Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

26 Billion Connected Devices By 2020 Will Dramatically Change Things

b2ap3_thumbnail_indroducing_big_data_400.jpgThe incorporation of mobile devices into day-to-day life has changed the culture significantly. In fact, when Apple introduced “iPhone” less than a decade ago, Steve Jobs famously said, “It’s like your life in your pocket.” Now, over eight years on from the launch of the first iPhone, it’s hard to remember what life was like before you had a full-function information system in the palm of your hand. We’ve come to rely heavily on these devices, driving mobile profits up and creating a market that didn’t have any substance only a short time ago.

So what is the next “big” thing? What’s the next consumer technology to revolutionize our lives? Is it another piece of hardware? Software? Practice? To find what’s next, many experts are focusing on the information; and it’s becoming evident that very information is actually the next “big” thing.

The “Big” Data
In this new age of individualism that is largely fueled by mobility, the average person uses (and creates) an enormous amount of data; well more than the two-to-five gigabytes that you get with your standard data plan. As of May of 2015 global IP traffic has increased 500 percent over the past five years and is at nearly one billion gigabytes per year. This number is expected to increase by 100 percent over the next five years to about 2 zettabytes per year. To put that in perspective, a zettabyte can hold 36,000,000 years of HD video... yes, that’s years.

This shift has all happened in a relatively short period of time, too. The ramifications of such a huge cultural move are still developing. Mobile devices, once looked at as “cool” gadgets, are now the predominant form of computing in the world (having just passed PC computing in worldwide data usage). People that use smartphones don’t just lug it around to make calls, they are constantly accessing the Internet, social media, and other applications. This creates a situation where businesses are building significant revenue streams by mining, packaging, and selling your user data to advertisers and other information-seeking organizations, including governments.

Everything Will Be Connected
The information systems your business uses are able to compute a fair amount of data, and by analyzing the data you collect, you can find out a lot about your business. If you think that is a lot of data to analyze, what will happen when everything you come into contact with is connected to the Internet? The concept of the Internet of Things isn’t a new one. The first network-connected device was a Coca-Cola machine on the campus of Carnegie Mellon University in 1982. The machine could report when beverage containers were empty and it could measure the temperature of imported cans.

According to Gartner, nearly 26 billion separate devices will be on the Internet of Things by 2020. Every device that is connected to the IoT will produce data. Whether it is a refrigerator that can automate grocery delivery or a dog collar that measures the health and activity of your pet, the underlying theme inherent in every Internet-connected device will be that relevant data will be reported for analysis. This data can go a long way to teach humans that many of the preexisting beliefs people have about humanity aren’t necessarily right; producing a world where, unlike the pop culture aspect of modern humanity, facts supersede opinions, and change will be the result of data analysis, not an emotional outcry from the fringes of society.

Where Does This Leave Users?
According to Mckinsey Global Institute, data brokers like Acxiom, fuel an industry worth $300 billion a year by selling off the data they collect. This information can include users’ name, gender, age, ethnicity, and more. In a profile of the company by The New York Times, Acxiom claimed to have information on some 500 million people including, “nearly every U.S. consumer”. Like it or not, information made up of your sociological traits, your search results, your purchasing history, even your browsing history, is being mined for valuable information.

It may be surprising to some that the same analytical methods that are being used to formulate user marketing profiles, are being used to advance high-end technologies like artificial intelligence. In what industry professionals call deep learning, software algorithms are written to have computers perform high-level thought and abstraction. These algorithms can take core data and analyze it through a very specific construct to get a visual representation of the data. Since there is so much data to consider, a graphic representation of the data is provided for analysis to give them a better chance of understanding the aspects of the information that they could find valuable for their company. Since all the answers they are looking for can be found by analyzing this data, there is no doubt that businesses are beginning to be very interested in how to harness and analyze this data.

It seems that your information may just be the most important variable in your business’ future. Do you think that big data can help connect the dots for your business, or bring about positive societal change? Leave us your thoughts in the comments.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 30 March 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Privacy Workplace Tips Computer Phishing Google Email Workplace Strategy Hosted Solutions Collaboration Small Business Users Backup Managed Service Ransomware Mobile Device Productivity Microsoft Quick Tips Passwords AI Saving Money Communication Cybersecurity Data Backup Smartphone Disaster Recovery Data Recovery Android Upgrade VoIP Smartphones Business Management Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Current Events Network Tech Term Remote Internet of Things Information Holiday Automation Artificial Intelligence Facebook Miscellaneous Gadgets Cloud Computing Covid-19 Training Compliance Remote Work Server Managed Service Provider Outsourced IT IT Support Spam Employee/Employer Relationship Encryption Office Windows 10 Government Business Continuity Data Management Wi-Fi Business Technology Bandwidth Windows 10 Virtualization Blockchain Apps Vendor Two-factor Authentication Mobile Office Managed Services Data Security Employer-Employee Relationship BYOD Tip of the week Chrome Mobile Device Management Budget Voice over Internet Protocol Gmail Apple Networking WiFi App HIPAA Computing Physical Security Applications Information Technology Hacker Access Control Avoiding Downtime Office 365 Marketing Conferencing Managed IT Services How To BDR Operating System Router Risk Management Virtual Private Network Computers Health 2FA Help Desk Analytics Website Office Tips Augmented Reality Retail Storage Healthcare Password Bring Your Own Device Big Data Remote Monitoring End of Support Vulnerability Vendor Management Solutions Cybercrime Customer Service Display Printer Paperless Office Windows 11 Infrastructure Monitoring Excel Document Management Remote Workers Managed IT Service Firewall Telephone Scam Data loss The Internet of Things Cooperation Free Resource Project Management Windows 7 Social Going Green Patch Management Save Money Microsoft 365 Settings Wireless Printing Content Filtering IT Management Customer Relationship Management YouTube Meetings VPN Employees Integration Cryptocurrency Modem Hacking User Tip Processor Presentation Computer Repair Mobile Security Virtual Desktop Holidays Data storage LiFi Wireless Technology Data Storage Smart Technology Supply Chain Outlook Video Conferencing Machine Learning Managed Services Provider Money Saving Time Virtual Machines Professional Services Humor Word Maintenance Sports Downloads Antivirus Mouse iPhone Licensing Safety Entertainment Administration Vulnerabilities Data Privacy Images 101 Multi-Factor Authentication Robot Mobility Telephone System Cost Management Alt Codes Content Remote Working IBM Wearable Technology Memory Vendors Downtime Unified Threat Management Motherboard Data Breach Comparison Google Play Be Proactive Health IT Unified Threat Management Directions Videos Hosted Solution Assessment Electronic Health Records Permissions Workforce Typing Wasting Time Threats Trend Micro Network Congestion Specifications Security Cameras Workplace Strategies Google Drive User Error Microchip Internet Exlporer Software as a Service Competition Knowledge Fraud Meta Username Managing Costs Amazon Point of Sale eCommerce 5G Black Friday SSID Google Docs Unified Communications Database Surveillance Experience Virtual Assistant Outsource IT User Media Bitcoin Network Management Running Cable Tech Support IT Technicians Virtual Machine Environment Google Wallet Proxy Server Reviews Cookies Monitors Cyber Monday Medical IT Tactics Development Hotspot Transportation Small Businesses Laptop Websites Mirgation Hypervisor Displays Windows 8 IP Address Drones Shopping Nanotechnology Optimization PowerPoint SharePoint Addiction Electronic Medical Records Language Employer/Employee Relationships Outsourcing Halloween Chatbots Recovery Navigation Management PCI DSS Lenovo Gig Economy Screen Reader Hard Drives Writing Distributed Denial of Service Workplace Service Level Agreement Internet Service Provider Domains Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Scary Stories Private Cloud Identity Evernote Paperless Hacks Server Management Regulations Compliance Superfish Bookmark Identity Theft Smart Tech Memes Refrigeration Fun Co-managed IT Deep Learning Download Net Neutrality Public Speaking Twitter Alerts SQL Server Technology Care Error History Business Communications Financial Data Lithium-ion battery Browsers Smartwatch Education Connectivity IT Social Engineering Break Fix Scams Entrepreneur Upload Procurement Remote Computing Azure Hybrid Work Cyber security Multi-Factor Security Tech Human Resources Mobile Computing Social Network Telework CES Tablet IoT Communitications Undo Search Dark Web Cables Best Practice Trends Supply Chain Management Alert Buisness File Sharing Regulations Dark Data Google Calendar Term Google Apps Managed IT Customer Resource management FinTech Legal Data Analysis IT solutions Star Wars IT Assessment How To Microsoft Excel IT Maintenance Business Growth Gamification Flexibility Notifications Staff Value Business Intelligence Travel Social Networking Application Legislation Shortcuts Organization Techology Fileless Malware Digital Security Cameras Google Maps Smart Devices Cortana Ransmoware

Blog Archive