Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Force is Strong with the Internet of Things

The Force is Strong with the Internet of Things

The Internet of Things has been growing rapidly, and with this growth it has become a major part of daily life. There are connected devices you couldn’t even fathom being needed, but some have turned out to be exceeding useful. In 1977, the release of Star Wars saw people’s imaginations expand. The science end of the sci-fi went into overdrive, and soon communications and computing would change forever. Despite being a long time ago in a galaxy far, far away, the Star Wars universe introduced several concepts of the Internet of Things, decades before the IoT was even conceptualized. This week, we will take a look at the modern day Internet of Things, and how Star Wars primed us for our own future.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Workplace Tips Computer Phishing Email IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Microsoft Mobile Device Small Business Passwords Backup Quick Tips Productivity Saving Money Cybersecurity Communication Managed Service Smartphone Data Backup Android Upgrade Smartphones VoIP AI Business Management Mobile Devices Data Recovery communications Disaster Recovery Windows Social Media Browser Managed IT Services Microsoft Office Current Events Network Internet of Things Remote Tech Term Automation Information Facebook Artificial Intelligence Miscellaneous Gadgets Cloud Computing Covid-19 Holiday Training Server Managed Service Provider Remote Work Outsourced IT Compliance Spam Encryption IT Support Employee/Employer Relationship Windows 10 Office Business Continuity Government Data Management Business Technology Bandwidth Blockchain Wi-Fi Windows 10 Virtualization Apps Vendor Data Security Mobile Office Two-factor Authentication Budget Tip of the week Employer-Employee Relationship Managed Services Voice over Internet Protocol Apple App Networking Mobile Device Management BYOD Gmail Chrome HIPAA Hacker Applications How To Avoiding Downtime BDR Marketing Computing Information Technology Conferencing Office 365 WiFi Access Control Storage Password Bring Your Own Device Retail Healthcare Router Computers Managed IT Services Website Operating System Help Desk 2FA Risk Management Virtual Private Network Analytics Office Tips Augmented Reality Health Big Data Cooperation Social Document Management Remote Workers Customer Service Scam Data loss Going Green Free Resource Project Management Windows 7 Cybercrime Windows 11 Patch Management Monitoring Save Money Microsoft 365 Remote Monitoring Vulnerability End of Support Vendor Management Firewall Solutions Excel Physical Security Display Telephone The Internet of Things Printer Paperless Office Infrastructure Data Storage Data Privacy Video Conferencing Managed Services Provider Machine Learning Sports Telephone System Virtual Machines Professional Services Mouse Customer Relationship Management Cost Management Administration Maintenance Hacking Antivirus Presentation iPhone User Tip Wireless Technology Modem Vulnerabilities Processor Settings Mobile Security Wireless Printing Content Filtering Images 101 Multi-Factor Authentication Mobility Robot YouTube Word Smart Technology Cryptocurrency Supply Chain Saving Time IT Management Employees VPN Meetings Virtual Desktop LiFi Managed IT Service Integration Data storage Safety Downloads Computer Repair Outlook Licensing Holidays Money Entertainment Humor Human Resources Hypervisor Websites Hacks Scary Stories Trends Application Customer Resource management Fun Shopping Regulations Cables Optimization Google Calendar PowerPoint Electronic Medical Records Deep Learning Data Analysis IBM Star Wars SharePoint Microsoft Excel Employer/Employee Relationships PCI DSS Staff Google Apps Navigation Gamification Education Gig Economy Social Networking IT Maintenance Lenovo Legislation Writing Teamwork Virtual Reality Fileless Malware Business Intelligence Internet Service Provider Regulations Compliance Wearable Technology Shortcuts Server Management Evernote Private Cloud Mobile Computing Content Health IT Competition Search Motherboard Ransmoware Memes Superfish Comparison Identity Theft SQL Server Twitter Best Practice Directions Assessment Vendors Net Neutrality Permissions Financial Data Be Proactive History Error Buisness Social Engineering IT solutions Smartwatch Workforce IT Specifications Legal Azure Remote Computing Business Growth Microchip Internet Exlporer Threats User Procurement Fraud Telework Workplace Strategies Cyber security Tech Username Cortana CES Meta Communitications Black Friday Tablet Alert Alt Codes IP Address Database Amazon Supply Chain Management FinTech IT Technicians Managed IT Term File Sharing Dark Data Downtime How To Hosted Solution Proxy Server Cookies Outsource IT IT Assessment Cyber Monday Value Notifications Typing Tactics Environment Recovery Flexibility Hotspot Media Hard Drives Organization Mirgation Travel Domains Knowledge Digital Security Cameras Nanotechnology Small Businesses Smart Devices Techology Google Maps Google Drive Memory Addiction Displays Remote Working Language Refrigeration 5G Chatbots Data Breach Google Play Unified Threat Management Management Unified Communications Public Speaking Experience Videos Screen Reader Outsourcing Electronic Health Records Unified Threat Management Distributed Denial of Service Google Docs Wasting Time Bitcoin Lithium-ion battery Running Cable Service Level Agreement Computing Infrastructure Identity Workplace Entrepreneur Trend Micro Security Cameras Google Wallet Network Congestion Bookmark Smart Tech Hiring/Firing Software as a Service User Error Paperless Managing Costs Windows 8 Laptop Download Alerts Undo Co-managed IT eCommerce SSID Point of Sale Drones Browsers Connectivity Technology Care Surveillance Break Fix Virtual Assistant Business Communications Virtual Machine Network Management Tech Support Halloween Upload Social Network Reviews Scams Multi-Factor Security Medical IT Monitors IoT Hybrid Work Development Dark Web Transportation

Blog Archive