi. Inden for AI lægges der vægt på 'agentic AI', der kan agere uafhængigt og potentielt redefinere arbejdskræfter, samt vigtigheden af AI-governance platforme for at sikre etik og ansvarlighed. Misinformation ses som en voksende trussel, især med avancerede phishing-teknikker. I forhold til postkvantekryptografi advares der om, at kvanteteknologi kan bryde nutidens kryptering, og relevansen af postkvantekryptografi understreges. Energieffektiv computing bliver mere nødvendig i takt med stigende krav til computerkapacitet og energibesparelse. Der vedrøres også emnerne om disinformation og sikkerhed, energioptimering inden for computing og hvordan fremtidige teknologiske fremskridt kan påvirke forretningsmodeller og samfundet som helhed.

Mitbringsel

  • 🏄‍♂️ Organisationer skal navigere i innovation med omhu og vælge de rette teknologier at fokusere på, ligesom surfere vælger bølger.
  • 💼 'Agentic AI' kan forbedre arbejdsstyrken ved at udføre opgaver uafhængigt.
  • 🌐 Postkvantekryptografi bliver afgørende for fremtidens cybersikkerhed i en kvanteteknologisk verden.
  • 🔒 AI governance platforms sikrer etisk og gennemsigtig anvendelse af kunstig intelligens.
  • 📢 Misinformation kan være skadelig for organisationers omdømme og kræver sikkerhedsværktøjer.
  • 🔋 Energieffektiv computing er afgørende for at håndtere stigende computer- og energikrav.
  • 🌊 Teknologiske fremskridt kan påvirke forretningsmodeller og samfundet som helhed.
  • 🛡️ Beskyttelse mod disinformation er en nyt og voksende sikkerhedsdimension.
  • 🤖 Menneske-maskine-synergi kan ændre måden, arbejdsstyrken opererer på.
  • 🔍 Identifikation af deep fakes og syntetiske medier er nu en nødvendighed.
  • 🗣️ Etik og ansvarlighed i AI-udvikling er ikke kun politik men en praksis.
  • 🕵️‍♀️ Der kræves avancerede sikkerhedstiltag for at imødegå sophisticated phishing.

Zeitleiste

  • 00:00:00 - 00:05:00

    Præsentationen starter med en analogi omkring surfing for at symbolisere opgaven med at vælge de rigtige innovationsstrategier for organisationer. Taleren beskriver processen bag udvælgelsen af fremtidige trends baseret på Gartner hype cycles og fremhæver tre fokusområder: AI risiko og imperativer, nye computingsgrænser, og menneske-maskine synergi. AI agenter fremstilles som løsningen til at håndtere opgaver uden menneskelig indblanding, hvilket kan ændre arbejdsstyrkens dynamik.

  • 00:05:00 - 00:10:00

    Fortsat fra AI-agent diskussionen, bevæger samtalen sig mod AI governance platforme, som forventes at blive essentielle for at sikre teknologiens etik og gennemsigtighed i de kommende årtier. Vigtigheden af AI-governance bliver understreget, bl.a. for at beskytte mod diskrimination og informationsmanipulation gennem AI. Taleren nævner potentielle stigninger i offentlige reguleringer omkring ansvarlig AI-brug og behovet for virksomheders efterlevelse.

  • 00:10:00 - 00:19:15

    Præsentationen skifter derefter fokus til misinformation og fejlinformation sikkerhed, som AI kan forværre ved at forfine phishing-angreb og skabe syntetiske medier. Der redegøres for fremkomsten af teknologier til at opdage og beskytte mod dybdelærte bedragerier og nødvendigheden af tværfagligt samarbejde for at håndtere desinformation. Computingsområderne dykker derefter ned i postkvantakryptering, RFID-udviklinger, og behovet for energibevidst computing som følge af stigende krav til kapacitet.

Mind Map

Video-Fragen und Antworten

  • Hvad er surf-analogien i præsentationen?

    Surf-analogien bruges til at forklare, hvordan organisationer kan navigere i innovation ved at vælge de rette teknologier (bølger) at fokusere på.

  • Hvad er betydningen af 'agentic AI'?

    Agentic AI refererer til kunstig intelligens, der kan handle selvstændigt baseret på at planlægge, sanse og træffe beslutninger, hvilket kan forbedre arbejdsstyrken og effektiviteten.

  • Hvordan påvirker kvanteteknologi cybersikkerhed?

    Kvanteteknologi kan bryde eksisterende asymmetrisk kryptering, hvilket kræver nye sikkerhedsprotokoller som postkvantekryptografi.

  • Hvad er AI governance platforms?

    AI governance platforms er teknologier, der sikrer, at AI udvikles og anvendes ansvarligt og etisk gennem øget transparens og kontrol.

  • Hvilken rolle spiller de nye IT-infrastrukturer?

    De nye IT-infrastrukturer, såsom energieffektiv computing, spiller en rolle i at reducere energiforbrug og carbon footprint i takt med stigende computerkrav.

  • Hvorfor er misinformation sikkerhed vigtigt?

    Misinformation sikkerhed er vigtigt for at beskytte organisationer mod fejlinformation, der kan skade deres omdømme og operationer.

  • Hvad er postkvantekryptografi?

    Postkvantekryptografi er en ny type kryptering, der kan modstå angreb fra både klassiske og kvantecomputere.

  • Hvordan kan organisationskultur påvirkes af AI?

    AI kan ændre organisationskulturen ved at introducere nye måder at arbejde på, herunder samarbejde mellem mennesker og maskiner.

  • Hvad indebærer energibesparende computerteknologier?

    Energibesparende teknologier stræber efter at opfylde de stigende computerefterspørgsler med mindre energi, reducere det samlede energiforbrug og møde pres fra regulatorer og kunder.

  • Hvordan kan virksomheder tilpasse sig stigende energikrav?

    Virksomheder kan tilpasse sig de stigende energikrav ved at investere i grønne cloudløsninger, optimere algoritmer for lavere energiforbrug og eksperimentere med nye teknologier.

Weitere Video-Zusammenfassungen anzeigen

Erhalten Sie sofortigen Zugang zu kostenlosen YouTube-Videozusammenfassungen, die von AI unterstützt werden!
Untertitel
en
Automatisches Blättern:
  • 00:00:02
    good
  • 00:00:02
    morning morning oh that's pretty cool
  • 00:00:05
    that's pretty cool so every day we wake
  • 00:00:10
    up with the challenge of bringing
  • 00:00:12
    Innovation to our
  • 00:00:15
    organizations and what's made it harder
  • 00:00:17
    over the last 20 years is those waves of
  • 00:00:19
    innovation come at us faster and faster
  • 00:00:22
    every day so that made me think of an
  • 00:00:25
    analogy that I would be using today for
  • 00:00:29
    this presentation
  • 00:00:31
    we are all going to be
  • 00:00:33
    Surfers we're going to decide what
  • 00:00:35
    beaches we should surf at and what waves
  • 00:00:39
    we should
  • 00:00:40
    ride we're going to take a look at waves
  • 00:00:43
    that are happening now in one to three
  • 00:00:45
    years near in 3 to five and in the
  • 00:00:49
    future five years and
  • 00:00:52
    Beyond but before I get started on that
  • 00:00:55
    I need to let you know how we got here
  • 00:00:57
    today how did we get to this list well
  • 00:01:01
    you've heard about the gardener hype
  • 00:01:03
    cycles and those Innovation profiles on
  • 00:01:05
    top of them the little dots we have over
  • 00:01:08
    2,000 of them we looked at the ones that
  • 00:01:11
    are coming from the technology trigger
  • 00:01:13
    to the peak of expected inflated
  • 00:01:18
    expectations then we took a look and
  • 00:01:21
    asked our analyst over 2500 of them
  • 00:01:24
    submit so we had this huge list we
  • 00:01:27
    vetted it down and then had our Chiefs
  • 00:01:29
    of research vote on it then finally the
  • 00:01:32
    team that worked with me to put together
  • 00:01:35
    today's list came up with a list of
  • 00:01:38
    technologies that we believe will shape
  • 00:01:41
    the future responsible
  • 00:01:45
    Innovation the three beaches that we're
  • 00:01:48
    going to look at today the first one is
  • 00:01:51
    AI risk and imperatives check I had to
  • 00:01:54
    say AI or else I don't get a bonus this
  • 00:01:57
    year right two
  • 00:02:01
    New Frontiers of computing oh my God
  • 00:02:04
    there is no more AI here and then lastly
  • 00:02:08
    how things are changing between humans
  • 00:02:10
    and machines human machine Synergy all
  • 00:02:14
    of this so that we can be responsible
  • 00:02:18
    ethical and
  • 00:02:20
    trusted so let's go to our first speech
  • 00:02:23
    our first speech here is AI imperatives
  • 00:02:26
    and risks and I'm going to build on what
  • 00:02:28
    you heard in the Keynote around agentic
  • 00:02:32
    AI so we have this as really two to
  • 00:02:35
    three years but it's now in two to three
  • 00:02:38
    years and I don't know about you there
  • 00:02:41
    isn't a day that I wake up where I don't
  • 00:02:43
    have a list of a thousand things to do
  • 00:02:46
    and every night I go to bed worried
  • 00:02:47
    about the things I didn't get done and
  • 00:02:51
    this is why we believe everybody needs
  • 00:02:54
    an agent we need agents why well what
  • 00:02:58
    can they do for us the first thing is
  • 00:03:01
    that agents are employees that never
  • 00:03:05
    need benefits they don't call it sick
  • 00:03:07
    they work 24 hours a day and will do
  • 00:03:10
    things for us that we often find mundane
  • 00:03:13
    or even more than that they can do
  • 00:03:16
    things with us or without us because
  • 00:03:21
    they have the ability to plan and sense
  • 00:03:23
    and make decisions and monitor and much
  • 00:03:27
    more also they may make websites or
  • 00:03:32
    applications unnecessary now I'm not
  • 00:03:34
    saying this is the death of the website
  • 00:03:36
    or the death of the application but
  • 00:03:39
    think about how many times people in
  • 00:03:41
    your organization get onto a website to
  • 00:03:44
    check something then decide to do
  • 00:03:48
    something based on what they saw same
  • 00:03:51
    thing for an
  • 00:03:52
    application we can have agents do those
  • 00:03:55
    things for us in fact we believe that
  • 00:03:59
    they're important because they can
  • 00:04:00
    upskill your Workforce so you saw Ula
  • 00:04:05
    Ula was able to become productive in
  • 00:04:09
    less than six months and have the equal
  • 00:04:11
    productivity of somebody with five years
  • 00:04:14
    but it can also enable new concepts of
  • 00:04:17
    scale so I want you to think of a list
  • 00:04:20
    when you leave this presentation of
  • 00:04:22
    things you would like agents to do for
  • 00:04:25
    you and your
  • 00:04:27
    organization and say what if we actually
  • 00:04:30
    created them lastly they can create new
  • 00:04:34
    co-workers now I don't know about you
  • 00:04:36
    I've always wondered how Tony Stark
  • 00:04:38
    could run a multi-billion dollar company
  • 00:04:40
    and have time to be an
  • 00:04:42
    Avenger he had
  • 00:04:44
    Jarvis multiple Jarvis is Jarvis
  • 00:04:48
    everywhere Jarvis for you Jarvis for
  • 00:04:51
    everyone so some of the things to
  • 00:04:53
    Watcher and do is that you're going to
  • 00:04:55
    see your application provider starting
  • 00:04:58
    to offer a Gent AI in their applications
  • 00:05:02
    they may make big announcements which
  • 00:05:04
    you've had some this month or they may
  • 00:05:06
    just put it in there and you can start
  • 00:05:08
    using it also you'll need to know when
  • 00:05:14
    this happens it's a signal it's in your
  • 00:05:16
    organization one of you developers walks
  • 00:05:18
    up to you and says hi look what I
  • 00:05:20
    created there here's an agent that
  • 00:05:22
    monitors all of our critical
  • 00:05:24
    infrastructure and it's going to manage
  • 00:05:26
    it while I'm on vacation right that's
  • 00:05:28
    pretty scary
  • 00:05:30
    but this is that b yo AI scenario this
  • 00:05:35
    can happen you can have developers
  • 00:05:37
    building agents right now and not be
  • 00:05:39
    aware of them another thing to watch out
  • 00:05:42
    for is that this is the not the next
  • 00:05:46
    generation of RPA this is not just
  • 00:05:49
    stringing applications together through
  • 00:05:52
    integration instead we have the ability
  • 00:05:55
    to make decisions and have action taken
  • 00:05:59
    so when it comes to the next generation
  • 00:06:02
    of Shadow it it's agentic
  • 00:06:06
    Ai and with that how do we manage this
  • 00:06:11
    new Workforce this brings us to our
  • 00:06:14
    second Trend which also Builds on things
  • 00:06:16
    that you've heard in the keynote and
  • 00:06:18
    that's AI governance platforms and we
  • 00:06:21
    believe this is happening in the next
  • 00:06:23
    two to four years so we've already saw
  • 00:06:27
    in the keynote cases of privacy being
  • 00:06:29
    broken discrimination could occur
  • 00:06:32
    through bias manipulation of markets and
  • 00:06:34
    many many other things that can happen
  • 00:06:37
    with
  • 00:06:38
    AI so we need an AI governance platform
  • 00:06:44
    that creates trust through
  • 00:06:46
    transparency we need to know what was
  • 00:06:49
    the data used to train this model how
  • 00:06:51
    was what was the algorithm or approach
  • 00:06:53
    used to train the model how did this
  • 00:06:56
    prompt come up with the answer that it
  • 00:06:58
    generated
  • 00:07:00
    also we need to have security and risk
  • 00:07:02
    management which is AI trism and then
  • 00:07:05
    we're going to have Guardian agents as
  • 00:07:07
    part of this this is the evolving area
  • 00:07:10
    of the AI governance
  • 00:07:12
    platform also it's going to ensure that
  • 00:07:16
    it serves everyone equally so this is
  • 00:07:19
    where we're going to see Technologies
  • 00:07:20
    emerge that actually check for bias and
  • 00:07:23
    you'll be able to do that as you're
  • 00:07:25
    building your applications or
  • 00:07:28
    agents and then lastly this is going to
  • 00:07:31
    pave the way to build ethics into every
  • 00:07:35
    AI that you
  • 00:07:37
    have so why is this important well we
  • 00:07:40
    need to have ethics in everything we
  • 00:07:43
    create because remember we want to be
  • 00:07:45
    responsible ethical and trusted and that
  • 00:07:48
    we want AIS to Monitor and prevent
  • 00:07:52
    anything bad so that we can have
  • 00:07:54
    generally good outcomes and of course
  • 00:07:57
    we're doing this to protect our
  • 00:08:00
    reputation so some of the things to
  • 00:08:02
    watch for is that you're going to see a
  • 00:08:04
    surge in government regulations they
  • 00:08:06
    continue to pop up everywhere every
  • 00:08:10
    government is concerned about it and
  • 00:08:12
    following those regulations will be
  • 00:08:14
    important and you're going to need
  • 00:08:15
    governance platforms to help you do
  • 00:08:18
    that next ethics is not going to be
  • 00:08:22
    something that you just write down and
  • 00:08:25
    say you do right what do I mean by that
  • 00:08:28
    ethics washing
  • 00:08:30
    so we're going to put out a policy that
  • 00:08:31
    says we are doing these things to
  • 00:08:32
    maintain ethicalness within our
  • 00:08:35
    organization and we're governing our AI
  • 00:08:37
    models and then have no tools to do it
  • 00:08:38
    or prove it also your vendors if they
  • 00:08:41
    make those claims you need to ensure
  • 00:08:44
    that they can actually do what they're
  • 00:08:46
    saying now we're also going to have to
  • 00:08:49
    pressure test all of our AI models to
  • 00:08:52
    check for bias those government's
  • 00:08:55
    platforms capabilities will help us do
  • 00:08:57
    that so that we don't release any bias
  • 00:09:01
    models now we believe that responsible
  • 00:09:04
    AI will be as standard as cyber security
  • 00:09:08
    and just as critical you'll have to do
  • 00:09:11
    this every
  • 00:09:13
    day onto our third Trend disinformation
  • 00:09:17
    security happening in the next one to
  • 00:09:19
    three years now what is disinformation
  • 00:09:23
    security I just think of it as bad
  • 00:09:26
    gossip right it's misinformation is to
  • 00:09:29
    be misleading we saw this recently with
  • 00:09:33
    the weather events here in Florida where
  • 00:09:35
    misleading information was propagated on
  • 00:09:38
    the web through how people can get
  • 00:09:40
    assistance after certain after the
  • 00:09:42
    Hurricanes that's that's sad that's said
  • 00:09:46
    so disinformation security right what's
  • 00:09:49
    made it worse is that AI has given the
  • 00:09:52
    technical means that your fishing tax
  • 00:09:55
    are so good you can bypass the patrol
  • 00:09:58
    controls and harm your Enterprise so
  • 00:10:01
    imagine I am I now can generate a
  • 00:10:03
    fishing attack that's so good you
  • 00:10:06
    believe it's me and you let me in your
  • 00:10:10
    organization now disinformation security
  • 00:10:13
    is an emerging category of Technologies
  • 00:10:15
    there are several of them right now such
  • 00:10:17
    as looking for deep fakes but it's aimed
  • 00:10:20
    at Discerning trust assessing the truth
  • 00:10:23
    and the spread of inform of information
  • 00:10:26
    knowing where it came from and where
  • 00:10:28
    it's going now within this trend there's
  • 00:10:31
    a Pandora's Box and it's
  • 00:10:34
    opened red team hackers now have the
  • 00:10:38
    ability to create
  • 00:10:41
    video
  • 00:10:43
    audio and O and imagery to be able to
  • 00:10:46
    that it's so good it can bypass the
  • 00:10:48
    biometric controls in your organization
  • 00:10:51
    and they can get into realtime
  • 00:10:54
    Communications so imagine this you're on
  • 00:10:56
    a c you're on a conference call you're
  • 00:10:58
    in your meeting you see each other and
  • 00:11:00
    you think you're actually talking to
  • 00:11:02
    your colleague and it's not
  • 00:11:06
    them next why is this important so
  • 00:11:10
    because the fishing attacks have gotten
  • 00:11:12
    so good with AI it's easy to use that as
  • 00:11:17
    the way in then using synthetic media I
  • 00:11:21
    can help spread false information inside
  • 00:11:24
    your organization and outside your
  • 00:11:28
    organization
  • 00:11:29
    so some of the things to watch for and
  • 00:11:31
    do here with misinformation is deep fake
  • 00:11:34
    identification tools looking for
  • 00:11:36
    synthetic media those are ones that you
  • 00:11:38
    should be looking at now also
  • 00:11:41
    impersonation prevention tools so
  • 00:11:43
    imagine a watermark at the underneath my
  • 00:11:46
    video as I'm in that conference goal
  • 00:11:47
    that says this is the real Gene Alvarez
  • 00:11:49
    we've authenticated that and we're doing
  • 00:11:52
    this so that we can protect our brand in
  • 00:11:56
    reputation what's really interesting
  • 00:11:58
    about this trend is for the first time
  • 00:12:00
    this is a team sport that involves the
  • 00:12:02
    business and cyber security marketing
  • 00:12:05
    may be detecting that the sentiment
  • 00:12:07
    analysis is dropping on your
  • 00:12:09
    organization and they'll have to get
  • 00:12:11
    together with the cyber security team to
  • 00:12:12
    figure out where is it coming from
  • 00:12:14
    what's the source is it true and if not
  • 00:12:17
    how do we correct
  • 00:12:19
    it so we're leaving the beach of AI now
  • 00:12:24
    that's it we're leaving bye and we're
  • 00:12:26
    now going across town to another Beach
  • 00:12:29
    New Frontiers of
  • 00:12:31
    computing now the next one is a hard one
  • 00:12:33
    for me to pronounce postquantum
  • 00:12:37
    cryptography now postquantum
  • 00:12:39
    cryptography We Believe will be bigger
  • 00:12:42
    than Y2K now please I know that's a big
  • 00:12:45
    claim please stick with me while I work
  • 00:12:47
    this out so Quantum Computing can break
  • 00:12:51
    every asymmetric encryption out there
  • 00:12:55
    now every application in your
  • 00:12:57
    organization that reaches the web uses
  • 00:13:00
    asymmetric encryption you may have in
  • 00:13:03
    that encryption used in applications
  • 00:13:05
    that you don't even know it's embedded
  • 00:13:07
    in there so when all the locks are
  • 00:13:11
    broken we need new
  • 00:13:13
    locks now postquantum Computing is a set
  • 00:13:17
    of algorithms that can resist attacks
  • 00:13:20
    from both classical computers and from
  • 00:13:24
    quantum
  • 00:13:25
    computers another Trend within this
  • 00:13:28
    trend that's happening is the Harvest
  • 00:13:30
    now and decrypt later so I get into your
  • 00:13:32
    organization through a fish I'm in and I
  • 00:13:35
    gather up all the encrypted data I can I
  • 00:13:37
    store it on my side as a red team hacker
  • 00:13:40
    and I'm waiting for Quantum to come
  • 00:13:42
    along to be able to unencrypt it so why
  • 00:13:46
    is postquantum cryptography important
  • 00:13:49
    well it's important because it's not a
  • 00:13:51
    simple patch it's not a simple as you
  • 00:13:53
    can run your patch management tools and
  • 00:13:54
    everything gets updated it's more than
  • 00:13:56
    that it's you need to also have an
  • 00:13:59
    inventory of everywhere you're using
  • 00:14:02
    encryption because all of it needs to be
  • 00:14:04
    replaced and these things can impact the
  • 00:14:08
    performance of applications that you
  • 00:14:10
    have running right now and I don't know
  • 00:14:13
    if there's anyone in this room that has
  • 00:14:15
    actually budgeted for it in
  • 00:14:18
    2025 so some of the things you're going
  • 00:14:20
    to have to do get an inventory where
  • 00:14:22
    you're using encryption move to a
  • 00:14:24
    cryptal agile approach where you can
  • 00:14:27
    update those applications and any other
  • 00:14:29
    things that use asymmetric encryption
  • 00:14:32
    and then also two you're going to have
  • 00:14:34
    to look at upgrading your hardware and
  • 00:14:36
    most importantly
  • 00:14:37
    budgeting so now let's go to ambient
  • 00:14:40
    invisible
  • 00:14:41
    intelligence remember when RFID promised
  • 00:14:44
    we could track everything and then we
  • 00:14:46
    saw the cost of the tags right and the
  • 00:14:49
    actual performance of them and the
  • 00:14:51
    batteries that they needed well no more
  • 00:14:54
    information in the shadows we are now
  • 00:14:57
    seeing because of the the low price and
  • 00:15:00
    form factors of the new tags such as the
  • 00:15:03
    ability for it to charge itself using
  • 00:15:05
    ambient radium frequency and paper thin
  • 00:15:09
    that you can tag anything and now go
  • 00:15:13
    after that information in the chat
  • 00:15:15
    Shadows such as how many chairs are in
  • 00:15:16
    this room where did they come from and
  • 00:15:18
    where do they need to go to next so this
  • 00:15:21
    means we're going to be redefining large
  • 00:15:24
    scale tagging and tracking and
  • 00:15:27
    intelligence and in the long run these
  • 00:15:29
    tags could be built into everyday
  • 00:15:31
    products which can lead us to a world of
  • 00:15:34
    smart
  • 00:15:36
    everything so this is going to be
  • 00:15:38
    important for organizations that want
  • 00:15:40
    that real-time inventory of millions of
  • 00:15:43
    items and this includes Industries like
  • 00:15:45
    retail food production warehousing for
  • 00:15:49
    example the sweater table where how many
  • 00:15:51
    sweaters and what sizes are on it we
  • 00:15:54
    could just scan it and know or ice cream
  • 00:15:56
    we need to know ice cream has made
  • 00:15:59
    maintained its temperature through the
  • 00:16:00
    entire supply chain but we have a
  • 00:16:03
    nefarious truck driver who actually
  • 00:16:04
    raises the temperature to save fuel that
  • 00:16:07
    tag would catch that we believe in the
  • 00:16:11
    next five years that those tags will hit
  • 00:16:13
    10 cents so some of the things you'll
  • 00:16:16
    need to do is when the tags hit 20 cents
  • 00:16:18
    is start looking for those opportunities
  • 00:16:21
    where you can use the tags for these
  • 00:16:23
    type of realtime information in the
  • 00:16:25
    shadow challenges you'll also have to
  • 00:16:28
    prepare your infrastructure for all of
  • 00:16:31
    this messaging go through it because the
  • 00:16:33
    volume is going to be
  • 00:16:34
    incredible and then next privacy
  • 00:16:37
    concerns remember my ice cream how do we
  • 00:16:40
    turn the tag off when Jean gets it at
  • 00:16:42
    home and he doesn't want anyone to know
  • 00:16:43
    how much ice cream he really eats all
  • 00:16:46
    right and yes I had some last night so
  • 00:16:50
    energy efficient Computing is our next
  • 00:16:53
    one anyone here in the room other than
  • 00:16:55
    those who put in solar have their
  • 00:16:56
    electricity bill go down for themselves
  • 00:16:58
    of their organization I don't think so I
  • 00:17:01
    know mine
  • 00:17:03
    hasn't however our com demand for
  • 00:17:05
    computing is through the roof through
  • 00:17:08
    the roof and we need to do more
  • 00:17:10
    Computing with less
  • 00:17:12
    energy so that means that we have to
  • 00:17:15
    find some consump some energy efficient
  • 00:17:18
    way because right now the rise of
  • 00:17:21
    computing power is so unsustainable for
  • 00:17:23
    us we can't catch up to
  • 00:17:25
    it so we're going to see an increased
  • 00:17:28
    demand because of big items such as AI
  • 00:17:31
    simulation
  • 00:17:33
    optimization me and media and driving
  • 00:17:36
    the growth of compute consumption and
  • 00:17:40
    driving our energy
  • 00:17:42
    footprint we're also seeing that
  • 00:17:44
    Executives Regulators partners and our
  • 00:17:47
    customers are putting us under pressure
  • 00:17:50
    to reduce its's carbon
  • 00:17:53
    footprint so why is this important well
  • 00:17:57
    incr incremental impr improvements is
  • 00:17:59
    not going to be enough yes you need to
  • 00:18:02
    do them but it's not going to be enough
  • 00:18:05
    we need to find long-term Solutions and
  • 00:18:08
    Innovative technology that's going to
  • 00:18:10
    help us meet the demand for computing
  • 00:18:13
    while reducing our carbon foot footprint
  • 00:18:16
    and of course we are seeing new
  • 00:18:18
    technologies emerging
  • 00:18:20
    here so in the short term you're going
  • 00:18:23
    to adopt such things as Green Cloud
  • 00:18:25
    moving things to Green Cloud you may
  • 00:18:27
    actually rewrite out algorithms remember
  • 00:18:29
    when we used to write them to save space
  • 00:18:32
    now we're going to write them to save
  • 00:18:34
    energy and we may be Shifting the load
  • 00:18:37
    of those of our compute to different
  • 00:18:40
    times in the
  • 00:18:42
    day so you're going to have to monitor
  • 00:18:44
    some of the new technologies coming out
  • 00:18:46
    and look at the ones that are offering
  • 00:18:47
    10x or 100x Improvement for Big Ticket
  • 00:18:51
    items such as Ai and you're going to
  • 00:18:54
    Pilot such new technology like Optical
  • 00:18:57
    computing morphic Computing and other
  • 00:19:00
    novel accelerators that are coming about
  • 00:19:03
    to take on this energy challenge
Tags
  • innovation
  • AI
  • menneske-maskine interaktion
  • postkvantekryptografi
  • informationssikkerhed
  • energibesparelse
  • surf-analogi
  • governance platform
  • etik
  • disinformation