Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Force is Strong with the Internet of Things

The Force is Strong with the Internet of Things

The Internet of Things has been growing rapidly, and with this growth it has become a major part of daily life. There are connected devices you couldn’t even fathom being needed, but some have turned out to be exceeding useful. In 1977, the release of Star Wars saw people’s imaginations expand. The science end of the sci-fi went into overdrive, and soon communications and computing would change forever. Despite being a long time ago in a galaxy far, far away, the Star Wars universe introduced several concepts of the Internet of Things, decades before the IoT was even conceptualized. This week, we will take a look at the modern day Internet of Things, and how Star Wars primed us for our own future.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing Collaboration IT Services Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Quick Tips Passwords Backup Communication Cybersecurity Saving Money Smartphone Productivity Data Backup Managed Service Android Upgrade Business Management AI Smartphones VoIP Data Recovery communications Mobile Devices Windows Disaster Recovery Browser Social Media Microsoft Office Managed IT Services Network Current Events Remote Tech Term Internet of Things Facebook Information Artificial Intelligence Automation Miscellaneous Gadgets Covid-19 Cloud Computing Holiday Training Remote Work Server Managed Service Provider Outsourced IT Encryption Spam Employee/Employer Relationship IT Support Compliance Office Windows 10 Government Business Continuity Data Management Virtualization Blockchain Wi-Fi Bandwidth Business Technology Windows 10 Data Security Apps Vendor Two-factor Authentication Mobile Office Networking Employer-Employee Relationship BYOD Chrome Budget Managed Services Voice over Internet Protocol Mobile Device Management Apple Tip of the week Gmail App WiFi How To Computing BDR HIPAA Information Technology Applications Office 365 Hacker Avoiding Downtime Access Control Marketing Conferencing Operating System Managed IT Services Big Data Risk Management Router Computers Analytics Office Tips 2FA Augmented Reality Virtual Private Network Help Desk Storage Website Password Health Bring Your Own Device Healthcare Retail Cooperation Free Resource Going Green Project Management Scam Windows 7 The Internet of Things Data loss Microsoft 365 Cybercrime Social Solutions Patch Management Save Money Remote Monitoring End of Support Vulnerability Customer Service Vendor Management Windows 11 Physical Security Monitoring Display Printer Excel Paperless Office Infrastructure Remote Workers Telephone Firewall Document Management Safety Maintenance Data Privacy Antivirus Images 101 Settings Wireless Printing Multi-Factor Authentication Mobility Content Filtering Telephone System Cost Management YouTube Cryptocurrency Robot Employees Customer Relationship Management Integration Virtual Desktop Modem Data storage LiFi User Tip Processor Mobile Security Hacking IT Management Holidays Outlook Meetings Presentation VPN Data Storage Money Humor Smart Technology Supply Chain Wireless Technology Video Conferencing Computer Repair Managed Services Provider Virtual Machines Professional Services Saving Time Sports Mouse Word Managed IT Service Machine Learning Downloads Administration iPhone Licensing Entertainment Vulnerabilities Trends Supply Chain Management Twitter Regulations Error Google Calendar Term Google Apps Cortana Undo Customer Resource management FinTech Data Analysis Star Wars IT Assessment Microsoft Excel IT Maintenance Alt Codes Social Engineering Downtime Gamification Flexibility Staff Value Business Intelligence Remote Computing Social Networking Legislation Shortcuts Hosted Solution Organization Fileless Malware Digital Security Cameras Smart Devices Tablet Ransmoware Typing Application Content Remote Working Wearable Technology Memory Vendors Alert Motherboard Data Breach Google Drive File Sharing Comparison Google Play Be Proactive Dark Data Knowledge Health IT Managed IT Directions Videos Assessment Electronic Health Records Permissions Workforce How To IBM 5G Wasting Time Threats Notifications Trend Micro Google Docs Travel Specifications Security Cameras Workplace Strategies Unified Communications Experience Microchip Techology Internet Exlporer Software as a Service Google Maps Fraud Meta Bitcoin Running Cable Username Managing Costs Amazon Google Wallet eCommerce Unified Threat Management Black Friday SSID Competition Unified Threat Management Database Surveillance Virtual Assistant Outsource IT Windows 8 Laptop Media IT Technicians Virtual Machine Environment Drones Cookies Cyber Monday Medical IT Network Congestion Proxy Server Reviews User Error User Tactics Development Hotspot Transportation Small Businesses Halloween Mirgation Hypervisor Displays Nanotechnology Optimization Point of Sale PowerPoint Shopping IP Address Addiction Language Employer/Employee Relationships Outsourcing Hacks Scary Stories Tech Support Navigation Fun Management PCI DSS Network Management Chatbots Screen Reader Distributed Denial of Service Workplace Deep Learning Monitors Gig Economy Recovery Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Hiring/Firing Websites Evernote Paperless Education Hard Drives Regulations Compliance Identity Smart Tech Memes Co-managed IT Domains Bookmark SharePoint Download Net Neutrality Alerts SQL Server Technology Care Mobile Computing Electronic Medical Records Business Communications Search Refrigeration Financial Data History Lenovo Connectivity IT Break Fix Scams Best Practice Writing Public Speaking Browsers Smartwatch Buisness Lithium-ion battery Upload Procurement Azure Hybrid Work Virtual Reality Legal Private Cloud Multi-Factor Security Tech Human Resources IT solutions Social Network Telework Server Management Entrepreneur Cyber security CES Superfish IoT Communitications Identity Theft Dark Web Cables Business Growth

Blog Archive