Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Force is Strong with the Internet of Things

The Force is Strong with the Internet of Things

The Internet of Things has been growing rapidly, and with this growth it has become a major part of daily life. There are connected devices you couldn’t even fathom being needed, but some have turned out to be exceeding useful. In 1977, the release of Star Wars saw people’s imaginations expand. The science end of the sci-fi went into overdrive, and soon communications and computing would change forever. Despite being a long time ago in a galaxy far, far away, the Star Wars universe introduced several concepts of the Internet of Things, decades before the IoT was even conceptualized. This week, we will take a look at the modern day Internet of Things, and how Star Wars primed us for our own future.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Business Computing Best Practices Productivity Data Software Hackers Innovation Business Network Security Cloud Hardware IT Support Internet User Tips Malware Email Efficiency Phishing Privacy Workplace Tips Computer Google Collaboration Hosted Solutions Users IT Services Cybersecurity Quick Tips Ransomware Microsoft Data Backup Small Business Communication Smartphones Mobile Device Workplace Strategy communications Android Business Management Mobile Devices Smartphone VoIP Saving Money Microsoft Office Managed IT Services Managed Service Browser Data Recovery Passwords Social Media Network Upgrade Backup Disaster Recovery Tech Term Internet of Things Automation Cloud Computing Remote Covid-19 Remote Work Server Managed Service Provider Artificial Intelligence Facebook Miscellaneous Encryption Windows Gadgets Spam Information Employee/Employer Relationship Holiday Windows 10 Outsourced IT Government Data Management Business Continuity Wi-Fi Windows 10 Business Technology Productivity Blockchain Two-factor Authentication Virtualization Bandwidth Compliance Apps Data Security Current Events Office Vendor Mobile Device Management Gmail Managed Services Voice over Internet Protocol Chrome Budget Employer-Employee Relationship Networking Apple App Avoiding Downtime Applications Mobile Office Computing Information Technology Access Control Office 365 Conferencing How To BDR Hacker Router BYOD Operating System Website Marketing Virtual Private Network Training Risk Management Health Help Desk Analytics Office Tips WiFi Augmented Reality Retail Big Data Storage Password Bring Your Own Device Managed IT Services Computers Remote Monitoring Going Green End of Support Vulnerability HIPAA Vendor Management Windows 11 Cybercrime Display Printer Excel Paperless Office Monitoring Firewall Infrastructure Tip of the week Remote Workers Document Management The Internet of Things Healthcare IT Support Telephone Social Scam Free Resource Project Management Data loss Windows 7 Cooperation Microsoft 365 Customer Service AI Solutions Patch Management Save Money Employees Wireless Technology Integration Settings Wireless IT Management Printing Meetings Content Filtering VPN Modem User Tip YouTube Processor Holidays 2FA Mobile Security Supply Chain Word Cryptocurrency Computer Repair Data Storage Video Conferencing Smart Technology Managed Services Provider Virtual Desktop Virtual Machines Professional Services Data storage LiFi Safety Saving Time Machine Learning Outlook Managed IT Service iPhone Money Humor Downloads Maintenance Data Privacy Vulnerabilities Antivirus Licensing Entertainment Sports Mouse Images 101 Customer Relationship Management Multi-Factor Authentication Mobility Administration Telephone System Hacking Cost Management Robot Presentation Directions Trend Micro Assessment Security Cameras Permissions Amazon Unified Threat Management Software as a Service Cortana Unified Threat Management Specifications Alt Codes Outsource IT IP Address Managing Costs Downtime Microchip eCommerce Media Internet Exlporer SSID Fraud Environment Hosted Solution Network Congestion Surveillance Username Virtual Assistant Recovery User Error Black Friday Typing Physical Security Small Businesses Virtual Machine Hard Drives Database Medical IT Reviews Displays Google Drive Point of Sale Development Knowledge Domains Transportation IT Technicians Cookies Cyber Monday Outsourcing Proxy Server Hypervisor Optimization 5G Refrigeration Tactics PowerPoint Network Management Hotspot Tech Support Shopping Google Docs Unified Communications Monitors Workplace Experience Public Speaking Employer/Employee Relationships Mirgation Nanotechnology Navigation Bitcoin PCI DSS Hiring/Firing Running Cable Lithium-ion battery Paperless Addiction Entrepreneur Language Google Wallet Websites Gig Economy Internet Service Provider Co-managed IT Management Teamwork Chatbots SharePoint Screen Reader Evernote Distributed Denial of Service Windows 8 Electronic Medical Records Regulations Compliance Technology Care Laptop Memes Business Communications Undo Service Level Agreement Computing Infrastructure Drones Writing Net Neutrality Scams SQL Server Lenovo Identity Smart Tech Virtual Reality Financial Data Hybrid Work Halloween Bookmark History Smartwatch IT Human Resources Download Server Management Alerts Private Cloud Identity Theft Procurement Cables Azure Superfish Browsers Cyber security Application Connectivity Tech Break Fix Hacks Twitter Telework Scary Stories CES Communitications Google Apps Fun Upload Error Multi-Factor Security Deep Learning Social Engineering Supply Chain Management IT Maintenance IBM Social Network IoT Term Dark Web Remote Computing FinTech Business Intelligence Education IT Assessment Shortcuts Trends Regulations Tablet Google Calendar Flexibility Ransmoware Customer Resource management Value Data Analysis Star Wars Microsoft Excel Mobile Computing Alert Organization Vendors File Sharing Digital Security Cameras Dark Data Smart Devices Be Proactive Search Competition Gamification Managed IT Staff Social Networking Legislation Best Practice How To Remote Working Workforce Memory Buisness Fileless Malware Data Breach Google Play Notifications Threats Legal Travel Videos IT solutions Electronic Health Records Workplace Strategies Content Wearable Technology User Techology Motherboard Google Maps Comparison Business Growth Meta Health IT Wasting Time

Blog Archive