Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Uber Used Technology to Break the Mold, Can Your Business?

b2ap3_thumbnail_what_about_uber_400.jpgAt a September tradeshow event, Travis Kalanick, cofounder and CEO of Uber, said five words in an interview that made everyone give pause to the potential for technology to shape our world for the better, “Every car should be Uber.”

In case you’re unfamiliar with Uber (it’s not yet available in every city), Uber is a technologies company which provides services for taxis and for-hire vehicles by allowing passengers to request trips to the closest for-hire Uber driver, through its mobile app. What makes the ride-hailing app unique is that it can turn anyone with a car and a smartphone into an Uber driver, allowing them to easily make extra income on the side by providing rides to Uber users. Plus, all transactions are handled via the app so that drivers don’t have to risk carrying cash.

Founded in 2009, the popularity of Uber has skyrocketed. Uber rapidly expanded to international markets beginning in 2012, and the company is currently valued at $50 billion. It should also be noted that Uber was honored by USA Today as “Tech Company of the Year” for 2013.

Looking back at Kalanick’s “Uber everywhere” comment, it’s not surprising that a CEO tasked with expanding a popular company would say such a thing. While a taxi/transportation service isn’t anything new, Uber’s adoption of new technology is what makes them stand out. Instead of thinking about ease-of-use and integration with mobile technology as an afterthought, Uber puts that first. Businesses that focus on consumers often sacrifice being cutting-edge so they can stick with what has always worked. Kalanick proves that it pays to think outside the norm.

Essentially, what he is proposing is a future where transportation becomes so commonplace and accessible, that hitching a ride with Uber will make more fiscal sense and be more convenient than owning a car. Kalanick explains:

If every car in San Francisco was Ubered there would be no traffic. If everyone in the city took an Uber instead, it would give back an hour of time every day to every person. What would you do with that time? You could give it back to your family.

It just so happens that Uber is headquartered in San Francisco, and it’s also the case that San Francisco is one of the worst cities in the U.S. in terms of how much time commuters lose per year due to being stuck in traffic--78 hours per year, according to a recent traffic study by Texas A&M University. Following Kalanick’s logic: more Uber cars on the road will equate to more people using the service, which means more people opting out of car ownership altogether, and that means less cars on the road and less traffic jams.

Uber has gone so far as to implement new technologies in order to make their ride-sharing service more efficient. Otherwise, an increased amount of Uber drivers would be sitting in their cars competing with each other while not having enough customers to give rides to. InformationWeek explains how this will work:

How does Uber plan to reduce the cost of transportation? Mostly by predicting demand. The cost of transportation comes in the downtime. If a driver has to spend 15 minutes traveling to pick up a fare, that's 15 minutes the driver isn't making any money. Uber is investing in predicting demand so it can move drivers to points of demand before that demand even occurs. He described heat maps for drivers that allowed them to move to areas of high demand so cars could "[take] the heat out of the area."

Therefore, as driver downtime is minimized, the fares will decrease along with it. Truly, it’s a bold vision of the future that has the potential to change things for the better--assuming that Uber is profitable enough that being an Uber driver will offset the insurance and wear-and-tear put on one’s car.

Uber is utilizing technology in an attempt to change the way people travel, to eliminate unnecessary costs and expenditures, and to make day-to-day travel more efficient. Similarly, technology can help your business stand out from your competitors and “defy the norm,” so to speak. The latest technology helps your business innovate and provide more valuable services to your clients. If you’re ready to take advantage of modern technology solutions that can thrust your business to the forefront of your industry, give Voyage Technology a call at 800.618.9844 and ask about our managed IT services.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 06 May 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware Phishing IT Support Google Email Workplace Tips Privacy Computer Workplace Strategy Collaboration Small Business Hosted Solutions Backup Users Ransomware AI Managed Service Mobile Device Productivity Microsoft Quick Tips Passwords Saving Money Communication Cybersecurity Smartphone Data Backup Disaster Recovery Data Recovery Android VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Current Events Network Tech Term Internet of Things Remote Miscellaneous Information Facebook Holiday Automation Artificial Intelligence Covid-19 Compliance Gadgets Cloud Computing Training Outsourced IT Remote Work Server Managed Service Provider IT Support Employee/Employer Relationship Encryption Spam Office Windows 10 Data Management Business Continuity Government Bandwidth Virtualization Blockchain Wi-Fi Vendor Business Technology Windows 10 Data Security Apps Managed Services Two-factor Authentication Mobile Office Gmail Budget WiFi Apple Networking App Employer-Employee Relationship BYOD Voice over Internet Protocol Mobile Device Management Tip of the week Chrome Conferencing Password Managed IT Services How To BDR HIPAA Computing Physical Security Hacker Applications Information Technology Avoiding Downtime Marketing Access Control Office 365 Retail Storage Bring Your Own Device Big Data 2FA Operating System Computers Router Healthcare Virtual Private Network Risk Management Website Health Help Desk Analytics Office Tips Augmented Reality Managed IT Service Solutions Telephone The Internet of Things Scam Data loss Social Cooperation Windows 11 Going Green Patch Management Save Money Remote Monitoring End of Support Excel Vulnerability Vendor Management Customer Service Cybercrime Remote Workers Display Printer Paperless Office Infrastructure Free Resource Monitoring Project Management Windows 7 Firewall Document Management Microsoft 365 Maintenance Safety Antivirus Sports Downloads Employees Mouse Licensing Integration Administration Entertainment Holidays Data Storage Robot Telephone System Cost Management Supply Chain Customer Relationship Management Settings Video Conferencing Wireless Managed Services Provider Printing Content Filtering Virtual Machines Professional Services Hacking IT Management Presentation VPN YouTube Meetings Cryptocurrency Wireless Technology User Tip Modem Computer Repair Mobile Security iPhone Processor Virtual Desktop LiFi Vulnerabilities Data storage Data Privacy Smart Technology Word Images 101 Outlook Machine Learning Multi-Factor Authentication Mobility Money Saving Time Humor Memory Vendors Hacks Server Management Entrepreneur Scary Stories Private Cloud Identity Remote Working Fun Data Breach Google Play Be Proactive Superfish Bookmark Identity Theft Smart Tech Deep Learning Download Videos Twitter Alerts Electronic Health Records Workforce Wasting Time Threats Undo Error Education Connectivity Social Engineering Break Fix Trend Micro Security Cameras Workplace Strategies Browsers Upload Remote Computing Software as a Service Meta Multi-Factor Security Managing Costs Amazon Mobile Computing Social Network Tablet IoT Search Dark Web eCommerce SSID Application Best Practice Trends Alert Surveillance Virtual Assistant Outsource IT Dark Data Google Calendar Virtual Machine Environment Media Managed IT Customer Resource management Buisness File Sharing Regulations IT solutions Star Wars Reviews How To Microsoft Excel Medical IT IBM Legal Data Analysis Business Growth Gamification Notifications Staff Development Transportation Small Businesses Legislation Hypervisor Displays Travel Social Networking Google Maps Shopping Cortana Optimization PowerPoint Techology Fileless Malware Employer/Employee Relationships Outsourcing Alt Codes Content Wearable Technology PCI DSS Comparison Navigation Competition Health IT Downtime Unified Threat Management Motherboard Hosted Solution Assessment Gig Economy Permissions Workplace Unified Threat Management Directions Teamwork Hiring/Firing Typing Internet Service Provider Regulations Compliance Network Congestion Specifications Evernote Paperless User Internet Exlporer Knowledge Fraud Memes Co-managed IT Google Drive User Error Microchip SQL Server Technology Care Username Net Neutrality Financial Data 5G Black Friday History Business Communications Point of Sale Unified Communications Database Smartwatch Experience IT Scams IP Address Google Docs Azure Hybrid Work Bitcoin Network Management Running Cable Tech Support IT Technicians Procurement Telework Monitors Cyber Monday Cyber security Tech Human Resources Google Wallet Proxy Server Cookies Recovery Tactics CES Hotspot Communitications Cables Hard Drives Windows 8 Laptop Websites Mirgation Supply Chain Management FinTech Term Google Apps Domains Drones Nanotechnology Addiction Electronic Medical Records Language IT Assessment IT Maintenance SharePoint Value Business Intelligence Refrigeration Management Halloween Chatbots Flexibility Organization Writing Distributed Denial of Service Shortcuts Public Speaking Lenovo Screen Reader Service Level Agreement Digital Security Cameras Virtual Reality Computing Infrastructure Smart Devices Ransmoware Lithium-ion battery

Blog Archive