Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Force is Strong with the Internet of Things

The Force is Strong with the Internet of Things

The Internet of Things has been growing rapidly, and with this growth it has become a major part of daily life. There are connected devices you couldn’t even fathom being needed, but some have turned out to be exceeding useful. In 1977, the release of Star Wars saw people’s imaginations expand. The science end of the sci-fi went into overdrive, and soon communications and computing would change forever. Despite being a long time ago in a galaxy far, far away, the Star Wars universe introduced several concepts of the Internet of Things, decades before the IoT was even conceptualized. This week, we will take a look at the modern day Internet of Things, and how Star Wars primed us for our own future.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Workplace Tips Computer Phishing Email IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Passwords Quick Tips Backup Cybersecurity Saving Money Communication Productivity Data Backup Smartphone Managed Service Android Upgrade Business Management Smartphones AI VoIP communications Data Recovery Mobile Devices Windows Disaster Recovery Social Media Browser Managed IT Services Microsoft Office Current Events Network Tech Term Remote Internet of Things Artificial Intelligence Information Automation Facebook Miscellaneous Gadgets Covid-19 Cloud Computing Holiday Training Server Remote Work Managed Service Provider Outsourced IT Compliance Spam IT Support Employee/Employer Relationship Encryption Office Windows 10 Government Business Continuity Data Management Virtualization Wi-Fi Bandwidth Blockchain Windows 10 Business Technology Apps Two-factor Authentication Data Security Mobile Office Vendor Employer-Employee Relationship Networking Chrome BYOD Budget Mobile Device Management Apple Gmail App Managed Services Voice over Internet Protocol Tip of the week Computing Conferencing Information Technology How To BDR Office 365 Hacker Avoiding Downtime Marketing HIPAA Applications Access Control WiFi Help Desk Big Data Healthcare 2FA Operating System Retail Risk Management Managed IT Services Computers Analytics Office Tips Augmented Reality Website Storage Password Bring Your Own Device Virtual Private Network Router Health Windows 11 Monitoring Document Management Social Cybercrime Excel Free Resource Scam Data loss Project Management Windows 7 Telephone Customer Service Microsoft 365 Solutions Patch Management Cooperation Save Money Remote Monitoring Vulnerability End of Support Vendor Management Physical Security Display Printer Firewall Paperless Office Infrastructure The Internet of Things Going Green Remote Workers Settings Smart Technology Wireless Printing iPhone Content Filtering Supply Chain YouTube Maintenance Saving Time Vulnerabilities Antivirus Cryptocurrency Managed IT Service Customer Relationship Management Images 101 Downloads Mobility Virtual Desktop Multi-Factor Authentication Data storage Hacking LiFi Licensing Presentation Entertainment Outlook Robot Wireless Technology Employees Data Privacy Money Humor Integration Telephone System Cost Management IT Management VPN Meetings Word Sports Holidays Mouse Computer Repair Data Storage Administration Video Conferencing User Tip Managed Services Provider Modem Safety Professional Services Mobile Security Processor Virtual Machines Machine Learning Writing Net Neutrality SQL Server Alt Codes Lenovo Mirgation Downtime Virtual Reality Financial Data Small Businesses History Nanotechnology Addiction Application Hosted Solution Server Management Language Private Cloud Smartwatch Displays IT Procurement Management Azure Typing Superfish Chatbots Identity Theft Distributed Denial of Service Twitter Telework Outsourcing Cyber security IBM Screen Reader Tech Communitications Google Drive Service Level Agreement Computing Infrastructure Knowledge Error CES Social Engineering Supply Chain Management Workplace Identity Term 5G Remote Computing FinTech Hiring/Firing Bookmark Smart Tech IT Assessment Paperless Google Docs Download Unified Communications Alerts Experience Flexibility Co-managed IT Value Competition Bitcoin Running Cable Tablet Break Fix Alert Organization Technology Care Browsers Google Wallet Connectivity Smart Devices Business Communications Upload Managed IT File Sharing Digital Security Cameras Dark Data How To Remote Working Scams Social Network Memory Windows 8 Laptop Multi-Factor Security IoT Google Play User Dark Web Notifications Hybrid Work Data Breach Drones Electronic Health Records Human Resources Trends Travel Videos Google Calendar Cables Customer Resource management Wasting Time Techology Regulations Halloween Google Maps Star Wars Security Cameras Microsoft Excel Data Analysis Trend Micro IP Address Software as a Service Google Apps Gamification Staff Unified Threat Management Legislation IT Maintenance Managing Costs Hacks Unified Threat Management Social Networking Scary Stories SSID Recovery Fun Business Intelligence Fileless Malware eCommerce Surveillance Shortcuts Content Virtual Assistant Hard Drives Deep Learning Wearable Technology Network Congestion Comparison Ransmoware Health IT Virtual Machine Domains User Error Motherboard Assessment Medical IT Education Permissions Reviews Vendors Directions Development Be Proactive Transportation Refrigeration Point of Sale Specifications Workforce Hypervisor Public Speaking Mobile Computing Internet Exlporer PowerPoint Network Management Fraud Search Tech Support Shopping Threats Microchip Optimization Lithium-ion battery Workplace Strategies Username Employer/Employee Relationships Best Practice Entrepreneur Monitors Buisness Black Friday PCI DSS Meta Navigation Legal Database IT solutions Websites Gig Economy Amazon Internet Service Provider Teamwork Undo Business Growth IT Technicians Cyber Monday Electronic Medical Records Regulations Compliance Outsource IT Proxy Server SharePoint Cookies Evernote Media Tactics Hotspot Cortana Environment Memes

Blog Archive