Trends impacting Online Media
It is important to look broadly for disruption. This list includes 218 trends we're following that may shape the future for this industry. You can also click here to search for trends by industry and technology.
- Self-Sovereign Identity
- Web 3.0
- Tokenizing Value
- Tokens For Smart Royalties and Freelancers
- Immutable Content
- Content Provenance and Permanent Archiving
- Distributed Computing For a Cause
- U.S. and Global Election Security
- Interoperability Initiatives
- Corporate Foreign Policy
- Blockchain
- Digital Citizenship
- Popup Newsrooms and Limited-Edition News Products
- Demands for Accountability and Trust
- The Proliferation of Splinternets
- Optimizing for New Types of Search
- Investigating the Algorithms
- Journalism as a Service
- One-To-Few Publishing
- The First Amendment in a Digital Age
- Content Moderation in the Name of National Security
- Digitally Retouching History
- Decentralized Content Platforms
- Platform Switching and Demographic Shifts Threaten Established Social Networks
- Censorship in the Digital Age
- Sports Tech
- Connected Toys
- IRL Geography Reshapes the Virtual World
- The End of Attention Metrics
- Digital Frailty
- Trigger Warnings
- Abusing the Notification Layer
- Cancel Culture and its Backlash
- Platform Ownership
- Platforms Forced to Pick a Side
- Detecting Authentic Activity
- eSports
- Infinite Gameplay
- Continued Media Consolidation
- The Subscription Economy Matures
- Bounty Programs
- Magnetic Tape Supply Shortages
- Biometric Malware
- State-Sponsored Security Breaches
- Critical Infrastructure Targets
- Offensive Government Hacking
- Security
- Zero-Day Exploits on the Rise
- Zero-Knowledge Proofs Go Commercial
- Gaining Access to Backdoors
- Remote Kill Switches
- Insecure Supply Chains
- Data Manipulation Becomes The Greater Threat
- Consumer Device Targeting
- Cyber Risk Insurance
- A.I.-Powered Automated Hacking Systems
- DDoS Attacks on the Rise
- Third-Party Verified Identities
- Ransomware-as-a-Service
- Decentralized Hacktivists
- Targeted Attacks on Voice Interfaces
- Open Source App Vulnerabilities
- Global Cybersecurity Pacts
- Proliferation of Darknets
- Hijacking Internet Traffic
- Weird Glitches
- The End of Biological Privacy
- Public Entities Selling Private Data
- Connected Device Security Loopholes
- Tech Workers Fighting for Privacy
- Encrypted Messaging Networks
- Vanishing Messages
- Digital Eavesdropping Rights
- Data Ownership
- Digital Self-Incrimination
- Differential Privacy
- Promoting Anonymity
- Verification
- Revenge Porn
- Drone Surveillance
- Influencing Future Privacy Laws
- Defining Online Harassment
- Safeguarding and Verifying Leaked Data
- Trolls
- Data Retention Policies
- Compliance Challenges and Unrealistic Budgets
- Head Mounted Displays
- Home Automation
- Privacy
- Wearables
- Autonomous Underwater Vehicles
- Drone Air Lanes
- Follow Me Autonomously
- Drone Swarms
- Transportation Trends
- Cognitive Active Safety Features
- Electric Vehicles Cause Electricity Demand Spikes
- Transportation-as-a-Service
- Forced Updates To Firmware and Software
- Analog Fallbacks
- Exponential Growth in Autonomous Miles Data
- Autonomous Last Mile Logistics
- Mixed-Use Sidewalks and Drone Lanes
- Supersonic Flights
- Autonomous Ships
- A.I. at the Edge
- Drones
- Medical Supply Drone Delivery
- Drone Operation Centers
- Clandestine, Disappearing Drones
- Quantum and Edge
- Drones-as-a-Service
- Personal Home Drone Surveillance
- Flying Beyond Visual Line of Sight
- Real-Time Mapping
- Drones for Dangerous and Hard-To-Reach Areas
- Flying Taxis
- Synth-Pop Makes a Comeback
- Simulating Human Experiences
- Synthetic Voice Fraud
- Synthetic Sex Tapes
- Synthetic Property Rights and Legal Protections
- Using Synthetic Media to Get Around Copyright Laws
- Synthetic Media Marketplaces
- Truth Decay in an Era of Synthetic Media
- Speech Synthesis
- Modulating Custom Voices
- Deep Behaviors and Predictive Machine Vision
- Generative Algorithms for Voice, Sound and Video
- Mapped Synthetic Environments
- Two-Factor Biometric-Based Authentication
- Gesture Recognition
- Object Recognition in Computational Photography
- Biometric Camouflage
- Personality Recognition
- Accent Recognition
- Emotional Recognition
- Responsive Recognition Technology
- Affective Computing
- Genetic Recognition
- Universal Genetic Databases
- Persistent Workplace and School Surveillance
- Emerging Digital Interfaces
- Mixed Reality
- Virtual Reality
- Augmented Reality
- Synthetic Media and Content
- Holograms
- 360-degree Video
- Prioritizing Accountability and Trust
- Scoring
- Persistent Tracking and Scoring
- Scoring Agencies Are On the Rise
- Intentionally Opaque Methodologies
- Recognition
- Faceprints
- Voiceprints
- Bone Recognition
- Proximity Recognition
- A.I. and Digital Dividends
- Vast Differences in Verification Systems
- Behavioral Biometrics
- Scoring Vulnerable Populations
- Surveillance Scoring-as-a-Service (SSaaS)
- Bias in Scoring Systems
- Conflicting Norms, Standards and Regulations for Scoring
- Automatic Voice Transcription
- Bioacoustic Recognition
- WiFi Recognition
- Ambient Computing Expands
- Ubiquitous Digital Assistants
- Consumer-Grade A.I. Applications
- China’s A.I. Rules
- Artificial Emotional Intelligence
- Personal Digital Twins
- The Rise of Undocumented A.I. Accidents
- Problematic Data Sets
- A.I. to Catch Cheaters
- Algorithms Designed to Target Vulnerable Populations
- A.I. Still Has a Bias Problem
- A.I. Systems Intentionally Hiding Data
- Multitask Learning
- New Generative Modeling Techniques
- Hybrid Human-Computer Vision Analysis
- Predictive Machine Vision
- Automated Machine Learning (AutoML)
- Customized Machine Learning
- Graph Neural Networks
- Intelligent Optical Character Recognition
- A.I. for the Creative Process
- Generative Algorithms for Content Production
- Automated Versioning
- Algorithmic Fact Checking
- Datamining Crowds
- Generating Virtual Environments from Short Videos
- Global Rush to Fund A.I.
- Algorithm Marketplaces
- Fragmentation
- Neuro-Symbolic A.I. Algorithms and Systems
- Real-Time Machine Learning
- Natural Language Understanding (NLU)
- Machine Reading Comprehension (MRC)
- Natural Language Generation (NLG)
- Real-Time Context in Machine Learning
- General Reinforcement Learning Algorithms
- Deep Learning Scales
- Faster and More Powerful Open Source Frameworks
- Reinforcement Learning and Hierarchical RL
- Continuous Learning
- Corporate Biometric Spoofing
- Bots
- Marketplace Consolidation
- Liability Insurance for A.I.
- Ambient Surveillance
- Artificial Intelligence
- A.I. in the Cloud
- Proliferation of Franken-Algorithms
- Companies Manipulating A.I. Systems for Competitive Advantage