(703) 288-9767    NTC Store
NTConnections Blog

NTConnections has been serving the Reston area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

CES 2018 Showcases Upcoming Technology

CES 2018 Showcases Upcoming Technology

If there is one thing you know about technology, it’s that it meets its demand. No matter if you are talking about the millions of Internet of Things products being created today, video games and entertainment, or business tech, demand drives the technology market.

The results of this demand were presented at the 2018 International Consumer Electronics Show, an event that took place from January 7th to the 12th in Las Vegas, Nevada. While the focus was admittedly directed toward consumer products, there were quite a few technologies present that could prove impactful to the business realm.

Perhaps most impactful to businesses was the continued discussion surrounding 5G wireless connectivity. Already discussed at length at CES 2017, 5G could prove to be of significant benefit to businesses that rely on cloud-based applications and wireless devices. Wireless carriers, including AT&T and Verizon, have plans to incorporate 5G in some markets by the end of 2018.

However, the question remains how much hardware will be able to support 5G connectivity in the coming year, and how quickly the term ‘5G’ will be adopted to describe something it isn’t.

There was also interesting news concerning laptops, even with the recent discovery of Spectre and Meltdown, the chip vulnerabilities that affect almost every single computing and mobile device in existence. Despite this setback, there was a noticeable trend in the laptops displayed at the event leaning more heavily on the kind of technology one would find in a mobile device. As a result, these devices could boast faster operating speeds.

Not everything at CES made very much sense, however. London-based Planet Computers launched the Gemini, an Android-powered mobile device that basically functions as a miniature clamshell laptop. While it is an effective device for what it does, it doesn’t make much sense in the business setting--but it may be an option for someone who often needs to take business on the road.

Overall, events like these just go to show that even if a device is labelled as a consumer product, it may just have a place in a business setting. Even if it doesn’t, it may inspire the development of a similar device that is more focused on a business user’s needs.

What would you like to see developed in 2018? Let us know in the comments, and make sure to subscribe to our blog!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 25 May 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Cloud Privacy Best Practices Hackers Business Computing Microsoft Hosted Solutions Productivity Malware Backup Internet Google Mobile Devices Efficiency VoIP IT Support Business IT Services Email Network Security Managed Service Provider Miscellaneous Server Data Innovation Disaster Recovery Business Continuity Workplace Tips Network Software Windows Upgrade Business Management Saving Money Hardware Communication Managed IT Services Save Money Smartphone Browser Mobile Device Management Android Virtualization Computer Smartphones communications Data Backup User Tips Holiday Microsoft Office Cybercrime Windows 10 Computers BYOD Outsourced IT WiFi Operating System Mobile Computing Cloud Computing Ransomware Small Business Hacking Chrome Big Data Social Media Remote Monitoring Data Recovery Automation IT Solutions Internet of Things Managed IT Services Alert Collaboration Apple VPN Proactive IT Application Avoiding Downtime Passwords Marketing The Internet of Things Office Budget Quick Tips Social Engineering Information Technology BDR Employer-Employee Relationship Going Green Remote Computing Managed IT Bandwidth Health Mobility Recovery Bring Your Own Device Gadgets Cybersecurity Telephone Systems Tech Term spam Private Cloud Firewall Artificial Intelligence How To Redundancy Vulnerability Data Security Compliance IT Support Two-factor Authentication Vendor Management Wireless Technology User Error iPhone Data Protection Business Intelligence App Router Website Gmail Save Time Phishing History Tablet Value Mouse Memory Retail Search Apps Identity Theft Law Enforcement Office 365 Data Management Document Management Networking Risk Management Productivity Windows 10 Antivirus Office Tips PowerPoint Analytics Excel Lithium-ion battery Phone System Content Filtering Money Downtime IT Plan Administration Smart Tech Human Resources Entertainment CES SaaS Training Unsupported Software Running Cable HIPAA Safety Unified Threat Management Government Skype Update Cleaning Mobile Office Meetings IT Consultant Customer Relationship Management HaaS Fax Server Black Market Solid State Drive Best Available Saving Time People Credit Cards Applications Programming Network Congestion Streaming Media Online Currency Internet Exlporer Trending Data storage Workers Biometrics Printer Encryption Business Owner Infrastructure eWaste OneNote Data Storage Humor Statistics Current Events Word Hard Drives Maintenance Mobile Device Comparison Facebook Work/Life Balance Outlook Physical Security DDoS Robot Data loss IT Management Flexibility Intranet Google Drive Public Cloud Environment Workforce Virtual Desktop Charger Touchpad Fiber-Optic IT service Flash Content Filter Relocation Hiring/Firing Hybrid Cloud Software as a Service Virtual Reality Telecommuting WIndows 7 Computer Care Insurance Uninterrupted Power Supply Cables Domains Sync Storage Spam Blocking PDF Content Management IaaS Bloatware Remote Work Customer Service Software Tips Managing Stress Practices Keyboard Unified Communications Telephony Addiction Virus Blockchain LinkedIn Google Docs Entrepreneur Hosted Computing Tech Support Debate Theft Start Menu Hacker Cache Computer Fan Audit Computer Accessories Staff Voice over Internet Protocol Cost Management Shadow IT Company Culture HBO Inventory Files Cortana Wireless Windows 8.1 Update Mobile Science Wireless Internet Instant Messaging FENG Screen Mirroring Cameras Password Digital Signature Video Surveillance Multi-Factor Security Fraud Shortcut Frequently Asked Questions Consultant Wi-Fi Access Control Education Colocation Google Apps SharePoint Professional Services Windows 8 Cast Printer Server Electronic Medical Records Strategy Lifestyle Sports Amazon Tip of the week Bluetooth Authentication Worker Commute Hosted Solution Monitor Piracy Computing Infrastructure Tools Tablets Print Server Legal Analysis Notifications YouTube Amazon Web Services Windows Server 2008 USB User Nanotechnology Reputation Licensing End of Support Password Manager Wearable Technology Social Accountants Samsung Connectivity NarrowBand Net Neutrality Online Shopping Computer Repair Windows 7 Twitter Customers Internet exploMicrosoft Business Mangement Botnet Specifications Social Networking Root Cause Analysis Data Warehousing Best Practice Crowdfunding Devices Chromecast Evernote Regulations Patch Management Advertising Recycling Travel Analyitcs Millennials IoT Laptop Touchscreen Wireless Charging Settings Servers Thought Leadership Windows Media Player Scam Criminal Distributed Denial of Service Scalability Politics Transportation How to webinar Benefits Loyalty Conferencing Windows 10s Smart Technology Battery Experience Two Factor Authentication Assessment Music Television Troubleshooting Wire Techology Public Computer Employer Employee Relationship Data Breach Automobile Books Emails CrashOverride IBM Users Emergency Webinar Worker Supercomputer Content IT solutions Rootkit Video Games Knowledge Audiobook Netflix