Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Force is Strong with the Internet of Things

The Force is Strong with the Internet of Things

The Internet of Things has been growing rapidly, and with this growth it has become a major part of daily life. There are connected devices you couldn’t even fathom being needed, but some have turned out to be exceeding useful. In 1977, the release of Star Wars saw people’s imaginations expand. The science end of the sci-fi went into overdrive, and soon communications and computing would change forever. Despite being a long time ago in a galaxy far, far away, the Star Wars universe introduced several concepts of the Internet of Things, decades before the IoT was even conceptualized. This week, we will take a look at the modern day Internet of Things, and how Star Wars primed us for our own future.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Privacy Workplace Tips Google Email Computer Phishing Workplace Strategy Collaboration Small Business Hosted Solutions Backup Users Ransomware Managed Service Mobile Device Microsoft Productivity Passwords Saving Money AI Quick Tips Communication Cybersecurity Data Backup Smartphone Disaster Recovery Data Recovery Android Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Current Events Network Tech Term Internet of Things Remote Information Automation Artificial Intelligence Facebook Miscellaneous Holiday Training Compliance Gadgets Cloud Computing Covid-19 Server Managed Service Provider Outsourced IT Remote Work IT Support Employee/Employer Relationship Encryption Spam Office Windows 10 Business Continuity Data Management Government Business Technology Bandwidth Windows 10 Virtualization Blockchain Wi-Fi Two-factor Authentication Mobile Office Managed Services Data Security Apps Vendor Tip of the week Chrome Mobile Device Management Budget Voice over Internet Protocol Gmail Apple Networking WiFi App Employer-Employee Relationship BYOD Hacker Access Control Avoiding Downtime Office 365 Marketing Conferencing Password Managed IT Services How To BDR HIPAA Computing Physical Security Applications Information Technology Computers Health Help Desk Analytics Website Office Tips Augmented Reality Retail 2FA Storage Healthcare Bring Your Own Device Big Data Operating System Router Virtual Private Network Risk Management Printer Paperless Office Infrastructure Monitoring Document Management Windows 11 Remote Workers Managed IT Service Firewall Telephone Scam Excel Data loss The Internet of Things Cooperation Free Resource Project Management Windows 7 Social Going Green Patch Management Save Money Microsoft 365 Remote Monitoring End of Support Vulnerability Vendor Management Solutions Cybercrime Customer Service Display Processor Presentation Computer Repair Mobile Security Virtual Desktop Holidays Data storage LiFi Wireless Technology Data Storage Smart Technology Outlook Video Conferencing Machine Learning Managed Services Provider Money Saving Time Virtual Machines Professional Services Humor Word Maintenance Sports Downloads Supply Chain Antivirus Mouse iPhone Licensing Safety Entertainment Administration Vulnerabilities Images 101 Multi-Factor Authentication Robot Mobility Telephone System Cost Management Settings Wireless Printing Content Filtering Data Privacy IT Management Customer Relationship Management VPN Employees YouTube Meetings Integration Cryptocurrency User Tip Modem Hacking Google Docs Unified Communications Database Surveillance Experience Virtual Assistant Vendors Running Cable Tech Support IT Technicians Virtual Machine User Be Proactive Bitcoin Network Management Google Wallet Proxy Server Reviews Cookies Monitors Cyber Monday Medical IT Workforce Tactics Development Hotspot Transportation Threats Laptop Websites Mirgation Hypervisor Workplace Strategies Windows 8 IP Address Drones Shopping Nanotechnology Optimization PowerPoint Meta SharePoint Addiction Electronic Medical Records Language Employer/Employee Relationships Amazon Halloween Chatbots Recovery Navigation Management PCI DSS Lenovo Gig Economy Screen Reader Hard Drives Writing Distributed Denial of Service Outsource IT Media Service Level Agreement Internet Service Provider Domains Virtual Reality Computing Infrastructure Teamwork Environment Scary Stories Private Cloud Identity Evernote Hacks Server Management Regulations Compliance Superfish Bookmark Identity Theft Smart Tech Memes Refrigeration Fun Small Businesses Displays Deep Learning Download Net Neutrality Public Speaking Twitter Alerts SQL Server Error History Financial Data Lithium-ion battery Browsers Smartwatch Education Connectivity IT Social Engineering Break Fix Entrepreneur Outsourcing Upload Procurement Remote Computing Azure Cyber security Multi-Factor Security Tech Workplace Mobile Computing Social Network Telework CES Tablet IoT Communitications Undo Search Dark Web Hiring/Firing Paperless Best Practice Trends Supply Chain Management Alert Buisness File Sharing Regulations Dark Data Google Calendar Term Co-managed IT Managed IT Customer Resource management FinTech Legal Data Analysis IT solutions Star Wars IT Assessment How To Microsoft Excel Technology Care Business Communications Business Growth Gamification Flexibility Notifications Staff Value Travel Social Networking Application Legislation Scams Organization Techology Fileless Malware Digital Security Cameras Google Maps Smart Devices Cortana Hybrid Work Human Resources Alt Codes Content Remote Working IBM Wearable Technology Memory Downtime Unified Threat Management Motherboard Data Breach Comparison Google Play Cables Health IT Unified Threat Management Directions Videos Hosted Solution Assessment Electronic Health Records Permissions Google Apps Typing Wasting Time Trend Micro Network Congestion Specifications Security Cameras IT Maintenance Google Drive User Error Microchip Internet Exlporer Software as a Service Competition Knowledge Fraud Business Intelligence Managing Costs Shortcuts Username Point of Sale eCommerce 5G Black Friday SSID Ransmoware

Blog Archive