SlideShare ist ein Scribd-Unternehmen logo
1 von 6
Downloaden Sie, um offline zu lesen
SEPTEMBER 10, 2018 ✱ ERICSSON TECHNOLOGY REVIEWERICSSON TECHNOLOGY REVIEW ✱ SEPTEMBER 10, 20181 2
✱ TECHNOLOGY TRENDS TECHNOLOGY TRENDS ✱
Rapid advancements in the use of machines to augment human intelligence are creating a
new reality in which we increasingly interact with robots and intelligent agents in our daily
lives, both privately and professionally. The list of examples is long, but a few of the most
common applications today are found in education, health care, maintenance and gaming.
My vision of the future network is an intelligent platform that enables this new reality
by supporting the digitalization of industries and society. This network platform consists
of three main areas: 5G access, automation through agility, and a distributed cloud.
A set of intelligent network applications and features is key to hiding complexity from
the network’s users, regardless of whether they are humans or machines.
The ability to transfer human skills in real time to other humans and machines located
all around the world has the potential to enable massive efficiency gains. Autonomous
operation by machines with self-learning capabilities offers the additional advantage of
continuous performance and quality enhancements. High levels of cooperation and trust
between humans and machines are essential. Building and maintaining trust will require
decision transparency, high availability, data integrity and clear communication of intentions.
The network platform I envision will deliver truly intuitive interaction between humans
and machines. In my view, there are five key technology trends that will play critical roles
in achieving the vision:
by erik ekudden, cto
#1	 The realization of zero touch
#2	The emergence of the Internet of Skills
#3	 Highly adaptable, cyber-physical systems
#4	 Trust technologies for security assurance
#5	 Ubiquitous, high-capacity radio
five technology
trends augmenting
the connected
society
SEPTEMBER 10, 2018 ✱ ERICSSON TECHNOLOGY REVIEWERICSSON TECHNOLOGY REVIEW ✱ SEPTEMBER 10, 2018
✱ TECHNOLOGY TRENDS TECHNOLOGY TRENDS ✱
the realization
of zero-touch
#1
TH E Z ERO -TO U CH networks
of the future will be characterized by
the fact that they require no human
intervention other than high-level
declarative and implementation-
independent intents. On the road to
zero touch both humans and machines
will learn from their interactions.
This will build trust and enable the
machines to adjust to human intention.
Computeandintelligencewillexistinthe
device,inthecloudandinvariousplacesin
thenetwork.Thenetworkwillautomatically
computetheimperativeactionstofulfill
givenintentsthroughaclosedloop
operation.Today’scomplexnetworks
aredesignedforoperationbyhumansand
thecomplexityisexpectedtoincrease.As
machinelearningandartificialintelligence
continuetodevelop,efficientlyintegrating
learningandreasoning,thecompetence
levelofmachineintelligencewillgrow.
AUGMENTATIONOFHUMAN
INTELLIGENCE
Therealizationofzerotouchisaniterative
processinwhichmachinesandhumans
collaboratereciprocally.Machinesbuild
intelligencethroughcontinuouslearning
andhumansareassistedbymachinesin
theirdecision-makingprocesses.Inthis
collaboration,themachinesgather
knowledgefromhumansandthe
environmentinordertobuildmodels
ofthereality.Structuredknowledgeis
createdfromunstructureddatawiththe
supportofsemanticwebtechnologies,
suchasontologies.Themodelsare
createdandevolvedwithnewknowledge
tomakeinformedpredictionsandenhance
automateddecisionmaking.
Tomaximizehumantrustandimprove
decisionquality,thereisaneedfor
transparencyinthemachine-driven
decision-makingprocess.Itispossible
togaininsightsintoamachine’sdecision
processbyanalyzingitsinternalmodeland
determininghowthatmodelsupported
particulardecisions.Thisservesasabasis
forgeneratingexplanationsthathumans
canunderstand.Humanscanalsoevaluate
decisionsandprovidefeedbacktothe
machinetofurtherimprovethelearning
3 4
process.Theinteractionbetweenhumans
andmachinesoccursusingnatural
languageprocessingaswellassyntactical
andsemanticanalysis.
ROBOTSANDAGENTSCOLLABORATE
WITHHUMANS
Inacollaborativescenario,arobotwillbe
abletoanticipatehumanintentionsand
respondproactively.Forexample,an
assembly-linerobotwouldautomatically
adaptitspacetotheskillsofitshuman
coworkers.Suchinteractionsrequirethe
introductionofexplainableartificial
intelligencetocultivatehumantrustin
robots.Robotswillworkalongsidehumans
toaidandtolearn.Robotscanalsointeract
withotherdigitalizedcomponentsor
digitaltwinstoreceivedirectfeedback.
However,furtheradvancementsinrobot
designandmanufacturingwillbeneeded
toimprovetheirdexterity.
Asoftwareagentinazero-touch
networkactsinthesamewayasahuman
operator.Theagentshouldbeabletolearn
theroleinrealtime,aswellasthepattern
andtheproperactionsforagiventask.
Inparticular,itshouldbeabletohandle
awiderangeofrandomvariationsinthe
task,includingcontaminateddatafrom
therealworldthatoriginatesfrom
incidentsandmistakes.Theseagentswill
learnthroughacombinationof
reinforcementlearning(wheretheagent
continuallyreceivesfeedbackfrom
theenvironment)andsupervised/
unsupervisedlearning(suchas
classification,regressionandclustering)
frommultipledatastreams.Anagentcan
bepre-trainedinasafeenvironment,
aswithinadigitaltwin,andtransferred
toalivesystem.Domainknowledgeisa
keysuccessfactorwhenapplyingagents
tocomplextasks.
Techniquessuchasneuralnetworks
offersignificantadvantagesinlearning
patterns,butthecurrentapproachistoo
rigid.Differentialplasticityisanother
techniquethatlookspromising.
SEPTEMBER 10, 2018 ✱ ERICSSON TECHNOLOGY REVIEWERICSSON TECHNOLOGY REVIEW ✱ SEPTEMBER 10, 2018
the emergence
of the internet
ofskills
#2
TH E I NTERN E T O F S KI LL S
allows humans to interact in real time
over great distances – both with each
other and with machines – and have
similar sensory experiences to those
that they experience locally. Current
application examples include remote
interactive teaching and remote repair
services. A fully immersive Internet of
Skills will become reality through a
combination of machine interaction
methods and extended
communication capabilities. Internet
of Skills-based systems are
characterized by the interplay of
various devices with sensing,
processing and actuation capabilities
near the user.
Currentsystemslacktheaudio,visual,
hapticandtelecommunicationcapabilities
necessarytoprovideafullyrealistic
experience.ToenabletheInternetofSkills,
theinterplaybetweenhumansandrobots,
andbetweenhumansandvirtualcontent,
isofparticularimportance.Bothindustry
andconsumersareshowinggreatinterest
andopennessinusingthesenew
capabilities.
HUMANSKILLSDELIVERED
WITHOUTBOUNDARIES
Anauthenticvisualexperiencerequires
real-time3Dvideocapturing,processing
andrendering.Thesecapabilitiesmakeit
possibletocreatea3Drepresentationof
thecapturedworldandprovidethe
experienceofbeingimmersedinaremote
orvirtualenvironment.Whiletoday’suser
devicesdon’tyetprovidethenecessary
resolution,fieldofview,depthperception,
wearabilityandpositioningcapabilities,
thequalityandperformanceofthese
technologycomponentsissteadily
improving.
Spatialmicrophoneswillbeusedto
separateindividualsoundsourcesinthe
spacedomain.Thisimpliesthattherewill
beanincreasedamountofdataneededto
capturetheaudiospatialaspects.Spatial
audiorenderingperformanceisverymuch
tiedtoefficienthead-relatedfiltermodels.
Newformatsforexchangingspatialaudio
streamshavebeenspecifiedand
compressiontechniquesarebeing
developed.
Hapticcomponentsallowuserstofeel
shapes,textures,motionandforcesin3D.
Deviceswillalsotrackthemotionsand
forcesappliedbytheuserduring
interaction.Withcurrenttechnologiesthe
userneedstowearorholdaphysical
device,butfutureultrasoundbasedhaptic
deviceswillofferacontact-freesolution.
Standardizationeffortsforhaptic
communicationwillallowforaquicker
adoptionofhapticcapabilities.
INSTANTINTERACTION
ANDCOMMUNICATION
Communicationbetweenhumansand
machineswillbecomemorenatural,tothe
pointthatitiscomparabletointerpersonal
interaction.Naturaluserinterfacessuchas
voiceandgesturewillbecommonplace.
Theuseofvision-basedsensorswillallow
foranintuitivetypeofinteraction.Tobetter
understandhuman-machineinteraction
thereisaneedtoevolvetheunderstanding
ofkinesiology,ergonomics,cognitive
scienceandsociology,andtoincorporate
themintoalgorithmsandindustrialdesign.
Thiswouldmakeiteasiertoconveya
machine’sintentbeforeitinitiatesactions,
forexample.
Largevolumesof3Dvisualinformation
imposehighnetworkcapacitydemands,
makingultra-lowlatencyandhigh
bandwidthcommunicationtechnologies
essential.Enablingthebestuser
experiencerequirestheuseofnetwork
edgecomputerstoprocessthelarge
volumesof3Dvisual,audioandhaptic
information.Thissetupsavesdevice
batterylifetimeandreducesheat
dissipation,aswellasreducingnetwork
load.
✱ TECHNOLOGY TRENDS TECHNOLOGY TRENDS ✱
5 6
SEPTEMBER 10, 2018 ✱ ERICSSON TECHNOLOGY REVIEWERICSSON TECHNOLOGY REVIEW ✱ SEPTEMBER 10, 2018
highly
adaptable
cyber-physical
systems
#3
✱ TECHNOLOGY TRENDS TECHNOLOGY TRENDS ✱
A CYB ER- PHYS I CAL system
is a composite of several systems of
varying natures that will soon be
present in all industry sectors. It is a
self-organizing expert system created
by the combination of model of models,
dynamic interaction between models
and deterministic communication.
A cyber-physical system presents a
concise and comprehensible system
overview that humans can understand
and act upon.
Themainpurposeofacyber-physical
systemistocontrolaphysicalprocessand
usefeedbacktoadapttonewconditions
inrealtime.Itbuildsupontheintegrationof
computing,networkingandphysical
processes.Anexampleofacyber-physical
systemisasmartfactorywhere
mechanicalsystems,robots,rawmaterials,
andproductscommunicateandinteract.
Thisinteractionenablesmachine
intelligencetoperformmonitoringand
controlofoperationsatallplantlevels.
SYNERGISTICINTEGRATIONOF
COMPUTATION,NETWORKINGAND
PHYSICALPROCESSES
Themainchallengeistheorchestration
ofthenetworkedcomputationalresources
formanyinterworkingphysicalsystems
withdifferentlevelsofcomplexity.Cyber-
physicalsystemsaretransformingtheway
peopleinteractwithengineeredsystems,
justastheinternethastransformedthe
waypeopleinteractwithinformation.
Humanswillassumeresponsibility
onawideroperatingscale,supervising
theoperationofthemostlyautomated
andself-organizingprocess.
Acyber-physicalsystemcontains
differentheterogeneouselementssuchas
mechanical,electrical,electromechanical,
controlsoftware,communicationnetwork
andhuman-machineinterfaces.Itisa
challengetounderstandtheinteractionof
thephysical,cyberandhumanworlds.
Systemmodelswilldefinetheevolutionof
eachsystemstateintime.Anoverarching
modelwillbeneededtointegrateallthe
respectivesystemmodelswhilecontem-
platingallpossibledynamicinteractions.
Thisimpliesacontrolprogramthatdelivers
adeterministicbehaviortoeach
subsystem.Currentdesigntoolsneedto
beupgradedtoconsidertheinteractions
betweenthevarioussystems,their
interfacesandabstractions.
MODELOFMODELSCREATES
THECYBER-PHYSICALSYSTEM
Withinthecyber-physicalsystemall
systemdynamicsneedtobeconsidered
throughamodelthatinteractswithallthe
sub-models.Manyfactorsimpactthe
dynamicsoftheinteractionsbetweenthe
systems,includinglatency,bandwidthand
reliability.Forawirelessnetwork,factors
suchasthedevicelocation,thepropagation
conditionsandthetrafficloadchangeover
time.Thismeansthatnetworksneedtobe
modeledinordertobeintegratedinthe
modelofmodels.
Thetimeittakestoperformataskmay
becriticaltoenableacorrectlyfunctioning
system.Physicalprocessesare
compositionsofmanythingsoccurringin
parallel.Amodeloftimethatisconsistent
withtherealitiesoftimemeasurementand
timesynchronizationneedstobe
standardizedacrossallmodels.
EXAMPLE:INDUSTRY4.0
Thefactoryofthefutureimplementsthe
conceptofIndustry4.0,whichincludesthe
transformationfrommassproductionto
masscustomization.Thisvisionwillbe
realizedthroughlarge-scaleindustrial
automationtogetherwiththedigitalization
ofmanufacturingprocesses.
Humansassumetheroleofsupervising
theoperationoftheautomatedandself-
organizingproductionprocess.Inthis
contextitwillbepossibletorecognizeall
thesystemmodelsthatneedtointeract:
•	Physicalandroboticsystemssuchas
conveyors,roboticarmsandautomated
guidedvehicles
•	Controlsystemssuchasrobot
controllersandprogrammablelogic
controllersforproduction
•	Softwaresystemstomanageallthe
operations
•	Bigdataandanalytics-based
softwaresystems
•	Electricalsystemstopower
machinesandrobots
•	 Communicationnetworks
•	 Sensorsanddevices.
Themastermodelconsistsofandinteracts
withallthelistedprocessesabove,resulting
intherealizationofthefinalproduct.
7 8
SEPTEMBER 10, 2018 ✱ ERICSSON TECHNOLOGY REVIEWERICSSON TECHNOLOGY REVIEW ✱ SEPTEMBER 10, 2018
trust
technologies
for security
assurance
#4
✱ TECHNOLOGY TRENDS TECHNOLOGY TRENDS ✱
TRUS T TECH N O LO G I E S will
provide mechanisms to protect
networks and offer security assurance
to both humans and machines.
Artificial intelligence and machine
learning are needed to manage the
complexity and variety of security
threats and the dynamics of networks.
Rapidly emerging confidential
computing – together with possible
future multi-party computation – will
facilitate secure cloud processing of
private and confidential data.
Performance and security demands
are driving the development of
algorithms and protocols for identities.
Theuseofcloudtechnologiescontinuesto
grow.Billionsofnewdeviceswithdifferent
capabilitiesandcharacteristicswillallbe
connectedtothecloud.Manyofthemare
physicallyaccessibleandthusexposed
andvulnerabletoattackortobeing
misusedasinstrumentsofattack.Digital
identitiesareneededtoproveownership
ofdataandtoensurethatservicesonly
connecttoothertrustworthyservices.
Flexibleanddynamicauditingand
complianceverificationarerequiredto
handlenewthreats.Furthermore,thereisa
needforautomatedprotectionthatadapts
tooperatingmodesandperformsanalytics
onthesysteminoperation.
PROTECTIONDRIVENBY
ARTIFICIALINTELLIGENCE
Artificialintelligence,machinelearningand
automationarebecomingimportanttools
forsecurity.Machinelearningaddresses
areassuchasthreatdetectionanduser
behavioranalytics.Artificialintelligence
assistssecurityanalystsbycollectingand
siftingthroughthreatinformationtofind
relevantinformationandcomputing
responses.However,thereisaneedto
addressthecurrentlackofopen
benchmarkstodeterminethematurityof
thetechnologyandpermitcomparisonof
products.
Whilethecurrenttrendistocentralize
dataandcomputation,security
applicationsfortheInternetofThingsand
futurenetworkswillrequiremore
distributedandhierarchicalapproachesto
supportbothfastlocaldecisionsand
slowerglobaldecisionsthatinfluencelocal
policies.
CONFIDENTIALCOMPUTING
TOBUILDTRUST
Confidentialcomputingusesthefeatures
ofenclaves–trustedexecution
environmentsandrootoftrust
technologies.Codeanddataiskept
confidentialandintegrityprotectionis
enforcedbyhardwaremechanisms,which
enablestrongguaranteesthatdataand
processingarekeptconfidentialinthe
cloudenvironmentandprevent
unauthorizedexposureofdatawhendoing
analytics.Confidentialcomputingis
becomingcommercialincloudsystems.
Researchisunderwaytoovercomethe
remainingchallenges,includingimproving
theefficiencyofthetrustedcomputing
base,reducingcontextswitchoverheads
whenportingapplicationsandpreventing
sidechannelinformationleakage.
Multi-partycomputationenables
partiestojointlycomputefunctionsover
theircombineddatainputswhilekeeping
thoseinputsprivate.Inadditionto
protectingtheconfidentialityoftheinput
data,multi-partyprotocolsmust
guaranteethatmaliciouspartiesarenot
abletoaffecttheoutputofhonestparties.
Althoughmulti-partycomputationis
alreadyusedinspecialcases,itslimited
functionalityandhighcomputation
complexitycurrentlystandinthewayof
wideadoption.Timewilltellifitbecomes
aspromisingasconfidentialcomputing.
PRIVACYREQUIRESSECURE
IDENTITIES
Digitalidentitiesarecrucialtomaintaining
ownershipofdataandforauthenticating
andauthorizingusers.Solutionsthat
addressidentitiesandcredentialsfor
machinesareequallyimportant.The
widespreaduseofwebandcloud
technologieshasmadetheneedfor
efficientidentitysolutionsevenmore
urgent.Inaddition,betteralgorithmsand
newprotocolsforthetransportlayer
securityprovideimprovedsecurity,lower
latencyandreducedoverhead.Efficiency
isparticularlyimportantwhen
orchestratingandusingidentitiesformany
dynamiccloudsystems,suchasthose
realizedviamicroservices,forexample.
Whenquantumcomputerswithenough
computationalpowerareavailable,all
existingidentitysystemsthatusepublic-
keycryptographywilllosetheirsecurity.
Developingnewsecurealgorithmsforthis
post-quantumcryptographyeraisan
activeresearcharea.
9 10
SEPTEMBER 10, 2018 ✱ ERICSSON TECHNOLOGY REVIEWERICSSON TECHNOLOGY REVIEW ✱ SEPTEMBER 10, 2018
✱ TECHNOLOGY TRENDS TECHNOLOGY TRENDS ✱
TH E WI RELE SS access network
is becoming a general connectivity
platform that enables the sharing of
data anywhere and anytime for anyone
and anything. There is good reason to
believe that rapidly increasing data
volumes will continue in the
foreseeable future. Ultra-reliable
connectivity requires ultra-low
latency, which will be needed to
support demanding use cases.
The focus will be on enabling high
data rates for everyone, rather than
support for extremely high data rates
that are only achievable under specific
conditions or for specific users.
Afewtechnologieswillneedtobe
enhancedinordertocreateaubiquitous,
high-capacityradionetwork.Thecommon
denominatorforthesetechnologiesistheir
capabilitytoenableandutilizehigh
frequenciesandwidebandwidth
operations.Coverageisaddressed
throughbeamformingandflexibilityin
deviceinterworking.Thechallengeisto
supportdatavolumesanddemanding-
trafficusecases,withoutacorresponding
increaseincostandenergyconsumption.
DEVICESACTASNETWORKNODES
Toenhancedevicecoverage,performance
andreliability,simultaneousmulti-site
connectivityacrossdifferentaccess
technologiesandaccessnodesisrequired.
Wirelesstechnologywillbeusedforthe
connectivitybetweenthenetworknodes,
asacomplementtofiber-basednetworks.
Devicecooperationwillbeusedtocreate
virtuallargeantennaarraysonthedevice
sidebycombiningtheantennasofmultiple
devices.Theborderlinebetweendevices
andnetworknodeswillbemorediffuse.
Massiveheterogenousnetworkswill
haveamuchmoremesh-likeconnectivity.
Advancedmachinelearningandartificial
intelligencewillbekeytothemanagement
ofthisnetwork,enablingittoevolveand
adapttonewrequirementsandchangesin
theoperatingenvironment.
NOSURPRISE–EXPONENTIAL
INCREASEDDATARATES
Meetingfuturebitratedemandswill
requiretheuseoffrequencybandsabove
100GHz.Operationinsuchspectrumwill
enableterabitdatarates,althoughonlyfor
short-rangeconnectivity.Itwillbean
implementationchallengetogenerate
substantialoutputpowerandhandleheat
dissipation,consideringthesmall
dimensionsofTHzcomponentsand
antennas.Spectrumsharingwillbefurther
enabledbybeamforming,whichismade
possiblebythehighfrequency.
Integratedpositioningwillbeenabledby
high-frequencyandwide-bandwidth
operationincombinationwithverydense
deploymentsofnetworknodes.High-
accuracypositioningisimportantfor
enhancednetworkperformanceandisan
enablerfornewtypesofend-userservices.
Thepositioningofmobiledevices,both
indoorandoutdoor,willbeanintegrated
partofthewirelessaccessnetworks.
Accuracywillbewellbelowonemeter.
ANEWTRADE-OFFBETWEEN
ANALOGANDDIGITALRADIO
FREQUENCYHARDWARE
Forthepast20yearstherehasbeen
acontinuoustrendtowardmoving
functionalityfromtheanalogtothedigital
radiofrequencydomain.However,the
trendisreversedforverywideband
transmissionatveryhighfrequencies,
incombinationwithaverylargenumber
ofantennas.Thismeansthatanew
implementationbalanceandinterplay
betweentheanaloganddigitalradio
frequencydomainswillemerge.
Increasinglysophisticatedprocessingis
alreadymovingovertotheanalogdomain.
Thiswillsoonalsoincludeutilizing
correlationsbetweendifferentanalog
signalsreceivedondifferentantennas,for
example.Thecompressionrequirements
ontheanalog-to-digitalconversionis
reduced.Thesplitbetweenanalogand
digitalradiofrequencyhardware
implementationwillchangeovertimeas
technologyandrequirementsevolve.
ubiquitous,
high-capacity
radio
#5
11 12

Weitere ähnliche Inhalte

Was ist angesagt?

Ericsson Technology Review, issue #1, 2016
Ericsson Technology Review, issue #1, 2016Ericsson Technology Review, issue #1, 2016
Ericsson Technology Review, issue #1, 2016
Ericsson
 

Was ist angesagt? (20)

Ericsson Technology Review: Service exposure: a critical capability in a 5G w...
Ericsson Technology Review: Service exposure: a critical capability in a 5G w...Ericsson Technology Review: Service exposure: a critical capability in a 5G w...
Ericsson Technology Review: Service exposure: a critical capability in a 5G w...
 
Ericsson Technology Review: Issue 2/2019
Ericsson Technology Review: Issue 2/2019Ericsson Technology Review: Issue 2/2019
Ericsson Technology Review: Issue 2/2019
 
Ericsson Technology Review: Boosting smart manufacturing with 5G wireless con...
Ericsson Technology Review: Boosting smart manufacturing with 5G wireless con...Ericsson Technology Review: Boosting smart manufacturing with 5G wireless con...
Ericsson Technology Review: Boosting smart manufacturing with 5G wireless con...
 
Ericsson Technology Review - Issue 1, 2019
Ericsson Technology Review - Issue 1, 2019Ericsson Technology Review - Issue 1, 2019
Ericsson Technology Review - Issue 1, 2019
 
Ericsson Technology Review: Driving transformation in the automotive and road...
Ericsson Technology Review: Driving transformation in the automotive and road...Ericsson Technology Review: Driving transformation in the automotive and road...
Ericsson Technology Review: Driving transformation in the automotive and road...
 
Ericsson Technology Review: Versatile Video Coding explained – the future of ...
Ericsson Technology Review: Versatile Video Coding explained – the future of ...Ericsson Technology Review: Versatile Video Coding explained – the future of ...
Ericsson Technology Review: Versatile Video Coding explained – the future of ...
 
Critical Broadband Networks presentation slideshare
Critical Broadband Networks presentation slideshareCritical Broadband Networks presentation slideshare
Critical Broadband Networks presentation slideshare
 
Ericsson Technology Review: Critical IoT connectivity: Ideal for time-critica...
Ericsson Technology Review: Critical IoT connectivity: Ideal for time-critica...Ericsson Technology Review: Critical IoT connectivity: Ideal for time-critica...
Ericsson Technology Review: Critical IoT connectivity: Ideal for time-critica...
 
Ericsson Technology Review: Key technology choices for optimal massive IoT de...
Ericsson Technology Review: Key technology choices for optimal massive IoT de...Ericsson Technology Review: Key technology choices for optimal massive IoT de...
Ericsson Technology Review: Key technology choices for optimal massive IoT de...
 
Ericsson Technology Review: Industrial automation enabled by robotics, machin...
Ericsson Technology Review: Industrial automation enabled by robotics, machin...Ericsson Technology Review: Industrial automation enabled by robotics, machin...
Ericsson Technology Review: Industrial automation enabled by robotics, machin...
 
Ericsson Technology Review: Cognitive technologies in network and business au...
Ericsson Technology Review: Cognitive technologies in network and business au...Ericsson Technology Review: Cognitive technologies in network and business au...
Ericsson Technology Review: Cognitive technologies in network and business au...
 
Ericsson 5G Radio Dot Infographic
Ericsson 5G Radio Dot InfographicEricsson 5G Radio Dot Infographic
Ericsson 5G Radio Dot Infographic
 
Ericsson Technology Review: issue 1, 2020
Ericsson Technology Review: issue 1, 2020Ericsson Technology Review: issue 1, 2020
Ericsson Technology Review: issue 1, 2020
 
Ericsson Technology Review: 5G-TSN integration meets networking requirements ...
Ericsson Technology Review: 5G-TSN integration meets networking requirements ...Ericsson Technology Review: 5G-TSN integration meets networking requirements ...
Ericsson Technology Review: 5G-TSN integration meets networking requirements ...
 
Ericsson Technology Review: End-to-end Security Management for the IoT
Ericsson Technology Review: End-to-end Security Management for the IoTEricsson Technology Review: End-to-end Security Management for the IoT
Ericsson Technology Review: End-to-end Security Management for the IoT
 
Ericsson Technology Review: 5G BSS: Evolving BSS to fit the 5G economy
Ericsson Technology Review: 5G BSS: Evolving BSS to fit the 5G economyEricsson Technology Review: 5G BSS: Evolving BSS to fit the 5G economy
Ericsson Technology Review: 5G BSS: Evolving BSS to fit the 5G economy
 
Ericsson Technology Review: Flexibility in 5G transport networks: the key to ...
Ericsson Technology Review: Flexibility in 5G transport networks: the key to ...Ericsson Technology Review: Flexibility in 5G transport networks: the key to ...
Ericsson Technology Review: Flexibility in 5G transport networks: the key to ...
 
Ericsson Technology Review, issue #1, 2016
Ericsson Technology Review, issue #1, 2016Ericsson Technology Review, issue #1, 2016
Ericsson Technology Review, issue #1, 2016
 
Evolving cellular IoT for industry digitalization
Evolving cellular IoT for industry digitalizationEvolving cellular IoT for industry digitalization
Evolving cellular IoT for industry digitalization
 
Ieee 5 g summit_ericsson_a
Ieee 5 g summit_ericsson_aIeee 5 g summit_ericsson_a
Ieee 5 g summit_ericsson_a
 

Ähnlich wie Ericsson Technology Review: Technology trends 2018 - Five technology trends augmenting the connected society

Unraveling the Critical Technology Elements: Navigating the Digital Landscape
Unraveling the Critical Technology Elements: Navigating the Digital LandscapeUnraveling the Critical Technology Elements: Navigating the Digital Landscape
Unraveling the Critical Technology Elements: Navigating the Digital Landscape
greendigital
 
accenturetechnologyvision2015slidshare-150129052229-conversion-gate01
accenturetechnologyvision2015slidshare-150129052229-conversion-gate01accenturetechnologyvision2015slidshare-150129052229-conversion-gate01
accenturetechnologyvision2015slidshare-150129052229-conversion-gate01
Crissa Toledo
 
Harbor Research - Designing Security for the Internet of Things & Smart Devices
Harbor Research - Designing Security for the Internet of Things & Smart DevicesHarbor Research - Designing Security for the Internet of Things & Smart Devices
Harbor Research - Designing Security for the Internet of Things & Smart Devices
Harbor Research
 
Eurotech reinvents Embedded Connected Computing for M2M. Machine-to-Machine c...
Eurotech reinvents Embedded Connected Computing for M2M. Machine-to-Machine c...Eurotech reinvents Embedded Connected Computing for M2M. Machine-to-Machine c...
Eurotech reinvents Embedded Connected Computing for M2M. Machine-to-Machine c...
Eurotech
 

Ähnlich wie Ericsson Technology Review: Technology trends 2018 - Five technology trends augmenting the connected society (20)

Ericsson Technology Review: Tackling IoT complexity with machine intelligence
Ericsson Technology Review: Tackling IoT complexity with machine intelligenceEricsson Technology Review: Tackling IoT complexity with machine intelligence
Ericsson Technology Review: Tackling IoT complexity with machine intelligence
 
Five Converging Forces that Are Driving Technological Evolution
Five Converging Forces that Are Driving Technological EvolutionFive Converging Forces that Are Driving Technological Evolution
Five Converging Forces that Are Driving Technological Evolution
 
IOTCYBER
IOTCYBERIOTCYBER
IOTCYBER
 
Book Review : TGC5 Transformative Telco Technologies
Book Review : TGC5 Transformative Telco TechnologiesBook Review : TGC5 Transformative Telco Technologies
Book Review : TGC5 Transformative Telco Technologies
 
Unraveling the Critical Technology Elements: Navigating the Digital Landscape
Unraveling the Critical Technology Elements: Navigating the Digital LandscapeUnraveling the Critical Technology Elements: Navigating the Digital Landscape
Unraveling the Critical Technology Elements: Navigating the Digital Landscape
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
What Can We Expect From Upcoming Developments In IoT.pdf
What Can We Expect From Upcoming Developments In IoT.pdfWhat Can We Expect From Upcoming Developments In IoT.pdf
What Can We Expect From Upcoming Developments In IoT.pdf
 
An Internet of Things blueprint for a smarter world
An Internet of Things blueprint for a smarter worldAn Internet of Things blueprint for a smarter world
An Internet of Things blueprint for a smarter world
 
Accenture Technology Vision 2015 - Digital Business Era
Accenture Technology Vision 2015 - Digital Business EraAccenture Technology Vision 2015 - Digital Business Era
Accenture Technology Vision 2015 - Digital Business Era
 
accenturetechnologyvision2015slidshare-150129052229-conversion-gate01
accenturetechnologyvision2015slidshare-150129052229-conversion-gate01accenturetechnologyvision2015slidshare-150129052229-conversion-gate01
accenturetechnologyvision2015slidshare-150129052229-conversion-gate01
 
Report 3 the fourth industrial revolution - things to tighten the link betwe...
Report 3  the fourth industrial revolution - things to tighten the link betwe...Report 3  the fourth industrial revolution - things to tighten the link betwe...
Report 3 the fourth industrial revolution - things to tighten the link betwe...
 
Harbor Research - Designing Security for the Internet of Things & Smart Devices
Harbor Research - Designing Security for the Internet of Things & Smart DevicesHarbor Research - Designing Security for the Internet of Things & Smart Devices
Harbor Research - Designing Security for the Internet of Things & Smart Devices
 
Eurotech reinvents Embedded Connected Computing for M2M. Machine-to-Machine c...
Eurotech reinvents Embedded Connected Computing for M2M. Machine-to-Machine c...Eurotech reinvents Embedded Connected Computing for M2M. Machine-to-Machine c...
Eurotech reinvents Embedded Connected Computing for M2M. Machine-to-Machine c...
 
Ericsson Technology Review: Spotlight on the Internet of Things
Ericsson Technology Review: Spotlight on the Internet of ThingsEricsson Technology Review: Spotlight on the Internet of Things
Ericsson Technology Review: Spotlight on the Internet of Things
 
Top 10 technologies trending in 2019
Top 10 technologies trending in 2019Top 10 technologies trending in 2019
Top 10 technologies trending in 2019
 
Internet of Things : Stats and Facts
Internet of Things : Stats and FactsInternet of Things : Stats and Facts
Internet of Things : Stats and Facts
 
Internet Of Things Uses & Applications In Various Industries | IOT
Internet Of Things Uses & Applications In Various Industries | IOTInternet Of Things Uses & Applications In Various Industries | IOT
Internet Of Things Uses & Applications In Various Industries | IOT
 
An Overview of Internet of Things (IoT): From Literature Survey to Applicatio...
An Overview of Internet of Things (IoT): From Literature Survey to Applicatio...An Overview of Internet of Things (IoT): From Literature Survey to Applicatio...
An Overview of Internet of Things (IoT): From Literature Survey to Applicatio...
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Top 14 IoT Trends to Emerge in 2023.pdf
Top 14 IoT Trends to Emerge in 2023.pdfTop 14 IoT Trends to Emerge in 2023.pdf
Top 14 IoT Trends to Emerge in 2023.pdf
 

Mehr von Ericsson

Mehr von Ericsson (13)

Ericsson Technology Review: Integrated access and backhaul – a new type of wi...
Ericsson Technology Review: Integrated access and backhaul – a new type of wi...Ericsson Technology Review: Integrated access and backhaul – a new type of wi...
Ericsson Technology Review: Integrated access and backhaul – a new type of wi...
 
Ericsson Technology Review: The future of cloud computing: Highly distributed...
Ericsson Technology Review: The future of cloud computing: Highly distributed...Ericsson Technology Review: The future of cloud computing: Highly distributed...
Ericsson Technology Review: The future of cloud computing: Highly distributed...
 
Ericsson Technology Review: Optimizing UICC modules for IoT applications
Ericsson Technology Review: Optimizing UICC modules for IoT applicationsEricsson Technology Review: Optimizing UICC modules for IoT applications
Ericsson Technology Review: Optimizing UICC modules for IoT applications
 
Ericsson Technology Review: 5G migration strategy from EPS to 5G system
Ericsson Technology Review: 5G migration strategy from EPS to 5G systemEricsson Technology Review: 5G migration strategy from EPS to 5G system
Ericsson Technology Review: 5G migration strategy from EPS to 5G system
 
Ericsson Technology Review: Creating the next-generation edge-cloud ecosystem
Ericsson Technology Review: Creating the next-generation edge-cloud ecosystemEricsson Technology Review: Creating the next-generation edge-cloud ecosystem
Ericsson Technology Review: Creating the next-generation edge-cloud ecosystem
 
SD-WAN Orchestration
SD-WAN OrchestrationSD-WAN Orchestration
SD-WAN Orchestration
 
Ericsson Technology Review: Meeting 5G latency requirements with inactive state
Ericsson Technology Review: Meeting 5G latency requirements with inactive stateEricsson Technology Review: Meeting 5G latency requirements with inactive state
Ericsson Technology Review: Meeting 5G latency requirements with inactive state
 
Ericsson Technology Review: Cloud-native application design in the telecom do...
Ericsson Technology Review: Cloud-native application design in the telecom do...Ericsson Technology Review: Cloud-native application design in the telecom do...
Ericsson Technology Review: Cloud-native application design in the telecom do...
 
Ericsson Microwave Outlook 2018
Ericsson Microwave Outlook 2018Ericsson Microwave Outlook 2018
Ericsson Microwave Outlook 2018
 
Ericsson Technology Review: Simplifying the 5G ecosystem by reducing architec...
Ericsson Technology Review: Simplifying the 5G ecosystem by reducing architec...Ericsson Technology Review: Simplifying the 5G ecosystem by reducing architec...
Ericsson Technology Review: Simplifying the 5G ecosystem by reducing architec...
 
Ericsson Technology Review: Distributed cloud - A key enabler of automotive a...
Ericsson Technology Review: Distributed cloud - A key enabler of automotive a...Ericsson Technology Review: Distributed cloud - A key enabler of automotive a...
Ericsson Technology Review: Distributed cloud - A key enabler of automotive a...
 
Ericsson Technology Review: The advantages of combining 5G NR with LTE
Ericsson Technology Review: The advantages of combining 5G NR with LTEEricsson Technology Review: The advantages of combining 5G NR with LTE
Ericsson Technology Review: The advantages of combining 5G NR with LTE
 
Is your network ready for 5G?
Is your networkready for 5G?Is your networkready for 5G?
Is your network ready for 5G?
 

Kürzlich hochgeladen

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Kürzlich hochgeladen (20)

Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 

Ericsson Technology Review: Technology trends 2018 - Five technology trends augmenting the connected society

  • 1. SEPTEMBER 10, 2018 ✱ ERICSSON TECHNOLOGY REVIEWERICSSON TECHNOLOGY REVIEW ✱ SEPTEMBER 10, 20181 2 ✱ TECHNOLOGY TRENDS TECHNOLOGY TRENDS ✱ Rapid advancements in the use of machines to augment human intelligence are creating a new reality in which we increasingly interact with robots and intelligent agents in our daily lives, both privately and professionally. The list of examples is long, but a few of the most common applications today are found in education, health care, maintenance and gaming. My vision of the future network is an intelligent platform that enables this new reality by supporting the digitalization of industries and society. This network platform consists of three main areas: 5G access, automation through agility, and a distributed cloud. A set of intelligent network applications and features is key to hiding complexity from the network’s users, regardless of whether they are humans or machines. The ability to transfer human skills in real time to other humans and machines located all around the world has the potential to enable massive efficiency gains. Autonomous operation by machines with self-learning capabilities offers the additional advantage of continuous performance and quality enhancements. High levels of cooperation and trust between humans and machines are essential. Building and maintaining trust will require decision transparency, high availability, data integrity and clear communication of intentions. The network platform I envision will deliver truly intuitive interaction between humans and machines. In my view, there are five key technology trends that will play critical roles in achieving the vision: by erik ekudden, cto #1 The realization of zero touch #2 The emergence of the Internet of Skills #3 Highly adaptable, cyber-physical systems #4 Trust technologies for security assurance #5 Ubiquitous, high-capacity radio five technology trends augmenting the connected society
  • 2. SEPTEMBER 10, 2018 ✱ ERICSSON TECHNOLOGY REVIEWERICSSON TECHNOLOGY REVIEW ✱ SEPTEMBER 10, 2018 ✱ TECHNOLOGY TRENDS TECHNOLOGY TRENDS ✱ the realization of zero-touch #1 TH E Z ERO -TO U CH networks of the future will be characterized by the fact that they require no human intervention other than high-level declarative and implementation- independent intents. On the road to zero touch both humans and machines will learn from their interactions. This will build trust and enable the machines to adjust to human intention. Computeandintelligencewillexistinthe device,inthecloudandinvariousplacesin thenetwork.Thenetworkwillautomatically computetheimperativeactionstofulfill givenintentsthroughaclosedloop operation.Today’scomplexnetworks aredesignedforoperationbyhumansand thecomplexityisexpectedtoincrease.As machinelearningandartificialintelligence continuetodevelop,efficientlyintegrating learningandreasoning,thecompetence levelofmachineintelligencewillgrow. AUGMENTATIONOFHUMAN INTELLIGENCE Therealizationofzerotouchisaniterative processinwhichmachinesandhumans collaboratereciprocally.Machinesbuild intelligencethroughcontinuouslearning andhumansareassistedbymachinesin theirdecision-makingprocesses.Inthis collaboration,themachinesgather knowledgefromhumansandthe environmentinordertobuildmodels ofthereality.Structuredknowledgeis createdfromunstructureddatawiththe supportofsemanticwebtechnologies, suchasontologies.Themodelsare createdandevolvedwithnewknowledge tomakeinformedpredictionsandenhance automateddecisionmaking. Tomaximizehumantrustandimprove decisionquality,thereisaneedfor transparencyinthemachine-driven decision-makingprocess.Itispossible togaininsightsintoamachine’sdecision processbyanalyzingitsinternalmodeland determininghowthatmodelsupported particulardecisions.Thisservesasabasis forgeneratingexplanationsthathumans canunderstand.Humanscanalsoevaluate decisionsandprovidefeedbacktothe machinetofurtherimprovethelearning 3 4 process.Theinteractionbetweenhumans andmachinesoccursusingnatural languageprocessingaswellassyntactical andsemanticanalysis. ROBOTSANDAGENTSCOLLABORATE WITHHUMANS Inacollaborativescenario,arobotwillbe abletoanticipatehumanintentionsand respondproactively.Forexample,an assembly-linerobotwouldautomatically adaptitspacetotheskillsofitshuman coworkers.Suchinteractionsrequirethe introductionofexplainableartificial intelligencetocultivatehumantrustin robots.Robotswillworkalongsidehumans toaidandtolearn.Robotscanalsointeract withotherdigitalizedcomponentsor digitaltwinstoreceivedirectfeedback. However,furtheradvancementsinrobot designandmanufacturingwillbeneeded toimprovetheirdexterity. Asoftwareagentinazero-touch networkactsinthesamewayasahuman operator.Theagentshouldbeabletolearn theroleinrealtime,aswellasthepattern andtheproperactionsforagiventask. Inparticular,itshouldbeabletohandle awiderangeofrandomvariationsinthe task,includingcontaminateddatafrom therealworldthatoriginatesfrom incidentsandmistakes.Theseagentswill learnthroughacombinationof reinforcementlearning(wheretheagent continuallyreceivesfeedbackfrom theenvironment)andsupervised/ unsupervisedlearning(suchas classification,regressionandclustering) frommultipledatastreams.Anagentcan bepre-trainedinasafeenvironment, aswithinadigitaltwin,andtransferred toalivesystem.Domainknowledgeisa keysuccessfactorwhenapplyingagents tocomplextasks. Techniquessuchasneuralnetworks offersignificantadvantagesinlearning patterns,butthecurrentapproachistoo rigid.Differentialplasticityisanother techniquethatlookspromising.
  • 3. SEPTEMBER 10, 2018 ✱ ERICSSON TECHNOLOGY REVIEWERICSSON TECHNOLOGY REVIEW ✱ SEPTEMBER 10, 2018 the emergence of the internet ofskills #2 TH E I NTERN E T O F S KI LL S allows humans to interact in real time over great distances – both with each other and with machines – and have similar sensory experiences to those that they experience locally. Current application examples include remote interactive teaching and remote repair services. A fully immersive Internet of Skills will become reality through a combination of machine interaction methods and extended communication capabilities. Internet of Skills-based systems are characterized by the interplay of various devices with sensing, processing and actuation capabilities near the user. Currentsystemslacktheaudio,visual, hapticandtelecommunicationcapabilities necessarytoprovideafullyrealistic experience.ToenabletheInternetofSkills, theinterplaybetweenhumansandrobots, andbetweenhumansandvirtualcontent, isofparticularimportance.Bothindustry andconsumersareshowinggreatinterest andopennessinusingthesenew capabilities. HUMANSKILLSDELIVERED WITHOUTBOUNDARIES Anauthenticvisualexperiencerequires real-time3Dvideocapturing,processing andrendering.Thesecapabilitiesmakeit possibletocreatea3Drepresentationof thecapturedworldandprovidethe experienceofbeingimmersedinaremote orvirtualenvironment.Whiletoday’suser devicesdon’tyetprovidethenecessary resolution,fieldofview,depthperception, wearabilityandpositioningcapabilities, thequalityandperformanceofthese technologycomponentsissteadily improving. Spatialmicrophoneswillbeusedto separateindividualsoundsourcesinthe spacedomain.Thisimpliesthattherewill beanincreasedamountofdataneededto capturetheaudiospatialaspects.Spatial audiorenderingperformanceisverymuch tiedtoefficienthead-relatedfiltermodels. Newformatsforexchangingspatialaudio streamshavebeenspecifiedand compressiontechniquesarebeing developed. Hapticcomponentsallowuserstofeel shapes,textures,motionandforcesin3D. Deviceswillalsotrackthemotionsand forcesappliedbytheuserduring interaction.Withcurrenttechnologiesthe userneedstowearorholdaphysical device,butfutureultrasoundbasedhaptic deviceswillofferacontact-freesolution. Standardizationeffortsforhaptic communicationwillallowforaquicker adoptionofhapticcapabilities. INSTANTINTERACTION ANDCOMMUNICATION Communicationbetweenhumansand machineswillbecomemorenatural,tothe pointthatitiscomparabletointerpersonal interaction.Naturaluserinterfacessuchas voiceandgesturewillbecommonplace. Theuseofvision-basedsensorswillallow foranintuitivetypeofinteraction.Tobetter understandhuman-machineinteraction thereisaneedtoevolvetheunderstanding ofkinesiology,ergonomics,cognitive scienceandsociology,andtoincorporate themintoalgorithmsandindustrialdesign. Thiswouldmakeiteasiertoconveya machine’sintentbeforeitinitiatesactions, forexample. Largevolumesof3Dvisualinformation imposehighnetworkcapacitydemands, makingultra-lowlatencyandhigh bandwidthcommunicationtechnologies essential.Enablingthebestuser experiencerequirestheuseofnetwork edgecomputerstoprocessthelarge volumesof3Dvisual,audioandhaptic information.Thissetupsavesdevice batterylifetimeandreducesheat dissipation,aswellasreducingnetwork load. ✱ TECHNOLOGY TRENDS TECHNOLOGY TRENDS ✱ 5 6
  • 4. SEPTEMBER 10, 2018 ✱ ERICSSON TECHNOLOGY REVIEWERICSSON TECHNOLOGY REVIEW ✱ SEPTEMBER 10, 2018 highly adaptable cyber-physical systems #3 ✱ TECHNOLOGY TRENDS TECHNOLOGY TRENDS ✱ A CYB ER- PHYS I CAL system is a composite of several systems of varying natures that will soon be present in all industry sectors. It is a self-organizing expert system created by the combination of model of models, dynamic interaction between models and deterministic communication. A cyber-physical system presents a concise and comprehensible system overview that humans can understand and act upon. Themainpurposeofacyber-physical systemistocontrolaphysicalprocessand usefeedbacktoadapttonewconditions inrealtime.Itbuildsupontheintegrationof computing,networkingandphysical processes.Anexampleofacyber-physical systemisasmartfactorywhere mechanicalsystems,robots,rawmaterials, andproductscommunicateandinteract. Thisinteractionenablesmachine intelligencetoperformmonitoringand controlofoperationsatallplantlevels. SYNERGISTICINTEGRATIONOF COMPUTATION,NETWORKINGAND PHYSICALPROCESSES Themainchallengeistheorchestration ofthenetworkedcomputationalresources formanyinterworkingphysicalsystems withdifferentlevelsofcomplexity.Cyber- physicalsystemsaretransformingtheway peopleinteractwithengineeredsystems, justastheinternethastransformedthe waypeopleinteractwithinformation. Humanswillassumeresponsibility onawideroperatingscale,supervising theoperationofthemostlyautomated andself-organizingprocess. Acyber-physicalsystemcontains differentheterogeneouselementssuchas mechanical,electrical,electromechanical, controlsoftware,communicationnetwork andhuman-machineinterfaces.Itisa challengetounderstandtheinteractionof thephysical,cyberandhumanworlds. Systemmodelswilldefinetheevolutionof eachsystemstateintime.Anoverarching modelwillbeneededtointegrateallthe respectivesystemmodelswhilecontem- platingallpossibledynamicinteractions. Thisimpliesacontrolprogramthatdelivers adeterministicbehaviortoeach subsystem.Currentdesigntoolsneedto beupgradedtoconsidertheinteractions betweenthevarioussystems,their interfacesandabstractions. MODELOFMODELSCREATES THECYBER-PHYSICALSYSTEM Withinthecyber-physicalsystemall systemdynamicsneedtobeconsidered throughamodelthatinteractswithallthe sub-models.Manyfactorsimpactthe dynamicsoftheinteractionsbetweenthe systems,includinglatency,bandwidthand reliability.Forawirelessnetwork,factors suchasthedevicelocation,thepropagation conditionsandthetrafficloadchangeover time.Thismeansthatnetworksneedtobe modeledinordertobeintegratedinthe modelofmodels. Thetimeittakestoperformataskmay becriticaltoenableacorrectlyfunctioning system.Physicalprocessesare compositionsofmanythingsoccurringin parallel.Amodeloftimethatisconsistent withtherealitiesoftimemeasurementand timesynchronizationneedstobe standardizedacrossallmodels. EXAMPLE:INDUSTRY4.0 Thefactoryofthefutureimplementsthe conceptofIndustry4.0,whichincludesthe transformationfrommassproductionto masscustomization.Thisvisionwillbe realizedthroughlarge-scaleindustrial automationtogetherwiththedigitalization ofmanufacturingprocesses. Humansassumetheroleofsupervising theoperationoftheautomatedandself- organizingproductionprocess.Inthis contextitwillbepossibletorecognizeall thesystemmodelsthatneedtointeract: • Physicalandroboticsystemssuchas conveyors,roboticarmsandautomated guidedvehicles • Controlsystemssuchasrobot controllersandprogrammablelogic controllersforproduction • Softwaresystemstomanageallthe operations • Bigdataandanalytics-based softwaresystems • Electricalsystemstopower machinesandrobots • Communicationnetworks • Sensorsanddevices. Themastermodelconsistsofandinteracts withallthelistedprocessesabove,resulting intherealizationofthefinalproduct. 7 8
  • 5. SEPTEMBER 10, 2018 ✱ ERICSSON TECHNOLOGY REVIEWERICSSON TECHNOLOGY REVIEW ✱ SEPTEMBER 10, 2018 trust technologies for security assurance #4 ✱ TECHNOLOGY TRENDS TECHNOLOGY TRENDS ✱ TRUS T TECH N O LO G I E S will provide mechanisms to protect networks and offer security assurance to both humans and machines. Artificial intelligence and machine learning are needed to manage the complexity and variety of security threats and the dynamics of networks. Rapidly emerging confidential computing – together with possible future multi-party computation – will facilitate secure cloud processing of private and confidential data. Performance and security demands are driving the development of algorithms and protocols for identities. Theuseofcloudtechnologiescontinuesto grow.Billionsofnewdeviceswithdifferent capabilitiesandcharacteristicswillallbe connectedtothecloud.Manyofthemare physicallyaccessibleandthusexposed andvulnerabletoattackortobeing misusedasinstrumentsofattack.Digital identitiesareneededtoproveownership ofdataandtoensurethatservicesonly connecttoothertrustworthyservices. Flexibleanddynamicauditingand complianceverificationarerequiredto handlenewthreats.Furthermore,thereisa needforautomatedprotectionthatadapts tooperatingmodesandperformsanalytics onthesysteminoperation. PROTECTIONDRIVENBY ARTIFICIALINTELLIGENCE Artificialintelligence,machinelearningand automationarebecomingimportanttools forsecurity.Machinelearningaddresses areassuchasthreatdetectionanduser behavioranalytics.Artificialintelligence assistssecurityanalystsbycollectingand siftingthroughthreatinformationtofind relevantinformationandcomputing responses.However,thereisaneedto addressthecurrentlackofopen benchmarkstodeterminethematurityof thetechnologyandpermitcomparisonof products. Whilethecurrenttrendistocentralize dataandcomputation,security applicationsfortheInternetofThingsand futurenetworkswillrequiremore distributedandhierarchicalapproachesto supportbothfastlocaldecisionsand slowerglobaldecisionsthatinfluencelocal policies. CONFIDENTIALCOMPUTING TOBUILDTRUST Confidentialcomputingusesthefeatures ofenclaves–trustedexecution environmentsandrootoftrust technologies.Codeanddataiskept confidentialandintegrityprotectionis enforcedbyhardwaremechanisms,which enablestrongguaranteesthatdataand processingarekeptconfidentialinthe cloudenvironmentandprevent unauthorizedexposureofdatawhendoing analytics.Confidentialcomputingis becomingcommercialincloudsystems. Researchisunderwaytoovercomethe remainingchallenges,includingimproving theefficiencyofthetrustedcomputing base,reducingcontextswitchoverheads whenportingapplicationsandpreventing sidechannelinformationleakage. Multi-partycomputationenables partiestojointlycomputefunctionsover theircombineddatainputswhilekeeping thoseinputsprivate.Inadditionto protectingtheconfidentialityoftheinput data,multi-partyprotocolsmust guaranteethatmaliciouspartiesarenot abletoaffecttheoutputofhonestparties. Althoughmulti-partycomputationis alreadyusedinspecialcases,itslimited functionalityandhighcomputation complexitycurrentlystandinthewayof wideadoption.Timewilltellifitbecomes aspromisingasconfidentialcomputing. PRIVACYREQUIRESSECURE IDENTITIES Digitalidentitiesarecrucialtomaintaining ownershipofdataandforauthenticating andauthorizingusers.Solutionsthat addressidentitiesandcredentialsfor machinesareequallyimportant.The widespreaduseofwebandcloud technologieshasmadetheneedfor efficientidentitysolutionsevenmore urgent.Inaddition,betteralgorithmsand newprotocolsforthetransportlayer securityprovideimprovedsecurity,lower latencyandreducedoverhead.Efficiency isparticularlyimportantwhen orchestratingandusingidentitiesformany dynamiccloudsystems,suchasthose realizedviamicroservices,forexample. Whenquantumcomputerswithenough computationalpowerareavailable,all existingidentitysystemsthatusepublic- keycryptographywilllosetheirsecurity. Developingnewsecurealgorithmsforthis post-quantumcryptographyeraisan activeresearcharea. 9 10
  • 6. SEPTEMBER 10, 2018 ✱ ERICSSON TECHNOLOGY REVIEWERICSSON TECHNOLOGY REVIEW ✱ SEPTEMBER 10, 2018 ✱ TECHNOLOGY TRENDS TECHNOLOGY TRENDS ✱ TH E WI RELE SS access network is becoming a general connectivity platform that enables the sharing of data anywhere and anytime for anyone and anything. There is good reason to believe that rapidly increasing data volumes will continue in the foreseeable future. Ultra-reliable connectivity requires ultra-low latency, which will be needed to support demanding use cases. The focus will be on enabling high data rates for everyone, rather than support for extremely high data rates that are only achievable under specific conditions or for specific users. Afewtechnologieswillneedtobe enhancedinordertocreateaubiquitous, high-capacityradionetwork.Thecommon denominatorforthesetechnologiesistheir capabilitytoenableandutilizehigh frequenciesandwidebandwidth operations.Coverageisaddressed throughbeamformingandflexibilityin deviceinterworking.Thechallengeisto supportdatavolumesanddemanding- trafficusecases,withoutacorresponding increaseincostandenergyconsumption. DEVICESACTASNETWORKNODES Toenhancedevicecoverage,performance andreliability,simultaneousmulti-site connectivityacrossdifferentaccess technologiesandaccessnodesisrequired. Wirelesstechnologywillbeusedforthe connectivitybetweenthenetworknodes, asacomplementtofiber-basednetworks. Devicecooperationwillbeusedtocreate virtuallargeantennaarraysonthedevice sidebycombiningtheantennasofmultiple devices.Theborderlinebetweendevices andnetworknodeswillbemorediffuse. Massiveheterogenousnetworkswill haveamuchmoremesh-likeconnectivity. Advancedmachinelearningandartificial intelligencewillbekeytothemanagement ofthisnetwork,enablingittoevolveand adapttonewrequirementsandchangesin theoperatingenvironment. NOSURPRISE–EXPONENTIAL INCREASEDDATARATES Meetingfuturebitratedemandswill requiretheuseoffrequencybandsabove 100GHz.Operationinsuchspectrumwill enableterabitdatarates,althoughonlyfor short-rangeconnectivity.Itwillbean implementationchallengetogenerate substantialoutputpowerandhandleheat dissipation,consideringthesmall dimensionsofTHzcomponentsand antennas.Spectrumsharingwillbefurther enabledbybeamforming,whichismade possiblebythehighfrequency. Integratedpositioningwillbeenabledby high-frequencyandwide-bandwidth operationincombinationwithverydense deploymentsofnetworknodes.High- accuracypositioningisimportantfor enhancednetworkperformanceandisan enablerfornewtypesofend-userservices. Thepositioningofmobiledevices,both indoorandoutdoor,willbeanintegrated partofthewirelessaccessnetworks. Accuracywillbewellbelowonemeter. ANEWTRADE-OFFBETWEEN ANALOGANDDIGITALRADIO FREQUENCYHARDWARE Forthepast20yearstherehasbeen acontinuoustrendtowardmoving functionalityfromtheanalogtothedigital radiofrequencydomain.However,the trendisreversedforverywideband transmissionatveryhighfrequencies, incombinationwithaverylargenumber ofantennas.Thismeansthatanew implementationbalanceandinterplay betweentheanaloganddigitalradio frequencydomainswillemerge. Increasinglysophisticatedprocessingis alreadymovingovertotheanalogdomain. Thiswillsoonalsoincludeutilizing correlationsbetweendifferentanalog signalsreceivedondifferentantennas,for example.Thecompressionrequirements ontheanalog-to-digitalconversionis reduced.Thesplitbetweenanalogand digitalradiofrequencyhardware implementationwillchangeovertimeas technologyandrequirementsevolve. ubiquitous, high-capacity radio #5 11 12