Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Is Big Tech Getting Too Big?

Is Big Tech Getting Too Big?

Some businesses have caught lightning in a bottle with the advent and overt use of the Internet. These companies now read like a who’s who of technology: Amazon, Google, Facebook, Apple, Microsoft. These companies are now some of the most lucrative in the world and there has been some very serious questions if they’re using their positions at the top of tech in unethical ways. Today, we’ll take a look at “Big Tech” and debate whether or not something has to be done to break up these companies before they become too powerful to fail. 

The Current Situation

The major technology companies hold a lot of influence. What is often referred to as the “Big Four” (Amazon, Apple, Facebook, and Google)--and sometimes referred to as the “Big Five” (adding in Microsoft or Netflix, but somehow never both)--are at the center of multiple controversies due to their use of their record profits to benefit their companies and undermine their competition. As a result there is a call from outside the technology sector to do something about it.

In fact, earlier in 2019, The Federal Trade Commission and the Department of Justice started investigating whether or not these companies were using their power and wealth to kill off and buy up competitors. In July, the U.S. House of Representatives held hearings. This has resulted in many state’s attorneys general beginning to start their own investigations. In fact, 50 attorneys general (all but California and Alabama) have coordinated to an ongoing investigation of Google for antitrust actions. 

What’s the Problem? 

Do you know how these huge corporations use your data? No. No one really does. With the amount of data these companies collect and are given the rights to, this can become a problem (especially when they don’t properly secure it). These organizations have billions of people who access their service every day. For the millions of people that search Google every hour, the millions on Facebook, the millions watching YouTube, every link you click on, every video you watch, every time you search for a word or phrase, you are providing information about yourself. This information is being used to create money-making situations for these companies. It also is the ground floor of an incredible knowledge base. 

Since the European Union enacted their General Data Protection Regulation (GDPR), more and more attention has been focused at individual data privacy. In fact, Google was levied the largest fine by GDPR regulators in its first year, a relatively small $50 million fine. Will this be the time when people start doing something about these growing tech bbehemoths, or do they resign to the immense value they bring them day-in and day-out? How much would you get done without Google Search? Have Facebook and Amazon helped your life? What would you do without your iPhone? 

Answer these questions and leave your thoughts in the comments section below. Return to Voyage Technology’s blog regularly.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 27 August 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security User Tips Hardware Efficiency Internet Malware IT Support Privacy Google Computer Email Workplace Tips Phishing IT Services Collaboration Hosted Solutions Users Mobile Device Ransomware Workplace Strategy Small Business Quick Tips Microsoft Backup Cybersecurity Passwords Saving Money Communication Data Backup Smartphone Managed Service Android VoIP Business Management Smartphones Upgrade Mobile Devices communications Disaster Recovery Data Recovery Productivity Browser Social Media Windows Microsoft Office Managed IT Services Current Events AI Tech Term Network Remote Internet of Things Artificial Intelligence Facebook Automation Covid-19 Gadgets Cloud Computing Holiday Managed Service Provider Miscellaneous Information Remote Work Training Server Outsourced IT Compliance Encryption Spam Employee/Employer Relationship Office Windows 10 Business Continuity Data Management Government IT Support Bandwidth Windows 10 Blockchain Virtualization Wi-Fi Business Technology Mobile Office Data Security Vendor Apps Two-factor Authentication Managed Services Voice over Internet Protocol Chrome Mobile Device Management Budget Gmail Apple Networking App Employer-Employee Relationship BYOD Conferencing Marketing Tip of the week How To WiFi BDR HIPAA Applications Computing Information Technology Hacker Access Control Avoiding Downtime Office 365 Analytics Website Office Tips Augmented Reality Healthcare Retail Storage Password Bring Your Own Device Managed IT Services Big Data Router Operating System Virtual Private Network Risk Management Computers 2FA Help Desk Health Remote Workers Document Management Telephone Firewall Scam Cooperation Free Resource Data loss Project Management Windows 7 The Internet of Things Microsoft 365 Solutions Social Going Green Patch Management Save Money Remote Monitoring End of Support Vulnerability Vendor Management Cybercrime Physical Security Windows 11 Customer Service Display Printer Monitoring Paperless Office Infrastructure Excel Outlook Machine Learning Managed IT Service Money Humor Word Downloads iPhone Licensing Maintenance Sports Vulnerabilities Entertainment Antivirus Mouse Data Privacy Images 101 Safety Administration Mobility Telephone System Multi-Factor Authentication Cost Management Robot Employees Settings Integration Wireless Printing Content Filtering User Tip IT Management Customer Relationship Management Modem YouTube Meetings Mobile Security Processor VPN Cryptocurrency Holidays Hacking Data Storage Presentation Computer Repair Smart Technology Supply Chain Video Conferencing Virtual Desktop Data storage LiFi Wireless Technology Managed Services Provider Professional Services Saving Time Virtual Machines SharePoint Regulations Compliance Identity Electronic Medical Records Evernote Paperless Halloween Recovery Co-managed IT Bookmark Smart Tech Memes Lenovo Download Net Neutrality Hard Drives Alerts SQL Server Technology Care Writing Financial Data Domains History Virtual Reality Business Communications Scary Stories Private Cloud Break Fix Scams Browsers Smartwatch Hacks Server Management Connectivity IT Superfish Upload Procurement Identity Theft Refrigeration Azure Hybrid Work Fun Social Network Telework Deep Learning Public Speaking Cyber security Twitter Multi-Factor Security Tech Human Resources Error Dark Web Cables CES Lithium-ion battery IoT Communitications Trends Supply Chain Management Education Social Engineering Entrepreneur Customer Resource management FinTech Regulations Remote Computing Google Calendar Term Google Apps Star Wars IT Assessment Microsoft Excel IT Maintenance Data Analysis Mobile Computing Gamification Flexibility Tablet Undo Staff Value Business Intelligence Search Legislation Shortcuts Organization Best Practice Social Networking Alert Smart Devices Buisness File Sharing Ransmoware Dark Data Fileless Malware Digital Security Cameras Managed IT Legal Content Remote Working IT solutions Wearable Technology Memory Vendors How To Comparison Google Play Be Proactive Health IT Business Growth Motherboard Data Breach Notifications Assessment Electronic Health Records Travel Application Permissions Workforce Directions Videos Techology Google Maps Wasting Time Threats Cortana Specifications Security Cameras Workplace Strategies Alt Codes IBM Trend Micro Internet Exlporer Software as a Service Downtime Unified Threat Management Fraud Meta Microchip Unified Threat Management Username Hosted Solution Managing Costs Amazon Black Friday SSID Typing eCommerce Database Surveillance Virtual Assistant Outsource IT Network Congestion Google Drive User Error Competition IT Technicians Virtual Machine Environment Knowledge Media Cyber Monday Medical IT Proxy Server Reviews Cookies Tactics Development Point of Sale Hotspot Transportation Small Businesses 5G Google Docs Unified Communications Mirgation Hypervisor Displays Experience Running Cable Tech Support User PowerPoint Shopping Bitcoin Network Management Nanotechnology Optimization Google Wallet Addiction Language Employer/Employee Relationships Outsourcing Monitors Management PCI DSS Chatbots Navigation Laptop Websites Distributed Denial of Service Workplace Gig Economy Windows 8 IP Address Screen Reader Drones Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Hiring/Firing

Blog Archive