Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Force is Strong with the Internet of Things

The Force is Strong with the Internet of Things

The Internet of Things has been growing rapidly, and with this growth it has become a major part of daily life. There are connected devices you couldn’t even fathom being needed, but some have turned out to be exceeding useful. In 1977, the release of Star Wars saw people’s imaginations expand. The science end of the sci-fi went into overdrive, and soon communications and computing would change forever. Despite being a long time ago in a galaxy far, far away, the Star Wars universe introduced several concepts of the Internet of Things, decades before the IoT was even conceptualized. This week, we will take a look at the modern day Internet of Things, and how Star Wars primed us for our own future.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Quick Tips Backup Passwords Cybersecurity Saving Money Communication Productivity Data Backup Smartphone Managed Service Android Upgrade Business Management Smartphones VoIP AI communications Data Recovery Mobile Devices Windows Disaster Recovery Browser Social Media Managed IT Services Microsoft Office Current Events Network Remote Tech Term Internet of Things Automation Facebook Artificial Intelligence Information Holiday Training Miscellaneous Gadgets Covid-19 Cloud Computing Managed Service Provider Remote Work Server Compliance Outsourced IT IT Support Spam Encryption Employee/Employer Relationship Windows 10 Office Data Management Business Continuity Government Wi-Fi Windows 10 Business Technology Blockchain Virtualization Bandwidth Two-factor Authentication Vendor Apps Data Security Mobile Office Mobile Device Management Gmail Managed Services Voice over Internet Protocol Tip of the week Chrome Budget Employer-Employee Relationship Networking Apple App BYOD Computing Information Technology Access Control Office 365 WiFi HIPAA Applications How To BDR Hacker Avoiding Downtime Conferencing Marketing Virtual Private Network Risk Management Health Analytics Office Tips Healthcare Augmented Reality Big Data Router Retail Storage Password Bring Your Own Device Managed IT Services Help Desk Computers 2FA Website Operating System Physical Security Display Printer Cooperation Firewall Paperless Office Infrastructure Remote Workers The Internet of Things Document Management Social Free Resource Project Management Scam Windows 7 Data loss Microsoft 365 Monitoring Customer Service Windows 11 Solutions Patch Management Going Green Save Money Remote Monitoring Vulnerability End of Support Excel Vendor Management Cybercrime Telephone Holidays VPN Meetings YouTube Licensing Word Cryptocurrency Data Storage Entertainment Video Conferencing Computer Repair Managed Services Provider Virtual Machines Professional Services Virtual Desktop LiFi Data storage Safety Data Privacy Telephone System Cost Management Outlook Machine Learning iPhone Money Humor Vulnerabilities Maintenance User Tip Antivirus Modem Sports Images 101 Processor Mobile Security Mouse Customer Relationship Management Multi-Factor Authentication Mobility Administration Hacking Smart Technology Presentation Saving Time Robot Employees Supply Chain Integration Wireless Technology Settings Wireless Managed IT Service Printing Content Filtering Downloads IT Management Paperless Browsers Connectivity Medical IT Hard Drives Break Fix Network Congestion Reviews Co-managed IT Knowledge Development User Error Upload Transportation Domains Google Drive Multi-Factor Security Technology Care Social Network Hypervisor Shopping Business Communications 5G Optimization IoT PowerPoint Refrigeration Point of Sale Dark Web Unified Communications Scams Experience Trends Employer/Employee Relationships Public Speaking Google Docs Lithium-ion battery Network Management Regulations Navigation Tech Support Google Calendar Bitcoin Hybrid Work Running Cable PCI DSS Customer Resource management Gig Economy Human Resources Data Analysis Star Wars Microsoft Excel Google Wallet Entrepreneur Monitors Cables Internet Service Provider Gamification Teamwork Staff Social Networking Evernote Websites Legislation Windows 8 Laptop Regulations Compliance Google Apps Fileless Malware Memes Undo Drones Electronic Medical Records IT Maintenance Net Neutrality SharePoint Content SQL Server Wearable Technology History Motherboard Comparison Business Intelligence Halloween Financial Data Health IT Smartwatch Shortcuts Directions IT Lenovo Assessment Permissions Writing Virtual Reality Ransmoware Procurement Azure Cyber security Server Management Tech Application Private Cloud Specifications Hacks Vendors Scary Stories Telework CES Be Proactive Fun Microchip Communitications Superfish Internet Exlporer Identity Theft Fraud Twitter Deep Learning Workforce Supply Chain Management Username IBM Term Error Black Friday Threats FinTech Education Workplace Strategies IT Assessment Database Social Engineering IT Technicians Remote Computing Meta Flexibility Value Proxy Server Cookies Cyber Monday Mobile Computing Amazon Organization Digital Security Cameras Search Smart Devices Tactics Competition Tablet Hotspot Mirgation Alert Best Practice Outsource IT Remote Working Memory Data Breach Managed IT Nanotechnology Google Play File Sharing Dark Data Environment Buisness Media IT solutions Videos Electronic Health Records Addiction Language Legal How To Chatbots User Notifications Business Growth Small Businesses Management Wasting Time Trend Micro Screen Reader Security Cameras Travel Distributed Denial of Service Displays Cortana Software as a Service Techology Service Level Agreement Google Maps Computing Infrastructure Identity Alt Codes Outsourcing Managing Costs IP Address Bookmark eCommerce Smart Tech SSID Unified Threat Management Downtime Hosted Solution Workplace Surveillance Unified Threat Management Download Virtual Assistant Alerts Recovery Typing Hiring/Firing Virtual Machine

Blog Archive