Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Force is Strong with the Internet of Things

The Force is Strong with the Internet of Things

The Internet of Things has been growing rapidly, and with this growth it has become a major part of daily life. There are connected devices you couldn’t even fathom being needed, but some have turned out to be exceeding useful. In 1977, the release of Star Wars saw people’s imaginations expand. The science end of the sci-fi went into overdrive, and soon communications and computing would change forever. Despite being a long time ago in a galaxy far, far away, the Star Wars universe introduced several concepts of the Internet of Things, decades before the IoT was even conceptualized. This week, we will take a look at the modern day Internet of Things, and how Star Wars primed us for our own future.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Backup Quick Tips Passwords Saving Money Communication Cybersecurity Productivity Smartphone Data Backup Managed Service Android Upgrade AI Business Management Smartphones VoIP communications Mobile Devices Data Recovery Windows Disaster Recovery Browser Social Media Managed IT Services Microsoft Office Network Current Events Remote Internet of Things Tech Term Facebook Information Automation Artificial Intelligence Covid-19 Cloud Computing Holiday Miscellaneous Training Gadgets Remote Work Server Managed Service Provider Compliance Outsourced IT Encryption Employee/Employer Relationship Spam IT Support Windows 10 Office Government Data Management Business Continuity Windows 10 Blockchain Wi-Fi Virtualization Business Technology Bandwidth Data Security Vendor Two-factor Authentication Apps Mobile Office Mobile Device Management App Gmail BYOD Employer-Employee Relationship Managed Services Voice over Internet Protocol Tip of the week Chrome Budget Networking Apple BDR Computing WiFi HIPAA Information Technology Applications Access Control Office 365 Hacker Avoiding Downtime Conferencing Marketing How To Operating System Big Data Risk Management Virtual Private Network Router Health Analytics Office Tips 2FA Augmented Reality Help Desk Healthcare Computers Retail Storage Password Bring Your Own Device Website Managed IT Services Firewall Going Green Solutions Patch Management Cooperation Save Money Remote Monitoring End of Support Vulnerability Vendor Management Cybercrime The Internet of Things Physical Security Display Printer Social Paperless Office Infrastructure Windows 11 Remote Workers Customer Service Document Management Monitoring Excel Scam Free Resource Project Management Data loss Windows 7 Telephone Microsoft 365 Entertainment Robot Data Privacy Employees Settings Wireless Printing Integration Telephone System Content Filtering Safety Cost Management IT Management Meetings YouTube VPN Holidays Cryptocurrency Computer Repair Data Storage Video Conferencing Virtual Desktop User Tip Managed Services Provider LiFi Modem Data storage Processor Virtual Machines Professional Services Mobile Security Customer Relationship Management Outlook Machine Learning Money Supply Chain Smart Technology Hacking Humor Presentation iPhone Saving Time Maintenance Wireless Technology Vulnerabilities Sports Antivirus Mouse Managed IT Service Images 101 Administration Downloads Multi-Factor Authentication Mobility Word Licensing IT solutions Human Resources Multi-Factor Security How To Remote Working Legal Social Network Memory Data Breach Business Growth IoT Google Play Cables Dark Web Refrigeration Notifications Public Speaking Travel Videos Electronic Health Records Trends Customer Resource management Wasting Time Techology Regulations Google Apps Cortana Lithium-ion battery Google Maps Google Calendar Entrepreneur Data Analysis Trend Micro Alt Codes Star Wars Security Cameras IT Maintenance Microsoft Excel Staff Unified Threat Management Software as a Service Gamification Business Intelligence Downtime Managing Costs Hosted Solution Unified Threat Management Social Networking Shortcuts Legislation Fileless Malware eCommerce Typing SSID Ransmoware Undo Wearable Technology Network Congestion Surveillance Content Virtual Assistant Vendors Health IT Virtual Machine User Error Motherboard Be Proactive Knowledge Comparison Google Drive Reviews Directions Assessment Medical IT Workforce Permissions 5G Point of Sale Development Transportation Threats Hypervisor Unified Communications Workplace Strategies Experience Specifications Application Google Docs Shopping Microchip Optimization Bitcoin Internet Exlporer PowerPoint Meta Running Cable Network Management Fraud Tech Support IBM Monitors Google Wallet Username Employer/Employee Relationships Amazon Navigation Black Friday PCI DSS Websites Gig Economy Windows 8 Database Outsource IT Laptop IT Technicians Media Internet Service Provider Drones Teamwork Environment Proxy Server SharePoint Cookies Evernote Cyber Monday Electronic Medical Records Regulations Compliance Memes Tactics Small Businesses Halloween Hotspot Competition Lenovo Mirgation Writing Net Neutrality SQL Server Displays History Nanotechnology Virtual Reality Financial Data Private Cloud Smartwatch IT Hacks Addiction Outsourcing Scary Stories Server Management Language Superfish Chatbots Fun Identity Theft User Procurement Management Azure Cyber security Deep Learning Screen Reader Tech Workplace Distributed Denial of Service Twitter Telework Error CES Communitications Service Level Agreement Hiring/Firing Computing Infrastructure Identity Paperless IP Address Social Engineering Supply Chain Management Education Bookmark Smart Tech Term Co-managed IT Remote Computing FinTech IT Assessment Mobile Computing Download Technology Care Alerts Business Communications Search Tablet Recovery Flexibility Value Browsers Best Practice Connectivity Scams Break Fix Hard Drives Alert Organization Domains File Sharing Digital Security Cameras Dark Data Smart Devices Upload Hybrid Work Buisness Managed IT

Blog Archive