Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

It's Time to Write a Eulogy for the Internet as We Know It

It's Time to Write a Eulogy for the Internet as We Know It

The Internet is prone to change. We all know this and have experienced it firsthand. Even though we may understand this reality, it can still be rather shocking when we’re confronted with it. The latest statistics show us how the current changes of the Internet have huge implications about how we’ll all interact with the web moving forward, which may spell doom for doing “online business as usual.”

A recent report by Forrester reveals that we are spending 85 percent of our time on our mobile phones using apps, and only 15 percent in the browser. Pair this with another major trend that saw a tipping point in 2014 when more people began accessing the Internet through mobile apps than desktop computers, and you really begin to see clearly just how the web is truly changing.

By changing, we mean that people are spending far less time on their desktops (and dramatically more so on their mobile devices) perusing the Internet by going from website to website, and far more of their time online using mobile apps. Does this mean you, as a business owner, should therefore shift all of your online efforts to mobile apps?

Not necessarily, seeing as another finding from Forrester’s study shows that people are spending 85 percent of their time on their mobile device utilizing only five apps, which includes obvious apps such as Facebook and Google.

As net neutrality continues to be threatened by legislation influenced by special interests, the trend shown by these statistics threaten the same freedoms we enjoy online, only from a different angle. That angle: the business interests of a handful of companies that own these popular mobile platforms will end up dominating and controlling the online conversation. Business2Community describes it like this: “This reality on the commercial web is now being revealed as we are witnessing the rise of a duopoly. Google and Facebook. Today 90 percent of all advertising growth on digital is coming from these two companies.”

Now, don’t get us wrong, as long as there’s an Internet you’ll still be able to publish your message (whether it be personal or professional) in the same ways that were popular 10 years ago before the iPhone hit the scene (like using websites, forums, email, etc.). It’s just that, good luck getting anybody to actually listen to your message without the help of Facebook and Google to drive traffic to your site. Furthermore, online content that’s not tailored for mobile will continue to lose influence as the Internet continues to evolve in the ways that it is.

While the vast majority of us are powerless to stop such changes, all those who value the open Web have every right to mourn what the web’s becomining. An appropriate eulogy can be found in the words of Tim Berners-Lee’s (the inventor of the World Wide Web) 1995 utopian vision of how the Internet can change the world for good. Berners-Lee described his vision of the web as “an open platform that would allow everyone, everywhere to share information, access opportunities, and collaborate across geographic and cultural boundaries.”

While the web is more accessible and “open” today than ever before, one must put an asterisk at the end of this 1995 statement that communicates, “at the terms of Google and Facebook.”

From a business standpoint, the ongoing changes of the Internet presents a challenge that’s inherent with the use of any technology--the challenge to keep up with and anticipate trends, and to adapt your business model accordingly. Technology can change suddenly and you owe it to the continuity of your business to be in the know. Thankfully, you’ve got the technology experts at Computerware to navigate this changing world of technology for you.

7 Habits of Highly Effective PC Users
3 Significant Ways Your Business Can Take Advantag...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, 21 April 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Microsoft Hackers Software Business Computing Backup Managed Service Provider Productivity Workplace Tips Data Hardware Saving Money Business Malware Email IT Support IT Services Hosted Solutions Google Network Security Small Business Efficiency Quick Tips Smartphones Gadgets Mobile Devices User Tips Business Continuity Disaster Recovery Computer Virtualization Mobile Office Network Microsoft Office VoIP Social Media Server Smartphone Mobile Device Management Android Windows 10 Miscellaneous Upgrade Innovation Ransomware Unified Threat Management Windows Remote Monitoring Passwords Holiday Operating System Remote Computing Mobile Computing WiFi Vendor Management BYOD Collaboration Communication Apps The Internet of Things Marketing Facebook Users Cybersecurity Analytics Firewall History Apple Managed IT services IT Support Data Management Productivity communications Alert Internet of Things Managed IT Services Phishing Outsourced IT Save Money IT Consultant Content Filtering BDR Health Spam Bring Your Own Device Office Automation Gmail App Big data Data Backup Tech Support Information Technology Best Practice Bandwidth Going Green Mobile Device Wireless Technology Outlook Search Hiring/Firing Maintenance Virus Lithium-ion Battery Browser Managed IT Data Recovery Hard Drives Windows 8 Antivirus Budget Artificial Intelligence Printer IBM Hacking Encryption Office 365 Money Update Recovery Employer-Employee Relationship Phone System Cost Management Help Desk SaaS Website Travel Education Document Management It Management Hard Drive Save Time Saving Time Networking Intranet Training Running Cable Administration Government Law Enforcement Cybercrime Data storage Risk Management Proactive IT Computers VPN Legal Cloud Computing Two-factor Authentication Customer Service Humor Wireless Hosted Solution iPhone Robot Business Intelligence Avoiding Downtime Social Engineering Compliance Black Market Current Events Excel Computer Repair Business Growth Mobility Telephone Systems User Windows 10 Disaster DDoS End of Support Securty Digital Payment Access Control Solid State Drive Word Comparison Cortana Augmented Reality Password Data Security Flexibility PowerPoint Laptop Social Networking Hacker Downtime Data Loss Tablet Fax Server Twitter Company Culture Data Breach Project Management Documents Computing Programming Net Neutrality Heating/Cooling Identity Theft Distributed Denial of Service IT service Virtual Reality Public Cloud Retail Pain Points Experience eWaste Bluetooth Computing Infrastructure Value Trending User Error Business Technology Statistics Automobile Telephony Monitors Scam Gaming Console Streaming Media Safety How To Specifications YouTube Webcam Unified Communications Digital Social Inbound Marketing Settings Websites Start Menu Network Congestion Tech Terms Vulnerabilities Chrome Mobile Technology Taxes Software as a Service Uninterrupted Power Supply Router Politics Tech Term Computer Accessories Customer Relationship Management Bitcoin Data Protection Cryptocurrency Co-managed IT Mouse Google Docs Patch Management Blockchain Google Maps Processors Text Messaging Cleaning Emails USB Presentation Office Tips Redundancy Lifestyle Hack Regulations Virtual Desktop Paperless Office Private Cloud Sports Migration Administrator Pirating Information Relocation Adminstration Audit Teamwork Equifax Data Warehousing Supercomputer Get More Done Machine Learning Notifications Storage Emergency Smart Phones Hard Drive Disposal Worker Desktop Content Management Printer Server Reliable Computing PDF Computer Care Best Available Music Startup Google Drive Windows Server 2008 Employer Employee Relationship Keyboard Domains Upgrades Product Reviews Vulnerability Unified Threat Management Licensing Applications Electricity Botnet Video Surveillance Read Printing LiFi Smart Tech LinkedIn Windows 7 Shortcut Saving ZTime Rental Service Troubleshooting Deep Learning Fiber-Optic Visible Light Communication Upselling Mobile Security WannaCry Archive Webinar Staffing Computer Malfunction Debate Environment Memory Downloads Wi-Fi Multi-Factor Security Time Management Freedom of Information Competition Business Owner Fraud Point of Contact Advertising UTM Motion Sickness Flash Google Calendar Google Wallet Legislation Touchscreen News Tracking Application Thin CLient Best Practives Displays Knowledge email scam Technology Tips Multi-factor Authentication Web Server Leadership Banking Digital Signature Drones Wireless Headphones Microserver Fake News Workers File Sharing Entertainment Permissions Device security Access Device Management Language Business Metrics Turn Key Microsoft Excel Samsung Trojan G Suite Writing Analytic switches Business Cards Spyware online Currency Organize Mobile Payment Physical Security Chromebook Tablets Public Speaking Sync Messenger Piracy HTML cache Television CCTV Entrepreneur Work/Life Balance Download HIPAA Business Managemenet Corporate Profile In Internet of Things Books Electronic Payment GPS IT consulting Software License Devices Assessment SharePoint Scalability Microchip CIO Tip of the week IP Address IT Plan VoIP Human Resources Ebay Reading 3D Windows XP Harddrive Society Accountants Consultation Evernote Meetings Recycling Hacks Micrsooft Skype External Harddrive Virtual Assistant Cabling Capital Productuvuty CrashOverride Nanotechnology 3D Printing