Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Is Big Tech Getting Too Big?

Is Big Tech Getting Too Big?

Some businesses have caught lightning in a bottle with the advent and overt use of the Internet. These companies now read like a who’s who of technology: Amazon, Google, Facebook, Apple, Microsoft. These companies are now some of the most lucrative in the world and there has been some very serious questions if they’re using their positions at the top of tech in unethical ways. Today, we’ll take a look at “Big Tech” and debate whether or not something has to be done to break up these companies before they become too powerful to fail. 

The Current Situation

The major technology companies hold a lot of influence. What is often referred to as the “Big Four” (Amazon, Apple, Facebook, and Google)--and sometimes referred to as the “Big Five” (adding in Microsoft or Netflix, but somehow never both)--are at the center of multiple controversies due to their use of their record profits to benefit their companies and undermine their competition. As a result there is a call from outside the technology sector to do something about it.

In fact, earlier in 2019, The Federal Trade Commission and the Department of Justice started investigating whether or not these companies were using their power and wealth to kill off and buy up competitors. In July, the U.S. House of Representatives held hearings. This has resulted in many state’s attorneys general beginning to start their own investigations. In fact, 50 attorneys general (all but California and Alabama) have coordinated to an ongoing investigation of Google for antitrust actions. 

What’s the Problem? 

Do you know how these huge corporations use your data? No. No one really does. With the amount of data these companies collect and are given the rights to, this can become a problem (especially when they don’t properly secure it). These organizations have billions of people who access their service every day. For the millions of people that search Google every hour, the millions on Facebook, the millions watching YouTube, every link you click on, every video you watch, every time you search for a word or phrase, you are providing information about yourself. This information is being used to create money-making situations for these companies. It also is the ground floor of an incredible knowledge base. 

Since the European Union enacted their General Data Protection Regulation (GDPR), more and more attention has been focused at individual data privacy. In fact, Google was levied the largest fine by GDPR regulators in its first year, a relatively small $50 million fine. Will this be the time when people start doing something about these growing tech bbehemoths, or do they resign to the immense value they bring them day-in and day-out? How much would you get done without Google Search? Have Facebook and Amazon helped your life? What would you do without your iPhone? 

Answer these questions and leave your thoughts in the comments section below. Return to Voyage Technology’s blog regularly.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 09 May 2024

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Business Computing Best Practices Productivity Data Software Hackers Business Innovation Network Security Cloud IT Support Hardware Internet User Tips Malware Email Efficiency Phishing Privacy Workplace Tips Computer Google Collaboration Hosted Solutions IT Services Users Cybersecurity Ransomware Quick Tips Data Backup Microsoft Communication Workplace Strategy Small Business Mobile Device Smartphones Saving Money Smartphone communications Android Business Management Mobile Devices VoIP Managed IT Services Managed Service Microsoft Office Data Recovery Browser Passwords Upgrade Social Media Network Backup Disaster Recovery Internet of Things Tech Term Automation Artificial Intelligence Covid-19 Remote Cloud Computing Server Managed Service Provider Remote Work Outsourced IT Facebook Miscellaneous Windows Encryption Gadgets Spam Windows 10 Employee/Employer Relationship Information Holiday Data Management Government Business Continuity Business Technology Current Events Windows 10 Wi-Fi Blockchain Productivity Compliance Virtualization Data Security Two-factor Authentication Apps Bandwidth Apple App Mobile Device Management Gmail Networking Employer-Employee Relationship Chrome Vendor Managed Services Voice over Internet Protocol Budget Office Avoiding Downtime Access Control Mobile Office Conferencing Computing Information Technology How To BDR Office 365 Applications Hacker Health Website Help Desk Marketing AI Retail Operating System WiFi Risk Management Managed IT Services Big Data Analytics Office Tips Augmented Reality BYOD HIPAA Router Storage Computers Virtual Private Network Healthcare Password Training Bring Your Own Device Paperless Office Infrastructure Monitoring Free Resource Project Management Windows 7 Tip of the week Document Management Going Green Microsoft 365 Firewall Solutions Cybercrime Telephone Scam Data loss The Internet of Things Cooperation Windows 11 Social Patch Management Save Money Remote Monitoring Vulnerability End of Support Excel IT Support Vendor Management Customer Service Remote Workers Display Printer Vulnerabilities Administration Data Privacy Smart Technology Images 101 Machine Learning Word Saving Time Multi-Factor Authentication Mobility Settings Printing Wireless Managed IT Service Content Filtering Maintenance Antivirus Downloads Safety YouTube Employees Licensing Integration Cryptocurrency Entertainment Virtual Desktop Holidays Data storage LiFi Telephone System Data Storage Robot 2FA Supply Chain Cost Management Video Conferencing Outlook Managed Services Provider Customer Relationship Management Professional Services Money Virtual Machines IT Management Humor VPN Meetings Hacking Presentation Sports User Tip Modem Computer Repair Mobile Security iPhone Mouse Processor Wireless Technology Proxy Server Telework Cookies Cyber security Monitors Cyber Monday Tech Human Resources IP Address Mobile Computing Hotspot Cables Search CES Tactics Communitications Supply Chain Management Websites Mirgation Best Practice Recovery Buisness FinTech Nanotechnology Term Google Apps Electronic Medical Records Language IT Maintenance Legal Hard Drives IT solutions SharePoint Addiction IT Assessment Management Flexibility Chatbots Value Business Intelligence Domains Business Growth Lenovo Organization Screen Reader Writing Distributed Denial of Service Shortcuts Virtual Reality Computing Infrastructure Ransmoware Refrigeration Cortana Digital Security Cameras Service Level Agreement Smart Devices Server Management Remote Working Private Cloud Identity Memory Vendors Public Speaking Alt Codes Downtime Superfish Bookmark Identity Theft Smart Tech Data Breach Google Play Be Proactive Lithium-ion battery Twitter Alerts Workforce Hosted Solution Entrepreneur Videos Download Electronic Health Records Error Wasting Time Threats Typing Browsers Connectivity Trend Micro Social Engineering Break Fix Security Cameras Workplace Strategies Software as a Service Remote Computing Meta Google Drive Undo Knowledge Upload Social Network Managing Costs Amazon Multi-Factor Security SSID 5G Tablet IoT eCommerce Dark Web Surveillance Alert Virtual Assistant Outsource IT Google Docs Unified Communications Experience Trends Running Cable Managed IT Customer Resource management File Sharing Regulations Virtual Machine Environment Dark Data Google Calendar Media Bitcoin Medical IT Google Wallet Application Data Analysis Reviews Star Wars How To Microsoft Excel Development Notifications Staff Transportation Small Businesses Gamification Laptop Travel Social Networking Hypervisor Displays Legislation IBM Windows 8 PowerPoint Drones Techology Fileless Malware Shopping Google Maps Optimization Wearable Technology Employer/Employee Relationships Outsourcing Content Halloween Health IT PCI DSS Unified Threat Management Motherboard Comparison Navigation Workplace Unified Threat Management Directions Gig Economy Assessment Permissions Internet Service Provider Teamwork Hiring/Firing Competition Scary Stories Regulations Compliance Network Congestion Specifications Evernote Paperless Hacks Physical Security Fraud Co-managed IT User Error Microchip Fun Internet Exlporer Memes Username Net Neutrality SQL Server Technology Care Deep Learning User Financial Data Point of Sale History Black Friday Business Communications Scams Education Smartwatch Database IT Network Management Procurement Tech Support IT Technicians Azure Hybrid Work

Blog Archive