{"id":29876,"date":"2019-10-24T04:00:00","date_gmt":"2019-10-24T04:00:00","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/gartner-crystal-ball-looking-beyond-2020-at-the-top-it-changing-technologies\/"},"modified":"2019-10-24T04:00:00","modified_gmt":"2019-10-24T04:00:00","slug":"gartner-crystal-ball-looking-beyond-2020-at-the-top-it-changing-technologies","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/gartner-crystal-ball-looking-beyond-2020-at-the-top-it-changing-technologies\/","title":{"rendered":"Gartner crystal ball: Looking beyond 2020 at the top IT-changing technologies"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/images.techhive.com\/images\/article\/2016\/12\/employee-wellness-predictions-100700086-large.3x2.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>ORLANDO \u2013&nbsp; Forecasting long-range IT technology trends is a little herding cats \u2013 things can get a little crazy.<\/p>\n<p>But Gartner analysts have specialized in looking forwardth, boasting an 80 percent&nbsp; accuracy rate over the years, Daryl Plummer, distinguished vice president and Gartner Fellow told the IT crowd at this year\u2019s <a href=\"https:\/\/www.networkworld.com\/article\/3447397\/gartner-10-infrastructure-trends-you-need-to-know.html\">IT Symposium\/XPO<\/a>.&nbsp; Some of those successful prediction have included the rise of automation, robotics, AI technology&nbsp; and other ongoing trends.<\/p>\n<aside class=\"fakesidebar\"><a href=\"https:\/\/www.networkworld.com\/article\/3274654\/ai-boosts-data-center-availability-efficiency.html\">Now see how AI can boost data-center availability and efficiency<\/a><\/aside>\n<p>Like some of the <a href=\"https:\/\/www.networkworld.com\/article\/3447401\/gartner-top-10-strategic-technology-trends-for-2020.html\">other predictions<\/a> Gartner has made at this event, this year\u2019s package of predictions for 2020 and beyond is heavily weighted toward the human side of technology rather than technology itself.&nbsp;<\/p>\n<aside id=\"fsb-2602\" class=\"fakesidebar fakesidebar-auto fakesidebar-sponsored\"><strong>[ <a href=\"https:\/\/pluralsight.pxf.io\/c\/321564\/424552\/7490?u=https%3A%2F%2Fwww.pluralsight.com%2Fcourses%2Fadministering-office-365-quick-start\" rel=\"nofollow\">Become a Microsoft Office 365 administrator in record time with this quick start course from PluralSight.<\/a> ]<\/strong><\/aside>\n<p>&nbsp;\u201cBeyond offering insights into some of the most critical areas of technology evolution, this year\u2019s predictions help us move beyond thinking about mere notions of technology adoption and draw us more deeply into issues surrounding what it means to be human in the digital world.\u201d Plummer said.<\/p>\n<p>The list this year goes like this:<\/p>\n<p><strong>By 2023, the number of people with disabilities employed will triple due to AI and emerging technologies, reducing barriers to access.<\/strong><\/p>\n<aside class=\"nativo-promo nativo-promo-1 smartphone\" id><\/aside>\n<p>Technology is going to make it easier for people with &nbsp;disabilities &nbsp;to connect to the business world. \u201cPeople with disabilities constitute an untapped pool of critically skilled talent,\u201d Plummer said.<\/p>\n<p>\u201c<a href=\"https:\/\/www.gartner.com\/en\/newsroom\/press-releases\/2019-07-15-gartner-survey-reveals-leading-organizations-expect-t\" rel=\"nofollow\">Artificial intelligence (AI)<\/a>, augmented reality (AR), virtual reality (VR) and other <a href=\"https:\/\/www.gartner.com\/en\/newsroom\/press-releases\/2018-08-20-gartner-identifies-five-emerging-technology-trends-that-will-blur-the-lines-between-human-and-machine\" rel=\"nofollow\">emerging technologies<\/a> have made work more accessible for employees with disabilities. For example, select restaurants are starting to pilot AI robotics technology that enables paralyzed employees to control robotic waiters remotely. Organizations that actively employ people with disabilities will not only cultivate goodwill from their communities, but also see 89 percent higher retention rates, a 72 percent increase in employee productivity, and a 29 percent increase in profitability,\u201d Plummer said.<\/p>\n<aside class=\"nativo-promo nativo-promo-1 tablet desktop\" id><\/aside>\n<p><strong>By 2024, AI identification of emotions will influence more than half of the online advertisements you see.<\/strong><\/p>\n<p>Computer vision, which allows AI to identify and interpret physical environments, is one of the key technologies used for emotion recognition and has been ranked by Gartner as one of the most important technologies in the next three to five years.&nbsp; <a href=\"https:\/\/www.gartner.com\/smarterwithgartner\/13-surprising-uses-for-emotion-ai-technology\/\" rel=\"nofollow\">Artificial emotional intelligence (AEI)<\/a> is the next frontier for AI development, Plummer said.&nbsp; Twenty-eight percent of marketers ranked AI and machine learning (ML) among the top three technologies that will drive future marketing impact, and 87 percent of marketing organizations are currently pursuing some level of personalization, according to Gartner. By 2022, 10 percent of personal devices will have emotion AI capabilities, Gartner predicted.<\/p>\n<p>\u201cAI makes it possible for both digital and physical experiences to become hyper personalized, beyond clicks and browsing history but actually on how customers <em>feel<\/em> in a specific purchasing moment. With the promise to measure and engage consumers based on something once thought to be intangible, this area of \u2018empathetic marketing\u2019 holds tremendous value for both brands and consumers when used within the proper <a href=\"https:\/\/www.gartner.com\/smarterwithgartner\/how-to-balance-personalization-with-data-privacy\/\" rel=\"nofollow\">privacy<\/a> boundaries,\u201d said Plummer.<\/p>\n<p><strong>Through 2023, 30% of IT organizations will extend BYOD policies with \u201cbring your own enhancement\u201d (BYOE) to address augmented humans in the workforce.<\/strong><\/p>\n<aside class=\"nativo-promo nativo-promo-2 tablet desktop smartphone\" id><\/aside>\n<p>The concept of augmented workers has gained traction in social media conversations in 2019 due to advancements in wearable technology. Wearables are driving workplace productivity and safety across most verticals, including automotive, oil and gas, retail and healthcare.<\/p>\n<p>Wearables are only one example of physical augmentations available today, but humans will look to additional physical augmentations that will enhance their personal lives and help do their jobs. Gartner defines human augmentation as creating cognitive and physical improvements as an integral part of the human body. An example is using active control systems to create limb prosthetics with characteristics that can exceed the highest natural human performance.<\/p>\n<p>\u201cIT leaders certainly see these technologies as impactful, but it is the consumers\u2019 desire to physically enhance themselves that will drive the adoption of these technologies first,\u201d Plummer said. \u201cEnterprises need to balance the control of these devices in their enterprises while also enabling users to use them for the benefit of the organization.\u201d<\/p>\n<p><strong>By 2025, 50% of people with a smartphone but without a bank account will use a mobile-accessible cryptocurrency account.<\/strong><\/p>\n<p>Currently 30 percent of people have no bank account and 71 percent will subscribe to mobile services by 2025.&nbsp; Major online marketplaces and social media platforms will start supporting cryptocurrency payments by the end of next year. By 2022, Facebook, Uber, Airbnb, eBay, PayPal and other digital e-commerce companies will support over 750 million customer, Gartner predicts.<\/p>\n<p>At least half the globe\u2019s citizens who do not use a bank account will instead use these new mobile-enabled cryptocurrency account services offered by global digital platforms by 2025, Gartner said.<\/p>\n<p><strong>By 2023, a self-regulating association for oversight of AI and machine-learning designers will be established in at least four of the G7 countries.<\/strong><\/p>\n<p>By 2021, multiple incidents involving non-trivial AI-produced harm to hundreds or thousands of individuals can be expected, Gartner said.&nbsp; Public demand for protection from the consequences of malfunctioning algorithms will in turn produce pressure to assign legal liability for the harmful consequences of algorithm failure. The immediate impact of regulation of process will be to increase cycle times for AI and ML algorithm development and deployment. Enterprises can also expect to spend more for training and certification for practitioners and documentation of processes, as well as higher salaries for certified personnel.&nbsp;<\/p>\n<p>\u201cRegulation of products as complex as AI and ML algorithms is no easy task. Consequences of algorithm failures at scale that occur within major societal functions are becoming more visible. For instance, AI-related failures in autonomous vehicles and aircraft have already killed people and attracted widespread attention in recent months,\u201d said Plummer.<\/p>\n<p><strong>By 2023, 40% of professional workers will orchestrate their business application experiences and capabilities like they do their music streaming experience.<\/strong><\/p>\n<p>The human desire to have a work environment that is similar to their personal environment continues to rise \u2014 one where they can assemble their own applications to meet job and personal requirements in a <a href=\"https:\/\/www.gartner.com\/en\/newsroom\/press-releases\/2019-05-28-gartner-says-the-future-of-self-service-is-customer-l\" rel=\"nofollow\">self-service fashion<\/a>. The consumerization of technology and introduction of new applications have elevated the expectations of employees as to what is possible from their business applications. Gartner says through 2020, the top 10 enterprise-application vendors will expose over 90 percent of their application capabilities through APIs.<\/p>\n<p>\u201cApplications used to define our jobs. Nowadays, we are seeing organizations designing application experiences around the employee. For example, mobile and cloud technologies are freeing many workers from coming into an office and instead supporting a work-anywhere environment, outpacing traditional application business models,\u201d&nbsp; Plummer said. \u201cSimilar to how humans customize their streaming experience, they can increasingly customize and engage with new application experiences.\u201d<\/p>\n<p><strong>By 2023, up to 30 percent of world news and video content will be authenticated as real by blockchain countering deep fake technology.<\/strong><\/p>\n<p>Fake news represents deliberate disinformation, such as propaganda that is presented to viewers as real news. Its rapid proliferation in recent years can be attributed to bot-controlled accounts on social media, attracting more viewers than authentic news and manipulating human intake of information, Plummer said. Fake content, exacerbated by AI can pose an existential threat to an organization.<\/p>\n<p>By 2021, at least 10 major news organizations will use <a href=\"https:\/\/www.gartner.com\/smarterwithgartner\/the-cios-guide-to-blockchain\/\" rel=\"nofollow\">blockchain<\/a> to track and prove the authenticity of their published content to readers and consumers. Likewise, governments, technology giants and other entities are fighting back through industry groups and proposed regulations. \u201cThe IT organization must work with content-production teams to establish and track the origin of enterprise-generated content using blockchain technology,\u201d Plummer said. &nbsp;<\/p>\n<p><strong>On average, t<\/strong><strong>hrough 202, digital transformation initiatives will take large traditional enterprises&nbsp; twice as long and cost twice as much as anticipated.<\/strong><\/p>\n<p>Business leaders\u2019 expectations for revenue growth are unlikely to be realized from digital optimization strategies, due to the cost of technology modernization and the unanticipated costs of simplifying operational interdependencies. Such operational complexity also impedes the pace of change along with the degree of innovation and adaptability required to operate as a digital business.<\/p>\n<p>\u201cIn most traditional organizations, the gap between digital ambition and reality is large,\u201d Plummer said. \u201cWe expect CIOs\u2019 budget allocation for IT modernization to grow 7 percent year-over-year through 2021 to try to close that gap.\u201d<\/p>\n<p><strong>By 2023, individual activities will be tracked digitally by an \u201cInternet of Behavior\u201d to influence, benefit and service eligibility for 40% of people worldwide.<\/strong><\/p>\n<p>Through facial recognition, location tracking and big data, organizations are starting to monitor individual behavior and link that behavior to other digital actions, like buying a train ticket. The Internet of Things (IoT) \u2013 where physical things are directed to do a certain thing based on a set of observed operating parameters relative to a desired set of operating parameters \u2014 is now being extended to people, known as the Internet of Behavior (IoB).&nbsp; Through 2020 watch for examples of usage-based and behaviorally-based business models to expand into health insurance or financial services, Plummer said.<\/p>\n<p>\u201cWith IoB, value judgements are applied to behavioral events to create a desired state of behavior,\u201d Plummer said. \u201cWhat level of tracking will we accept? Will it be hard to get life insurance if your Fitbit tracker doesn\u2019t see 10,000 steps a day?\u201d<\/p>\n<p>\u201cOver the long term, it is likely that almost everyone living in a modern society will be exposed to some form of IoB that melds with cultural and legal norms of our existing predigital societies,\u201d &nbsp;Plummer said<\/p>\n<p><strong>By 2024, the World Health Organization will identify online shopping as an&nbsp; addictive disorder, as millions abuse digital commerce and encounter financial stress.<\/strong><\/p>\n<p>Consumer spending via digital commerce platforms will continue to grow over 10 percent year-over-year through 2022. In addition watch for an increased number of digital commerce orders predicted by, and initiated by, AI.<\/p>\n<p>The ease of online shopping will cause financial stress for millions of people, as online retailers increasingly use AI and personalization to effectively target consumers and prompt them to spend income that they do not have. The resulting debt and personal bankruptcies will cause depression and other health concerns caused by stress, which is capturing the attention of the WHO.<\/p>\n<p>\u201cThe side effects of technology that promote addictive behavior are not exclusive to consumers. CIOs must also consider the possibility of lost productivity among employees who put work aside for online shopping and other digital distractions. In addition, regulations in support of responsible online retail practices might force companies to provide warnings to prospective customers who are ready to make online purchases, similar to casinos or cigarette companies,\u201d Plummer said.<\/p>\n<div class=\"end-note\">\n<div id class=\"blx blxParticleendnote blxM2005 blox4_html blxC23909\">Join the Network World communities on <a href=\"https:\/\/www.facebook.com\/NetworkWorld\/\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a> and <a href=\"https:\/\/www.linkedin.com\/company\/network-world\" target=\"_blank\" rel=\"noopener noreferrer\">LinkedIn<\/a> to comment on topics that are top of mind.<\/div>\n<\/div>\n<p>READ MORE <a href=\"https:\/\/www.networkworld.com\/article\/3447759\/gartner-looks-beyond-2020-to-foretell-the-top-it-changing-technologies.html#tk.rss_security\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\nORLANDO \u2013\u00a0 Forecasting long-range IT technology trends is a little herding cats \u2013 things can get a little crazy.But Gartner analysts have specialized in looking forwardth, boasting an 80 percent\u00a0 accuracy rate over the years, Daryl Plummer, distinguished vice president and Gartner Fellow told the IT crowd at this year\u2019s IT Symposium\/XPO.\u00a0 Some of those successful prediction have included the rise of automation, robotics, AI technology\u00a0 and other ongoing trends.Now see how AI can boost data-center availability and efficiency<br \/>\nLike some of the other predictions Gartner has made at this event, this year\u2019s package of predictions for 2020 and beyond is heavily weighted toward the human side of technology rather than technology itself.\u00a0To read this article in full, please click here READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":29877,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[738],"tags":[812,307,764],"class_list":["post-29876","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-networkworld","tag-data-center","tag-security","tag-software"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Gartner crystal ball: Looking beyond 2020 at the top IT-changing technologies 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/gartner-crystal-ball-looking-beyond-2020-at-the-top-it-changing-technologies\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Gartner crystal ball: Looking beyond 2020 at the top IT-changing technologies 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/gartner-crystal-ball-looking-beyond-2020-at-the-top-it-changing-technologies\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-10-24T04:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/10\/gartner-crystal-ball-looking-beyond-2020-at-the-top-it-changing-technologies.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/gartner-crystal-ball-looking-beyond-2020-at-the-top-it-changing-technologies\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/gartner-crystal-ball-looking-beyond-2020-at-the-top-it-changing-technologies\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Gartner crystal ball: Looking beyond 2020 at the top IT-changing technologies\",\"datePublished\":\"2019-10-24T04:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/gartner-crystal-ball-looking-beyond-2020-at-the-top-it-changing-technologies\\\/\"},\"wordCount\":1778,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/gartner-crystal-ball-looking-beyond-2020-at-the-top-it-changing-technologies\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/gartner-crystal-ball-looking-beyond-2020-at-the-top-it-changing-technologies.jpg\",\"keywords\":[\"Data Center\",\"Security\",\"Software\"],\"articleSection\":[\"Networkworld\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/gartner-crystal-ball-looking-beyond-2020-at-the-top-it-changing-technologies\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/gartner-crystal-ball-looking-beyond-2020-at-the-top-it-changing-technologies\\\/\",\"name\":\"Gartner crystal ball: Looking beyond 2020 at the top IT-changing technologies 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/gartner-crystal-ball-looking-beyond-2020-at-the-top-it-changing-technologies\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/gartner-crystal-ball-looking-beyond-2020-at-the-top-it-changing-technologies\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/gartner-crystal-ball-looking-beyond-2020-at-the-top-it-changing-technologies.jpg\",\"datePublished\":\"2019-10-24T04:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/gartner-crystal-ball-looking-beyond-2020-at-the-top-it-changing-technologies\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/gartner-crystal-ball-looking-beyond-2020-at-the-top-it-changing-technologies\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/gartner-crystal-ball-looking-beyond-2020-at-the-top-it-changing-technologies\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/gartner-crystal-ball-looking-beyond-2020-at-the-top-it-changing-technologies.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/gartner-crystal-ball-looking-beyond-2020-at-the-top-it-changing-technologies.jpg\",\"width\":1200,\"height\":800},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/gartner-crystal-ball-looking-beyond-2020-at-the-top-it-changing-technologies\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Data Center\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/data-center\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Gartner crystal ball: Looking beyond 2020 at the top IT-changing technologies\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Gartner crystal ball: Looking beyond 2020 at the top IT-changing technologies 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/gartner-crystal-ball-looking-beyond-2020-at-the-top-it-changing-technologies\/","og_locale":"en_US","og_type":"article","og_title":"Gartner crystal ball: Looking beyond 2020 at the top IT-changing technologies 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/gartner-crystal-ball-looking-beyond-2020-at-the-top-it-changing-technologies\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-10-24T04:00:00+00:00","og_image":[{"width":1200,"height":800,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/10\/gartner-crystal-ball-looking-beyond-2020-at-the-top-it-changing-technologies.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/gartner-crystal-ball-looking-beyond-2020-at-the-top-it-changing-technologies\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/gartner-crystal-ball-looking-beyond-2020-at-the-top-it-changing-technologies\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Gartner crystal ball: Looking beyond 2020 at the top IT-changing technologies","datePublished":"2019-10-24T04:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/gartner-crystal-ball-looking-beyond-2020-at-the-top-it-changing-technologies\/"},"wordCount":1778,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/gartner-crystal-ball-looking-beyond-2020-at-the-top-it-changing-technologies\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/10\/gartner-crystal-ball-looking-beyond-2020-at-the-top-it-changing-technologies.jpg","keywords":["Data Center","Security","Software"],"articleSection":["Networkworld"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/gartner-crystal-ball-looking-beyond-2020-at-the-top-it-changing-technologies\/","url":"https:\/\/www.threatshub.org\/blog\/gartner-crystal-ball-looking-beyond-2020-at-the-top-it-changing-technologies\/","name":"Gartner crystal ball: Looking beyond 2020 at the top IT-changing technologies 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/gartner-crystal-ball-looking-beyond-2020-at-the-top-it-changing-technologies\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/gartner-crystal-ball-looking-beyond-2020-at-the-top-it-changing-technologies\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/10\/gartner-crystal-ball-looking-beyond-2020-at-the-top-it-changing-technologies.jpg","datePublished":"2019-10-24T04:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/gartner-crystal-ball-looking-beyond-2020-at-the-top-it-changing-technologies\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/gartner-crystal-ball-looking-beyond-2020-at-the-top-it-changing-technologies\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/gartner-crystal-ball-looking-beyond-2020-at-the-top-it-changing-technologies\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/10\/gartner-crystal-ball-looking-beyond-2020-at-the-top-it-changing-technologies.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/10\/gartner-crystal-ball-looking-beyond-2020-at-the-top-it-changing-technologies.jpg","width":1200,"height":800},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/gartner-crystal-ball-looking-beyond-2020-at-the-top-it-changing-technologies\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Data Center","item":"https:\/\/www.threatshub.org\/blog\/tag\/data-center\/"},{"@type":"ListItem","position":3,"name":"Gartner crystal ball: Looking beyond 2020 at the top IT-changing technologies"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/29876","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=29876"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/29876\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/29877"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=29876"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=29876"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=29876"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}