Google Glass: Boon To Humanity Or Bane Of Modern Existence?

Google Glass: Boon To Humanity Or Bane Of Modern Existence?

Google Glass

Google Glass is, by far, one of the most anticipated tech devices in recent memory. The capability to view virtual content without having to look down at a screen is something that a wide range of mobile and cloud computing users find very attractive.

Unfortunately, Google Glass is not always the subject of positive content for all types of people A few issues have been brought to light, some of which may have a lasting effect on where Google Glass can be used, as well as in what capacities.

So what exactly are these issues and how will they affect using Glass once it is released? Let’s take a look!

Privacy

When smartphones with built-in cameras first became a big thing towards the end of the last decade, issues concerning where they could be used started to rise. One venue where this came into play the most is at concerts, with artists banning the use of these devices at their events.

This issues has extended to include Google Glass to a much greater degree. According to recent studies, over 72 percent of Americans are so concerned about privacy, that they will not be buying Google Glass. One of the main reasons is covert surveillance by public or private individuals. Since Google Glass is always on, discovering whether or not a person is recording is extremely difficult.

Banning

Certain industries have already begun to identify problem areas where Google Glass should not be used. This has resulted in a whole slew of different companies that have banned patrons even wearing them while they are in attendance. Aside from the aforementioned concert events, chief among these industries are movie theaters, casinos and strip clubs, all venues with concerns about people recording their activities.

Glassholes

Take just one look at this new moniker and chances are you will understand the sentiment it is trying to convey. In essence, glasshole is a reference to people using Google Glass in ways that are not acceptable to other people.

This has become such a relevant issue that Google has released instructions outlining how not to be lumped into this category. These tips range from the obvious, such as not standing in the corner of a room and recording everyone, to not “glassing out,” which refers to stationary staring the prism for long periods of time.

One specific occurrence that has recently attracted many news outlet’s attention is the negative reviews posted on Google+ for New York-based restaurant, Feast. Apparently, one customer was asked to remove her Google Glass, which she refused, then left the restaurant.

This resulted her leaving a negative review, primarily referencing the incident and how it had never happened before. This snowballed into a ton of one-star reviews by people who had never even visited the restaurant, rather they were simply infuriated by the restaurant’s policy.

As you can see, the argument over whether Google Glass will be a positive or negative influence rages on, with advocates on both sides of the aisle hotly contesting the validity of the other side’s claims. Which side of the aisle do you come down on? Are you looking forward to Google Glass or will it be something to be shunned? Let us know in the Comments section below!

(Infographic Source: Online-PHD-Programs.org)

By Joe Pellicone

About Joe Pellicone

In 2011, Joe launched his writing career, dealing primarily with the tech topics he is so familiar with (Tech & Gaming). Today, Joe uses his experience and talent to create quality and enjoyable pieces on everything from gaming hardware and software, to individual games and gaming companies.

View All Articles

Sorry, comments are closed for this post.

Comic
SWIFT Says Bank Hacks Set To Increase

SWIFT Says Bank Hacks Set To Increase

Bank Hacks Set To Increase SWIFT, whose messaging network is used by banks to send payment instructions worth trillions of dollars each day, said three clients were hacked over the summer and cyber attacks on banks are set to increase. The theft of $81 million in February from Bangladesh’s central bank using SWIFT messages rocked…

Security: Avoiding A Hatton Garden-Style Data Center Heist

Security: Avoiding A Hatton Garden-Style Data Center Heist

Data Center Protection In April 2015, one of the world’s biggest jewelry heists occurred at the Hatton Garden Safe Deposit Company in London. Posing as workmen, the criminals entered the building through a lift shaft and cut through a 50cm-thick concrete wall with an industrial power drill. Once inside, the criminals had free and unlimited…

The Lighter Side Of The Cloud – Data Merge

The Lighter Side Of The Cloud – Data Merge

By Christian Mirra Please feel free to share our comics via social media networks such as Twitter, Facebook, LinkedIn, Instagram, Pinterest. Clear attribution (Twitter example: via @cloudtweaks) to our original comic sources is greatly appreciated.

The Rise Of Threat Intelligence Sharing

The Rise Of Threat Intelligence Sharing

Threat Intelligence Sharing  Security has been discussed often on CloudTweaks and for good reason. It is one of the most sought after topics of information in the technology industry.  It is virtually impossible to wake up and not read a headline that involves the words “Breached, Hacked, Compromised or Extorted (Ransomware)“. Included (below) is an…

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Cloud Email Migration In today’s litigious society, preserving your company’s data is a must if you (and your legal team) want to avoid hefty fines for data spoliation. But what about when you move to the cloud? Of course, you’ve probably thought of this already. You’ll have a migration strategy in place and you’ll carefully…

Are Cloud Solutions Secure Enough Out-of-the-box?

Are Cloud Solutions Secure Enough Out-of-the-box?

Out-of-the-box Cloud Solutions Although people may argue that data is not safe in the Cloud because using cloud infrastructure requires trusting another party to look after mission critical data, cloud services actually are more secure than legacy systems. In fact, a recent study on the state of cloud security in the enterprise market revealed that…

Ending The Great Enterprise Disconnect

Ending The Great Enterprise Disconnect

Five Requirements for Supporting a Connected Workforce It used to be that enterprises dictated how workers spent their day: stuck in a cubicle, tied to an enterprise-mandated computer, an enterprise-mandated desk phone with mysterious buttons, and perhaps an enterprise-mandated mobile phone if they traveled. All that is history. Today, a modern workforce is dictating how…

Cloud-based GRC Intelligence Supports Better Business Performance

Cloud-based GRC Intelligence Supports Better Business Performance

Cloud-based GRC Intelligence All businesses need a strategy and processes for governance, risk and compliance (GRC). Many still view GRC activity as a burdensome ‘must-do,’ approaching it reactively and managing it with non-specialized tools. GRC is a necessary business endeavor but it can be elevated from a cost drain to a value-add activity. By integrating…

Your Biggest Data Security Threat Could Be….

Your Biggest Data Security Threat Could Be….

Paying Attention To Data Security Your biggest data security threat could be sitting next to you… Data security is a big concern for businesses. The repercussions of a data security breach ranges from embarrassment, to costly lawsuits and clean-up jobs – particularly when confidential client information is involved. But although more and more businesses are…

Why Cloud Compliance Doesn’t Need To Be So Overly Complicated

Why Cloud Compliance Doesn’t Need To Be So Overly Complicated

Cloud Compliance  Regulatory compliance is an issue that has not only weighed heavily on the minds of executives, security and audit teams, but also today, even end users. Public cloud adds more complexity when varying degrees of infrastructure (depending on the cloud model) and data fall out of the hands of the company and into…

The Future Of Cybersecurity

The Future Of Cybersecurity

The Future of Cybersecurity In 2013, President Obama issued an Executive Order to protect critical infrastructure by establishing baseline security standards. One year later, the government announced the cybersecurity framework, a voluntary how-to guide to strengthen cybersecurity and meanwhile, the Senate Intelligence Committee voted to approve the Cybersecurity Information Sharing Act (CISA), moving it one…

4 Different Types of Attacks – Understanding the “Insider Threat”

4 Different Types of Attacks – Understanding the “Insider Threat”

Understanding the “Insider Threat”  The revelations that last month’s Sony hack was likely caused by a disgruntled former employee have put a renewed spotlight on the insider threat. The insider threat first received attention after Edward Snowden began to release all sorts of confidential information regarding national security. While many called him a hero, what…

The Industries That The Cloud Will Change The Most

The Industries That The Cloud Will Change The Most

The Industries That The Cloud Will Change The Most Cloud computing is rapidly revolutionizing the way we do business. Instead of being a blurry buzzword, it has become a facet of everyday life. Most people may not quite understand how the cloud works, but electricity is quite difficult to fathom as well. Anyway, regardless of…

Cloud Infographic: The Explosive Growth Of The Cloud

Cloud Infographic: The Explosive Growth Of The Cloud

The Explosive Growth Of The Cloud We’ve been covering cloud computing extensively over the past number of years on CloudTweaks and have truly enjoyed watching the adoption and growth of it. Many novices are still trying to wrap their mind around what the cloud it is and what it does, while others such as thought…

Digital Marketing Driven by Cloud, Big Data and IoT

Digital Marketing Driven by Cloud, Big Data and IoT

Digital Marketing Successful digital marketing campaigns are being driven largely by trending technologies, specifically the Internet of Things (IoT), Big Data, and The Cloud. These may be used for a huge number of marketing applications, from optimizing the performance of sports teams to improving science and research, even helping to aid law enforcement. Amazon Web…