It's Time to Write a Eulogy for the Internet as We Know It

It's Time to Write a Eulogy for the Internet as We Know It

The Internet is prone to change. We all know this and have experienced it firsthand. Even though we may understand this reality, it can still be rather shocking when we’re confronted with it. The latest statistics show us how the current changes of the Internet have huge implications about how we’ll all interact with the web moving forward, which may spell doom for doing “online business as usual.”

A recent report by Forrester reveals that we are spending 85 percent of our time on our mobile phones using apps, and only 15 percent in the browser. Pair this with another major trend that saw a tipping point in 2014 when more people began accessing the Internet through mobile apps than desktop computers, and you really begin to see clearly just how the web is truly changing.

By changing, we mean that people are spending far less time on their desktops (and dramatically more so on their mobile devices) perusing the Internet by going from website to website, and far more of their time online using mobile apps. Does this mean you, as a business owner, should therefore shift all of your online efforts to mobile apps?

Not necessarily, seeing as another finding from Forrester’s study shows that people are spending 85 percent of their time on their mobile device utilizing only five apps, which includes obvious apps such as Facebook and Google.

As net neutrality continues to be threatened by legislation influenced by special interests, the trend shown by these statistics threaten the same freedoms we enjoy online, only from a different angle. That angle: the business interests of a handful of companies that own these popular mobile platforms will end up dominating and controlling the online conversation. Business2Community describes it like this: “This reality on the commercial web is now being revealed as we are witnessing the rise of a duopoly. Google and Facebook. Today 90 percent of all advertising growth on digital is coming from these two companies.”

Now, don’t get us wrong, as long as there’s an Internet you’ll still be able to publish your message (whether it be personal or professional) in the same ways that were popular 10 years ago before the iPhone hit the scene (like using websites, forums, email, etc.). It’s just that, good luck getting anybody to actually listen to your message without the help of Facebook and Google to drive traffic to your site. Furthermore, online content that’s not tailored for mobile will continue to lose influence as the Internet continues to evolve in the ways that it is.

While the vast majority of us are powerless to stop such changes, all those who value the open Web have every right to mourn what the web’s becomining. An appropriate eulogy can be found in the words of Tim Berners-Lee’s (the inventor of the World Wide Web) 1995 utopian vision of how the Internet can change the world for good. Berners-Lee described his vision of the web as “an open platform that would allow everyone, everywhere to share information, access opportunities, and collaborate across geographic and cultural boundaries.”

While the web is more accessible and “open” today than ever before, one must put an asterisk at the end of this 1995 statement that communicates, “at the terms of Google and Facebook.”

From a business standpoint, the ongoing changes of the Internet presents a challenge that’s inherent with the use of any technology--the challenge to keep up with and anticipate trends, and to adapt your business model accordingly. Technology can change suddenly and you owe it to the continuity of your business to be in the know. Thankfully, you’ve got the technology experts at Computerware to navigate this changing world of technology for you.

7 Habits of Highly Effective PC Users
3 Significant Ways Your Business Can Take Advantag...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, June 22, 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Microsoft Software Business Computing Hackers Backup Managed Service Provider Productivity Workplace Tips Data Saving Money Hardware Business Malware Email IT Support IT Services Hosted Solutions Network Security Google Small Business Efficiency Smartphones Quick Tips Gadgets Mobile Devices User Tips Business Continuity Computer Disaster Recovery Mobile Office Virtualization Network Microsoft Office VoIP Social Media Android Innovation Server Smartphone Mobile Device Management Upgrade Miscellaneous Windows 10 Windows Ransomware Unified Threat Management Remote Monitoring Operating System Collaboration Communication Holiday Mobile Computing Passwords Remote Computing WiFi Vendor Management Cybersecurity BYOD Apps Managed IT services The Internet of Things Marketing Facebook Users Analytics History IT Support Firewall Apple Data Management Productivity communications Alert Data Backup Automation Data Recovery Internet of Things Tech Term Artificial Intelligence Phishing IT Consultant Outsourced IT Managed IT Services Save Money App Content Filtering Going Green Office Mobile Device Health Bring Your Own Device Big data Gmail Spam BDR Bandwidth Managed IT Best Practice Information Technology Maintenance Cost Management Lithium-ion Battery Printer Virus Tech Support Encryption Budget Wireless Technology Antivirus Search Browser Outlook Cybercrime Windows 8 Hiring/Firing Hard Drives Hacking Computers IBM Office 365 Update Help Desk Phone System Money Recovery Employer-Employee Relationship Document Management Humor Saving Time Compliance VPN Data storage Travel Intranet Education Windows 10 Legal Risk Management Training Networking Two-factor Authentication Customer Service Administration Regulations Save Time Hard Drive Website Government SaaS It Management Proactive IT Business Technology Law Enforcement Running Cable Cloud Computing Password Patch Management Cortana Blockchain Social Networking Solid State Drive Data Loss Excel Hacker Black Market Twitter Flexibility Data Breach Customer Relationship Management Augmented Reality Laptop Telephone Systems Project Management Business Growth PowerPoint User Wireless Business Intelligence Current Events DDoS Digital Payment Paperless Office Access Control Downtime Disaster Avoiding Downtime Hosted Solution Comparison Tablet Mobility End of Support Fax Server Social Engineering Word Data Security Robot Company Culture Securty Computer Repair iPhone Pain Points Computing Infrastructure Hack Value Vulnerabilities How To Statistics Programming Healthcare Bluetooth Download Scam Network Congestion Private Cloud Redundancy Processors Cryptocurrency Telephony USB Applications Taxes Google Docs Streaming Media Machine Learning Presentation Gaming Console Distributed Denial of Service Experience Digital Specifications Websites Safety Cleaning Virtual Desktop Monitors Net Neutrality Text Messaging Start Menu Social Tech Terms Office Tips Webcam Public Cloud Documents Mobile Technology Chrome User Error Identity Theft Software as a Service Co-managed IT Heating/Cooling YouTube Storage Unified Communications Settings Uninterrupted Power Supply Sports Router Google Maps Computer Accessories Computing Virtual Reality Bitcoin Inbound Marketing Politics Automobile Retail Trending Data Protection Emails Lifestyle IT service Chromebook eWaste Mouse Network Management Best Practives Music Skype Equifax Messenger WannaCry Tracking Shortcut Downloads switches Writing Archive Troubleshooting Time Management Freedom of Information Device security Rental Service Corporate Profile Meetings Entrepreneur Upgrades LiFi Desktop Finance Web Server Environment Point of Contact Nanotechnology Microserver HIPAA Assessment Cabling SharePoint Business Cards Service Level Agreement Upselling Wi-Fi Administrator Electronic Payment Tip of the week Startup Books Workers Competition Google Calendar Get More Done Business Owner Touchscreen News Work/Life Balance Video Surveillance VoIP Supercomputer Deep Learning Unified Threat Management Backup and Disaster Recovery Evernote Visible Light Communication Recycling Memory Gamification Printer Server Microchip Knowledge Analytic Screen Reader Saving ZTime Turn Key Consultation Worker IP Address Piracy Upload Trojan Human Resources Virtual Assistant Product Reviews Smart Tech Reading Samsung Application Technology Tips IT consulting G Suite Fake News HTML Debate Organize Employer Employee Relationship Audit Read Fiber-Optic Database Harddrive Licensing Data Warehousing Advertising Flash Mobile Security GPS Hacks Physical Security CIO Conferencing Software License Trends Banking Botnet Emergency Hard Drive Disposal Staffing Google Wallet Multi-Factor Security External Harddrive Relocation Digital Signature Access Tablets Windows XP Device Management Sync Entertainment Microsoft Excel Society Business Managemenet Devices File Sharing Teamwork Computer Care Displays Content Management Fraud Tactics Google Drive Windows Server 2008 UTM Content 3D Ebay Webinar Notifications CCTV Micrsooft Monitoring Thin CLient IT Plan Enterprise Resource Planning Business Metrics Computer Malfunction PDF Vulnerability Drones Legislation Smart Phones Reliable Computing Spyware Mobile Payment online Currency In Internet of Things Accountants Best Available Electricity Keyboard Printing email scam Addiction Domains Windows 7 Permissions Language LinkedIn Multi-factor Authentication Adminstration Pirating Information Management Leadership Migration Connected Devices Motion Sickness Wireless Headphones Scalability cache Public Speaking Television CrashOverride 3D Printing Capital Managing Stress Productuvuty