Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Force is Strong with the Internet of Things

The Force is Strong with the Internet of Things

The Internet of Things has been growing rapidly, and with this growth it has become a major part of daily life. There are connected devices you couldn’t even fathom being needed, but some have turned out to be exceeding useful. In 1977, the release of Star Wars saw people’s imaginations expand. The science end of the sci-fi went into overdrive, and soon communications and computing would change forever. Despite being a long time ago in a galaxy far, far away, the Star Wars universe introduced several concepts of the Internet of Things, decades before the IoT was even conceptualized. This week, we will take a look at the modern day Internet of Things, and how Star Wars primed us for our own future.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Services IT Support Privacy Workplace Tips Phishing Google Email Computer Workplace Strategy Collaboration Hosted Solutions Users Backup Small Business Ransomware Mobile Device Productivity Microsoft Managed Service Passwords Quick Tips Saving Money Communication Cybersecurity AI Data Backup Smartphone Disaster Recovery Data Recovery Android Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Information Artificial Intelligence Holiday Automation Facebook Miscellaneous Cloud Computing Covid-19 Training Gadgets Server Remote Work Managed Service Provider Compliance IT Support Outsourced IT Spam Employee/Employer Relationship Encryption Office Windows 10 Government Business Continuity Data Management Blockchain Bandwidth Business Technology Windows 10 Virtualization Wi-Fi Apps Two-factor Authentication Data Security Vendor Mobile Office Employer-Employee Relationship Chrome BYOD Budget Mobile Device Management Apple Gmail Tip of the week App Managed Services WiFi Voice over Internet Protocol Networking How To BDR Office 365 Hacker HIPAA Avoiding Downtime Applications Marketing Access Control Conferencing Computing Information Technology Analytics Computers Office Tips Augmented Reality Router Physical Security Website Storage Virtual Private Network Password Bring Your Own Device Health 2FA Help Desk Retail Operating System Big Data Healthcare Risk Management Managed IT Services Cooperation Free Resource Project Management Windows 7 Patch Management Customer Service Save Money Microsoft 365 Remote Monitoring Vulnerability End of Support Vendor Management Solutions Display Printer Paperless Office Windows 11 Infrastructure Monitoring Firewall Excel Going Green Document Management The Internet of Things Remote Workers Telephone Cybercrime Scam Social Data loss Data Privacy Customer Relationship Management Images 101 Virtual Desktop LiFi Data storage Telephone System Multi-Factor Authentication Robot Mobility Cost Management Hacking Presentation Outlook Money IT Management Wireless Technology Humor VPN Employees Meetings Integration User Tip Modem Sports Computer Repair Mobile Security Processor Mouse Word Holidays Administration Data Storage Smart Technology Supply Chain Video Conferencing Machine Learning Managed Services Provider Saving Time Safety Virtual Machines Professional Services Settings Wireless Printing Managed IT Service Content Filtering Maintenance Antivirus Downloads YouTube iPhone Licensing Cryptocurrency Entertainment Vulnerabilities Trends Supply Chain Management Unified Communications Alert Experience Google Docs Managed IT Customer Resource management FinTech Bitcoin File Sharing Regulations Running Cable Dark Data Google Calendar Term Google Apps How To Microsoft Excel IT Maintenance Data Analysis Google Wallet Star Wars IT Assessment Gamification Flexibility Competition Notifications Staff Value Business Intelligence Organization Windows 8 Travel Social Networking Laptop Legislation Shortcuts Ransmoware Techology Fileless Malware Digital Security Cameras Drones Google Maps Smart Devices Content Remote Working Wearable Technology Memory Vendors Health IT Unified Threat Management Motherboard Data Breach User Halloween Comparison Google Play Be Proactive Permissions Workforce Unified Threat Management Directions Videos Assessment Electronic Health Records Wasting Time Threats IP Address Hacks Trend Micro Scary Stories Network Congestion Specifications Security Cameras Workplace Strategies Fraud Meta Fun User Error Microchip Internet Exlporer Software as a Service Username Deep Learning Managing Costs Amazon Point of Sale eCommerce Recovery Black Friday SSID Virtual Assistant Outsource IT Database Surveillance Hard Drives Education Network Management Domains Tech Support IT Technicians Virtual Machine Environment Media Proxy Server Reviews Mobile Computing Cookies Monitors Cyber Monday Medical IT Hotspot Transportation Small Businesses Search Tactics Development Refrigeration Public Speaking Best Practice Websites Mirgation Hypervisor Displays Shopping Lithium-ion battery Nanotechnology Optimization Buisness PowerPoint Electronic Medical Records Language Employer/Employee Relationships Outsourcing Entrepreneur SharePoint Legal Addiction IT solutions Management PCI DSS Business Growth Chatbots Navigation Lenovo Gig Economy Screen Reader Writing Distributed Denial of Service Workplace Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Cortana Service Level Agreement Internet Service Provider Undo Server Management Regulations Compliance Alt Codes Private Cloud Identity Evernote Paperless Superfish Bookmark Identity Theft Smart Tech Memes Downtime Co-managed IT Hosted Solution Twitter Alerts SQL Server Technology Care Download Net Neutrality Financial Data Typing Error History Business Communications Browsers Smartwatch Connectivity IT Application Social Engineering Break Fix Scams Remote Computing Azure Hybrid Work Knowledge Google Drive Upload Procurement Social Network Telework IBM Cyber security Multi-Factor Security Tech Human Resources 5G CES Tablet IoT Communitications Dark Web Cables

Blog Archive