Trends impacting CPG
It is important to look broadly for disruption. This list includes 215 trends we're following that may shape the future for this industry. You can also click here to search for trends by industry and technology.
- Deep Learning for Food Recognition
- Big Tech Gets into Farming
- Big Tech Gets Into Healthcare
- Patient-Generated Health Data
- Rebuilding the Cold Chain
- The Anthropocene Epoch
- Unpredictable, Rising Sea Levels
- Extreme Weather Events
- Human Migration Patterns Shift
- Precision Agriculture
- The Proliferation of Splinternets
- 5G Triggers a Surge of New Businesses
- Capturing IIoT Metadata
- Robots as a Service (RaaS)
- Collaborative Robots
- Self-Assembling Robots
- Commercial Quadrupedal Robots
- Decentralized Content Platforms
- Platform Switching and Demographic Shifts Threaten Established Social Networks
- Censorship in the Digital Age
- IRL Geography Reshapes the Virtual World
- Digital Frailty
- Platform Ownership
- Detecting Authentic Activity
- Bounty Programs
- Magnetic Tape Supply Shortages
- Biometric Malware
- State-Sponsored Security Breaches
- Critical Infrastructure Targets
- Offensive Government Hacking
- Security
- Zero-Day Exploits on the Rise
- Zero-Knowledge Proofs Go Commercial
- Gaining Access to Backdoors
- Remote Kill Switches
- Insecure Supply Chains
- Data Manipulation Becomes The Greater Threat
- Consumer Device Targeting
- Cyber Risk Insurance
- A.I.-Powered Automated Hacking Systems
- DDoS Attacks on the Rise
- Third-Party Verified Identities
- Ransomware-as-a-Service
- Decentralized Hacktivists
- Targeted Attacks on Voice Interfaces
- Open Source App Vulnerabilities
- Global Cybersecurity Pacts
- Proliferation of Darknets
- Hijacking Internet Traffic
- Weird Glitches
- The End of Biological Privacy
- Public Entities Selling Private Data
- Connected Device Security Loopholes
- Tech Workers Fighting for Privacy
- Encrypted Messaging Networks
- Vanishing Messages
- Digital Eavesdropping Rights
- Data Ownership
- Digital Self-Incrimination
- Differential Privacy
- Promoting Anonymity
- Verification
- Revenge Porn
- Drone Surveillance
- Influencing Future Privacy Laws
- Defining Online Harassment
- Safeguarding and Verifying Leaked Data
- Trolls
- Data Retention Policies
- Compliance Challenges and Unrealistic Budgets
- Head Mounted Displays
- Home Automation
- Privacy
- Intelligent Packaging
- Insect Agriculture and Bug Proteins
- Cellular Agriculture
- Fertilizing the Oceans
- Enzymes to Eat Ocean Trash
- Corporate Environmental Responsibility
- Sustainability as Corporate Identity
- Corporates Adopt Net-Zero Energy
- Sustainable Shipping
- Corporate Meteorologists
- Aeroponics, Vertical Cultivation and Indoor Plant Factories
- Aeroponic Growing
- Vertical Farming Grows Up
- Indoor Plant Factories
- Geoengineering
- Storing Captured Carbon with Algae and Bacteria
- Converting Carbon Dioxide into Building Materials
- Stratospheric Aerosol Scattering with Sulfur Dioxide
- Reducing Corporate Reliance on Plastics
- Wireless Charging Everywhere
- Energy Trading Platforms for Blockchain
- Zero Carbon Natural Gas
- Floating Nuclear Energy Plants
- Subsea Power Grids
- A.I. at the Edge
- Neuroenhancers
- Vaping and E-cigarettes
- Nootropics
- Synth-Pop Makes a Comeback
- Simulating Human Experiences
- Synthetic Voice Fraud
- Synthetic Sex Tapes
- Synthetic Property Rights and Legal Protections
- Using Synthetic Media to Get Around Copyright Laws
- Synthetic Media Marketplaces
- Truth Decay in an Era of Synthetic Media
- Speech Synthesis
- Modulating Custom Voices
- Deep Behaviors and Predictive Machine Vision
- Generative Algorithms for Voice, Sound and Video
- Mapped Synthetic Environments
- Scaling Cannabis Infusion Techniques
- Specialized Cannabis CRM Platforms
- Vices
- CBD-Infused Products
- Cannabis Supply Chains
- Cannabis Compliance Systems
- Banking for Cannabis Dispensaries
- Two-Factor Biometric-Based Authentication
- Gesture Recognition
- Object Recognition in Computational Photography
- Biometric Camouflage
- Personality Recognition
- Accent Recognition
- Emotional Recognition
- Responsive Recognition Technology
- Affective Computing
- Genetic Recognition
- Universal Genetic Databases
- Persistent Workplace and School Surveillance
- Food Recognition Systems
- Emerging Digital Interfaces
- Mixed Reality
- Virtual Reality
- Augmented Reality
- Synthetic Media and Content
- Holograms
- 360-degree Video
- Prioritizing Accountability and Trust
- Scoring
- Persistent Tracking and Scoring
- Scoring Agencies Are On the Rise
- Intentionally Opaque Methodologies
- Recognition
- Faceprints
- Voiceprints
- Bone Recognition
- Proximity Recognition
- A.I. and Digital Dividends
- Vast Differences in Verification Systems
- Behavioral Biometrics
- Scoring Vulnerable Populations
- Surveillance Scoring-as-a-Service (SSaaS)
- Bias in Scoring Systems
- Conflicting Norms, Standards and Regulations for Scoring
- Automatic Voice Transcription
- Bioacoustic Recognition
- WiFi Recognition
- Ambient Computing Expands
- Ubiquitous Digital Assistants
- Consumer-Grade A.I. Applications
- China’s A.I. Rules
- Artificial Emotional Intelligence
- Personal Digital Twins
- The Rise of Undocumented A.I. Accidents
- Problematic Data Sets
- A.I. to Catch Cheaters
- Algorithms Designed to Target Vulnerable Populations
- A.I. Still Has a Bias Problem
- A.I. Systems Intentionally Hiding Data
- Multitask Learning
- New Generative Modeling Techniques
- Hybrid Human-Computer Vision Analysis
- Predictive Machine Vision
- Automated Machine Learning (AutoML)
- Customized Machine Learning
- Graph Neural Networks
- Intelligent Optical Character Recognition
- A.I. for the Creative Process
- Generative Algorithms for Content Production
- Automated Versioning
- Algorithmic Fact Checking
- Datamining Crowds
- Global Rush to Fund A.I.
- Algorithm Marketplaces
- Fragmentation
- Neuro-Symbolic A.I. Algorithms and Systems
- Real-Time Machine Learning
- Natural Language Understanding (NLU)
- Machine Reading Comprehension (MRC)
- Natural Language Generation (NLG)
- Real-Time Context in Machine Learning
- General Reinforcement Learning Algorithms
- Deep Learning Scales
- Faster and More Powerful Open Source Frameworks
- Reinforcement Learning and Hierarchical RL
- Continuous Learning
- Corporate Biometric Spoofing
- Bots
- Marketplace Consolidation
- Liability Insurance for A.I.
- Ambient Surveillance
- Artificial Intelligence
- A.I. in the Cloud
- Robotic Process Automation
- Digital Twins and Cognitive Twins in the Enterprise
- Robots with Cognitive Skills
- Advanced A.I. Chipsets
- Serverless Computing
- Proprietary, Homegrown A.I. Languages
- Proliferation of Franken-Algorithms
- Companies Manipulating A.I. Systems for Competitive Advantage