Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Force is Strong with the Internet of Things

The Force is Strong with the Internet of Things

The Internet of Things has been growing rapidly, and with this growth it has become a major part of daily life. There are connected devices you couldn’t even fathom being needed, but some have turned out to be exceeding useful. In 1977, the release of Star Wars saw people’s imaginations expand. The science end of the sci-fi went into overdrive, and soon communications and computing would change forever. Despite being a long time ago in a galaxy far, far away, the Star Wars universe introduced several concepts of the Internet of Things, decades before the IoT was even conceptualized. This week, we will take a look at the modern day Internet of Things, and how Star Wars primed us for our own future.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Hackers Cloud Network Security Hardware User Tips Efficiency Internet Malware IT Support Privacy Google Computer Phishing Workplace Tips Email IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Quick Tips Passwords Backup Cybersecurity Saving Money Communication Data Backup Managed Service Smartphone Android Productivity Smartphones Upgrade VoIP Business Management Mobile Devices communications Data Recovery Disaster Recovery Social Media Windows Browser Microsoft Office Managed IT Services AI Current Events Network Tech Term Remote Internet of Things Automation Artificial Intelligence Facebook Information Gadgets Cloud Computing Holiday Covid-19 Miscellaneous Training Server Managed Service Provider Remote Work Outsourced IT Employee/Employer Relationship Spam Compliance Encryption Office Windows 10 IT Support Government Business Continuity Data Management Wi-Fi Business Technology Bandwidth Windows 10 Blockchain Virtualization Apps Two-factor Authentication Mobile Office Data Security Vendor Employer-Employee Relationship BYOD Managed Services Voice over Internet Protocol Tip of the week Chrome Mobile Device Management Budget Gmail Apple Networking App Computing Information Technology Hacker Conferencing Access Control Avoiding Downtime Office 365 Marketing How To WiFi HIPAA BDR Applications Operating System 2FA Help Desk Risk Management Virtual Private Network Computers Health Healthcare Analytics Website Office Tips Augmented Reality Retail Storage Password Bring Your Own Device Managed IT Services Router Big Data Remote Monitoring End of Support Vulnerability Windows 11 Vendor Management Cybercrime Monitoring Physical Security Customer Service Excel Display Printer Paperless Office Infrastructure Remote Workers Telephone Document Management Cooperation Free Resource Project Management Windows 7 Firewall Scam Data loss Microsoft 365 Solutions The Internet of Things Social Going Green Patch Management Save Money Processor Mobile Security Settings Wireless Printing Holidays Content Filtering IT Management Customer Relationship Management YouTube Meetings Data Storage VPN Smart Technology Supply Chain Video Conferencing Cryptocurrency Hacking Managed Services Provider Virtual Machines Professional Services Presentation Computer Repair Saving Time Virtual Desktop Data storage LiFi Managed IT Service Wireless Technology Downloads Outlook iPhone Licensing Machine Learning Money Humor Vulnerabilities Word Entertainment Data Privacy Images 101 Maintenance Antivirus Sports Mouse Multi-Factor Authentication Mobility Telephone System Cost Management Safety Administration Employees Integration Robot Modem User Tip Database Surveillance Alt Codes Virtual Assistant Outsource IT IBM Downtime Unified Threat Management Media IT Technicians Virtual Machine Environment Unified Threat Management Cookies Hosted Solution Cyber Monday Medical IT Proxy Server Reviews Tactics Development Typing Hotspot Transportation Small Businesses Network Congestion Mirgation Hypervisor Displays Google Drive User Error Nanotechnology Optimization PowerPoint Competition Knowledge Shopping Addiction Language Employer/Employee Relationships Outsourcing Point of Sale Navigation 5G Management PCI DSS Chatbots Google Docs Screen Reader Unified Communications Distributed Denial of Service Workplace Experience Gig Economy Service Level Agreement Internet Service Provider Bitcoin Network Management Computing Infrastructure Teamwork Hiring/Firing Running Cable Tech Support User Evernote Paperless Monitors Regulations Compliance Google Wallet Identity Smart Tech Memes Co-managed IT Bookmark Download Net Neutrality Windows 8 Alerts SQL Server Technology Care IP Address Laptop Websites Business Communications Financial Data Drones History SharePoint Connectivity IT Break Fix Scams Electronic Medical Records Browsers Smartwatch Recovery Upload Procurement Azure Hybrid Work Halloween Multi-Factor Security Tech Human Resources Hard Drives Writing Social Network Telework Lenovo Cyber security IoT Communitications Dark Web Cables Domains Virtual Reality CES Trends Supply Chain Management Hacks Server Management Scary Stories Private Cloud Identity Theft Google Calendar Term Google Apps Refrigeration Fun Customer Resource management FinTech Superfish Regulations Data Analysis Star Wars IT Assessment Deep Learning Microsoft Excel IT Maintenance Public Speaking Twitter Gamification Flexibility Staff Value Business Intelligence Lithium-ion battery Error Social Networking Education Legislation Shortcuts Social Engineering Entrepreneur Organization Fileless Malware Digital Security Cameras Smart Devices Ransmoware Remote Computing Content Remote Working Mobile Computing Wearable Technology Memory Vendors Motherboard Data Breach Tablet Comparison Google Play Be Proactive Undo Search Health IT Directions Videos Assessment Electronic Health Records Best Practice Permissions Workforce Alert Buisness File Sharing Dark Data Managed IT Wasting Time Threats Legal Trend Micro IT solutions Specifications Security Cameras Workplace Strategies How To Microchip Internet Exlporer Software as a Service Business Growth Fraud Meta Notifications Travel Application Username Managing Costs Amazon Techology eCommerce Google Maps Black Friday SSID Cortana

Blog Archive