by Tom Austin | February 10, 2014 | Comments Off on Smart Machines: How Will They Disrupt Your Career?
How susceptible is your job to computerization? According to Frey and Osborne, 47% of all current U.S. jobs are at risk over the next two decades because they consist primarily of tasks that can be automated in that time period. (Left unanalyzed are the beneficial impacts — such as new capabilities people will pick up by collaborating with smart machines.)
I recently wrote that smart machines will continue to enhance and threaten the abilities of employees to do their jobs. By 2020, Gartner Predicts that a majority of knowledge worker career paths will be disrupted by smart machines in both positive and negative ways. Read the full report, Gartner Top Predictions 2014: Plan for a Disruptive, but Constructive Future.
Smart machines — a broad and powerful range of new systems— are emerging this decade. They do what we thought only people could do and what we didn’t think technology could do. Smart machines and smart advisors exploit machine learning and algorithms — they learn from results and work faster than humans – they make smart people smarter. Virtual personal assistants – focused on user behavior (habits, activities, needs) — make smart people more effective.
The smart machine market is small, but growing, threatening to upend knowledge workers careers by 2020 (see chart). Ignore at your own peril.
How should you factor smart machines and machine-assisted tasks into your IT planning? View Gartner Top Predictions 2014: Plan for a Disruptive, but Constructive Future to see key findings, market implications and recommendations. Discover the competitive advantages that await early adopters.
For Gartner clients seeking more on the smart machines, view Predicts 2014: The Emerging Smart Machine Era and The IT Role in Helping High Impact Performers Thrive.
Read Complimentary Relevant Research
Predicts 2017: Artificial Intelligence
Artificial intelligence is changing the way in which organizations innovate and communicate their processes, products and services. Practical...
View Relevant Webinars
How to Protect Mobile Apps
Securely enabling applications on corporate- or employee-owned devices is key to protecting enterprise data from misuse. From containers...
Comments or opinions expressed on this blog are those of the individual contributors only, and do not necessarily represent the views of Gartner, Inc. or its management. Readers may copy and redistribute blog postings on other blogs, or otherwise for private, non-commercial or journalistic purposes, with attribution to Gartner. This content may not be used for any other purposes in any other formats or media. The content on this blog is provided on an "as-is" basis. Gartner shall not be liable for any damages whatsoever arising out of the content or use of this blog.