![Beitragsbild zu Gartner Highlights Seven Disruptions CIOs Might Not See Coming](https://www.all-about-security.de/wp-content/uploads/2022/09/ancient-gb01ee39c3_640.png)
Analysts to Explore Emerging Trends and Technologies at Gartner IT Symposium/Xpo 2022, 7-10 November in Barcelona, Spain
CIOs must take time to consider “what if” scenarios to avoid being blindsided by social, behavioural and technological disruptions, according to Gartner, Inc.
“Disruptions are fundamental shifts that create lasting change, and successful organisations will be those that are prepared to address them,” said David Yockelson, VP analyst at Gartner. “We need to keep asking “what if” to remain open to opportunities presented by disruptions.”
Yockelson highlighted seven key disruptions that technology executives should consider in the next five years.
Metaverse Work Experiences
Gartner defines a metaverse as “the next level of interaction in the virtual and physical worlds.” Today, organisations are harnessing metaverse technologies to provide better engagement, collaboration, and connection to their employees through better immersive workspaces in virtual offices and the use of internal metaverse experiences called intraverses.
Gartner predicts that fully virtual workspaces will account for 30% of the investment growth in metaverse technologies and will reimagine the office experience through 2027.
Flying cars
Flying autonomous vehicles, or unmanned aerial vehicles (UAVs), are for carrying passengers, primarily over short distances in urban areas. These encompass self-operating aircrafts that are sometimes referred to as “flying cars” or passenger drones and are designed to operate without a human pilot. Several companies are working on new aircraft piloted by AI and designed to create a faster, less expensive, safer, and lower carbon way to execute air travel, primarily in congested areas. The first flying taxi service is scheduled to launch in 2024.
Notwithstanding potential regulatory challenges, CIOs should assess what problems in transportation — moving people and cargo — might be solved by using these vehicles.
The Digital Human Economy
From medical care, customer service, virtual influencers, and HR training to bringing the deceased “back to life”, the possible uses for digital humans are endless. A digital human economy provides the opportunity for a new digital ecosystem, underpinned by technology that brings individuals and organisations together to innovate and interact in new ways.
Gartner predicts that by 2035, the digital human economy will become a $125-billion market and continue to grow.
The “Decentralised Autonomous Organisation”
Decentralised autonomous organisations (DAOs) represent a new type of organisation model emerging in the IT services marketplace. Gartner defines a DAO as a digital entity, running on a blockchain, which can engage in business interactions with other DAOs, digital and human agents, and corporations, without conventional human management.
Many high-value digital workers will be attracted to working in DAOs. Though in their infancy, DAOs have the potential to be highly disruptive to many current norms of the technology industry.
Wireless Electric Vehicle (EV) Charging
As it becomes available, wireless charging will make the most sense for fleet vehicles such as buses and taxis. These vehicles can make effective use of dynamic charging to extend range and reduce costs.
Subsequently, residential installations will be the biggest market for wireless vehicle charging, as EV owners enjoy the modest convenience of not having to plug a cable in. However, looking out beyond that time, Gartner expects that private housing estates and campus sites will overtake in-home installations by volume.
Graphene Replaces Silicon
During the next seven to 10 years, there is a huge potential for carbon-based field-effect transistors (FETs) to replace silicon in traditional transistors when they reach their minimum size limits. One example is graphene, a one-atom thick material of pure carbon, bonded together in a hexagonal honeycomb lattice. Graphene could displace current silicon devices, especially for wireless communications, where these carbon-based FETs can carry a much higher current in a small area, enabling super quick processing.
CIOs should consider new possibilities enabled by graphene-based technologies and start to identify emerging suppliers.
Tech Becomes Disposable
What if the technology industry starts to mirror the fashion industry, with “throwaway” applications designed to be made, used and disposed of quickly? While elements of business composability are already widely practiced, there are opportunities for CIOs to take it to the next level and prepare for the flexibility of disposable technology.
Learn which technologies will drive digital business and innovation in 2022 in the Gartner Top Strategic Technology Trends for 2022 e-book.
Fachartikel
![Featured image for “Kontinuierliche Ransomware-Validierung: Warum jährliche Tests nicht mehr ausreichen”](https://www.all-about-security.de/wp-content/uploads/2025/01/Depositphotos_19125253_S.jpg)
Kontinuierliche Ransomware-Validierung: Warum jährliche Tests nicht mehr ausreichen
![Featured image for “Herausforderungen im Zuge von IT-Sicherheit: Ist MDR die Lösung?”](https://www.all-about-security.de/wp-content/uploads/2025/01/Depositphotos_95679652_S.jpg)
Herausforderungen im Zuge von IT-Sicherheit: Ist MDR die Lösung?
![Featured image for “IT-Sicherheit: Die vier typischsten Angriffsflächen von Unternehmen”](https://www.all-about-security.de/wp-content/uploads/2023/04/wood-g908abea64_640.jpg)
IT-Sicherheit: Die vier typischsten Angriffsflächen von Unternehmen
![Featured image for “CTEM: Ein moderner Ansatz für kontinuierliches Bedrohungsmanagement”](https://www.all-about-security.de/wp-content/uploads/2025/01/Depositphotos_77282656_S.jpg)
CTEM: Ein moderner Ansatz für kontinuierliches Bedrohungsmanagement
![Featured image for “Gefährdet: Wie Hacker die Zukunft der Software Defined Vehicles bedrohen”](https://www.all-about-security.de/wp-content/uploads/2025/01/Depositphotos_575283544_S.jpg)
Gefährdet: Wie Hacker die Zukunft der Software Defined Vehicles bedrohen
Studien
![Featured image for “KI-gestützter Identitätsbetrug auch 2025 weiter auf dem Vormarsch”](https://www.all-about-security.de/wp-content/uploads/2025/01/Depositphotos_435022046_S.jpg)
KI-gestützter Identitätsbetrug auch 2025 weiter auf dem Vormarsch
![Featured image for “Wissenschaftler der Universität Paderborn entwickeln App, die sicheres digitales Verhalten fördert”](https://www.all-about-security.de/wp-content/uploads/2024/10/app-68002_6401.jpg)
Wissenschaftler der Universität Paderborn entwickeln App, die sicheres digitales Verhalten fördert
![Featured image for “HP Wolf Security-Studie: Sicherheitslücken bedrohen Unternehmen in jeder Phase des Gerätelebenszyklus”](https://www.all-about-security.de/wp-content/uploads/2024/12/Depositphotos_10846788_S.jpg)
HP Wolf Security-Studie: Sicherheitslücken bedrohen Unternehmen in jeder Phase des Gerätelebenszyklus
![Featured image for “Neue Studie deckt Anstieg der SAP-Automatisierung bei zunehmender S/4HANA-Migration auf”](https://www.all-about-security.de/wp-content/uploads/2024/11/Depositphotos_525824074_S.jpg)
Neue Studie deckt Anstieg der SAP-Automatisierung bei zunehmender S/4HANA-Migration auf
![Featured image for “Studie belegt API-Sicherheitsvorfälle bei 84 Prozent der deutschen Sicherheitsexperten im vergangenen Jahr”](https://www.all-about-security.de/wp-content/uploads/2024/01/comics-151341_640.png)
Studie belegt API-Sicherheitsvorfälle bei 84 Prozent der deutschen Sicherheitsexperten im vergangenen Jahr
Whitepaper
![Featured image for “Allianz Risk Barometer 2025”](https://www.all-about-security.de/wp-content/uploads/2025/01/Depositphotos_1272614_S.jpg)
Allianz Risk Barometer 2025
![Featured image for “Start der elektronischen Patientenakte: 65% der Deutschen fühlen sich schlecht informiert”](https://www.all-about-security.de/wp-content/uploads/2025/01/Depositphotos_170397486_S.jpg)
Start der elektronischen Patientenakte: 65% der Deutschen fühlen sich schlecht informiert
![Featured image for “Globaler Ausblick auf die Cybersicherheit 2025 – Orientierung in der zunehmenden Cyberkomplexität”](https://www.all-about-security.de/wp-content/uploads/2025/01/Depositphotos_127153934_S.jpg)
Globaler Ausblick auf die Cybersicherheit 2025 – Orientierung in der zunehmenden Cyberkomplexität
![Featured image for “CISA und US-amerikanische und internationale Partner veröffentlichen Leitfaden zu vorrangigen Überlegungen bei der Produktauswahl für OT-Eigentümer und -Betreiber”](https://www.all-about-security.de/wp-content/uploads/2025/01/Depositphotos_312417314_S.jpg)
CISA und US-amerikanische und internationale Partner veröffentlichen Leitfaden zu vorrangigen Überlegungen bei der Produktauswahl für OT-Eigentümer und -Betreiber
![Featured image for “Report: Die meisten Cyberkriminellen brechen nicht ein, sondern loggen sich ein”](https://www.all-about-security.de/wp-content/uploads/2025/01/Depositphotos_86577086_S.jpg)
Report: Die meisten Cyberkriminellen brechen nicht ein, sondern loggen sich ein
Hamsterrad-Rebell
![Featured image for “Network Access Enforcement”](https://www.all-about-security.de/wp-content/uploads/2025/01/Watchguard_Titel_jiw.jpg)
Network Access Enforcement
![Featured image for “Maximale Sicherheit und Produktivität: Worauf es bei der Einführung von Microsoft Copilot ankommt”](https://www.all-about-security.de/wp-content/uploads/2025/01/Varonis_Titel_jiw.jpg)
Maximale Sicherheit und Produktivität: Worauf es bei der Einführung von Microsoft Copilot ankommt
![Featured image for “Vertrauen in große Anbieter: Realität oder Illusion”](https://www.all-about-security.de/wp-content/uploads/2024/12/Exeon_Dezember_titel_jiw.jpg)
Vertrauen in große Anbieter: Realität oder Illusion
![Featured image for “Wie lasse ich meine SAP Systeme in der Cloud laufen, damit die Kosten übersichtlich bleiben?”](https://www.all-about-security.de/wp-content/uploads/2024/12/Alina_Dezember_24_jiw.jpg)
Wie lasse ich meine SAP Systeme in der Cloud laufen, damit die Kosten übersichtlich bleiben?
![Featured image for “Wie kann man mit Pentera wie ein Angreifer denken?”](https://www.all-about-security.de/wp-content/uploads/2024/11/Pentera_Titel_Nov_jiw.jpg)