Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Force is Strong with the Internet of Things

The Force is Strong with the Internet of Things

The Internet of Things has been growing rapidly, and with this growth it has become a major part of daily life. There are connected devices you couldn’t even fathom being needed, but some have turned out to be exceeding useful. In 1977, the release of Star Wars saw people’s imaginations expand. The science end of the sci-fi went into overdrive, and soon communications and computing would change forever. Despite being a long time ago in a galaxy far, far away, the Star Wars universe introduced several concepts of the Internet of Things, decades before the IoT was even conceptualized. This week, we will take a look at the modern day Internet of Things, and how Star Wars primed us for our own future.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Business Computing Best Practices Productivity Data Software Hackers Innovation Business Network Security Cloud IT Support Hardware Internet User Tips Malware Email Phishing Efficiency Computer Privacy Google Workplace Tips Collaboration Hosted Solutions Users IT Services Cybersecurity Quick Tips Ransomware Microsoft Data Backup Small Business Smartphones Mobile Device Communication Mobile Devices communications Android Workplace Strategy Business Management Smartphone VoIP Saving Money Microsoft Office Managed IT Services Data Recovery Managed Service Browser Social Media Passwords Upgrade Backup Disaster Recovery Network Internet of Things Tech Term Automation Cloud Computing Covid-19 Remote Server Managed Service Provider Artificial Intelligence Remote Work Facebook Miscellaneous Gadgets Spam Windows Encryption Information Holiday Windows 10 Employee/Employer Relationship Outsourced IT Government Business Continuity Data Management Blockchain Wi-Fi Productivity Business Technology Windows 10 Apps Data Security Two-factor Authentication Bandwidth Current Events Compliance Virtualization Networking Employer-Employee Relationship Managed Services Voice over Internet Protocol Vendor Office Chrome Mobile Device Management Budget Gmail Apple App How To BDR Computing Information Technology Hacker Applications Avoiding Downtime Office 365 Mobile Office Access Control Conferencing Managed IT Services Operating System Risk Management Computers Router BYOD Analytics Office Tips Website Virtual Private Network Marketing Augmented Reality Training Help Desk Health Storage Password Bring Your Own Device WiFi Retail Big Data Cybercrime Remote Workers Patch Management Customer Service Healthcare HIPAA Save Money Remote Monitoring Vulnerability End of Support Vendor Management Free Resource Project Management Windows 7 Display IT Support Monitoring Printer Microsoft 365 Paperless Office Infrastructure AI Firewall Solutions Windows 11 Tip of the week Document Management Telephone The Internet of Things Excel Cooperation Scam Social Going Green Data loss Video Conferencing Settings Managed Services Provider Wireless Printing Virtual Machines Telephone System Professional Services Content Filtering Customer Relationship Management Cost Management YouTube Robot Cryptocurrency Data Privacy Hacking iPhone Presentation Virtual Desktop Data storage User Tip LiFi Vulnerabilities Modem IT Management Wireless Technology Mobile Security VPN Meetings Processor Images 101 Outlook Multi-Factor Authentication Mobility Computer Repair Money Word Humor Smart Technology Saving Time Sports Mouse Employees Machine Learning Integration Managed IT Service 2FA Safety Administration Supply Chain Downloads Licensing Holidays Maintenance Antivirus Entertainment Data Storage Microsoft Excel IBM Data Analysis Alt Codes Technology Care Employer/Employee Relationships Star Wars Gamification Downtime Business Communications Navigation Staff Tablet PCI DSS Alert Gig Economy Hosted Solution Scams Social Networking Legislation Managed IT File Sharing Dark Data Internet Service Provider Fileless Malware Typing Hybrid Work Teamwork Content Human Resources Evernote Wearable Technology How To Regulations Compliance Notifications Google Drive Memes Health IT Cables Motherboard Knowledge Comparison Competition Permissions Travel Net Neutrality Directions SQL Server Assessment History Google Apps Techology 5G Google Maps Financial Data Smartwatch Google Docs IT Unified Communications IT Maintenance Experience Specifications Fraud Unified Threat Management User Procurement Microchip Bitcoin Business Intelligence Azure Internet Exlporer Running Cable Cyber security Username Shortcuts Tech Unified Threat Management Telework Google Wallet CES Communitications Ransmoware Black Friday IP Address Network Congestion Supply Chain Management Windows 8 Vendors Database Laptop Be Proactive Term IT Technicians User Error Physical Security FinTech Drones IT Assessment Proxy Server Workforce Cookies Cyber Monday Hotspot Point of Sale Recovery Flexibility Threats Value Tactics Halloween Workplace Strategies Mirgation Hard Drives Organization Tech Support Digital Security Cameras Smart Devices Meta Nanotechnology Network Management Domains Language Monitors Remote Working Hacks Amazon Memory Addiction Scary Stories Data Breach Management Google Play Chatbots Fun Refrigeration Websites Videos Electronic Health Records Deep Learning Outsource IT Screen Reader Distributed Denial of Service Public Speaking Media Computing Infrastructure Lithium-ion battery Environment Wasting Time Service Level Agreement Trend Micro Education Security Cameras Identity SharePoint Electronic Medical Records Entrepreneur Software as a Service Bookmark Small Businesses Smart Tech Alerts Lenovo Writing Mobile Computing Displays Managing Costs Download eCommerce SSID Search Undo Virtual Reality Private Cloud Surveillance Browsers Best Practice Outsourcing Virtual Assistant Connectivity Break Fix Server Management Buisness Superfish Identity Theft Virtual Machine Upload Legal Social Network IT solutions Workplace Medical IT Multi-Factor Security Twitter Reviews Error Development Business Growth Hiring/Firing Transportation IoT Dark Web Trends Paperless Application Social Engineering Hypervisor Remote Computing Shopping Optimization Customer Resource management Co-managed IT PowerPoint Regulations Cortana Google Calendar

Blog Archive