Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Force is Strong with the Internet of Things

The Force is Strong with the Internet of Things

The Internet of Things has been growing rapidly, and with this growth it has become a major part of daily life. There are connected devices you couldn’t even fathom being needed, but some have turned out to be exceeding useful. In 1977, the release of Star Wars saw people’s imaginations expand. The science end of the sci-fi went into overdrive, and soon communications and computing would change forever. Despite being a long time ago in a galaxy far, far away, the Star Wars universe introduced several concepts of the Internet of Things, decades before the IoT was even conceptualized. This week, we will take a look at the modern day Internet of Things, and how Star Wars primed us for our own future.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Services IT Support Privacy Workplace Tips Google Email Computer Phishing Workplace Strategy Collaboration Hosted Solutions Backup Small Business Users Ransomware Managed Service Mobile Device Productivity Microsoft Passwords Saving Money Quick Tips Communication AI Cybersecurity Smartphone Data Backup Disaster Recovery Data Recovery Android Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Internet of Things Remote Automation Artificial Intelligence Facebook Miscellaneous Information Holiday Compliance Gadgets Cloud Computing Covid-19 Training Server Managed Service Provider Remote Work IT Support Outsourced IT Encryption Spam Employee/Employer Relationship Windows 10 Office Business Continuity Data Management Government Business Technology Bandwidth Windows 10 Virtualization Blockchain Wi-Fi Mobile Office Data Security Apps Vendor Two-factor Authentication Tip of the week Chrome Mobile Device Management Budget Managed Services Voice over Internet Protocol Gmail Apple Networking WiFi App Employer-Employee Relationship BYOD Avoiding Downtime Office 365 Marketing Conferencing How To BDR Computing HIPAA Information Technology Applications Hacker Access Control Analytics Website Office Tips 2FA Help Desk Augmented Reality Retail Storage Password Bring Your Own Device Healthcare Managed IT Services Big Data Operating System Physical Security Router Virtual Private Network Risk Management Computers Health Windows 11 Monitoring Document Management Excel Firewall Remote Workers Scam Data loss Telephone The Internet of Things Cooperation Free Resource Project Management Windows 7 Going Green Patch Management Social Save Money Remote Monitoring Microsoft 365 Vulnerability End of Support Vendor Management Cybercrime Solutions Customer Service Display Printer Paperless Office Infrastructure Holidays Data Storage Outlook Smart Technology Supply Chain Machine Learning Video Conferencing Money Word Managed Services Provider Humor Professional Services Saving Time Virtual Machines Maintenance Managed IT Service Antivirus Sports Mouse Downloads iPhone Safety Licensing Administration Vulnerabilities Entertainment Data Privacy Images 101 Robot Settings Telephone System Multi-Factor Authentication Mobility Printing Wireless Cost Management Content Filtering IT Management Customer Relationship Management VPN YouTube Meetings Cryptocurrency Employees Integration Hacking Presentation Computer Repair User Tip Modem Mobile Security Virtual Desktop Processor Wireless Technology Data storage LiFi Cyber Monday Medical IT Windows 8 IP Address Laptop Websites Proxy Server Reviews Cookies Tactics Development Hotspot Transportation Small Businesses Drones Electronic Medical Records Mirgation Hypervisor Displays SharePoint PowerPoint Halloween Shopping Recovery Nanotechnology Optimization Writing Addiction Language Employer/Employee Relationships Outsourcing Lenovo Hard Drives Domains Virtual Reality Management PCI DSS Chatbots Navigation Distributed Denial of Service Workplace Hacks Server Management Scary Stories Private Cloud Gig Economy Screen Reader Fun Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Hiring/Firing Superfish Identity Theft Refrigeration Deep Learning Public Speaking Twitter Regulations Compliance Identity Evernote Paperless Co-managed IT Lithium-ion battery Error Bookmark Smart Tech Memes Social Engineering Download Net Neutrality Entrepreneur Alerts SQL Server Technology Care Education Remote Computing Financial Data History Business Communications Break Fix Scams Mobile Computing Browsers Smartwatch Connectivity IT Search Upload Procurement Azure Hybrid Work Tablet Undo Best Practice Alert Social Network Telework Cyber security Multi-Factor Security Tech Human Resources Dark Web Cables Managed IT Buisness File Sharing CES Dark Data IoT Communitications How To Trends Supply Chain Management Legal IT solutions Business Growth Notifications Customer Resource management FinTech Regulations Google Calendar Term Google Apps Microsoft Excel IT Maintenance Travel Data Analysis Application Star Wars IT Assessment Cortana Gamification Flexibility Staff Value Business Intelligence Techology Google Maps Alt Codes IBM Organization Social Networking Legislation Shortcuts Ransmoware Downtime Unified Threat Management Fileless Malware Digital Security Cameras Smart Devices Content Remote Working Wearable Technology Memory Vendors Unified Threat Management Hosted Solution Typing Health IT Motherboard Data Breach Comparison Google Play Be Proactive Permissions Workforce Directions Videos Network Congestion Assessment Electronic Health Records Competition Knowledge Wasting Time Threats Google Drive User Error Trend Micro Specifications Security Cameras Workplace Strategies Fraud Meta Point of Sale Microchip 5G Internet Exlporer Software as a Service Experience Username Managing Costs Amazon Google Docs Unified Communications Bitcoin Network Management Running Cable Tech Support User eCommerce Black Friday SSID Database Surveillance Virtual Assistant Outsource IT Google Wallet Monitors IT Technicians Virtual Machine Environment Media

Blog Archive