ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Is Society Really Prepared For the Drastic Changes The Internet of Things Will Usher In?

b2ap3_thumbnail_ubiquity_data_400.jpgTechnology has changed the world. It has changed individual lives, businesses, and the way people communicate with one another. The main reason for this is that technology, and the use of it, happens everywhere. In fact, the world has seen a huge spike in the addition of microprocessors to ordinary objects which allows them to communicate with the digital world. This trend is known as ubiquitous computing.

Ubiquitous Computing
Humans are starting to use computers everywhere. The concept is not new. Some of the most celebrated science fiction authors of the 20th century explained worlds that were rife with this type of computing. In most of these stories, the computer (or the technology) is celebrated at first; part of a technological utopia that changes the experience of the stories’ characters. This supposed utopia usually results in some grandiose systemic failure, and the protagonists of the story realize that the ubiquity of this technology was actually a hindrance to humanity, not a blessing.

Many sci-fi stories follow this paradigm. Of course, in a world where the computing we take for granted was just fiction, it’s not hard to imagine technology having some horrific effect on society. In the 21st century, however, technologies are eerily similar to the ones that the likes of Orwell, Dick, Huxley, and Asimov had described have come to fruition, making these interesting fiction stories more into tales of caution about how to handle today’s most dynamic technologies.

The technologies that are described in this literature, have largely been created by humans for the benefit of the society, while largely limiting the role of the individual. This is an important qualification to consider when looking at the viability of true technological ubiquity in our time. Can we make the same mistakes of the people in these science fiction novels? Only time will tell.

How is Computing Starting to Become Omnipresent?
The consumer technologies that many people identify as pushing this trend forward - the smartphone, the tablet, and the laptop - just scratch the surface of what is possible with today’s technology. Businesses are able to automate aspects of their organization, giving them the ability to save capital and use more of their money toward building sustainability through diversification. Today’s worker may not be concerned that automated processes will ultimately cost them their jobs, but with more ubiquity throughout the culture, you may begin to see significant shifts toward that ideology.

The main difference that many people are going to see going forward is that they are literally going to be surrounded by technology, and while there are a generation or two that will accept this shift without question, a majority of humans have no choice but to be skeptical. This should not be a surprise, given the context in which they’ve been exposed to technologies like these.

True ubiquity, however, will not be possible until there is a complete acceptance that computing systems actually bring enhanced efficiency. From the perspective of manufacturers, this has already happened. They are simply taking their time creating demand before they commit completely to the idea that every product they manufacture should come with some kind of connectivity. It seems an inevitability that in the very near future, most commercial goods will have this capability.

The Internet of Things
Many of the world’s largest software companies have been waiting for the technology to be available to make this concept a reality. It is happening now. Cisco has estimated that the Internet of Things, as it is viewed today, creates a market that is valued at upwards of $19 trillion. A February 2015 report from TechNavio suggests that the products connected to the Internet will exceed 17 billion by 2019. This number doesn’t include connected cars, wearable technology, smart TVs, tablets, smartphones or PCs. That is 17 billion thermostats, lamps, refrigerators, and any other product you can imagine. There are already manufacturers making Internet connected clothes. The technology professionals at Gartner estimate that the service offerings that will accompany those billions of products will exceed $300 billion by 2020.

As you can see, the manufacturers are already chomping at the bit, and according to some of these numbers, the demand is already there. The World Economic Forum has outwardly stated that by 2020 they expect that five billion people will have pervasive Internet possibilities and the Internet will have nearly 35 billion things connected to it.

ib iot

With this rate of growth, it seems as if ubiquitous computing is inevitable. The future is here and any debate whether goods that are connected to the Internet (and their corresponding services) are ultimately a good thing for humanity, won’t happen. Here’s to hoping that the pitfalls that plagued the science-fiction worlds of 1984, Minority Report, I, Robot, or A Brave New World aren’t inflicted on human society.

If you would like to find out more about the Internet of Things or ubiquitous computing, or simply how to get your business ready for the inevitable, give ClearView IT a call at 866-326-7214 today.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 05 July 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Network Security Privacy Data Cloud Business User Tips IT Support Internet Hardware Innovation Malware Email Hosted Solutions Efficiency Workplace Tips Computer Microsoft Google Collaboration Android Cybersecurity Phishing Business Management IT Services Backup Ransomware Data Backup communications Smartphone Small Business Microsoft Office Upgrade Smartphones Mobile Devices Network Communication Data Recovery Managed IT Services Productivity Quick Tips VoIP Users Social Media Mobile Device Tech Term Automation Windows 10 Facebook Business Continuity Disaster Recovery Covid-19 Passwords Holiday Browser Managed Service IT Support Apps Windows 10 Miscellaneous Cloud Computing Outsourced IT Managed Service Provider Data Management Internet of Things Remote Work Saving Money Operating System Government Networking Windows Gadgets Artificial Intelligence Managed IT services Workplace Strategy Encryption Blockchain Business Technology App Virtualization Mobile Device Management Spam Information Server Bandwidth Remote WiFi Employee/Employer Relationship Budget Gmail Office Two-factor Authentication History Office 365 Apple Information Technology BDR Wi-Fi Big Data Conferencing Health Access Control Data Security Analytics Cybercrime Save Money Help Desk IT Management Hacking Voice over Internet Protocol Training Employer-Employee Relationship Cost Management Hacker Vendor Patch Management Document Management Remote Computing Compliance Remote Monitoring IBM Website Data loss BYOD Mobile Office Search... Computing Best Practice Vendor Management Hard Drive Managed Services Retail Alert Money Applications Customer Service Hiring/Firing Legal Unified Threat Management Outlook Firewall Vulnerabilities Data storage Password Augmented Reality Project Management Word Travel Content Filtering Virtual Reality Social Engineering Websites Cryptocurrency Black Market Windows 11 Mobility Router Meetings Mobile Computing Cleaning Robot Marketing The Internet of Things Google Maps Scam Remote Workers YouTube Running Cable Windows 7 Free Resource Storage Laptop VPN Update How To Twitter Data Breach Law Enforcement End of Support Printer Social Sports User SaaS DDoS Paperless Office Antivirus Maintenance Monitoring iPhone Healthcare Education Cortana Chrome Saving Time Bluetooth Start Menu Cooperation Lithium-ion battery Distributed Denial of Service Downloads Video Conferencing Office Tips Computer Care PowerPoint Private Cloud Computers Memory Bitcoin Virtual Machines Administration Vulnerability Telephone Computer Repair Processors Presentation Software as a Service Data Protection Professional Services Specifications IT Consultant Politics Machine Learning Settings Excel Customer Relationship Management Solid State Drive Co-Managed IT Managed Services Provider Entertainment Virtual Private Network Wireless Technology eWaste Virtual Assistant Tech Terms Chromebook Drones Current Events Automobile Downtime Managed IT Safety Digital Solutions Processor How To Images 101 Virtual Desktop Microchip Integration Taxes HIPAA Flexibility Experience Display Hack Employees Identity Theft Notifications Multi-factor Authentication Avoiding Downtime Physical Security Disaster Unified Communications Holidays Google Docs Wireless Headphones Recovery Touchscreen Microsoft Excel Virtual Machine Competition Business Cards Optimization Music Smart Technology Computer Malfunction Tech Inbound Marketing Going Green Reviews Emergency Error 2FA LiFi Vendor Mangement Teamwork Entrepreneur Bookmark Data Storage Documents Hypervisor Application Samsung Piracy Uninterrupted Power Supply Medical IT Business Intelligence Webcam Term Botnet Download Shopping Paperless Rental Service HTML Business Mangement Micrsooft SQL Server Electronic Payment Browsers Nanotechnology PCI DSS Securty Flash Licensing Tablets Telephone Systems Software License Humor Domains Business Growth Supply Chain Google Play Upload Gig Economy Social Network Business Communications Google Calendar Phone System Internet Service Provider Azure Supercomputer Data Analysis Screen Reader Regulations Compliance Virus Managed IT Service Banking Mobile Technology Memes Google Wallet Workplace Motion Sickness Security Cameras Trends Customer Resource management Human Resources Comparison Messenger Devices Net Neutrality Google Drive Deep Learning Fileless Malware Financial Data Tip of the week Public Speaking Streaming Media Knowledge Computer Accessories Business Metrics Company Culture IT Corporate Profile Hosted Solution Scams Gamification Risk Management Telephone System Google Apps Television Books Regulations Telephony Keyboard Employer Employee Relationship Hard Drives Cabling Society Directions Backup and Disaster Recovery Telework Language Desktop Communitications Tablet Microsoft 365 Cables intranet G Suite Content Smartwatch Electronic Medical Records Mouse Reading Accountants Procurement Wireless VoIP Monitors Shortcut Tracking Visible Light Communication Heating/Cooling Windows 8 Environment Database FinTech Windows XP IT Assessment Point of Sale Social Networking Web Server CES Health IT SharePoint Relocation Equifax Supply Chain Management Displays Value Digital Payment Advertising Worker Tech Support Shortcuts Troubleshooting Tactics Organization Work/Life Balance Hard Drive Disposal Cyber security Smart Devices Access Username Startup Remote Working Time Management Freedom of Information Public Cloud Trend Micro Be Proactive Navigation In Internet of Things Addiction AI email scam Digital Security Cameras Audit Hacks Mobile Security Electronic Health Records Spyware Network Congestion Transportation User Tip Reliable Computing Legislation Staffing Writing News Wasting Time File Sharing eCommerce IP Address Modem Workplace Strategies Evernote Business Owner Network Management Redundancy Videos Surveillance Cache Proxy Server Scalability Emails Unified Threat Management Fake News Managing Costs Workers Proactive IT SSID Administrator Service Level Agreement Text Messaging Computing Infrastructure Media Printing Bring Your Own Device Device security Development Employer/Employee Relationships CCTV Management

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?