Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Force is Strong with the Internet of Things

The Force is Strong with the Internet of Things

The Internet of Things has been growing rapidly, and with this growth it has become a major part of daily life. There are connected devices you couldn’t even fathom being needed, but some have turned out to be exceeding useful. In 1977, the release of Star Wars saw people’s imaginations expand. The science end of the sci-fi went into overdrive, and soon communications and computing would change forever. Despite being a long time ago in a galaxy far, far away, the Star Wars universe introduced several concepts of the Internet of Things, decades before the IoT was even conceptualized. This week, we will take a look at the modern day Internet of Things, and how Star Wars primed us for our own future.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Google Phishing Email Workplace Tips Computer IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Microsoft Mobile Device Small Business Quick Tips Productivity Passwords Backup Cybersecurity Saving Money Communication Managed Service Data Backup Smartphone Android Upgrade AI VoIP Business Management Smartphones Mobile Devices communications Data Recovery Windows Disaster Recovery Social Media Browser Microsoft Office Managed IT Services Current Events Network Remote Tech Term Internet of Things Automation Artificial Intelligence Facebook Information Holiday Training Covid-19 Miscellaneous Gadgets Cloud Computing Server Remote Work Managed Service Provider Outsourced IT Compliance IT Support Employee/Employer Relationship Encryption Spam Office Windows 10 Business Continuity Data Management Government Wi-Fi Business Technology Bandwidth Windows 10 Virtualization Blockchain Vendor Two-factor Authentication Mobile Office Data Security Apps Tip of the week Chrome Mobile Device Management Budget Gmail Apple Networking Managed Services Voice over Internet Protocol App Employer-Employee Relationship BYOD Computing Applications Information Technology Hacker Access Control Avoiding Downtime Office 365 Marketing Conferencing How To WiFi BDR HIPAA Router Virtual Private Network Risk Management Computers Health Help Desk Analytics Website Office Tips Augmented Reality Retail 2FA Storage Password Bring Your Own Device Managed IT Services Healthcare Big Data Operating System Windows 7 Physical Security Customer Service Display Microsoft 365 Printer Paperless Office Solutions Infrastructure Monitoring Document Management Windows 11 Firewall Telephone Scam Excel Data loss The Internet of Things Cooperation Remote Workers Going Green Patch Management Social Save Money Remote Monitoring Vulnerability End of Support Free Resource Vendor Management Cybercrime Project Management VPN YouTube Meetings Images 101 Multi-Factor Authentication Mobility Cryptocurrency User Tip Modem Hacking Processor Presentation Computer Repair Mobile Security Virtual Desktop Data storage LiFi Wireless Technology Employees Smart Technology Integration Outlook Machine Learning Money Saving Time Humor Word Holidays Managed IT Service Maintenance Data Storage Sports Downloads Supply Chain Antivirus Mouse Video Conferencing Managed Services Provider Licensing Safety Virtual Machines Professional Services Entertainment Administration Telephone System Robot iPhone Cost Management Settings Printing Wireless Vulnerabilities Data Privacy Content Filtering IT Management Customer Relationship Management Network Congestion Specifications IT Assessment IT Maintenance Value Business Intelligence Google Drive User Error Microchip Internet Exlporer Competition Knowledge Fraud Flexibility Organization Shortcuts Username Point of Sale Digital Security Cameras 5G Black Friday Smart Devices Ransmoware Memory Vendors Google Docs Unified Communications Database Experience Remote Working Running Cable Tech Support IT Technicians User Data Breach Google Play Be Proactive Bitcoin Network Management Google Wallet Proxy Server Cookies Videos Monitors Cyber Monday Electronic Health Records Workforce Wasting Time Threats Tactics Hotspot Laptop Websites Mirgation Trend Micro Security Cameras Workplace Strategies Windows 8 IP Address Drones Nanotechnology Software as a Service Meta Managing Costs Amazon SharePoint Addiction Electronic Medical Records Language Halloween Chatbots Recovery eCommerce SSID Management Lenovo Screen Reader Hard Drives Writing Distributed Denial of Service Surveillance Virtual Assistant Outsource IT Virtual Machine Environment Media Service Level Agreement Domains Virtual Reality Computing Infrastructure Scary Stories Private Cloud Identity Reviews Medical IT Hacks Server Management Superfish Bookmark Identity Theft Smart Tech Refrigeration Fun Development Transportation Small Businesses Hypervisor Displays Deep Learning Download Public Speaking Twitter Alerts Lithium-ion battery Error Shopping Optimization PowerPoint Browsers Education Connectivity Social Engineering Break Fix Entrepreneur Employer/Employee Relationships Outsourcing Navigation Upload Remote Computing PCI DSS Gig Economy Multi-Factor Security Workplace Mobile Computing Social Network Tablet IoT Undo Search Dark Web Internet Service Provider Teamwork Hiring/Firing Evernote Paperless Best Practice Trends Alert Regulations Compliance Buisness File Sharing Regulations Dark Data Google Calendar Memes Co-managed IT Managed IT Customer Resource management Legal Data Analysis IT solutions Star Wars How To Microsoft Excel Net Neutrality SQL Server Technology Care Financial Data History Business Communications Business Growth Gamification Notifications Staff Travel Social Networking Smartwatch Application Legislation IT Scams Azure Hybrid Work Techology Fileless Malware Google Maps Cortana Procurement Wearable Technology Telework Cyber security Tech Human Resources Alt Codes Content IBM Health IT Downtime Unified Threat Management Motherboard CES Comparison Communitications Cables Unified Threat Management Directions Hosted Solution Assessment Permissions Supply Chain Management FinTech Term Google Apps Typing

Blog Archive