Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Force is Strong with the Internet of Things

The Force is Strong with the Internet of Things

The Internet of Things has been growing rapidly, and with this growth it has become a major part of daily life. There are connected devices you couldn’t even fathom being needed, but some have turned out to be exceeding useful. In 1977, the release of Star Wars saw people’s imaginations expand. The science end of the sci-fi went into overdrive, and soon communications and computing would change forever. Despite being a long time ago in a galaxy far, far away, the Star Wars universe introduced several concepts of the Internet of Things, decades before the IoT was even conceptualized. This week, we will take a look at the modern day Internet of Things, and how Star Wars primed us for our own future.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Microsoft Mobile Device Small Business Passwords Backup Quick Tips Productivity Saving Money Cybersecurity Communication Smartphone Data Backup Managed Service Android Upgrade VoIP Business Management Smartphones AI Data Recovery communications Mobile Devices Windows Disaster Recovery Browser Social Media Microsoft Office Managed IT Services Current Events Network Remote Tech Term Internet of Things Artificial Intelligence Facebook Information Automation Cloud Computing Holiday Training Miscellaneous Gadgets Covid-19 Remote Work Server Managed Service Provider Compliance Outsourced IT Employee/Employer Relationship IT Support Encryption Spam Office Windows 10 Government Business Continuity Data Management Bandwidth Windows 10 Blockchain Virtualization Business Technology Wi-Fi Data Security Mobile Office Vendor Apps Two-factor Authentication Networking Chrome Budget Mobile Device Management BYOD Gmail Managed Services Apple Voice over Internet Protocol App Tip of the week Employer-Employee Relationship Conferencing Office 365 Avoiding Downtime How To BDR Marketing HIPAA WiFi Access Control Applications Computing Information Technology Hacker Managed IT Services Analytics Office Tips Augmented Reality Website Storage Password Bring Your Own Device Healthcare Virtual Private Network 2FA Router Health Big Data Operating System Help Desk Risk Management Retail Computers Telephone Patch Management Save Money Cooperation Remote Monitoring End of Support Vulnerability Firewall Vendor Management Remote Workers Physical Security Windows 11 Display Printer The Internet of Things Going Green Paperless Office Excel Infrastructure Social Free Resource Project Management Windows 7 Cybercrime Document Management Microsoft 365 Monitoring Customer Service Solutions Scam Data loss Managed IT Service Wireless Technology Outlook Downloads Money Holidays Licensing Humor Robot Data Storage Word Entertainment Video Conferencing Sports Managed Services Provider Mouse Virtual Machines Professional Services IT Management Meetings Telephone System VPN Administration Cost Management Safety iPhone Computer Repair Supply Chain Vulnerabilities Settings Printing User Tip Modem Wireless Images 101 Processor Content Filtering Mobile Security Machine Learning Multi-Factor Authentication YouTube Mobility Customer Relationship Management Cryptocurrency Smart Technology Maintenance Hacking Antivirus Saving Time Virtual Desktop Data Privacy Presentation Employees Data storage LiFi Integration Laptop Identity IT Maintenance Windows 8 Managing Costs Drones eCommerce Tablet Bookmark SSID Smart Tech Business Intelligence Alerts IP Address Shortcuts Surveillance Virtual Assistant Alert Download Halloween Dark Data Ransmoware Managed IT Virtual Machine File Sharing Browsers Medical IT How To Connectivity Vendors Break Fix Reviews Be Proactive Recovery Development Transportation Notifications Upload Social Network Scary Stories Workforce Multi-Factor Security Hard Drives Hacks Hypervisor Travel Optimization Google Maps PowerPoint IoT Fun Threats Dark Web Domains Shopping Techology Workplace Strategies Deep Learning Employer/Employee Relationships Trends Customer Resource management Navigation Regulations Meta Google Calendar Refrigeration PCI DSS Unified Threat Management Unified Threat Management Data Analysis Education Star Wars Amazon Microsoft Excel Public Speaking Gig Economy Staff Lithium-ion battery Internet Service Provider Teamwork Gamification Evernote Network Congestion Social Networking Outsource IT Legislation Regulations Compliance Entrepreneur Mobile Computing User Error Media Memes Fileless Malware Search Environment Wearable Technology Net Neutrality Best Practice SQL Server Content History Point of Sale Health IT Buisness Motherboard Small Businesses Comparison Undo Financial Data Smartwatch Legal IT Directions IT solutions Assessment Displays Permissions Procurement Network Management Business Growth Azure Tech Support Cyber security Tech Monitors Outsourcing Specifications Telework CES Communitications Microchip Internet Exlporer Cortana Fraud Workplace Application Supply Chain Management Alt Codes Websites Username Downtime Term Hiring/Firing Black Friday FinTech IBM SharePoint Paperless IT Assessment Hosted Solution Electronic Medical Records Database IT Technicians Co-managed IT Flexibility Typing Value Proxy Server Writing Cookies Technology Care Cyber Monday Organization Lenovo Hotspot Digital Security Cameras Business Communications Google Drive Smart Devices Virtual Reality Tactics Knowledge Mirgation Scams Remote Working Server Management Memory Private Cloud Data Breach Identity Theft Google Play Nanotechnology 5G Hybrid Work Competition Superfish Language Videos Human Resources Google Docs Electronic Health Records Unified Communications Twitter Addiction Experience Management Running Cable Chatbots Cables Bitcoin Wasting Time Error Google Wallet Trend Micro Security Cameras Social Engineering Screen Reader Distributed Denial of Service Computing Infrastructure Google Apps User Software as a Service Remote Computing Service Level Agreement

Blog Archive