shutterstock 6840 TEST SIZE V1 051116

 

 "Experienced Analysts are ready to help you."

Have IT Questions?
Call us now (888) 894-6411

Blog

CES 2018 Showcases Upcoming Technology

CES 2018 Showcases Upcoming Technology

If there is one thing you know about technology, it’s that it meets its demand. No matter if you are talking about the millions of Internet of Things products being created today, video games and entertainment, or business tech, demand drives the technology market.

The results of this demand were presented at the 2018 International Consumer Electronics Show, an event that took place from January 7th to the 12th in Las Vegas, Nevada. While the focus was admittedly directed toward consumer products, there were quite a few technologies present that could prove impactful to the business realm.

Perhaps most impactful to businesses was the continued discussion surrounding 5G wireless connectivity. Already discussed at length at CES 2017, 5G could prove to be of significant benefit to businesses that rely on cloud-based applications and wireless devices. Wireless carriers, including AT&T and Verizon, have plans to incorporate 5G in some markets by the end of 2018.

However, the question remains how much hardware will be able to support 5G connectivity in the coming year, and how quickly the term ‘5G’ will be adopted to describe something it isn’t.

There was also interesting news concerning laptops, even with the recent discovery of Spectre and Meltdown, the chip vulnerabilities that affect almost every single computing and mobile device in existence. Despite this setback, there was a noticeable trend in the laptops displayed at the event leaning more heavily on the kind of technology one would find in a mobile device. As a result, these devices could boast faster operating speeds.

Not everything at CES made very much sense, however. London-based Planet Computers launched the Gemini, an Android-powered mobile device that basically functions as a miniature clamshell laptop. While it is an effective device for what it does, it doesn’t make much sense in the business setting--but it may be an option for someone who often needs to take business on the road.

Overall, events like these just go to show that even if a device is labelled as a consumer product, it may just have a place in a business setting. Even if it doesn’t, it may inspire the development of a similar device that is more focused on a business user’s needs.

What would you like to see developed in 2018? Let us know in the comments, and make sure to subscribe to our blog!

Blockchain is for More Than Cryptocurrency
Tip of the Week: The Internet of Things Poses Thre...

Related Posts

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, August 21 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code

Our 10 Benefits

Our 10 Benefits Whitepaper

This whitepaper will evaluate the differences between traditional technical support practices and modern managed IT practices and the pros and cons of both in regards to small and medium-sized businesses.

Download Now!   Need A Consultation?

Tag Cloud

Security Tip of the Week Best Practices Cloud Privacy Technology Business Computing Backup Hackers Network Security Malware Hosted Solutions Microsoft Google VoIP roundup Email Mobile Devices nonprofit Software bgc Disaster Recovery Data Managed IT Services Alert Business Outsourced IT Business Continuity Internet communications Windows 10 Innovation Hardware Smartphones Tech Term IT Services Ransomware Android Saving Money Managed IT Services Browser Cybercrime Data Backup Small Business Efficiency Cloud Computing IT Support Computers Computer Server Business Management Productivity Smartphone User Tips Data Recovery Network Windows BDR Internet of Things Passwords Office Save Money Cybersecurity Miscellaneous IT Support Quick Tips Telephone Systems BYOD Managed IT Money Social Engineering Recovery Mobile Device Management Virtualization Collaboration Upgrade Law Enforcement Applications Hacking Facebook Artificial Intelligence Phishing Communication Mobility Vulnerability Productivity Gadgets Work/Life Balance Social Media How To Office 365 Remote Monitoring Data Protection Automation Compliance Managed Service Provider Chrome Router Office Tips Avoiding Downtime Budget Flexibility VPN Firewall Two-factor Authentication Proactive IT Health App Private Cloud Bring Your Own Device Wi-Fi Bandwidth Password Microsoft Office Holiday Workplace Tips Google Drive Information Technology History HaaS Black Market Safety Data Breach Data Security Operating System Windows 10 Apps Identity Theft Mobile Device Remote Computing Business Intelligence Redundancy Connectivity Word Value Solid State Drive Big Data Computing Infrastructure Spam Worker Unsupported Software Document Management Marketing Mobile Computing Data Storage Website Blockchain Employer-Employee Relationship Spam Blocking Wireless Technology Legal HIPAA YouTube Save Time Risk Management SaaS IT Management Physical Security Hiring/Firing Cleaning Training Workers Infrastructure Paperless Office Comparison Automobile Servers IT Plan Computer Care Update End of Support USB Data storage The Internet of Things Patch Management Data Management Keyboard OneNote Information Samsung CES Battery Content Filtering Credit Cards Entertainment Charger Scam Encryption Business Owner Government Sports Content Management Emergency PDF Electronic Medical Records Windows 7 Relocation Mobile Gmail Networking NarrowBand Transportation Current Events Workforce Access Control Telephony Fiber-Optic Cortana Wire Files Public Computer Techology Accountants MSP Thought Leadership Loyalty Computer Fan Virtual Assistant Regulations Amazon Humor Going Green Unified Threat Management Professional Services Recycling Shadow IT Enterprise Content Management Books Hacker Benefits Knowledge Frequently Asked Questions Telecommuting Authentication Rootkit Skype Cables Google Apps Instant Messaging Smart Office Software Tips File Sharing Twitter Apple FENG Voice over Internet Protocol Human Resources Users Telephone System Amazon Web Services Windows 10s Meetings Software as a Service eWaste Password Management Hosted Solution Internet Exlporer Smart Technology Network Congestion Excel Remote Work Best Practice Nanotechnology Content Start Menu Unified Communications Search Practices Augmented Reality Online Shopping Addiction Politics iPhone Multi-Factor Security Staff Virtual Reality Regulation Employer Employee Relationship webinar Public Cloud Data loss Criminal NIST Two Factor Authentication Tip of the week Smart Tech Audiobook Vendor Management Tools Theft Password Manager How to Machine Learning User Error IBM HBO Specifications Hosted Computing Remote Worker Flash Evernote Cache Downtime Assessment Trending Digital Signature Worker Commute Wireless Computer Accessories Conferencing Laptop Screen Mirroring WiFi Cryptocurrency Reputation Advertising Chromecast IT Consultant Windows Server 2008 Video Games Hard Drives Settings Business Mangement HVAC Troubleshooting Monitor Colocation Supercomputer Outlook Millennials Inventory Wiring Bluetooth Netflix Sync Wireless Charging Scalability Wireless Internet Experience Robot Television CrashOverride Data Warehousing Lifestyle Managed Service Touchpad Audit Cast Google Docs Education Safe Mode Customers Leadership Fraud Devices nonprofits Thank You Congratulations