facebook linkedin twitter

Computerware Blog

Is Big Tech Getting Too Big?

Is Big Tech Getting Too Big?

Some businesses have caught lightning in a bottle with the advent and overt use of the Internet. These companies now read like a who’s who of technology: Amazon, Google, Facebook, Apple, Microsoft. These companies are now some of the most lucrative in the world and there has been some very serious questions if they’re using their positions at the top of tech in unethical ways. Today, we’ll take a look at “Big Tech” and debate whether or not something has to be done to break up these companies before they become too powerful to fail. 

The Current Situation

The major technology companies hold a lot of influence. What is often referred to as the “Big Four” (Amazon, Apple, Facebook, and Google)--and sometimes referred to as the “Big Five” (adding in Microsoft or Netflix, but somehow never both)--are at the center of multiple controversies due to their use of their record profits to benefit their companies and undermine their competition. As a result there is a call from outside the technology sector to do something about it.

In fact, earlier in 2019, The Federal Trade Commission and the Department of Justice started investigating whether or not these companies were using their power and wealth to kill off and buy up competitors. In July, the U.S. House of Representatives held hearings. This has resulted in many state’s attorneys general beginning to start their own investigations. In fact, 50 attorneys general (all but California and Alabama) have coordinated to an ongoing investigation of Google for antitrust actions. 

What’s the Problem? 

Do you know how these huge corporations use your data? No. No one really does. With the amount of data these companies collect and are given the rights to, this can become a problem (especially when they don’t properly secure it). These organizations have billions of people who access their service every day. For the millions of people that search Google every hour, the millions on Facebook, the millions watching YouTube, every link you click on, every video you watch, every time you search for a word or phrase, you are providing information about yourself. This information is being used to create money-making situations for these companies. It also is the ground floor of an incredible knowledge base. 

Since the European Union enacted their General Data Protection Regulation (GDPR), more and more attention has been focused at individual data privacy. In fact, Google was levied the largest fine by GDPR regulators in its first year, a relatively small $50 million fine. Will this be the time when people start doing something about these growing tech bbehemoths, or do they resign to the immense value they bring them day-in and day-out? How much would you get done without Google Search? Have Facebook and Amazon helped your life? What would you do without your iPhone? 

Answer these questions and leave your thoughts in the comments section below. Return to Computerware’s blog regularly.

Tip of the Week: Network Security Basics
Your Computer May be Older than You
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, January 26, 2020

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Business Computing Internet Cloud Software Business Management Data Hackers Microsoft Hardware Workplace Tips Backup Network Security Managed Service Provider Productivity Business Hosted Solutions Email Malware IT Services Saving Money Efficiency Productivity Computer Google User Tips IT Support Small Business Smartphones Innovation Mobile Devices Data Backup Quick Tips VoIP Gadgets Network IT Support Collaboration Business Continuity communications Microsoft Office Upgrade Data Recovery Social Media Android Server Disaster Recovery Mobile Office Cybersecurity Communication Virtualization Smartphone Miscellaneous Mobile Device Management Phishing Holiday Ransomware Passwords Windows Tech Term Operating System Windows 10 Apps Facebook Outsourced IT Managed IT Services Unified Threat Management Vendor Management Remote Monitoring BDR Mobile Device Internet of Things Automation Analytics Users BYOD Remote Computing Managed IT services Apple Mobile Computing Data Management WiFi Windows 10 The Internet of Things Marketing History Artificial Intelligence Firewall Browser Save Money Help Desk Alert App Cloud Computing Big data Spam Office 365 Training Two-factor Authentication Bandwidth Business Technology Encryption IT Consultant Information Technology Going Green Hard Drives Bring Your Own Device Maintenance Printer Antivirus Gmail Office Government Health Cybercrime Content Filtering Lithium-ion Battery Best Practice Cost Management Information Outlook Windows 8 Hiring/Firing Budget Access Control Wireless Technology Saving Time Computers VPN Virus Windows 7 Tech Support Search Managed Service Managed IT Employer-Employee Relationship Retail Networking Hacking Project Management IBM Money Document Management Healthcare Humor Customer Service It Management Travel Blockchain Education Recovery Data Loss Update iPhone Phone System Value Password Legal Save Time Hacker Downtime Customer Relationship Management Regulations Augmented Reality PowerPoint Proactive IT SaaS Computing Running Cable File Sharing Administration Applications Hard Drive Law Enforcement Twitter Intranet Compliance Mobility Website Patch Management Solid State Drive Data storage Avoiding Downtime Conferencing Risk Management Current Events Data Breach Business Intelligence Private Cloud Cortana Business Growth Excel Digital Digital Payment Telephony Websites Router Management Machine Learning Comparison Tablet Paperless Office Vulnerabilities Fax Server Telephone Systems Sports Cooperation Company Culture User Computer Repair Vendor Disaster Virtual Desktop End of Support Social Networking Hosted Solution Robot Social Wireless Data Security Securty Google Maps DDoS Storage Social Engineering Flexibility Scam Black Market Voice over Internet Protocol Cryptocurrency Word Laptop Monitoring User Error Download Evernote Co-managed IT Experience Chrome Monitors Virtual Assistant Cleaning Wi-Fi Office Tips Multi-factor Authentication Microchip Taxes Telephone Processors Start Menu Tech Terms Computer Accessories USB Managed IT Service Mobile Technology YouTube Lifestyle Distributed Denial of Service Trending Presentation Gaming Console Software as a Service Unified Communications Settings Public Cloud Licensing Uninterrupted Power Supply Mouse Webcam Processor Specifications Safety Text Messaging Vulnerability Statistics Bitcoin Programming Identity Theft IT service Network Congestion Documents Data Protection Teamwork Heating/Cooling Distribution Entertainment Downloads Politics Professional Services Virtual Reality Emails Bluetooth Streaming Media Automobile Inbound Marketing Chromebook Redundancy Computing Infrastructure Hack Google Docs Net Neutrality Meetings Pain Points Memory How To eWaste IT Plan Enterprise Resource Planning Web Server Shortcut Term Managed Services Provider Consultation IT consulting Legislation Error Cabling Electronic Medical Records Transportation Knowledge Device Management Entrepreneur Directions Display Technology Tips Business Managemenet Accountants Webinar A.I. Books Workers Troubleshooting Recording Optimization Content Management Communitications email scam Addiction Administrator Audit CIO Supercomputer HIPAA Upselling SSID How To Fake News Advertising Flash Environment Dark Web Free Resource Migration Connected Devices Competition Processing Managed Services Data Warehousing Windows XP Wireless Headphones Worker Electronic Payment Health IT Employee/Employer Relationship Video Surveillance Staffing Google Wallet online Currency Saving ZTime Wasting Time Access Displays Equifax Fleet Tracking Reading Samsung Business Owner Logistics Virtual Machines Emergency Hard Drive Disposal Society Network Management Computer Care Micrsooft LinkedIn Device security MSP Employer Employee Relationship IP Address Cyber security Microsoft Excel G Suite Bookmark Desktop Best Practives Finance Hacks Physical Security Application Harddrive Google Play Telephone Service Google Drive Windows Server 2008 Nanotechnology Social Network Human Resources Employer/Employee Relationships Debate Drones Botnet Managing Costs Spyware Mobile Payment Skype Startup Asset Tracking Relocation Tablets GPS Microsoft 365 Archive Business Cards Service Level Agreement Banking Electricity Printing Username Medical IT Trend Micro Permissions Language Memes Unified Threat Management Backup and Disaster Recovery Microserver Sync External Harddrive Browsers Gamification Notifications CCTV Digital Signature Security Cameras Threats Point of Contact Screen Reader Customer Resource management User Tip Proactive Maintenance Business Metrics Computer Malfunction Navigation Thin CLient Virtual Machine cache Television switches Writing Smart Tech Reliable Computing 3D Solutions Ebay Music Piracy Get More Done Upload Data Analysis Employees WannaCry Upgrades HTML Printer Server eCommerce IT Fiber-Optic Database Turn Key In Internet of Things Smart Phones Recycling Mobile Security Trojan GDPR Managing Risk Time Management Freedom of Information LiFi Analytic Telephone System PDF SQL Server Corporate Profile Motion Sickness Best Available Keyboard Tech Leadership Hypervisor Assessment SharePoint Product Reviews Multi-Factor Security Organize Cost Scalability Adminstration Integration Pirating Information Software License Trends Fileless Malware Hybrid Cloud Google Calendar Deep Learning Devices Messenger Tracking Domains Holidays Tip of the week Work/Life Balance Smart Devices Read Fraud Tactics UTM Content Rental Service Public Speaking Modem Strategy Touchscreen News Visible Light Communication Proxy Server Azure VoIP 3D Printing Capital IT Assessment Productuvuty Personal Information Financial Managing Stress Printers CrashOverride Regulation

toner1