Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Force is Strong with the Internet of Things

The Force is Strong with the Internet of Things

The Internet of Things has been growing rapidly, and with this growth it has become a major part of daily life. There are connected devices you couldn’t even fathom being needed, but some have turned out to be exceeding useful. In 1977, the release of Star Wars saw people’s imaginations expand. The science end of the sci-fi went into overdrive, and soon communications and computing would change forever. Despite being a long time ago in a galaxy far, far away, the Star Wars universe introduced several concepts of the Internet of Things, decades before the IoT was even conceptualized. This week, we will take a look at the modern day Internet of Things, and how Star Wars primed us for our own future.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware Phishing IT Support Privacy Google Email Workplace Tips Computer Workplace Strategy Collaboration Small Business Hosted Solutions Backup Users AI Managed Service Ransomware Mobile Device Productivity Microsoft Saving Money Quick Tips Passwords Communication Cybersecurity Smartphone Data Backup Disaster Recovery Data Recovery Android VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Current Events Network Tech Term Internet of Things Remote Miscellaneous Information Facebook Holiday Automation Artificial Intelligence Compliance Gadgets Cloud Computing Training Covid-19 Outsourced IT Server Remote Work Managed Service Provider IT Support Encryption Spam Employee/Employer Relationship Office Windows 10 Business Continuity Government Data Management Virtualization Blockchain Wi-Fi Vendor Business Technology Windows 10 Bandwidth Managed Services Data Security Apps Two-factor Authentication Mobile Office WiFi Apple Networking Voice over Internet Protocol App Employer-Employee Relationship BYOD Mobile Device Management Tip of the week Chrome Gmail Budget Password Managed IT Services How To BDR HIPAA Computing Hacker Physical Security Applications Information Technology Avoiding Downtime Access Control Marketing Office 365 Conferencing Storage Bring Your Own Device Big Data Healthcare Operating System Computers Router Risk Management Virtual Private Network Website Health Help Desk Analytics Office Tips Augmented Reality 2FA Retail Excel Telephone The Internet of Things Scam Data loss Remote Workers Social Cooperation Going Green Patch Management Save Money Remote Monitoring Free Resource End of Support Vulnerability Project Management Customer Service Windows 7 Vendor Management Cybercrime Microsoft 365 Display Printer Solutions Paperless Office Infrastructure Monitoring Firewall Document Management Windows 11 Managed IT Service Safety Video Conferencing Maintenance Sports Downloads Antivirus Managed Services Provider Mouse Virtual Machines Professional Services Licensing Entertainment Administration iPhone Robot Telephone System Customer Relationship Management Cost Management Vulnerabilities Data Privacy Settings Wireless Printing Content Filtering Images 101 Hacking IT Management YouTube Meetings Mobility Presentation VPN Multi-Factor Authentication Cryptocurrency Modem Wireless Technology User Tip Processor Computer Repair Mobile Security Virtual Desktop Employees Data storage LiFi Integration Word Smart Technology Outlook Machine Learning Money Saving Time Holidays Humor Data Storage Supply Chain Deep Learning Download Employer/Employee Relationships Outsourcing Twitter Alerts Error Navigation PCI DSS Undo Browsers Education Connectivity Workplace Social Engineering Break Fix Gig Economy Internet Service Provider Upload Teamwork Hiring/Firing Remote Computing Evernote Paperless Multi-Factor Security Regulations Compliance Mobile Computing Social Network Memes Tablet IoT Co-managed IT Search Dark Web Net Neutrality Application Best Practice Trends SQL Server Technology Care Alert Buisness File Sharing Regulations Business Communications Dark Data Google Calendar Financial Data Managed IT Customer Resource management History IBM Legal Data Analysis IT IT solutions Star Wars Scams How To Microsoft Excel Smartwatch Procurement Business Growth Gamification Azure Hybrid Work Notifications Staff Travel Social Networking Tech Human Resources Legislation Telework Cyber security Techology Fileless Malware Communitications Google Maps Cables Cortana CES Supply Chain Management Alt Codes Content Wearable Technology Downtime Unified Threat Management Motherboard Term Google Apps Comparison FinTech Competition Health IT Unified Threat Management Directions IT Assessment Hosted Solution Assessment IT Maintenance Permissions Flexibility Typing Value Business Intelligence Shortcuts Network Congestion Specifications Organization Digital Security Cameras Google Drive User Error Microchip Smart Devices User Internet Exlporer Ransmoware Knowledge Fraud Remote Working Username Memory Vendors Data Breach Point of Sale Google Play Be Proactive 5G Black Friday Videos IP Address Google Docs Electronic Health Records Unified Communications Database Workforce Experience Bitcoin Network Management Wasting Time Threats Running Cable Tech Support IT Technicians Trend Micro Cookies Security Cameras Workplace Strategies Monitors Cyber Monday Google Wallet Proxy Server Software as a Service Recovery Tactics Meta Hotspot Hard Drives Windows 8 Managing Costs Amazon Laptop Websites Mirgation Drones eCommerce Nanotechnology SSID Domains SharePoint Surveillance Addiction Virtual Assistant Outsource IT Electronic Medical Records Language Halloween Chatbots Media Refrigeration Management Virtual Machine Environment Public Speaking Lenovo Screen Reader Medical IT Writing Distributed Denial of Service Reviews Lithium-ion battery Development Service Level Agreement Transportation Small Businesses Virtual Reality Computing Infrastructure Entrepreneur Scary Stories Private Cloud Identity Hacks Server Management Hypervisor Displays Superfish Bookmark Optimization Identity Theft Smart Tech PowerPoint Fun Shopping

Blog Archive