Let us be your IT department!
Call us Today! (703) 821-8200


Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

It's Time to Write a Eulogy for the Internet as We Know It

It's Time to Write a Eulogy for the Internet as We Know It

The Internet is prone to change. We all know this and have experienced it firsthand. Even though we may understand this reality, it can still be rather shocking when we’re confronted with it. The latest statistics show us how the current changes of the Internet have huge implications about how we’ll all interact with the web moving forward, which may spell doom for doing “online business as usual.”

A recent report by Forrester reveals that we are spending 85 percent of our time on our mobile phones using apps, and only 15 percent in the browser. Pair this with another major trend that saw a tipping point in 2014 when more people began accessing the Internet through mobile apps than desktop computers, and you really begin to see clearly just how the web is truly changing.

By changing, we mean that people are spending far less time on their desktops (and dramatically more so on their mobile devices) perusing the Internet by going from website to website, and far more of their time online using mobile apps. Does this mean you, as a business owner, should therefore shift all of your online efforts to mobile apps?

Not necessarily, seeing as another finding from Forrester’s study shows that people are spending 85 percent of their time on their mobile device utilizing only five apps, which includes obvious apps such as Facebook and Google.

As net neutrality continues to be threatened by legislation influenced by special interests, the trend shown by these statistics threaten the same freedoms we enjoy online, only from a different angle. That angle: the business interests of a handful of companies that own these popular mobile platforms will end up dominating and controlling the online conversation. Business2Community describes it like this: “This reality on the commercial web is now being revealed as we are witnessing the rise of a duopoly. Google and Facebook. Today 90 percent of all advertising growth on digital is coming from these two companies.”

Now, don’t get us wrong, as long as there’s an Internet you’ll still be able to publish your message (whether it be personal or professional) in the same ways that were popular 10 years ago before the iPhone hit the scene (like using websites, forums, email, etc.). It’s just that, good luck getting anybody to actually listen to your message without the help of Facebook and Google to drive traffic to your site. Furthermore, online content that’s not tailored for mobile will continue to lose influence as the Internet continues to evolve in the ways that it is.

While the vast majority of us are powerless to stop such changes, all those who value the open Web have every right to mourn what the web’s becomining. An appropriate eulogy can be found in the words of Tim Berners-Lee’s (the inventor of the World Wide Web) 1995 utopian vision of how the Internet can change the world for good. Berners-Lee described his vision of the web as “an open platform that would allow everyone, everywhere to share information, access opportunities, and collaborate across geographic and cultural boundaries.”

While the web is more accessible and “open” today than ever before, one must put an asterisk at the end of this 1995 statement that communicates, “at the terms of Google and Facebook.”

From a business standpoint, the ongoing changes of the Internet presents a challenge that’s inherent with the use of any technology--the challenge to keep up with and anticipate trends, and to adapt your business model accordingly. Technology can change suddenly and you owe it to the continuity of your business to be in the know. Thankfully, you’ve got the technology experts at Computerware to navigate this changing world of technology for you.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, 23 September 2017
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Microsoft Managed Service Provider Workplace Tips Software Productivity Business Computing Backup Hackers Data Hardware Saving Money Business Malware Email IT Support IT Services Hosted Solutions Efficiency Google Quick Tips Gadgets Smartphones Business Continuity Small Business Mobile Devices Mobile Office Disaster Recovery User Tips Virtualization Computer Microsoft Office Server Network Network Security Miscellaneous Upgrade VoIP Social Media Windows 10 Windows Unified Threat Management Mobile Device Management Operating System Smartphone Innovation Remote Computing Communication Ransomware WiFi Vendor Management Android Passwords BYOD Mobile Computing Apps Marketing The Internet of Things History Holiday Managed IT services Facebook Users Remote Monitoring Firewall Apple Collaboration Data Management Analytics IT Consultant Alert Save Money Office Outsourced IT Health Automation Content Filtering Big data Managed IT Services Bring Your Own Device Search App Productivity Windows 8 Lithium-ion Battery Hard Drives Tech Support Phishing Hiring/Firing Outlook Best Practice BDR Spam Going Green Virus Wireless Technology Phone System Managed IT Printer Help Desk Antivirus Data Backup Internet of Things Gmail Recovery Browser Employer-Employee Relationship Information Technology Encryption IT Support IBM Budget Customer Service Education Data storage Humor Save Time Proactive IT Money Computers Running Cable SaaS Artificial Intelligence Bandwidth Administration Maintenance communications Saving Time Intranet Two-factor Authentication Wireless Securty Update Travel Website Solid State Drive Data Recovery Flexibility Digital Payment Fax Server Hacking Legal PowerPoint Social Networking Office 365 Avoiding Downtime VPN User Twitter Hosted Solution Current Events DDoS Government iPhone Business Intelligence Word It Management Black Market Risk Management Hard Drive Password Mobile Device Document Management Networking Hacker Computer Repair Telephone Systems Windows 10 Tablet Training Disaster Virtual Desktop Start Menu End of Support Documents Programming Taxes Streaming Media Inbound Marketing Heating/Cooling Law Enforcement Uninterrupted Power Supply Co-managed IT Politics Chrome Retail Experience Lifestyle Router Laptop Computer Accessories Comparison Customer Relationship Management Augmented Reality Cloud Computing Office Tips Hack Paperless Office Text Messaging Sports Computing Safety Social Pain Points Robot IT service Network Congestion User Error Excel Net Neutrality Public Cloud Compliance Cybercrime Cybersecurity Gaming Console Cortana Cost Management Mobility Business Growth Webcam Monitors Automobile Trending Telephony Downtime Processors USB How To YouTube Statistics Presentation Settings Company Culture Trojan Websites Banking Workers Drones Skype Organize Thin CLient Tech Terms File Sharing Access Language Permissions Software as a Service Business Metrics Teamwork Samsung Writing G Suite switches Leadership Storage PDF Spyware Physical Security Device Management Keyboard Chromebook Best Available Tablets Data Protection Product Reviews Sync Domains Messenger eWaste cache Work/Life Balance Read CCTV Cryptocurrency Harddrive Shortcut Patch Management Download Value Google Maps Google Docs online Currency Troubleshooting Corporate Profile In Internet of Things IT consulting Books Staffing Environment Assessment Emails Cleaning External Harddrive Scalability CIO Mouse Competition Redundancy Microchip Business Owner VoIP Regulations Windows XP Reading Get More Done GPS Consultation Meetings Society Smart Phones Private Cloud Printer Server Application Project Management Hacks Cabling Micrsooft Specifications Administrator Relocation 3D Identity Theft Supercomputer Ebay Machine Learning Recycling Emergency Notifications Digital Signature Worker Entertainment Distributed Denial of Service Reliable Computing Pirating Information Adminstration Google Drive Virtual Reality Employer Employee Relationship Music Upselling Webinar Social Engineering Licensing Upgrades Electricity Bluetooth Analytic Botnet LiFi Computing Infrastructure Content Management Deep Learning Public Speaking Business Technology Rental Service WannaCry Memory Computer Malfunction Visible Light Communication Video Surveillance Best Practives Entrepreneur Time Management Wi-Fi LinkedIn Business Managemenet Saving ZTime Scam HIPAA Electronic Payment Flash Motion Sickness Advertising Microserver Debate Touchscreen Tracking Google Wallet Archive Displays IP Address Knowledge Digital Web Server Unified Communications Point of Contact Turn Key Human Resources 3D Printing Capital Productuvuty Vulnerability CrashOverride

hp supplies medallionLarge2017