ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Is Society Really Prepared For the Drastic Changes The Internet of Things Will Usher In?

b2ap3_thumbnail_ubiquity_data_400.jpgTechnology has changed the world. It has changed individual lives, businesses, and the way people communicate with one another. The main reason for this is that technology, and the use of it, happens everywhere. In fact, the world has seen a huge spike in the addition of microprocessors to ordinary objects which allows them to communicate with the digital world. This trend is known as ubiquitous computing.

Ubiquitous Computing
Humans are starting to use computers everywhere. The concept is not new. Some of the most celebrated science fiction authors of the 20th century explained worlds that were rife with this type of computing. In most of these stories, the computer (or the technology) is celebrated at first; part of a technological utopia that changes the experience of the stories’ characters. This supposed utopia usually results in some grandiose systemic failure, and the protagonists of the story realize that the ubiquity of this technology was actually a hindrance to humanity, not a blessing.

Many sci-fi stories follow this paradigm. Of course, in a world where the computing we take for granted was just fiction, it’s not hard to imagine technology having some horrific effect on society. In the 21st century, however, technologies are eerily similar to the ones that the likes of Orwell, Dick, Huxley, and Asimov had described have come to fruition, making these interesting fiction stories more into tales of caution about how to handle today’s most dynamic technologies.

The technologies that are described in this literature, have largely been created by humans for the benefit of the society, while largely limiting the role of the individual. This is an important qualification to consider when looking at the viability of true technological ubiquity in our time. Can we make the same mistakes of the people in these science fiction novels? Only time will tell.

How is Computing Starting to Become Omnipresent?
The consumer technologies that many people identify as pushing this trend forward - the smartphone, the tablet, and the laptop - just scratch the surface of what is possible with today’s technology. Businesses are able to automate aspects of their organization, giving them the ability to save capital and use more of their money toward building sustainability through diversification. Today’s worker may not be concerned that automated processes will ultimately cost them their jobs, but with more ubiquity throughout the culture, you may begin to see significant shifts toward that ideology.

The main difference that many people are going to see going forward is that they are literally going to be surrounded by technology, and while there are a generation or two that will accept this shift without question, a majority of humans have no choice but to be skeptical. This should not be a surprise, given the context in which they’ve been exposed to technologies like these.

True ubiquity, however, will not be possible until there is a complete acceptance that computing systems actually bring enhanced efficiency. From the perspective of manufacturers, this has already happened. They are simply taking their time creating demand before they commit completely to the idea that every product they manufacture should come with some kind of connectivity. It seems an inevitability that in the very near future, most commercial goods will have this capability.

The Internet of Things
Many of the world’s largest software companies have been waiting for the technology to be available to make this concept a reality. It is happening now. Cisco has estimated that the Internet of Things, as it is viewed today, creates a market that is valued at upwards of $19 trillion. A February 2015 report from TechNavio suggests that the products connected to the Internet will exceed 17 billion by 2019. This number doesn’t include connected cars, wearable technology, smart TVs, tablets, smartphones or PCs. That is 17 billion thermostats, lamps, refrigerators, and any other product you can imagine. There are already manufacturers making Internet connected clothes. The technology professionals at Gartner estimate that the service offerings that will accompany those billions of products will exceed $300 billion by 2020.

As you can see, the manufacturers are already chomping at the bit, and according to some of these numbers, the demand is already there. The World Economic Forum has outwardly stated that by 2020 they expect that five billion people will have pervasive Internet possibilities and the Internet will have nearly 35 billion things connected to it.

ib iot

With this rate of growth, it seems as if ubiquitous computing is inevitable. The future is here and any debate whether goods that are connected to the Internet (and their corresponding services) are ultimately a good thing for humanity, won’t happen. Here’s to hoping that the pitfalls that plagued the science-fiction worlds of 1984, Minority Report, I, Robot, or A Brave New World aren’t inflicted on human society.

If you would like to find out more about the Internet of Things or ubiquitous computing, or simply how to get your business ready for the inevitable, give ClearView IT a call at 866-326-7214 today.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 05 May 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Network Security Privacy Data Cloud Business User Tips IT Support Internet Hardware Innovation Email Hosted Solutions Malware Efficiency Workplace Tips Computer Google Microsoft Collaboration Android Business Management Phishing Cybersecurity IT Services Backup Data Backup Ransomware communications Smartphone Microsoft Office Upgrade Smartphones Small Business Mobile Devices Network Data Recovery Managed IT Services Communication Productivity Quick Tips Users Social Media VoIP Mobile Device Automation Tech Term Facebook Business Continuity Windows 10 Covid-19 Disaster Recovery Passwords Holiday Windows 10 Managed Service IT Support Apps Browser Cloud Computing Outsourced IT Miscellaneous Data Management Remote Work Internet of Things Managed Service Provider Government Saving Money Operating System Networking Gadgets Windows Artificial Intelligence Managed IT services Workplace Strategy Blockchain App Virtualization Server Spam Information Remote Mobile Device Management WiFi Bandwidth Business Technology Encryption Information Technology Gmail Office History Two-factor Authentication Office 365 Employee/Employer Relationship Budget Apple Big Data Conferencing Access Control Data Security Health Wi-Fi Analytics BDR Cybercrime Help Desk Document Management Hacking Employer-Employee Relationship Save Money Patch Management Vendor Hacker Remote Monitoring Remote Computing Compliance Voice over Internet Protocol Cost Management IT Management Training Website Data loss Legal Search... Best Practice Data storage Retail Alert Applications Hiring/Firing Money Project Management Outlook BYOD Customer Service Password Vulnerabilities Unified Threat Management Computing Firewall Vendor Management Hard Drive Augmented Reality Mobile Office Word IBM Managed Services Law Enforcement End of Support Router Marketing How To Windows 11 Printer VPN Running Cable The Internet of Things Update YouTube Storage Travel Laptop Virtual Reality Social Engineering Data Breach Cryptocurrency Paperless Office Antivirus Black Market Maintenance Cleaning User Robot Social Sports DDoS SaaS Monitoring Websites Chrome Healthcare Mobility Meetings iPhone Remote Workers Cortana Education Google Maps Twitter Windows 7 Content Filtering Scam Free Resource Mobile Computing Microchip IT Consultant Flexibility Current Events Processors Customer Relationship Management Excel Solutions Tech Terms Co-Managed IT Hack Identity Theft Entertainment Images 101 Notifications Managed IT Integration Display Digital Unified Communications Google Docs Virtual Assistant Wireless Technology Bluetooth Taxes eWaste Employees Distributed Denial of Service Avoiding Downtime Office Tips Private Cloud Memory Holidays Downtime Safety HIPAA Processor Physical Security Cooperation Politics Video Conferencing Virtual Desktop Machine Learning Experience Settings Virtual Machines Start Menu Computer Repair Solid State Drive Downloads Multi-factor Authentication Computer Care Professional Services Vulnerability Disaster Drones Saving Time Chromebook Software as a Service Data Protection PowerPoint Automobile Managed Services Provider Administration Lithium-ion battery Computers Bitcoin Presentation Virtual Private Network Telephone How To Specifications Business Intelligence Phone System Browsers Smartwatch Nanotechnology Communitications Microsoft 365 Knowledge Software License Corporate Profile Google Play Upload Procurement Social Network FinTech In Internet of Things Television Securty Telephony Employer Employee Relationship Network Congestion Cabling Data Analysis CES Screen Reader IT Assessment Hacks Domains Reliable Computing Mobile Technology Value Writing Tablet G Suite Security Cameras Trends Supply Chain Management Customer Resource management Organization Mouse Devices Cyber security VoIP Supply Chain Tracking Computer Accessories Fileless Malware Smart Devices Tip of the week Scalability Company Culture Web Server Gamification Remote Working Telephone System AI Administrator SharePoint Regulations Trend Micro Text Messaging Workplace Public Speaking Proactive IT Digital Payment Worker Directions Digital Security Cameras Backup and Disaster Recovery Electronic Health Records Streaming Media Bring Your Own Device Transportation Content Desktop Wasting Time Access Keyboard Electronic Medical Records Accountants eCommerce Time Management Modem Scams Hard Drives Music Public Cloud intranet Videos Database Surveillance Audit Managing Costs Wireless Spyware Shortcut Troubleshooting Environment Health IT Botnet Equifax SSID Cables Heating/Cooling File Sharing Hard Drive Disposal Employer/Employee Relationships Micrsooft Social Networking Media Tactics Development Windows XP Rental Service Redundancy Username Virtual Machine Flash Cache Reviews Startup Optimization Telephone Systems Unified Threat Management Freedom of Information Point of Sale Business Growth Workers email scam Teamwork Navigation 2FA Addiction Data Storage Printing Mobile Security Hypervisor Shortcuts Business Owner CCTV Google Wallet User Tip Shopping Legislation Banking Touchscreen News Medical IT Messenger Emergency SQL Server Deep Learning Computer Malfunction Evernote Paperless Network Management PCI DSS Licensing Staffing Vendor Mangement Be Proactive Hosted Solution Samsung Proxy Server Gig Economy Emails Humor Business Metrics Fake News IP Address Books Computing Infrastructure Azure Uninterrupted Power Supply Webcam Business Communications Service Level Agreement Internet Service Provider Management Regulations Compliance Device security Managed IT Service Language Business Mangement Workplace Strategies Inbound Marketing Society Tablets Wireless Headphones Memes Microsoft Excel Reading Business Cards Monitors Visible Light Communication Tech Human Resources Going Green Net Neutrality Error Financial Data Google Calendar Recovery Competition Windows 8 Supercomputer Bookmark Risk Management IT Virus Electronic Payment Relocation Piracy Displays Entrepreneur Advertising Motion Sickness Term Google Apps Download LiFi Telework Comparison HTML Documents Work/Life Balance Google Drive Smart Technology Application Tech Support

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?