Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Force is Strong with the Internet of Things

The Force is Strong with the Internet of Things

The Internet of Things has been growing rapidly, and with this growth it has become a major part of daily life. There are connected devices you couldn’t even fathom being needed, but some have turned out to be exceeding useful. In 1977, the release of Star Wars saw people’s imaginations expand. The science end of the sci-fi went into overdrive, and soon communications and computing would change forever. Despite being a long time ago in a galaxy far, far away, the Star Wars universe introduced several concepts of the Internet of Things, decades before the IoT was even conceptualized. This week, we will take a look at the modern day Internet of Things, and how Star Wars primed us for our own future.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Hackers Cloud Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Phishing Workplace Tips Google Privacy Email Computer Workplace Strategy Hosted Solutions Collaboration Backup Small Business Users Ransomware Managed Service AI Mobile Device Productivity Microsoft Passwords Saving Money Quick Tips Communication Cybersecurity Data Backup Smartphone Disaster Recovery Data Recovery Android VoIP Upgrade Smartphones Business Management Mobile Devices communications Windows Social Media Browser Managed IT Services Microsoft Office Current Events Network Tech Term Remote Internet of Things Miscellaneous Information Automation Artificial Intelligence Facebook Holiday Training Covid-19 Gadgets Compliance Cloud Computing Remote Work IT Support Outsourced IT Server Managed Service Provider Spam Employee/Employer Relationship Encryption Windows 10 Office Business Continuity Government Data Management Business Technology Bandwidth Windows 10 Wi-Fi Blockchain Virtualization Two-factor Authentication Vendor Apps Managed Services Mobile Office Data Security Employer-Employee Relationship Tip of the week Chrome Budget Voice over Internet Protocol Apple Networking Mobile Device Management App Gmail BYOD WiFi HIPAA Access Control Applications Office 365 Hacker Password Avoiding Downtime Conferencing Managed IT Services Marketing How To BDR Computing Physical Security Information Technology Router Health Analytics Office Tips Augmented Reality Computers 2FA Retail Help Desk Storage Bring Your Own Device Website Healthcare Operating System Big Data Virtual Private Network Risk Management Social Solutions Printer Paperless Office Infrastructure Windows 11 Customer Service Document Management Monitoring Excel Scam Data loss Managed IT Service Remote Workers Telephone Firewall Going Green Patch Management Save Money Remote Monitoring Cooperation Free Resource End of Support Vulnerability Project Management Vendor Management Windows 7 Cybercrime The Internet of Things Microsoft 365 Display Computer Repair Employees Virtual Desktop LiFi Integration Data storage Customer Relationship Management User Tip Modem Mobile Security Outlook Processor Machine Learning Money Holidays Hacking Humor Presentation Data Storage Smart Technology Supply Chain Maintenance Video Conferencing Wireless Technology Antivirus Sports Managed Services Provider Virtual Machines Professional Services Mouse Saving Time Administration Downloads Word iPhone Licensing Robot Vulnerabilities Entertainment Settings Data Privacy Wireless Printing Content Filtering Safety Images 101 IT Management Mobility VPN Telephone System YouTube Meetings Multi-Factor Authentication Cost Management Cryptocurrency Unified Communications Assessment Electronic Health Records Experience Permissions Workforce Application Google Docs Directions Videos Bitcoin Network Management Running Cable Tech Support Wasting Time Threats Monitors Specifications Security Cameras Workplace Strategies IBM Google Wallet Trend Micro Internet Exlporer Software as a Service Fraud Meta Microchip Windows 8 Username Laptop Websites Managing Costs Amazon Black Friday SSID Drones eCommerce Database Surveillance Electronic Medical Records Virtual Assistant Outsource IT SharePoint Competition Halloween IT Technicians Virtual Machine Environment Media Writing Cyber Monday Medical IT Lenovo Proxy Server Reviews Cookies Tactics Development Virtual Reality Hotspot Transportation Small Businesses Hacks Server Management Scary Stories Private Cloud Mirgation Hypervisor Displays Fun PowerPoint User Superfish Shopping Identity Theft Nanotechnology Optimization Deep Learning Addiction Twitter Language Employer/Employee Relationships Outsourcing Management PCI DSS Error Chatbots Navigation Screen Reader Social Engineering Distributed Denial of Service Workplace IP Address Gig Economy Education Service Level Agreement Internet Service Provider Remote Computing Computing Infrastructure Teamwork Hiring/Firing Evernote Paperless Mobile Computing Regulations Compliance Identity Smart Tech Memes Search Co-managed IT Recovery Bookmark Tablet Best Practice Download Net Neutrality Alert Alerts SQL Server Technology Care Hard Drives Business Communications Domains Managed IT Financial Data Buisness File Sharing History Dark Data IT solutions Connectivity IT How To Break Fix Scams Legal Browsers Smartwatch Business Growth Upload Procurement Notifications Azure Hybrid Work Refrigeration Multi-Factor Security Tech Human Resources Public Speaking Social Network Telework Travel Cyber security Google Maps IoT Communitications Cortana Dark Web Cables Lithium-ion battery Techology CES Entrepreneur Alt Codes Trends Supply Chain Management Google Calendar Term Google Apps Customer Resource management FinTech Downtime Unified Threat Management Regulations Hosted Solution Star Wars IT Assessment Microsoft Excel IT Maintenance Unified Threat Management Data Analysis Undo Typing Gamification Flexibility Staff Value Business Intelligence Network Congestion Legislation Shortcuts Organization Social Networking Smart Devices Knowledge Ransmoware Google Drive User Error Fileless Malware Digital Security Cameras Content Remote Working Wearable Technology Memory Vendors 5G Comparison Google Play Be Proactive Health IT Point of Sale Motherboard Data Breach

Blog Archive