Takeover Tracker
vs

52 shared · 22 different

core competencies

Side-by-Side Comparison

MetricComputer and Information Research ScientistsSoftware Developers, Applications
Risk Score32.4%35.6%
Risk TierMedium RiskMedium Risk
Risk Percentile53th67th
Tasks at Risk (>50%)5 / 157 / 15
Median SalaryN/AN/A
EmploymentN/AN/A

Skill Comparison

|

Sorted by largest difference

Education and Training
Communicating with Persons Outside Organization
Interpreting the Meaning of Information for Others
Documenting/Recording Information
Processing Information
Judging the Qualities of Things, Services, or People
Making Decisions and Solving Problems
Engineering and Technology
Communications and Media
Getting Information
Scheduling Work and Activities
Identifying Objects, Actions, and Events

Protective Factors

Higher values indicate stronger protection against AI displacement

Computer and Information Research Scientists

33%

total discount

Software Developers, Applications

28%

total discount

Task Risk Comparison

Tasks sorted by AI automation risk — higher means more automatable

Computer and Information Research Scientists

5 of 15 at risk
80%Maintain network hardware and software, direct network security measures, and monitor networks to ensure availability to system users.
78%Approve, prepare, monitor, and adjust operational budgets.
65%Assign or schedule tasks to meet work priorities and goals.
56%Apply theoretical expertise and innovation to create or apply new technology, such as adapting principles for applying computers to new uses.
51%Analyze problems to develop solutions involving computer hardware and software.

Software Developers, Applications

7 of 15 at risk
84%Recommend purchase of equipment to control dust, temperature, and humidity in area of system installation.
83%Coordinate software system installation and monitor equipment functioning to ensure specifications are met.
75%Specify power supply requirements and configuration.
72%Obtain and evaluate information on factors such as reporting formats required, costs, and security needs to determine hardware configuration.
66%Store, retrieve, and manipulate data for analysis of system capabilities and requirements.

Premium Head-to-Head Analysis

Displacement Timeline Comparison

Computer and Information Research Scientists20282035
Software Developers, Applications20282035
20242030203520402045

Computer and Information Research Scientists has a longer runway before significant displacement, projected 0 years later than Software Developers, Applications.

Transition Feasibility

1%

Skill Overlap

Low overlap — significant retraining needed for transition

0

Unique to Computer

0

Unique to Software

Combined Protection Strategy

Regardless of which path you choose, focus on these protective factors

Fine Manipulation
Regulatory Barriers
Creativity
Social Intelligence
Computer and Information Research ScientistsSoftware Developers, Applications