Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Force is Strong with the Internet of Things

The Force is Strong with the Internet of Things

The Internet of Things has been growing rapidly, and with this growth it has become a major part of daily life. There are connected devices you couldn’t even fathom being needed, but some have turned out to be exceeding useful. In 1977, the release of Star Wars saw people’s imaginations expand. The science end of the sci-fi went into overdrive, and soon communications and computing would change forever. Despite being a long time ago in a galaxy far, far away, the Star Wars universe introduced several concepts of the Internet of Things, decades before the IoT was even conceptualized. This week, we will take a look at the modern day Internet of Things, and how Star Wars primed us for our own future.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support Privacy IT Services Workplace Tips Computer Google Email Phishing Hosted Solutions Workplace Strategy Collaboration Users Ransomware Small Business Backup Mobile Device Productivity Microsoft Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Data Backup Smartphone Data Recovery AI Android Disaster Recovery Upgrade VoIP Smartphones Business Management communications Mobile Devices Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Miscellaneous Information Holiday Automation Artificial Intelligence Facebook Covid-19 Cloud Computing Gadgets Training Remote Work Server Managed Service Provider Compliance IT Support Outsourced IT Spam Employee/Employer Relationship Encryption Windows 10 Office Government Business Continuity Data Management Wi-Fi Business Technology Bandwidth Windows 10 Blockchain Virtualization Vendor Apps Two-factor Authentication Mobile Office Data Security BYOD Employer-Employee Relationship Tip of the week Chrome Managed Services Voice over Internet Protocol Budget Mobile Device Management Gmail Apple Networking App WiFi HIPAA Applications Computing Information Technology Access Control Hacker Office 365 Avoiding Downtime Conferencing Marketing How To BDR Router Operating System Risk Management Virtual Private Network Computers Help Desk Health Analytics Office Tips Website Augmented Reality Retail Healthcare Storage Password Bring Your Own Device Managed IT Services 2FA Big Data Solutions Social Remote Monitoring End of Support Vulnerability Vendor Management Cybercrime Physical Security Display Printer Customer Service Paperless Office Monitoring Infrastructure Document Management Remote Workers Telephone Firewall Scam Data loss Cooperation Free Resource Windows 11 Project Management Windows 7 The Internet of Things Excel Microsoft 365 Going Green Patch Management Save Money Settings Wireless Printing Employees Content Filtering Integration IT Management VPN YouTube Meetings User Tip Customer Relationship Management Modem Mobile Security Cryptocurrency Processor Data Privacy Computer Repair Holidays Hacking Virtual Desktop Data Storage Presentation Data storage LiFi Smart Technology Video Conferencing Wireless Technology Managed Services Provider Outlook Saving Time Virtual Machines Professional Services Machine Learning Money Humor Managed IT Service Word Downloads Maintenance iPhone Licensing Antivirus Sports Mouse Entertainment Vulnerabilities Administration Images 101 Safety Supply Chain Telephone System Multi-Factor Authentication Mobility Cost Management Robot Permissions Alt Codes Directions Videos Paperless Assessment Electronic Health Records Application Wasting Time Co-managed IT Downtime Unified Threat Management Technology Care Hosted Solution IBM Trend Micro Specifications Security Cameras Unified Threat Management Fraud Typing Microchip Business Communications Internet Exlporer Software as a Service Username Network Congestion Managing Costs Scams Google Drive User Error Hybrid Work Knowledge eCommerce Black Friday SSID Virtual Assistant Human Resources Database Surveillance Point of Sale Competition 5G IT Technicians Virtual Machine Cables Google Docs Unified Communications Proxy Server Reviews Experience Cookies Cyber Monday Medical IT Hotspot Transportation Bitcoin Network Management Google Apps Running Cable Tech Support Tactics Development IT Maintenance Monitors Mirgation Hypervisor Google Wallet Business Intelligence Shopping Nanotechnology Optimization User PowerPoint Language Employer/Employee Relationships Windows 8 Shortcuts Laptop Websites Addiction Ransmoware Management PCI DSS Chatbots Navigation Drones SharePoint Vendors Gig Economy IP Address Electronic Medical Records Screen Reader Distributed Denial of Service Computing Infrastructure Teamwork Be Proactive Halloween Service Level Agreement Internet Service Provider Workforce Regulations Compliance Writing Identity Evernote Lenovo Threats Bookmark Virtual Reality Smart Tech Memes Recovery Alerts SQL Server Hacks Server Management Workplace Strategies Scary Stories Private Cloud Download Net Neutrality Hard Drives Meta Identity Theft Financial Data Domains Fun History Superfish Amazon Deep Learning Browsers Smartwatch Twitter Connectivity IT Break Fix Azure Error Upload Procurement Refrigeration Outsource IT Education Social Network Telework Public Speaking Social Engineering Cyber security Multi-Factor Security Tech Environment CES Lithium-ion battery Media Remote Computing IoT Communitications Dark Web Entrepreneur Mobile Computing Trends Supply Chain Management Small Businesses Tablet Customer Resource management FinTech Search Regulations Google Calendar Term Displays Best Practice Data Analysis Alert Star Wars IT Assessment Microsoft Excel Dark Data Staff Value Managed IT Buisness File Sharing Gamification Flexibility Undo Outsourcing IT solutions Organization How To Social Networking Legislation Legal Business Growth Fileless Malware Digital Security Cameras Notifications Smart Devices Content Remote Working Wearable Technology Memory Workplace Travel Hiring/Firing Google Maps Health IT Cortana Motherboard Data Breach Comparison Google Play Techology

Blog Archive