ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Is Big Tech Getting Too Big?

Is Big Tech Getting Too Big?

Some businesses have caught lightning in a bottle with the advent and overt use of the Internet. These companies now read like a who’s who of technology: Amazon, Google, Facebook, Apple, Microsoft. These companies are now some of the most lucrative in the world and there has been some very serious questions if they’re using their positions at the top of tech in unethical ways. Today, we’ll take a look at “Big Tech” and debate whether or not something has to be done to break up these companies before they become too powerful to fail. 

The Current Situation

The major technology companies hold a lot of influence. What is often referred to as the “Big Four” (Amazon, Apple, Facebook, and Google)--and sometimes referred to as the “Big Five” (adding in Microsoft or Netflix, but somehow never both)--are at the center of multiple controversies due to their use of their record profits to benefit their companies and undermine their competition. As a result there is a call from outside the technology sector to do something about it.

In fact, earlier in 2019, The Federal Trade Commission and the Department of Justice started investigating whether or not these companies were using their power and wealth to kill off and buy up competitors. In July, the U.S. House of Representatives held hearings. This has resulted in many state’s attorneys general beginning to start their own investigations. In fact, 50 attorneys general (all but California and Alabama) have coordinated to an ongoing investigation of Google for antitrust actions. 

What’s the Problem? 

Do you know how these huge corporations use your data? No. No one really does. With the amount of data these companies collect and are given the rights to, this can become a problem (especially when they don’t properly secure it). These organizations have billions of people who access their service every day. For the millions of people that search Google every hour, the millions on Facebook, the millions watching YouTube, every link you click on, every video you watch, every time you search for a word or phrase, you are providing information about yourself. This information is being used to create money-making situations for these companies. It also is the ground floor of an incredible knowledge base. 

Since the European Union enacted their General Data Protection Regulation (GDPR), more and more attention has been focused at individual data privacy. In fact, Google was levied the largest fine by GDPR regulators in its first year, a relatively small $50 million fine. Will this be the time when people start doing something about these growing tech bbehemoths, or do they resign to the immense value they bring them day-in and day-out? How much would you get done without Google Search? Have Facebook and Amazon helped your life? What would you do without your iPhone? 

Answer these questions and leave your thoughts in the comments section below. Return to ClearView IT’s blog regularly.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 05 July 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Network Security Privacy Data Cloud Business User Tips IT Support Internet Hardware Innovation Email Hosted Solutions Malware Efficiency Workplace Tips Computer Google Microsoft Collaboration Android Cybersecurity Business Management Phishing IT Services Backup Ransomware Data Backup communications Smartphone Small Business Microsoft Office Upgrade Smartphones Mobile Devices Network Data Recovery Managed IT Services Communication Productivity Quick Tips Social Media Users VoIP Mobile Device Tech Term Automation Windows 10 Facebook Business Continuity Disaster Recovery Covid-19 Passwords Holiday Managed Service Windows 10 IT Support Browser Apps Miscellaneous Cloud Computing Outsourced IT Data Management Remote Work Internet of Things Managed Service Provider Government Saving Money Operating System Networking Gadgets Windows Artificial Intelligence Managed IT services Workplace Strategy Mobile Device Management App Virtualization Business Technology Blockchain Spam Remote Server WiFi Bandwidth Information Encryption Gmail Office Apple History Two-factor Authentication Information Technology Office 365 Employee/Employer Relationship Budget BDR Big Data Health Analytics Conferencing Access Control Data Security Cybercrime Wi-Fi Voice over Internet Protocol Remote Monitoring Help Desk Hacking Cost Management Employer-Employee Relationship IT Management Training Document Management Hacker Remote Computing Save Money Compliance Patch Management Vendor IBM Project Management Website Computing Vulnerabilities Mobile Office Vendor Management Hard Drive Search... Managed Services Best Practice Retail Legal Alert Data loss Data storage Hiring/Firing Money Outlook Password Customer Service Unified Threat Management Firewall Augmented Reality Word Applications BYOD Maintenance Mobile Computing Remote Workers Router Marketing Monitoring Running Cable Windows 7 Healthcare Free Resource The Internet of Things Websites YouTube Mobility Twitter Meetings Storage How To Law Enforcement Laptop End of Support Google Maps Printer Scam User VPN Social Sports Travel Update DDoS Virtual Reality SaaS Social Engineering Chrome Cryptocurrency Black Market Data Breach iPhone Cleaning Windows 11 Cortana Paperless Office Education Antivirus Robot Content Filtering Physical Security Presentation Specifications IT Consultant Solid State Drive Processors Managed Services Provider Multi-factor Authentication Start Menu Customer Relationship Management Downloads Chromebook Drones Computer Care Virtual Private Network Co-Managed IT Entertainment Automobile Vulnerability Saving Time Current Events Software as a Service Data Protection Computers Bitcoin Solutions How To Wireless Technology Microchip eWaste Flexibility Telephone Images 101 Integration Display Downtime Safety Identity Theft Excel HIPAA Hack Notifications Unified Communications Employees Avoiding Downtime Virtual Desktop Tech Terms Experience Google Docs Holidays Managed IT Bluetooth Digital Virtual Assistant Distributed Denial of Service Office Tips Cooperation Private Cloud Memory Taxes Video Conferencing Disaster Virtual Machines Processor Computer Repair PowerPoint Politics Administration Lithium-ion battery Professional Services Machine Learning Settings Navigation Banking Cache Addiction Business Communications Entrepreneur Google Wallet email scam Internet Service Provider Azure LiFi Managed IT Service Documents Messenger Unified Threat Management Application Deep Learning Workers Mobile Security Regulations Compliance Legislation Business Intelligence News Memes Phone System Workplace User Tip Printing Evernote Business Metrics Network Management Human Resources Hosted Solution CCTV Net Neutrality Securty Books Touchscreen Financial Data Emails Risk Management Society Computer Malfunction Fake News IT Scams Emergency Proxy Server Domains Language Vendor Mangement Service Level Agreement Google Apps Computing Infrastructure Computer Accessories Reading Management Monitors Samsung Device security Telework Visible Light Communication Uninterrupted Power Supply Wireless Headphones Smartwatch Windows 8 Webcam Microsoft Excel Communitications Microsoft 365 Cables Tech Business Mangement Going Green Business Cards Procurement Advertising Relocation Error Public Speaking Displays Tablets FinTech Work/Life Balance CES Tech Support IT Assessment Point of Sale Streaming Media Bookmark Google Calendar Term Download Keyboard Supercomputer Piracy Supply Chain Management Value Cyber security Shortcuts Virus Hard Drives HTML Organization Nanotechnology intranet Motion Sickness Smart Devices In Internet of Things Browsers Comparison Google Play Wireless Hacks Google Drive Upload Shortcut Network Congestion Software License Remote Working Troubleshooting Environment Trend Micro Be Proactive Reliable Computing Social Network Heating/Cooling Writing AI Corporate Profile Screen Reader Digital Security Cameras Social Networking Electronic Health Records Transportation Windows XP Knowledge Data Analysis Television Security Cameras Telephony Trends Employer Employee Relationship Mobile Technology Wasting Time eCommerce Modem Workplace Strategies Scalability Customer Resource management Cabling Devices Text Messaging Tablet Videos Proactive IT G Suite Tip of the week Surveillance Administrator Fileless Malware Mouse Bring Your Own Device VoIP Gamification Tracking Company Culture Business Owner Managing Costs SSID Telephone System Regulations Backup and Disaster Recovery Media Music Web Server Development Employer/Employee Relationships Directions SharePoint Staffing Content Digital Payment Desktop Virtual Machine Optimization Smart Technology Electronic Medical Records IP Address Worker Accountants Reviews Access Database 2FA Teamwork Botnet Rental Service Time Management Micrsooft Public Cloud Data Storage Inbound Marketing Hypervisor Equifax Shopping Medical IT Health IT Flash Audit Telephone Systems Spyware Tactics Paperless Business Growth Hard Drive Disposal SQL Server Licensing Recovery Username Competition File Sharing PCI DSS Startup Gig Economy Electronic Payment Freedom of Information Humor Supply Chain Redundancy

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?