Browse Definitions :
Definition

transformative technology

Contributor(s): Ivy Wigmore

Transformative technology is hardware- and software-based tools designed to enhance human psychological well-being, cognitive function and physical capabilities.

Transformative technologies include:

Virtual reality therapy – the use of VR to enhance physical and psychological well-being. VR therapy has been applied for sports training and stroke and paraplegia recovery as well as treatment for mental health issues including phobias, stress, anxiety and PTSD (post-traumatic stress disorder).

Digital drugs (binaural beats) -- audio recordings capable of changing brain wave patterns and inducing an altered state of consciousness similar to that effected by taking physical drugs or achieving a deep state of meditation.

Mindfulness training -- in a tech context, apps designed to help participants increase their ability to live fully in the present moment. That capacity reduces stress and burnout and leads to greater engagement and productivity.

Affective computing -- AI systems that can assess human emotion through data gathered from faces, voices and body language. An important business goal of AC is to build human-computer interfaces that can detect and appropriately respond to an end user's state of mind.

Biofeedback – systems that access biological data from the user, such as heart rate, breathing patterns and skin changes and help them control physiological responses to improve physical and mental health.

The old adage that we only use 10 percent of our brain is no longer considered valid -- it’s more accurate to say that the other 90 percent is also active, but we’re not sure exactly what it is doing. According to experts such as Michael Hutchinson, author of Mega Brain, the human capacity for transformation is vast:

“What we think of as normal intelligence is probably just a pale shadow of the brain’s actual powers and faculties. It’s as if we’ve been given superbly engineered sports cars in which we’ve been putt-putting about without ever shifting out of first gear, never realizing that there were higher gears."

Transformative technologies are one aspect of what is being referred to as consciousness hacking. The other two elements of consciousness hacking are practices such as shamanic drumming and meditation, and psychedelics such as peyote and ayahuasca.

The term transformative technology is also sometimes used in reference to disruptive technology.

This was last updated in April 2018

Continue Reading About transformative technology

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

SearchSecurity

  • buffer underflow

    Buffer underflow, also known as buffer underrun or buffer underwrite, is a threat to data that typically occurs when the ...

  • digital signature

    A digital signature is a mathematical technique used to validate the authenticity and integrity of a message, software or digital...

  • denial-of-service attack

    A denial-of-service attack is a security event that occurs when an attacker prevents legitimate users from accessing specific ...

SearchHealthIT

SearchDisasterRecovery

  • virtual disaster recovery

    Virtual disaster recovery is a type of DR that typically involves replication and allows a user to fail over to virtualized ...

  • tabletop exercise (TTX)

    A tabletop exercise (TTX) is a disaster preparedness activity that takes participants through the process of dealing with a ...

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a data center.

SearchStorage

  • secondary storage

    Secondary storage is storage for noncritical data that does not need to be frequently accessed.

  • Pure Storage

    Pure Storage is a provider of enterprise data flash storage solutions designed to substitute for electromechanical disk arrays.

  • yobibyte (YiB)

    A yobibyte (YiB) is a unit of measure used to describe data capacity as part of the binary system of measuring computing and ...

Close