Browse Definitions :
Definition

macrotrend

A macrotrend is a pervasive and persistent shift in the direction of some phenomenon on a global level. Examples of current macro trends include urbanization, automation and changing demographics.

Within IT (information technology), cloud computing, social media and the internet of things (IoT) can all be considered macrotrends. None of the three is likely to go away, although they may all reach a point where they are fully realized and no longer considered trends but just characteristics of the tech environment.

Trends are often characterized in terms of their longevity. The most pervasive and persistent phenomena are megatrends. The Copenhagen Institute for Future Studies defines megatrends as developing trends that predict “the probable future – or express what we know with great confidence about the future. Megatrends are certainties.” Global warming, for example, is a mega trend: something that is ongoing and almost certain to continue unless some unforeseen event forestalls worsening of the greenhouse effect.

At the low end of the scale are fads: widespread but briefly prevalent phenomena, typically lasting a few years or less. The Pokémon GO craze circa 2016 is one example. The augmented reality game achieved widespread popularity following its release; however, it is unlikely that users will be hunting Pikachu and Weedle in 2026.

Somewhere between fads and macrotrends are microtrends, which are influential in a given sphere and tend to last a few years. Microtrends are common in business. One example is the flexible workforce, in which a business retains a minimal staff and contracts out as much work as possible. Inherent drawbacks to such microtrends often become apparent in practice, leading to a trend in the opposite direction.

 

This was last updated in September 2016

Continue Reading About macrotrend

SearchCompliance

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

  • enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

SearchSecurity

  • spam trap

    A spam trap is an email address that is used to identify and monitor spam email.

  • honeypot (computing)

    A honeypot is a network-attached system set up as a decoy to lure cyber attackers and detect, deflect and study hacking attempts ...

  • cracker

    A cracker is someone who breaks into someone else's computer system, often on a network; bypasses passwords or licenses in ...

SearchHealthIT

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage

  • cloud testing

    Cloud testing is the process of using the cloud computing resources of a third-party service provider to test software ...

  • storage virtualization

    Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a single storage ...

  • erasure coding

    Erasure coding (EC) is a method of data protection in which data is broken into fragments, expanded and encoded with redundant ...

Close