Is Technology Overrated

verrated/Underrated is a monthly column featuring CompTIA members and experts sharing which tech trends are getting more buzz than they might deserve and which ones aren't getting enough. This month, we talked to Tony Francisco, CEO of CloudPlus, a private-labeled hosted-services platform developed entirely around the end-user experience.

Overrated: Technology

The concept of technology itself can sometimes be overwhelming and misleading—especially if it adds nothing of real value. Tony Francisco, CEO of CloudPlus and member of CompTIA’s Channel Advisory Board, believes technology is simply a tool to automate what’s being done manually, and the real focus should be on how the channel enhances the end-user experience.

Why is technology overrated?

Tony Francisco: It happens naturally. Marketing creates a hyped-up translation of the vision of what the product, service or widget can do, and that evolves into hyperbole. It becomes a vacuum to where everybody starts believing that this is a fundamental change, when in fact it is nothing more than reshuffling the same ingredients. I think that has led to people believing that IT is generally an overrated rumor of what it used to be, which was a true fundamental evolution and an improvement in their life and lifestyle.

How much technology is too much technology?

TF: My explanation for it, from what I understand, is that technology is a tool, and it should do nothing other than automate what you were doing manually, so the question is “What are you doing manually?" Automation and scalability are absolutely tied together. You cannot have one without the other. In theory, you can automate something to be infinitely scalable, so what you should be looking at is what you’re doing manually, and the changes needed to automate that process. Then determine: Is the juice worth the squeeze?
More Info: comptia a jobs

Comments

Popular posts from this blog

DDoS Attack Mean for My Security?

Profiling Hackers in the MITRE ATT&CK Navigator

The Importance of Post-Attack Analysis