Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Force is Strong with the Internet of Things

The Force is Strong with the Internet of Things

The Internet of Things has been growing rapidly, and with this growth it has become a major part of daily life. There are connected devices you couldn’t even fathom being needed, but some have turned out to be exceeding useful. In 1977, the release of Star Wars saw people’s imaginations expand. The science end of the sci-fi went into overdrive, and soon communications and computing would change forever. Despite being a long time ago in a galaxy far, far away, the Star Wars universe introduced several concepts of the Internet of Things, decades before the IoT was even conceptualized. This week, we will take a look at the modern day Internet of Things, and how Star Wars primed us for our own future.

Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Technology Hackers Cloud Email Privacy Malware Tech Term Business Computing Internet Computer Network Security Business Data Hosted Solutions Efficiency IT Services Innovation Software Data Backup Mobile Devices User Tips Android Smartphone Hardware Communication Browser Google Microsoft Windows 10 Business Management Small Business Workplace Tips Productivity Artificial Intelligence Ransomware Productivity Data Recovery Managed Service Provider Backup Gmail Data Management Facebook Internet of Things Smartphones IT Support Social Media Two-factor Authentication Saving Money Collaboration App Encryption Server Microsoft Office Upgrade Windows Office 365 Office Tips Cloud Computing Bandwidth Business Technology Cybersecurity Information Windows 10 Miscellaneous Automation Disaster Recovery Applications Spam Managed Service Phishing Managed IT Services Passwords communications Mobile Device Mobile Device Management BDR Firewall Printer IT Support Blockchain Access Control The Internet of Things WiFi Business Continuity Big Data Social Infrastructure Tip of the week Paperless Office Apps VoIP Employer-Employee Relationship Users Government Scam Going Green BYOD Holiday Computing Outsourced IT Website Vulnerability Risk Management Robot Data storage LiFi End of Support Analytics Quick Tips Chrome Augmented Reality Money Safety Cost Management Storage HIPAA Sports Vendor Router Mouse Bring Your Own Device Administration Modem Apple Mobile Security Antivirus Customer Service Network Hacking Document Management Maintenance Presentation Settings Computers Printing Hacker Office Content Filtering Saving Time Data Security Wireless Technology Cybercrime Wi-Fi Recovery 5G Marketing Telephone Information Technology Websites Mobile Office Tablet Unified Communications Hard Drives Experience Browsers Unified Threat Management Connectivity Google Docs Term Black Friday Upload Remote Monitoring Licensing Bitcoin Save Money Domains Running Cable Word Social Network VPN Compliance Google Wallet Machine Learning Virtual Desktop IoT Dark Web Refrigeration Entertainment User Error Mobility Cyber Monday Trends IT Management Cooperation Windows 8 Vendor Management Public Speaking Laptop Customer Resource management Virtual Private Network Regulations Drones Error Lithium-ion battery Star Wars Outlook Google Maps Microsoft Excel Network Congestion Entrepreneur Data Analysis Google Play Smart Technology Gamification Staff Electronic Medical Records Halloween Telephone System Social Networking Humor Display Undo Fileless Malware Security Cameras Distributed Denial of Service Content Network Management Wearable Technology Hacks Virtual Reality Scary Stories Fun Health IT Motherboard Budget Travel Assessment Permissions Deep Learning Monitors Virtualization Directions SharePoint SSID Managed IT Service Password Remote Computing Education Application Lenovo Unified Threat Management Internet Exlporer Fraud Microchip Downloads Break Fix Gadgets Username Mobile Computing Alert IBM Search User Tip Superfish Database Best Practice Writing Processor Multi-Factor Security Server Management IT Technicians Current Events Customer Relationship Management Buisness IT solutions Proxy Server Cookies Legal Tactics Managed IT Services Hotspot Business Growth Retail Competition Navigation Google Calendar Monitoring Mirgation Cortana Help Desk Networking Nanotechnology Legislation Addiction Language Alt Codes Social Engineering Evernote User Wireless Management Chatbots Downtime Identity Theft Hosted Solution Screen Reader Operating System Comparison Service Level Agreement Data loss Computing Infrastructure Typing Healthcare Avoiding Downtime Conferencing Patch Management Identity Tech Support IP Address YouTube Dark Data Knowledge Bookmark Techology Smart Tech Google Drive Specifications Download Alerts Cryptocurrency How To Tech

Sign Up For Our Newsletter!