Trends impacting Airlines
It is important to look broadly for disruption. This list includes 238 trends we're following that may shape the future for this industry. You can also click here to search for trends by industry and technology.
- Personal Robots and Robot Butlers
- Ethical Manufacturing
- Robot Rights
- Smart Dust
- Reversing Environmental Rules and Regulations
- Green Tech
- Renewable Energy
- Charging Stations
- Ultra-High-Voltage Direct Current and Macro Grids
- Better Batteries
- The Anthropocene Epoch
- Unpredictable, Rising Sea Levels
- Extreme Weather Events
- Human Migration Patterns Shift
- The Proliferation of Splinternets
- Autonomous, Programmable Robot Swarms
- Robotic Process Automation
- Robot Compilers
- Soft Robotics
- 5G Triggers a Surge of New Businesses
- Capturing IIoT Metadata
- Robots as a Service (RaaS)
- Collaborative Robots
- Self-Assembling Robots
- Commercial Quadrupedal Robots
- Decentralized Content Platforms
- Platform Switching and Demographic Shifts Threaten Established Social Networks
- Censorship in the Digital Age
- IRL Geography Reshapes the Virtual World
- Digital Frailty
- Platform Ownership
- Detecting Authentic Activity
- Bounty Programs
- Magnetic Tape Supply Shortages
- Biometric Malware
- State-Sponsored Security Breaches
- Critical Infrastructure Targets
- Offensive Government Hacking
- Security
- Zero-Day Exploits on the Rise
- Zero-Knowledge Proofs Go Commercial
- Gaining Access to Backdoors
- Remote Kill Switches
- Insecure Supply Chains
- Data Manipulation Becomes The Greater Threat
- Consumer Device Targeting
- Cyber Risk Insurance
- A.I.-Powered Automated Hacking Systems
- DDoS Attacks on the Rise
- Third-Party Verified Identities
- Ransomware-as-a-Service
- Decentralized Hacktivists
- Targeted Attacks on Voice Interfaces
- Open Source App Vulnerabilities
- Global Cybersecurity Pacts
- Proliferation of Darknets
- Hijacking Internet Traffic
- Weird Glitches
- The End of Biological Privacy
- Public Entities Selling Private Data
- Connected Device Security Loopholes
- Tech Workers Fighting for Privacy
- Encrypted Messaging Networks
- Vanishing Messages
- Digital Eavesdropping Rights
- Data Ownership
- Digital Self-Incrimination
- Differential Privacy
- Promoting Anonymity
- Verification
- Revenge Porn
- Drone Surveillance
- Influencing Future Privacy Laws
- Defining Online Harassment
- Safeguarding and Verifying Leaked Data
- Trolls
- Data Retention Policies
- Compliance Challenges and Unrealistic Budgets
- Head Mounted Displays
- Home Automation
- Privacy
- Wearables
- Fertilizing the Oceans
- Enzymes to Eat Ocean Trash
- Corporate Environmental Responsibility
- Sustainability as Corporate Identity
- Corporates Adopt Net-Zero Energy
- Sustainable Shipping
- Geoengineering
- Storing Captured Carbon with Algae and Bacteria
- Converting Carbon Dioxide into Building Materials
- Stratospheric Aerosol Scattering with Sulfur Dioxide
- Reducing Corporate Reliance on Plastics
- Autonomous Underwater Vehicles
- Drone Air Lanes
- Follow Me Autonomously
- Drone Swarms
- Transportation Trends
- Cognitive Active Safety Features
- Electric Vehicles Cause Electricity Demand Spikes
- Transportation-as-a-Service
- Forced Updates To Firmware and Software
- Analog Fallbacks
- Exponential Growth in Autonomous Miles Data
- Autonomous Last Mile Logistics
- Mixed-Use Sidewalks and Drone Lanes
- Supersonic Flights
- Autonomous Ships
- Wireless Charging Everywhere
- Energy Trading Platforms for Blockchain
- Zero Carbon Natural Gas
- Floating Nuclear Energy Plants
- Subsea Power Grids
- A.I. at the Edge
- Near-Real-Time Application Environments
- Hyper-Local Data Centers for Edge Computing
- Quantum for the Masses
- Drones
- Medical Supply Drone Delivery
- Drone Operation Centers
- Clandestine, Disappearing Drones
- Quantum and Edge
- Drones-as-a-Service
- Personal Home Drone Surveillance
- Flying Beyond Visual Line of Sight
- Real-Time Mapping
- Drones for Dangerous and Hard-To-Reach Areas
- Flying Taxis
- Synth-Pop Makes a Comeback
- Simulating Human Experiences
- Synthetic Voice Fraud
- Synthetic Sex Tapes
- Synthetic Property Rights and Legal Protections
- Using Synthetic Media to Get Around Copyright Laws
- Synthetic Media Marketplaces
- Truth Decay in an Era of Synthetic Media
- Speech Synthesis
- Modulating Custom Voices
- Deep Behaviors and Predictive Machine Vision
- Generative Algorithms for Voice, Sound and Video
- Mapped Synthetic Environments
- Two-Factor Biometric-Based Authentication
- Gesture Recognition
- Object Recognition in Computational Photography
- Biometric Camouflage
- Personality Recognition
- Accent Recognition
- Emotional Recognition
- Responsive Recognition Technology
- Affective Computing
- Genetic Recognition
- Universal Genetic Databases
- Persistent Workplace and School Surveillance
- Emerging Digital Interfaces
- Mixed Reality
- Virtual Reality
- Augmented Reality
- Synthetic Media and Content
- Holograms
- 360-degree Video
- Prioritizing Accountability and Trust
- Scoring
- Persistent Tracking and Scoring
- Scoring Agencies Are On the Rise
- Intentionally Opaque Methodologies
- Recognition
- Faceprints
- Voiceprints
- Bone Recognition
- Proximity Recognition
- A.I. and Digital Dividends
- Vast Differences in Verification Systems
- Behavioral Biometrics
- Scoring Vulnerable Populations
- Surveillance Scoring-as-a-Service (SSaaS)
- Bias in Scoring Systems
- Conflicting Norms, Standards and Regulations for Scoring
- Automatic Voice Transcription
- Bioacoustic Recognition
- WiFi Recognition
- Ambient Computing Expands
- Ubiquitous Digital Assistants
- Consumer-Grade A.I. Applications
- China’s A.I. Rules
- Artificial Emotional Intelligence
- Personal Digital Twins
- The Rise of Undocumented A.I. Accidents
- Problematic Data Sets
- A.I. to Catch Cheaters
- Algorithms Designed to Target Vulnerable Populations
- A.I. Still Has a Bias Problem
- A.I. Systems Intentionally Hiding Data
- Multitask Learning
- New Generative Modeling Techniques
- Hybrid Human-Computer Vision Analysis
- Predictive Machine Vision
- Automated Machine Learning (AutoML)
- Customized Machine Learning
- Graph Neural Networks
- Intelligent Optical Character Recognition
- A.I. for the Creative Process
- Generative Algorithms for Content Production
- Automated Versioning
- Algorithmic Fact Checking
- Datamining Crowds
- Generative Adversarial Networks (GANs)
- Probabilistic Programming Languages
- Machine Image Completion
- Global Rush to Fund A.I.
- Algorithm Marketplaces
- Fragmentation
- Neuro-Symbolic A.I. Algorithms and Systems
- Real-Time Machine Learning
- Natural Language Understanding (NLU)
- Machine Reading Comprehension (MRC)
- Natural Language Generation (NLG)
- Real-Time Context in Machine Learning
- General Reinforcement Learning Algorithms
- Deep Learning Scales
- Faster and More Powerful Open Source Frameworks
- Reinforcement Learning and Hierarchical RL
- Continuous Learning
- Corporate Biometric Spoofing
- Bots
- Marketplace Consolidation
- Liability Insurance for A.I.
- Ambient Surveillance
- Creating 3D Models from Flat 2D Images
- Artificial Intelligence
- Using A.I. to Speed the Process of Scientific Discovery
- A.I. in the Cloud
- Digital Twins and Cognitive Twins in the Enterprise
- Robots with Cognitive Skills
- Advanced A.I. Chipsets
- Serverless Computing
- Proprietary, Homegrown A.I. Languages
- Proliferation of Franken-Algorithms
- Companies Manipulating A.I. Systems for Competitive Advantage