Today’s top tech execs pick tomorrow’s top 3 technologies

Discussing how technology applications have experienced a tremendous surge in recent years.

Published by 

Alexis Pratsides


Case study featured image for

Updated in July 2020

Over the last few years, technology applications have experienced a tremendous surge.

Developments in artificial intelligence (AI), the cloud, ID voice recognition and more have reshaped the world of technology and are responsible for all kinds of advancements across the globe. As we all know, 2020 has been accompanied by the coronavirus crisis and, due to this, a wide number of these technologies have been serving to fight the spread of the virus.

Artificial intelligence

AI continues to hold the top position in terms of technological advancements. However, it does have a negative side regarding jobs and society as a whole. One of its core applications is automation, which is causing the loss of a high number of jobs globally. On the other hand, artificial intelligence is also expected to create positions in development, programming, testing, support, etc.

Focussing on the coronavirus crisis, AI applications are allowing scientists to track the advance of the virus through algorithms. These are highly useful as early warning systems, to detect epidemiological patterns, or to spot virus transmission chains.

Edge computing

Edge computing is one of the tech trends that, like AI, has been with us for a long time now. But, 2020 is its official year of disruption. The adoption of services in the cloud continues to expand thanks to services such as Amazon Azure and Google Cloud. However, the amount of data we manage daily is increasing which can cause several conflicts within the cloud. The solution to this? Apply edge computing.

Edge computing is one of the bespoke solutions to tackle these cloud conflicts, as it enables all the data to be transferred to a data centre to be adequately processed; it has been designed to bypass the latency caused by the cloud. Due to this, edge computing is being used to process time-sensitive data in remote locations—where there is poor or limited connectivity—to a centralised location.

The main objective of this tech application is to process all data near its network perimeter (where data is generated) instead of processing it in a centralised data-processing place.


Last year, Google registered more than 4.3 million mentions of cybersecurity as a topic. Even though our society is aware of the problems generated by being super connected to the Internet of Things, cyberattacks are still happening. A wide range of businesses around the world are increasing protective measures, but there is still a lot to do in terms of implementing these measures.

In general, companies lack qualified personnel and training schemes to teach their teams to identify these attacks in good time. For example, the rise of potentially-dangerous practices such as deepfakes have become popular in 2020. In this fake media, a person appears on a video/image, replaced by an identical but fake, computer-generated product. These manipulations are increasing in number, and are produced through sophisticated artificial intelligence technology.

artificial technology being used to fake someones identity

The covid-19 crisis has been the perfect opportunity for hackers to direct their attacks, whether they use this technology or not. Mainly, these attacks have been perpetrated by email, targeting specific businesses. Attacks have become more damaging, especially to healthcare institutions and police services. Cybercriminals are using other methods to disrupt the life of their victims, intending to steal personal information and their login details. Text messages and fake social media accounts have also been used for this purpose. Therefore, it is of importance for every organisation to address these conflicts by providing their teams with cybersecurity training and other schemes to help them protect against malware. 

Get in touch today to start updating your website to protect against cyber attacks.

Blockchain technologies

Blockchains are just like their name refers: blocks of chains. These blocks store information, such as transactions, their date, time, and who was participating in a deal, etc. It is a term widely known by bitcoin and other cryptocurrency users, as it’s used as part of their transaction process. In simple terms, this is a chain of information. Wide ranges of companies are using blockchain applications now, as they do not have to rely on third parties to validate transactions. 

In conclusion

We do not know to what extent these tech applications will be implemented over the coming years, but what our digital marketing consultancy team knows for sure is that they will revolutionise the tech spectrum.  

Created by

Alexis Pratsides

Published at 

More insights from the team