Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Is Big Tech Getting Too Big?

Is Big Tech Getting Too Big?

Some businesses have caught lightning in a bottle with the advent and overt use of the Internet. These companies now read like a who’s who of technology: Amazon, Google, Facebook, Apple, Microsoft. These companies are now some of the most lucrative in the world and there has been some very serious questions if they’re using their positions at the top of tech in unethical ways. Today, we’ll take a look at “Big Tech” and debate whether or not something has to be done to break up these companies before they become too powerful to fail. 

The Current Situation

The major technology companies hold a lot of influence. What is often referred to as the “Big Four” (Amazon, Apple, Facebook, and Google)--and sometimes referred to as the “Big Five” (adding in Microsoft or Netflix, but somehow never both)--are at the center of multiple controversies due to their use of their record profits to benefit their companies and undermine their competition. As a result there is a call from outside the technology sector to do something about it.

In fact, earlier in 2019, The Federal Trade Commission and the Department of Justice started investigating whether or not these companies were using their power and wealth to kill off and buy up competitors. In July, the U.S. House of Representatives held hearings. This has resulted in many state’s attorneys general beginning to start their own investigations. In fact, 50 attorneys general (all but California and Alabama) have coordinated to an ongoing investigation of Google for antitrust actions. 

What’s the Problem? 

Do you know how these huge corporations use your data? No. No one really does. With the amount of data these companies collect and are given the rights to, this can become a problem (especially when they don’t properly secure it). These organizations have billions of people who access their service every day. For the millions of people that search Google every hour, the millions on Facebook, the millions watching YouTube, every link you click on, every video you watch, every time you search for a word or phrase, you are providing information about yourself. This information is being used to create money-making situations for these companies. It also is the ground floor of an incredible knowledge base. 

Since the European Union enacted their General Data Protection Regulation (GDPR), more and more attention has been focused at individual data privacy. In fact, Google was levied the largest fine by GDPR regulators in its first year, a relatively small $50 million fine. Will this be the time when people start doing something about these growing tech bbehemoths, or do they resign to the immense value they bring them day-in and day-out? How much would you get done without Google Search? Have Facebook and Amazon helped your life? What would you do without your iPhone? 

Answer these questions and leave your thoughts in the comments section below. Return to Voyage Technology’s blog regularly.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 31 March 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Privacy Workplace Tips Computer Phishing Google Email Workplace Strategy Hosted Solutions Collaboration Small Business Users Backup Managed Service Ransomware Mobile Device Productivity Microsoft Quick Tips Passwords AI Saving Money Communication Cybersecurity Data Backup Smartphone Disaster Recovery Data Recovery Android Upgrade VoIP Smartphones Business Management Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Current Events Network Tech Term Remote Internet of Things Information Holiday Artificial Intelligence Automation Facebook Miscellaneous Gadgets Cloud Computing Covid-19 Training Compliance Remote Work Server Managed Service Provider Outsourced IT IT Support Spam Employee/Employer Relationship Encryption Office Windows 10 Government Business Continuity Data Management Wi-Fi Blockchain Business Technology Bandwidth Windows 10 Virtualization Apps Data Security Vendor Two-factor Authentication Mobile Office Managed Services Employer-Employee Relationship BYOD Chrome Mobile Device Management Budget Tip of the week Gmail Voice over Internet Protocol Apple WiFi App Networking How To BDR Computing Information Technology Hacker HIPAA Physical Security Applications Avoiding Downtime Office 365 Marketing Access Control Conferencing Managed IT Services Operating System Risk Management Computers Router Virtual Private Network Analytics Website Office Tips Augmented Reality Health 2FA Help Desk Storage Password Bring Your Own Device Retail Healthcare Big Data Cooperation Free Resource Project Management Windows 7 Cybercrime Patch Management Save Money Microsoft 365 Customer Service Remote Monitoring End of Support Vulnerability Vendor Management Solutions Display Printer Paperless Office Windows 11 Infrastructure Monitoring Firewall Excel Document Management Remote Workers Managed IT Service The Internet of Things Telephone Scam Data loss Going Green Social Settings Data Privacy Printing Wireless Content Filtering Images 101 Customer Relationship Management Multi-Factor Authentication Robot Mobility YouTube Telephone System Cost Management Cryptocurrency Hacking Presentation IT Management VPN Employees Meetings Virtual Desktop LiFi Wireless Technology Integration Data storage User Tip Modem Processor Computer Repair Mobile Security Outlook Holidays Money Word Humor Data Storage Smart Technology Supply Chain Video Conferencing Machine Learning Managed Services Provider Sports Saving Time Virtual Machines Professional Services Mouse Safety Administration Maintenance Downloads Antivirus iPhone Licensing Entertainment Vulnerabilities Alt Codes IBM Trends Supply Chain Management Alert File Sharing Regulations Dark Data Google Calendar Term Google Apps Downtime Managed IT Customer Resource management FinTech Data Analysis Star Wars IT Assessment How To Microsoft Excel IT Maintenance Hosted Solution Typing Gamification Flexibility Notifications Staff Value Business Intelligence Travel Social Networking Legislation Shortcuts Organization Competition Knowledge Techology Fileless Malware Digital Security Cameras Google Maps Smart Devices Ransmoware Google Drive Content Remote Working Wearable Technology Memory Vendors Unified Threat Management Motherboard Data Breach Comparison Google Play Be Proactive 5G Health IT Experience Unified Threat Management Directions Videos Assessment Electronic Health Records Permissions Workforce Google Docs Unified Communications Bitcoin Running Cable User Wasting Time Threats Trend Micro Network Congestion Specifications Security Cameras Workplace Strategies Google Wallet User Error Microchip Internet Exlporer Software as a Service Fraud Meta Managing Costs Amazon Windows 8 IP Address Laptop Username Point of Sale eCommerce Black Friday SSID Drones Database Surveillance Virtual Assistant Outsource IT Tech Support IT Technicians Virtual Machine Environment Media Halloween Recovery Network Management Proxy Server Reviews Cookies Monitors Cyber Monday Medical IT Hard Drives Domains Tactics Development Hotspot Transportation Small Businesses Websites Mirgation Hypervisor Displays Hacks Scary Stories Fun Shopping Nanotechnology Optimization PowerPoint Refrigeration Deep Learning Public Speaking SharePoint Addiction Electronic Medical Records Language Employer/Employee Relationships Outsourcing Chatbots Navigation Lithium-ion battery Management PCI DSS Lenovo Gig Economy Entrepreneur Screen Reader Writing Distributed Denial of Service Workplace Education Service Level Agreement Internet Service Provider Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Private Cloud Identity Evernote Paperless Mobile Computing Server Management Regulations Compliance Search Superfish Bookmark Identity Theft Smart Tech Memes Co-managed IT Undo Best Practice Download Net Neutrality Twitter Alerts SQL Server Technology Care Error History Business Communications Buisness Financial Data Browsers Smartwatch Connectivity IT Social Engineering Break Fix Scams Legal IT solutions Business Growth Upload Procurement Remote Computing Azure Hybrid Work Cyber security Multi-Factor Security Tech Human Resources Application Social Network Telework Cortana CES Tablet IoT Communitications Dark Web Cables

Blog Archive